Academic literature on the topic 'Decentralized data management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Decentralized data management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Decentralized data management"

1

Lamehamedi, Houda, and Boleslaw K. Szymanski. "Decentralized data management framework for Data Grids." Future Generation Computer Systems 23, no. 1 (January 2007): 109–15. http://dx.doi.org/10.1016/j.future.2006.06.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Lynn, Bowen Lou, and Lorin Hitt. "Data Analytics Supports Decentralized Innovation." Management Science 65, no. 10 (October 2019): 4863–77. http://dx.doi.org/10.1287/mnsc.2019.3344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade, and Suprakash Sudarsanan Nair. "Patient data management using blockchain technology." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (December 1, 2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.

Full text
Abstract:
<span>The patient data management is an essential component of healthcare systems, the secure and efficient data processing is important for the medical data. Data security, interoperability and privacy are the key requirements of data storage systems of healthcare organizations. The electronic medical records have become a key technique to maintain patient information in hospitals due to the technology revolution. Some hospital systems are also using server-based patient detail management systems, they require considerable storage to record all of the patient's medical reports, limiting scalability. They are facing difficulties, including interoperability, security and privacy worries, cyberattacks on centralized storage, and maintaining medical policy compliance simultaneously. The blockchain technology has come up with solution having decentralized and irreversible data storage. A distributed secure ledger of blockchain is the solution, enabling safe storage and retrieval of data. The proposed work yields effectively deployed smart contracts based on the system's functions, real-time patient health monitoring. The main goal of this system is to bring the whole medical data together on a single platform, employing a secured decentralized approach to store and retrieve medical information effectively.</span>
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yun, Zhi Tang, Jing Huang, Yue Ding, Hao He, Xiaosheng Xia, and Chunhua Li. "A Decentralized Model for Spatial Data Digital Rights Management." ISPRS International Journal of Geo-Information 9, no. 2 (February 1, 2020): 84. http://dx.doi.org/10.3390/ijgi9020084.

Full text
Abstract:
The copyright of data is a key point that needs to be solved in spatial data infrastructure for data sharing. In this paper, we propose a decentralized digital rights management model of spatial data, which can provide a novel way of solving the existing copyright management problem or other problems in spatial data infrastructure for data sharing. An Ethereum smart contract is used in this model to realize spatial data digital rights management function. The InterPlanetary File System is utilized as external data storage for storing spatial data in the decentralized file system to avoid data destruction that is caused by a single point of failure. There is no central server in the model architecture, which has a completely decentralized nature and it makes spatial data rights management not dependent on third-party trust institutions. We designed three spatial data copyright management algorithms, developed a prototype system to implement and test the model, used the smart contract security verification tool to check code vulnerabilities, and, finally, discussed the usability, scalability, efficiency, performance, and security of the proposed model. The result indicates that the proposed model not only has diversified functions of copyright management compared with previous studies on the blockchain-based digital rights management, but it can also solve the existing problems in traditional spatial data infrastructure for data sharing due to its characteristics of complete decentralization, mass orientation, immediacy, and high security.
APA, Harvard, Vancouver, ISO, and other styles
5

Berezko, Leonid, and V. Tatianchuk. "Decentralized access management scheme to the cloud data storage." Computer systems and network 1, no. 1 (December 3, 2019): 9–14. http://dx.doi.org/10.23939/csn2019.01.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meisami, Sajad, Sadaf Meisami, Melina Yousefi, and Mohammad Reza Aref. "Combining Blockchain and IoT for Decentralized Healthcare Data Management." International Journal on Cryptography and Information Security 13, no. 1 (March 30, 2023): 35–50. http://dx.doi.org/10.5121/ijcis.2023.13102.

Full text
Abstract:
The emergence of the Internet of Things (IoT) has resulted in a significant increase in research on e-health. As the amount of patient data grows, it has become increasingly challenging to protect patients' privacy. Patient data is commonly stored in the cloud, making it difficult for users to control and protect their information. Moreover, the recent rise in security and surveillance breaches in the healthcare industry has highlighted the need for a better approach to data storage and protection. Traditional models that rely on third-party control over patients' healthcare data are no longer reliable, as they have proven vulnerable to security breaches. To address these issues, blockchain technology has emerged as a promising solution. Blockchain-based protocols have the potential to provide a secure and efficient system for e-health applications that does not require trust in third-party intermediaries. The proposed protocol outlined in this paper uses a blockchain-based approach to manage patient data securely and efficiently. Unlike Bitcoin, which is primarily used for financial transactions, the protocol described here is designed specifically for e-health applications. It employs a consensus mechanism that is more suitable for resource constrained IoT devices, thereby reducing network costs and increasing efficiency. The proposed protocol also provides a privacy-preserving access control mechanism that enables patients to have more control over their healthcare data. By leveraging blockchain technology, the protocol ensures that only authorized individuals can access the patient's data, which helps prevent data breaches and other security issues. Finally, the security and privacy of the proposed protocol are analysed to ensure that it meets the necessary standards for data protection. The protocol's effectiveness and efficiency are tested under different scenarios to ensure that it can perform reliably and consistently. Finally, the protocol proposed in this paper shows that how blockchain can be used to provide a secure and efficient system that empowers patients to take control of their healthcare data.
APA, Harvard, Vancouver, ISO, and other styles
7

Jorwekar, Harshal. "Medical Records Management with Decentralized Framework." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 10, 2021): 193–200. http://dx.doi.org/10.22214/ijraset.2021.35703.

Full text
Abstract:
The mystery between the emotional improvement of medical information protection interest and long periods of administrative guideline has eased back advancement for electronic medical records (EMRs). In this paper, we propose a efficient, secure and decentralized Blockchain system for data privacy preserving and sharing. This manages confidentiality, authentication, data preserving and data sharing when handling sensitive information. We exploit consortium Blockchain and smart contracts to accomplish secure information storage and sharing, which forestalls information sharing without consent. The patient’s historical data, medical record, patient’s private information is very critical and needs to be stored and maintained securely. The proposed framework builds information security and eliminates the cost, time, and assets needed to deal with the medical care information records.
APA, Harvard, Vancouver, ISO, and other styles
8

Smita Chaudhari, Soham Mohite, Shreya Kumbhakarn, Viren Rathod, and Sakshi Khairnar. "Blockchain based solution for academic certificate management system using smart contract." International Journal of Science and Research Archive 8, no. 1 (January 30, 2023): 291–197. http://dx.doi.org/10.30574/ijsra.2023.8.1.0037.

Full text
Abstract:
Educational certificates serve as proof of qualification for their recipients. These certificates are subject to forgery and manipulation. The traditional way to verify the authenticity and integrity of certificates has not shown much efficiency in preventing fraud. Universities and companies need to collect, keep and update an unmanageable number of documents and papers from the applicants, in order to verify the competencies that the applicant claims and to determine forged documents. Another concern is about cyber criminals trying to hack the university’s centralized databases to alter the data. Moreover, corrupt officials may be bribed to illegally change a student’s academic data without fulfilling the requirements. Blockchain technology has emerged as a new approach to building decentralized reliable systems. It provides an effective and efficient way to protect sensitive data from subsequent change or deletion. Smart contracts decentralize the critical services in the certification process to improve transparency, accuracy, data privacy, and reliability. Unlike the traditional verification methods, the system will be designed in a decentralized way by using blockchain technology. Decentralization enhances the security and robustness features of the system by avoiding single points of failure and removing the need to put trust in any single party.
APA, Harvard, Vancouver, ISO, and other styles
9

Botchkaryov, A. "METHOD FOR DECENTRALIZED CONTROL OF ADAPTIVE DATA COLLECTION PROCESSES IN AUTONOMOUS DISTRIBUTED SYSTEMS." Computer systems and network 5, no. 1 (December 16, 2023): 8–19. http://dx.doi.org/10.23939/csn2023.01.008.

Full text
Abstract:
The problem of monitoring a computer network under conditions of limitations on the use of system resources and high requirements for the survivability of the monitoring system has been considered. An autonomous decentralized computer network monitoring system has been developed, consisting of a team of software agents. Each agent can operate in two modes: main mode and monitoring system management console mode. In the main mode, the agent collects information about the computer network. In management console mode, the agent provides the user with access to information collected by all agents and allows the user to execute commands to manage the monitoring system. The developed monitoring system allows you to obtain more reliable information about the operation of the network with greater efficiency under the conditions of limitations on the use of system resources specified by the user. The autonomous monitoring system is created on the basis of the concept of multi-agent systems, within which a software agent of the system has some initiative for planning and implementing monitoring scenarios. The operation of software agents implements methods for organizing adaptive processes for collecting information using the principles of self-organization and the concept of structural adaptation. A decentralized software architecture for an autonomous monitoring system without a control center has been proposed. This ensures high reliability and survivability of the monitoring system. The software architecture of the autonomous monitoring system implements the SMA application software interface and the corresponding software library, which allows you to collect statistical data on the operation of the computer network and its nodes. The implementation of a software agent and a management console for an autonomous computer network monitoring system has been considered. Key words: computer network monitoring, autonomous system, decentralized control, software agent
APA, Harvard, Vancouver, ISO, and other styles
10

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma, and Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain." Journal of Global Information Management 31, no. 2 (December 29, 2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Full text
Abstract:
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, central, or federated identity management models. In this exploratory work, the authors employ qualitative secondary case-based study research methodology to understand the challenges of the current digital identity management landscape and explore the possible benefits of DID as an emerging identity management paradigm. They propose a conceptual cube framework for analysing and studying various DID platforms thereby contributing to both the theory and practice of digitally secure identity.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Decentralized data management"

1

Essilfie-Conduah, Nana S. M. Massachusetts Institute of Technology. "A systems analysis of insider data exfiltration : a decentralized framework for disincentivizing and auditing data exfiltration." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122440.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 105-110).
It has become common place to hear of data breaches. Typically, we hear of external hackers as the perpetrators, however, the reality is there is a high frequency of threats from insiders within an organization and that the cost and challenge in detecting these threats is considerable. The issue has affected companies in multiple private sectors (finance, retail) and the public sector is also at risk as apparent with the Edward Snowden and Chelsea Manning cases. This thesis explores the current space of insider threats in terms of frequency, cost and complexity in attack assessment. It also explores the multiple perspectives and stakeholders that make up the complex insider threat systems. Insights from multiple insider threat cases as well as subject matter experts in cyber security were used to model and pinpoint the high value metrics around access management and logging that will aid audit efforts. Following this an exploration of kill chains, blockchain technology and hierarchical organization exploration is made. Research findings highlight the wide reach of excessive privileges and the crucial role resource access and event logging of stakeholder actions plays in the success of insider threat prevention. In response to this finding a proposal is made for a combined solution that aims to provide an easy and accessible interface for searching and requesting access to resources that scales with an organization. This proposal suggests the capitalization of the transparent and immutable properties of blockchain to ledger the requesting and approval of file access through dynamic and multi user approval logic. The solution combines simplistic file-based resource access in an accessible manner with a multi layered security approach that adds further hurdles for bad actors but provides a visible and reliable look back on an immutable audit path.
by Nana Essilfie-Conduah.
S.M. in Engineering and Management
S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
APA, Harvard, Vancouver, ISO, and other styles
2

Hull, R. "Decentralized resource and data management in a fault tolerant distributed computer system." Thesis, University of Sussex, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.356505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fleming, Theodor. "Decentralized Identity Management for a Maritime Digital Infrastructure : With focus on usability and data integrity." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-155115.

Full text
Abstract:
When the Internet was created it did not include any protocol for identifying the person behind the computer. Instead, the act of identification has primarily been established by trusting a third party. But, the rise of Distributed Ledger Technology has made it possible to authenticate a digital identity and build trust without the need of a third party. The Swedish Maritime Administration are currently validating a new maritime digital infrastructure for the maritime transportation industry. The goal is to reduce the number of accidents, fuel consumption and voyage costs. Involved actors has their identity stored in a central registry that relies on the trust of a third party. This thesis investigates how a conversion from the centralized identity registry to a decentralized identity registry affects the usability and the risk for compromised data integrity. This is done by implementing a Proof of Concept of a decentralized identity registry that replaces the current centralized registry, and comparing them. The decentralized Proof of Concept’s risk for compromised data integrity is 95.1% less compared with the centralized registry, but this comes with a loss of 53% in efficiency.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Mianyu Kam Moshe Kandasamy Nagarajan. "A decentralized control and optimization framework for autonomic performance management of web-server systems /." Philadelphia, Pa. : Drexel University, 2007. http://hdl.handle.net/1860/2643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ponnakanti, Hari Priya. "A Hyperledger based Secure Data Management and Disease Diagnosis Framework Design for Healthcare." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1627662565879478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Diallo, El-hacen. "Study and Design of Blockchain-based Decentralized Road Traffic Data Management in VANET (Vehicular Ad hoc NETworks)." Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG017.

Full text
Abstract:
La prolifération des véhicules autonomes a imposé la nécessité d'une gestion plus sécurisée des données du trafic routier (c'est-à-dire les événements liés aux accidents, l'état de la circulation, le rapport d'attaque, etc.) dans les réseaux Ad hoc pour véhicules (VANET). Les systèmes centralisés traditionnels répondent à ce besoin en exploitant des serveurs distants éloignés des véhicules. Cette solution n’est pas optimale, car les données relatives au trafic routier doivent être distribuées et mises en cache de manière sécurisée à proximité des véhicules. Cela améliore la latence et réduit la surcharge sur la bande passante du réseau de communication.La technologie Blockchain est apparue comme une solution prometteuse grâce à sa propriété de décentralisation. Certaines questions restent néanmoins sans réponse. Comment concevoir une validation appropriée des données du trafic routier par blockchain, qui semble plus complexe qu'une transaction financière ? Quelles sont les performances attendues dans les scénarios VANET ?Cette thèse offre des réponses à ces questions en concevant une gestion des données du trafic routier adaptée aux contraintes imposée par la blockchain. La performance ainsi que la validité des protocoles proposés sont ensuite évaluées à travers diverses simulations de scénarios pris d’un trafic routier réel.Nous proposons d'abord une adaptation du mécanisme de consensus Preuve de Travail (PoW) dans un réseau VANET, où les infrastructures situées aux bords de routes (RSUs) maintiennent une base de données décentralisée des données du trafic routier. Ensuite, une évaluation rigoureuse des performances en présence de véhicules malveillants est réalisée. Les résultats ont montré que le schéma proposé permet de construire une base de données sécurisée et décentralisée des données du trafic routier au niveau des RSUs.Ensuite, motivés par nos résultats, nous utilisons PBFT (Practical Byzantine Fault Tolerance), un mécanisme de consensus établi grâce au vote, pour réduire la latence dans le processus de validation dans une blockchain. Les RSUs validatrices de données de trafic sont sélectionnées dynamiquement en fonction de la localisation des événements du trafic. Nous proposons un nouveau schéma de réplication de la blockchain entre les RSUs. Cette réplication choisit un compromis entre les performances en termes de latence et la fréquence de réplication des blocs de la chaine. Les résultats de simulation montrent de meilleures performances, lorsque les RSUs validatrices, sont réduites au minimum.Dans la dernière partie de la thèse, nous proposons un modèle de confiance pour réduire au minimum le nombre de validatrices sans compromettre la décentralisation et l'équité de la création de blocs. Ce modèle de confiance s'appuie sur la distance géographique et la confiance des RSUs pour former dynamiquement un groupe de validateurs pour chaque bloc de la chaîne. Nous formalisons et évaluons ce modèle de réputation, en considérant divers scénarios avec des RSUs malicieuses. Les résultats démontrent l'efficacité de la proposition pour minimiser le groupe de validateurs tout en isolant les RSUs malicieuses
The prominence of autonomous vehicles has imposed the need for more secure road traffic data (i.e., events related to accidents, traffic state, attack report, etc.) management in VANET (Vehicular Ad hoc NETworks). Traditional centralized systems address this need by leveraging remote servers far from the vehicles. That is not an optimal solution as road traffic data must be distributed and securely cached close to cars to enhance performance and reduce bandwidth overhead. Blockchain technology offers a promising solution thanks to its decentralization property. But some questions remain unanswered: how to design blockchain-adapted traffic data validation, which is more complex than an economic transaction? What is the performance in real-world VANET scenarios?This thesis addresses those questions by designing blockchain-adapted traffic data management. The performance analysis and the validation of the proposed schemes are conducted through various simulations of real scenarios.We first adapt the PoW (Proof of Work) consensus mechanism to the VANET context whereby the RSUs (Road Side Units) maintain the decentralized database of road traffic data. After that, the proposed scheme is evaluated in the presence of malicious vehicles. The results show that the proposed approach enables a secure and decentralized database of road traffic data at the RSUs level.Next, motivated by our findings, we adopt PBFT (Practical Byzantine Fault Tolerance), a voting-based consensus mechanism, to reduce the blockchain latency. The traffic data validators are dynamically selected based on traffic event appearance location. Finally, we propose a novel blockchain replication scheme between RSUs. This scheme offers a trade-off between the blockchain latency and replication frequency. Simulation results show better performance when the validators (i.e., RSUs) are minimized.Finally, we propose a trust model to minimize the validators without compromising the decentralization and fairness of block-creation. This trust model leverages the geographical distance and the RSUs trust to dynamically form a group of validators for each block in the blockchain. We formalize and evaluate this trust model, considering various scenarios with malicious RSUs. Results show the efficiency of the proposed model to minimize the validators group while isolating malicious RSUs
APA, Harvard, Vancouver, ISO, and other styles
7

Bögels, Machteld. "Digital Waste : ELIMINATING NON-VALUE ADDING ACTIVITIES THROUGH DECENTRALIZED APPLICATION DEVELOPMENT." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-263903.

Full text
Abstract:
In an era where the network of interconnected devices is rapidly expanding, it is difficult for organizations to adapt to the increasingly data-rich and dynamic environment while remaining competitive. Employees experience that much of their time and resources is spent daily on repetitive, inefficient and mundane tasks. Whereas lean manufacturing has manifested itself as a well-known optimization concept, lean information management and the removal of waste is not yet being used to its full potential as its direct value is less visible. A case study was conducted to define which types of non-value adding activities can be identified within information flows and to determine whether decentralized application development can eliminate this digital waste. An internal information flow was modelled, analyzed and optimized by developing customized applications on the Microsoft Power Platform. Based on literature from the field of manufacturing and software development, a framework was developed to categorize digital waste as well as higher order root causes in terms of business strategy and IT infrastructure. While decentralized app development provides the ability to significantly reduce operational digital waste in a simplified manner, it can also enable unnecessary expansion of a common data model and requires application lifecycle management efforts as well as edge security to ensure data compliance and governance. Although limited to one case study, the suggested framework could give insights to organizations that aim to optimize internal workflows by identifying and eliminating digital waste and its root causes.
I en tid där nätverk av sammankopplade enheter expanderar snabbt, är det svårt för organisationer att anpassa sig till den allt mer datoriserade och dynamiska miljön och samtidigt förbli konkurrenskraftiga. Anställda upplever att mycket av deras tid och resurser spenderas på repetitiva, ineffektiva och vardagliga uppgifter. Lean manufacturing har visat sig vara ett välkänt optimeringskoncept, dock har informationshantering och avlägsnande av slöseri inte ännu nått sin fulla potential eftersom dess direkta värde är svårare att se och räkna. En fallstudie genomfördes för att definiera vilka typer av icke-värdeskapande aktiviteter som kan identifieras inom informationsflöden och för att avgöra om decentraliserad applikationsutveckling kan eliminera detta digitala slöseri. Ett internt informationsflöde modellerades, analyserades och optimerades genom att utveckla anpassade applikationer på Microsoft Power Platform. Baserat på litteratur från tillverknings- och mjukvaruutvecklingsområdet utvecklades en ram för att kategorisera digitalt slöseri samt högre grundorsaker när det gäller affärsstrategi och ITinfrastruktur. Medan decentraliserad apputveckling ger möjlighet att avsevärt minska det operativa digitala slöseriet på ett förenklat sätt, så kan det också möjliggöra onödig expansion av en gemensam datamodell och kräver hantering av livscykelanalyser samt kantsäkerhet för att säkerställa datahantering och styrning. Trots begränsad till en fallstudie, så kan det föreslagna ramverket ge insikter till organisationer som syftar till att optimera interna arbetsflöden genom att identifiera och eliminera digitalt slöseri och dess grundläggande orsaker.
APA, Harvard, Vancouver, ISO, and other styles
8

Mehra, Varun S. M. Massachusetts Institute of Technology. "Optimal sizing of solar and battery assets in decentralized micro-grids with demand-side management." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/108959.

Full text
Abstract:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2017.
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 199-209).
Solar-based community micro-grids and individual home systems have been recognized as key enablers of electricity provision to the over one billion people living without energy access to-date. Despite significant cost reductions in solar panels, these options can still be cost-prohibitive mainly due over-sizing of generation assets corresponding with a lack of ability to actively manage electricity demand. The main contribution shared is the methodology and optimization approach of least-cost combinations of generation asset sizes, in solar panels and batteries, subject to meeting reliability constraints; these results are based on a techno-economic modeling approach constructed for assessing decentralized micro-grids with demand-side management capabilities. The software model constructed is implemented to represent the technical characteristics of a low-voltage, direct current network architecture and computational capabilities of a power management device. The main use-case of the model presented is based on serving representative, aggregated, household-level load profiles combined with simulated power output from solar photovoltaic modules and the kinetic operating constraints of lead-acid batteries at hourly timesteps over year-long simulations. The state-space for solutions is based on available solar module and battery capacities from distributors in Jharkhand, India. Additional work presented also extends to real-time operation of such isolated micro-grids with requisite local computation. First, for load disaggregation and forecasting purposes, clustering algorithms and statistical learning techniques are applied on quantitative results from inferred load profiles based on data logged from off-grid solar home systems. Second, results from an optimization approach to accurately parametrize a lead-acid battery model for potential usage in real-time field implementation are also shared. Economic results, sensitivity analyses around key technical and financial input assumptions, and comparisons in cost reductions due to the optimization of solar and battery assets for decentralized micro-grids with demand-side management capabilities are subsequently presented. The work concludes with insights and policy implications on establishing differentiated willingness-to-pay, tiers of service, and dynamic price-setting in advanced micro-grids.
by Varun Mehra.
S.M. in Technology and Policy
S.M.
APA, Harvard, Vancouver, ISO, and other styles
9

Rodriguez, German Darío Rivas. "Decentralized Architecture for Load Balancing in District Heating Systems." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3329.

Full text
Abstract:
Context. In forthcoming years, sustainability will lead the development of society. Implementation of innovative systems to make the world more sustainable is becoming one of the key points for science. Load balancing strategies aim to reduce economic and ecological cost of the heat production in district heating systems. Development of a decentralized solution lies in the objective of making the load balancing more accessible and attractive for the companies in charge of providing district-heating services. Objectives. This master thesis aims to find a new alternative for implementing decentralized load balancing in district heating systems. Methods. The development of this master thesis involved the review of the state-of-the-art on demand side management in district heating systems and power networks. It also implied the design of the architecture, creation of a software prototype and execution of a simulation of the system to measure the performance in terms of response time. Results. Decentralized demand side management algorithm and communication framework, software architecture description and analysis of the prototype simulation performance. Conclusions. The main conclusion is that it is possible to create a decentralized algorithm that performs load balancing without compromising the individuals’ privacy. It is possible to say that the algorithm shows good levels of performance not only from the system aggregated response time, but also from the individual performance, in terms of memory consumption and CPU consumption.
(+46) 709706206
APA, Harvard, Vancouver, ISO, and other styles
10

Ribe-Baumann, Elizabeth [Verfasser], Kai-Uwe [Akademischer Betreuer] Sattler, Jochen [Akademischer Betreuer] Seitz, and Manfred [Akademischer Betreuer] Hauswirth. "Resource and Location Aware Robust Decentralized Data Management / Elizabeth Ribe-Baumann. Gutachter: Jochen Seitz ; Manfred Hauswirth. Betreuer: Kai-Uwe Sattler." Ilmenau : Universitätsbibliothek Ilmenau, 2015. http://d-nb.info/1074139607/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Decentralized data management"

1

Yu, Ting, and Sushil Jajodia, eds. Secure Data Management in Decentralized Systems. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-27696-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manyika, J. Data fusion and sensor management: A decentralized information-theoretic approach. New York: Ellis Horwood, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IFIP Working Conference on Information Systems Development for Decentralized Organizations (1995). Information systems development for decentralized organizations: Proceedings of the IFIP working conference on information systems development for decentralized organizations, 1995. London: Chapman & Hall, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Hospitals and Health Care. Veterans' Administration's decentralized hospital computer program: Hearing before the Subcommittee on Hospitals and Health Care of the Committee on Veterans' Affairs, House of Representatives, One hundredth Congress, first session, April 8, 1987. Washington: U.S. G.P.O., 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Society, IEEE Computer, Jōhō Shori Gakkai (Japan), and Keisoku Jidō Seigyo Gakkai (Japan), eds. ISADS 97, Third International Symposium on Autonomous Decentralized Systems: Proceedings, April 9-11, 1997, Berlin, Germany. Los Alamitos, Calif: IEEE Computer Society Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kramer, Joe. Managing a year 2000 program in a decentralized environment at Amoco. [Atlanta, Ga.]: Information Management Forum, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jajodia, Sushil, and Ting Yu. Secure Data Management in Decentralized Systems. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jajodia, Sushil, and Ting Yu. Secure Data Management in Decentralized Systems. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

(Editor), Ting Yu, and Sushil Jajodia (Editor), eds. Secure Data Management in Decentralized Systems (Advances in Information Security). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Solvberg, Arne, John Krogstie, and Anne Helga Seltveit. Information Systems Development for Decentralized Organization. Springer, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Decentralized data management"

1

Prathibha, Soma, V. Saiganesh, S. Lokesh, Avudaiappan Maheshwari, and M. A. Kishore. "Propchain: Decentralized Property Management System." In Advances in Data and Information Sciences, 347–58. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-6906-7_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Venkatesan, Subramanian, Shubham Sahai, Sandeep Kumar Shukla, and Jaya Singh. "Secure and Decentralized Management of Health Records." In Studies in Big Data, 115–39. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9547-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Pengfei, Wenjuan Cui, and Jianhui Li. "A Framework of Data Sharing System with Decentralized Network." In Big Scientific Data Management, 255–62. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-28061-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sonakshi, Sujal Garg, Taanvi Jain, Priyanka Rani, and Neha Batra. "Decentralized Library Management System Using Blockchain Technology." In Proceedings of Data Analytics and Management, 355–62. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6289-8_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Asano, Yasuhito, Yang Cao, Soichiro Hidaka, Zhenjiang Hu, Yasunori Ishihara, Hiroyuki Kato, Keisuke Nakano, et al. "Bidirectional Collaborative Frameworks for Decentralized Data Management." In Communications in Computer and Information Science, 13–51. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93849-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Messanakis, Kostas, Petros Demetrakopoulos, and Yannis Kotidis. "Smart-Views: Decentralized OLAP View Management Using Blockchains." In Big Data Analytics and Knowledge Discovery, 216–21. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86534-4_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Weihai. "Decentralized Orchestration of BPEL Processes with Execution Consistency." In Advances in Data and Web Management, 665–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00672-2_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rathore, Shikha, Jitendra Agrawal, Sanjeev Sharma, and Santosh Sahu. "Efficient Decentralized Key Management Approach for Vehicular Ad Hoc Network." In Data, Engineering and Applications, 147–61. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Spenger, Jonas, Paris Carbone, and Philipp Haller. "WIP: Pods: Privacy Compliant Scalable Decentralized Data Services." In Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 70–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93663-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schanzenbach, Martin, and Christian Banse. "Managing and Presenting User Attributes over a Decentralized Secure Name System." In Data Privacy Management and Security Assurance, 213–20. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Decentralized data management"

1

Rodrig, Maya, and Anthony LaMarca. "Decentralized weighted voting for P2P data management." In the 3rd ACM international workshop. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/940923.940939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Utete, Simukai W., and Hugh F. Durrant-Whyte. "Network management in decentralized data fusion networks." In Photonics for Industrial Applications, edited by Paul S. Schenker. SPIE, 1994. http://dx.doi.org/10.1117/12.189071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmad, Mumtaz, and Abdessamad Imine. "Decentralized Collaborative Editing Platform." In 2015 16th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2015. http://dx.doi.org/10.1109/mdm.2015.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carvalho Ota, Fernando Kaway, Cristina G. B. de Oliveira, Rafael Meira Silva, and Radu State. "A Decentralized Super App." In 2023 24th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2023. http://dx.doi.org/10.1109/mdm58254.2023.00024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lucking, Markus, Raphael Manke, Markus Schinle, Lukas Kohout, Stefan Nickel, and Wilhelm Stork. "Decentralized patient-centric data management for sharing IoT data streams." In 2020 International Conference on Omni-layer Intelligent Systems (COINS). IEEE, 2020. http://dx.doi.org/10.1109/coins49042.2020.9191653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Heyden, Marco, Jürgen Wilwer, Edouard Fouché, Steffen Thoma, Sven Matthiesen, and Thomas Gwosch. "Tandem Outlier Detectors for Decentralized Data." In SSDBM 2022: 34th International Conference on Scientific and Statistical Database Management. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3538712.3538748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kusunoki, Kei, Yoshihiro Kawahara, and Tohru Asami. "Supervisor application for content management in named data networking." In 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE, 2013. http://dx.doi.org/10.1109/isads.2013.6513423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moon, Jaewon, Seungwoo Kum, Youngkee Kim, Vlado Stankovski, Uros Pascinski, and Petar Kochovski. "A Decentralized AI Data Management System In Federated Learning." In 2020 International Conference on Intelligent Systems and Computer Vision (ISCV). IEEE, 2020. http://dx.doi.org/10.1109/iscv49265.2020.9204271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manyika, James M., and Hugh F. Durrant-Whyte. "Information-theoretic approach to management in decentralized data fusion." In Applications in Optical Science and Engineering, edited by Paul S. Schenker. SPIE, 1992. http://dx.doi.org/10.1117/12.131652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Greenway, Phil, and Rob H. Deaves. "Information filter for decentralized data fusion and sensor management." In SPIE's International Symposium on Optical Engineering and Photonics in Aerospace Sensing, edited by Ivan Kadar and Vibeke Libby. SPIE, 1994. http://dx.doi.org/10.1117/12.177768.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Decentralized data management"

1

Jamasb, Tooraj, Emanuele Giovannetti, Manuel Llorca, Daniel Davi-Arderius, and Golnoush Soroush. A Brief Economics of Energy Data Space: The EDDIE Project. Copenhagen School of Energy Infrastructure, 2023. http://dx.doi.org/10.22439/csei.pb.016.

Full text
Abstract:
The appeal of decentralised approaches to structure energy generation, transmission and distribution networks, and consumption to scholars and practitioners has grown in the past 20-30 years. Moreover, in the coming years digitalisation will become a key enabler for the sustainable and efficient management of key areas in our economies including the energy sector. A European, decentralised, and open-source energy data space solution such as the one proposed in the Horizon Europe Innovation Action project EDDIE (European Distributed Data Infrastructure for Energy), fits into this trend. In this policy brief the authors outline their initial views on EDDIE and some economic concepts related to the project’s vision.
APA, Harvard, Vancouver, ISO, and other styles
2

Bourrier, Mathilde, Michael Deml, and Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, November 2022. http://dx.doi.org/10.31265/usps.254.

Full text
Abstract:
The purpose of this report is to compare the risk communication strategies and public health mitigation measures implemented by Germany, Norway, Sweden, Switzerland, and the United Kingdom (UK) in 2020 in response to the COVID-19 pandemic based on publicly available documents. The report compares the country responses both in relation to one another and to the recommendations and guidance of the World Health Organization where available. The comparative report is an output of Work Package 1 from the research project PAN-FIGHT (Fighting pandemics with enhanced risk communication: Messages, compliance and vulnerability during the COVID-19 outbreak), which is financially supported by the Norwegian Research Council's extraordinary programme for corona research. PAN-FIGHT adopts a comparative approach which follows a “most different systems” variation as a logic of comparison guiding the research (Przeworski & Teune, 1970). The countries in this study include two EU member States (Sweden, Germany), one which was engaged in an exit process from the EU membership (the UK), and two non-European Union states, but both members of the European Free Trade Association (EFTA): Norway and Switzerland. Furthermore, Germany and Switzerland govern by the Continental European Federal administrative model, with a relatively weak central bureaucracy and strong subnational, decentralised institutions. Norway and Sweden adhere to the Scandinavian model—a unitary but fairly decentralised system with power bestowed to the local authorities. The United Kingdom applies the Anglo-Saxon model, characterized by New Public Management (NPM) and decentralised managerial practices (Einhorn & Logue, 2003; Kuhlmann & Wollmann, 2014; Petridou et al., 2019). In total, PAN-FIGHT is comprised of 5 Work Packages (WPs), which are research-, recommendation-, and practice-oriented. The WPs seek to respond to the following research questions and accomplish the following: WP1: What are the characteristics of governmental and public health authorities’ risk communication strategies in five European countries, both in comparison to each other and in relation to the official strategies proposed by WHO? WP2: To what extent and how does the general public’s understanding, induced by national risk communication, vary across five countries, in relation to factors such as social capital, age, gender, socio-economic status and household composition? WP3: Based on data generated in WP1 and WP2, what is the significance of being male or female in terms of individual susceptibility to risk communication and subsequent vulnerability during the COVID-19 outbreak? WP4: Based on insight and knowledge generated in WPs 1 and 2, what recommendations can we offer national and local governments and health institutions on enhancing their risk communication strategies to curb pandemic outbreaks? WP5: Enhance health risk communication strategies across five European countries based upon the knowledge and recommendations generated by WPs 1-4. Pre-pandemic preparedness characteristics All five countries had pandemic plans developed prior to 2020, which generally were specific to influenza pandemics but not to coronaviruses. All plans had been updated following the H1N1 pandemic (2009-2010). During the SARS (2003) and MERS (2012) outbreaks, both of which are coronaviruses, all five countries experienced few cases, with notably smaller impacts than the H1N1 epidemic (2009-2010). The UK had conducted several exercises (Exercise Cygnet in 2016, Exercise Cygnus in 2016, and Exercise Iris in 2018) to check their preparedness plans; the reports from these exercises concluded that there were gaps in preparedness for epidemic outbreaks. Germany also simulated an influenza pandemic exercise in 2007 called LÜKEX 07, to train cross-state and cross-department crisis management (Bundesanstalt Technisches Hilfswerk, 2007). In 2017 within the context of the G20, Germany ran a health emergency simulation exercise with WHO and World Bank representatives to prepare for potential future pandemics (Federal Ministry of Health et al., 2017). Prior to COVID-19, only the UK had expert groups, notably the Scientific Advisory Group for Emergencies (SAGE), that was tasked with providing advice during emergencies. It had been used in previous emergency events (not exclusively limited to health). In contrast, none of the other countries had a similar expert advisory group in place prior to the pandemic. COVID-19 waves in 2020 All five countries experienced two waves of infection in 2020. The first wave occurred during the first half of the year and peaked after March 2020. The second wave arrived during the final quarter. Norway consistently had the lowest number of SARS-CoV-2 infections per million. Germany’s counts were neither the lowest nor the highest. Sweden, Switzerland and the UK alternated in having the highest numbers per million throughout 2020. Implementation of measures to control the spread of infection In Germany, Switzerland and the UK, health policy is the responsibility of regional states, (Länders, cantons and nations, respectively). However, there was a strong initial centralized response in all five countries to mitigate the spread of infection. Later on, country responses varied in the degree to which they were centralized or decentralized. Risk communication In all countries, a large variety of communication channels were used (press briefings, websites, social media, interviews). Digital communication channels were used extensively. Artificial intelligence was used, for example chatbots and decision support systems. Dashboards were used to provide access to and communicate data.
APA, Harvard, Vancouver, ISO, and other styles
3

Occhiali, Giovanni, and Michael Falade. Missing the Forest for the Trees: Ekiti State’s Quest for Forestry Revenue and its Impact on Forest Management. Institute of Development Studies, August 2023. http://dx.doi.org/10.19088/ictd.2023.039.

Full text
Abstract:
Forests are important socio-economic assets in many low-income countries. However, they are often over-exploited as governments do not sufficiently valorise them, including by taxing them inefficiently. This is the case across Nigeria, where forest management and taxation has been effectively decentralised from the federal government to individual states. In this paper we assess the current forestry tax regime in Ekiti State, one of the eight Nigerian states where forests represent more than 50 per cent of land area, and where forest revenue has been historically relevant. Based on 16 interviews with government state officials, forest officers and actors from the industry, as well as data from the Forestry Commission, our analysis suggests that the ongoing depletion of forest resources in the state seems to be partially connected to an excessive focus on their capacity to generate revenue. The conceptualisation of the Ekiti State Forestry Commission as a revenue-raising agency rather than a management one, a continuous drive to extract revenue from the sector through outdated tax rates, and a view of the industry potential disconnected from the existing stock, all perversely led to a lower contribution from forestry to the state budget. While there is potential to reform both the structure of forestry taxes and their method of administration, evidence from our interviews suggests that priority should be given to enforcing a ban on forest exploitation for a period that is long enough to allow for its regrowth, at least in government reserves. This will require substantial sensitisation and engagement with actors in the sector, as well as increasing the monitoring capacity of the Forestry Commission. The Forestry Commission does not currently have enough staff to guarantee the enforcement of existing legislation, let alone a ban on all forest activities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography