Articles de revues sur le sujet « SHARED ACCESS LAYER – SERVICE »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : SHARED ACCESS LAYER – SERVICE.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « SHARED ACCESS LAYER – SERVICE ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Scott, Rachel E., et Gail Barton. « Promoting Interlibrary Loan in the Traditional Catalog and Discovery Layer : Two Pilot Projects ». Library Resources & ; Technical Services 62, no 2 (4 avril 2018) : 74. http://dx.doi.org/10.5860/lrts.62n2.74.

Texte intégral
Résumé :
This paper describes two projects that promote interlibrary loan (ILL) in both traditional online public access catalogs and discovery settings to address user frustrations with gaps in the collection. By creating and inserting OpenURL links into bibliographic records for titles held exclusively by external institutions, the authors leveraged the discovery capabilities of their shared catalog and promoted ILL as an alternative means of access. The second project targeted the overwhelming amount of content indexed in the library’s discovery layer that was not locally available. To more directly translate discovery into access, the authors worked with EBSCO to create and enable ILL CustomLinks for this content indexed by EBSCO Discovery Service and not available to their users. This paper presents ILL data to investigate whether these projects are changing the ways our users find and access content not held locally.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Qi, Min, et Junshu Wang. « Using the Internet of Things E-Government Platform to Optimize the Administrative Management Mode ». Wireless Communications and Mobile Computing 2021 (26 juillet 2021) : 1–11. http://dx.doi.org/10.1155/2021/2224957.

Texte intégral
Résumé :
This paper builds an intelligent E-Government platform based on the Internet of Things. It adopts a three-layer architecture model, including the government collection layer, the government network layer, and the government application layer. By making full use of data technology and information technology, government services can be realized in real-time perception, efficient operation, scientific decision-making, active service, and intelligent supervision and can be open and collaborative, so as to provide the public with better quality and more efficient and more responsive government services. In addition, this paper has realized optimization in the aspects of government service mode, Internet of Things application mode, and database structure. Through the use of big data technology, the government service information will be digitized and integrated, and through the data sharing and exchange platform, the government information resources will be intercommunicated and shared across departments, levels, and regions. The application mode has been upgraded. Compared with the traditional E-Government, the government has made a qualitative leap in the degree of automation of control, the intelligence of service and decision, the remote support ability, and the space-time scope that government can control. The distributed management mode of the SQL Server is adopted to realize the exchange of requested data and process the data content, which can greatly improve the working efficiency of the system. Finally, through testing, the government affairs management system has good stability; there is no congestion and delay when multiple users access the system, so the response speed and efficiency of the system basically meet the requirements.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Oh, Se-Ra, et Young-Gab Kim. « AFaaS : Authorization framework as a service for Internet of Things based on interoperable OAuth ». International Journal of Distributed Sensor Networks 16, no 2 (février 2020) : 155014772090638. http://dx.doi.org/10.1177/1550147720906388.

Texte intégral
Résumé :
Internet of Things has become a fundamental paradigm in our everyday lives. However, standards and technologies are often designed without considering interoperability, which is a critical issue for Internet of Things. Internet of Things environment requires interoperability to share resources (e.g. data and services) between heterogeneous Internet of Things domains. The open authorization (OAuth) 2.0 framework that is actively used in Internet of Things (as well as in conventional web environments) also did not focus on interoperability. In other words, the systems that implement the same OAuth 2.0 standard cannot interoperate without additional support. For this reason, we propose an authorization framework as a service. Authorization framework as a service provides an additional authorization layer to support standard authorization capabilities as an interoperable secure wrapper between different domains. Besides, authorization framework as a service supports the four extended authorization grant flow types to issue an interoperable access token, which has a global access scope across multiple heterogeneous domains. With the authorization framework as a service, interoperability can be supported for heterogeneous domains, and token management can also be simple because an interoperable access token can represent several existing access tokens that have local access scopes. Furthermore, this article presents a feasible interoperability scenario, implementation, and security considerations for authorization framework as a service, focusing on Internet of Things platforms.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Edris, Ed Kamya Kiyemba, Mahdi Aiash et Jonathan Loo. « An Introduction of a Modular Framework for Securing 5G Networks and Beyond ». Network 2, no 3 (22 juillet 2022) : 419–39. http://dx.doi.org/10.3390/network2030026.

Texte intégral
Résumé :
Fifth Generation Mobile Network (5G) is a heterogeneous network in nature, made up of multiple systems and supported by different technologies. It will be supported by network services such as device-to-device (D2D) communications. This will enable the new use cases to provide access to other services within the network and from third-party service providers (SPs). End-users with their user equipment (UE) will be able to access services ubiquitously from multiple SPs that might share infrastructure and security management, whereby implementing security from one domain to another will be a challenge. This highlights a need for a new and effective security approach to address the security of such a complex system. This article proposes a network service security (NSS) modular framework for 5G and beyond that consists of different security levels of the network. It reviews the security issues of D2D communications in 5G, and it is used to address security issues that affect the users and SPs in an integrated and heterogeneous network such as the 5G enabled D2D communications network. The conceptual framework consists of a physical layer, network access, service and D2D security levels. Finally, it recommends security mechanisms to address the security issues at each level of the 5G-enabled D2D communications network.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Dugmore, Lois, et Saskia Bauweraerts. « When policy fails try something different integrated practice improve outcomes for dual diagnosis co-occurring service users accessing mental health services ». Drugs and Alcohol Today 21, no 2 (22 février 2021) : 157–70. http://dx.doi.org/10.1108/dat-06-2020-0036.

Texte intégral
Résumé :
Purpose This paper aims to discuss an initiative developed between, Leicestershire Partnership National Health Service Trust and Turning Point, which is the locally commissioned drug and alcohol service in Leicester, Leicestershire and Rutland. The aim was to improve outcomes for clients with dual diagnosis (co-occurring mental health and substance misuse) issues. The purpose of the change in working practice was to engage with local substance misuse agencies more effectively to improve clinical outcomes within this service user group. This was achieved through four interrelated approaches. This comprising providing an integrated service. It included building relationships with substance misuse services, providing specialist dual diagnosis clinics and the introduction of substance misuse workers onto mental health wards and group work specific to substance misuse. The outcomes included easier access to services for service users and greater uptake of service users who were moving onto substance misuse services. This led to a reduction in risk related to prescribing and fewer incidents related to prescribing changes and greater engagement in services. When service users were moving between services better communication led to prescriptions being transferred with no delay and to reduced dropout rates in service. There was improved access to substance misuse services, more referrals and take up of service taking place. There was a greater understanding by staff of co-occurring substance misuse and how to work with this client group. Closer working relationship with substance misuse services and shared skills led to greater confidence in managing this service user group. This demonstrates a cost effective service that can be replicated within similar settings. Design/methodology/approach In clinical practice, shared treatment has proved challenging in light of different service models (Laker, 2006). Substance misuse works on the premise of change comes from the individual, where recovery models in mental health offer a formalised approach. One of the challenges faced by services has been the inability for mental health services to recruit and services become overstretched (Rimmer, 2018); this gave an opportunity for a new method of working to be considered. This led to the development of a new service model. These changes were: • Improving the interface with substance misuse services to improve access to community substance misuse services for mental health clients. • To provide specialist staff within the dual diagnosis field to provide a clinic jointly with local drug and alcohol services. • Introduction of substance misuse workers as team members on acute mental health and rehab wards. • Group Substance Misuse programmes. Findings Working within an integrated model, yet maintaining separate organisations, by offering joint training and clinics has led to a greater understanding of each organisation’s work and increased engagement within the service user group.The introduction of substance misuse workers to acute and rehab mental health inpatient services encouraged service users to engage at the point of admission and to be referred into locally commissioned substance misuse services prior to the point of discharge. Engagement with staff has demonstrated better engagement with substance service by service users following discharge.For clients able to take leave assessment could take place prior to discharge. This led to an increased uptake in services. Due to no opiate substitution given on discharge decreased risk of prescribed medication overdose at point of discharge and led to increase in returning straight to substance misuse services. This meant that service users received medication quicker and the right dose and on discharge ensured reduced risk. The prescribing of Naloxone at discharge is yet to be assessed, but the risk of an overdose within seven days is well-documented and Naloxone is key in reversing this trend. This change in practice can be replicated in any mental health setting and has increased access to services for those using substances. Originality/value Is original no other services have substance workers or joint clinics across the UK. First inpatient unit to welcome patients back post-discharge to attend groups.
Styles APA, Harvard, Vancouver, ISO, etc.
6

El Bouchti, Abdelali, Abdelkrim Haqiq et Said El Kafhali. « Quality of Service Analysis and Queuing Performance Modeling of Orthogonal Frequency Division Multiple Access Based IEEE 802.16/WiMAX System ». International Journal of Mobile Computing and Multimedia Communications 4, no 3 (juillet 2012) : 54–70. http://dx.doi.org/10.4018/jmcmc.2012070104.

Texte intégral
Résumé :
The authors present a problem of queuing theoretic performance modeling and analysis of Orthogonal Frequency Division Multiple Access (OFDMA) under broadband wireless networks. They consider a single-cell WiMAX environment in which the base station allocates sub channels to the subscriber stations in its coverage area. The sub channels allocated to a subscriber station are shared by multiple connections at that subscriber station. To ensure the Quality of Service (QoS) performances, a Connection Admission Control (CAC) mechanism is considered at a subscriber station. A queuing analytical framework for these admission control mechanisms is presented considering OFDMA-based transmission at the physical layer and based on the queuing model; both the connection-level and packet-level performances are studied and compared with their analogues in the case without CAC. The connection arrival is modeled by a Poisson process and the packet arrival for a connection by a Markov Modulated Poisson Process (MMPP). Several performance measures, namely connection blocking probability, average number of ongoing connections, average queue length, packet dropping probability, queue throughput and average packet delay, are then derived and quantified.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Berkani, Lamia, et Azeddine Chikh. « A Semantic Based Approach for Knowledge Capitalization in Communities of Practice of E-Learning ». International Journal of Knowledge Society Research 3, no 4 (octobre 2012) : 1–11. http://dx.doi.org/10.4018/jksr.2012100101.

Texte intégral
Résumé :
Communities of Practice of E-learning (CoPEs) are considered as a virtual framework for exchanging and sharing techno-pedagogic knowledge and know-how between actors of e-learning. However, after analyzing of knowledge management modalities in some CoPEs, the authors noticed that knowledge is often represented in a way that does not facilitate its access and reuse. Accordingly, this paper focuses on knowledge capitalization in CoPEs and proposes an ontology-based framework aiming to facilitate knowledge sharing and reuse. This framework is structured into three layers: (1) the ontology layer, (2) the semantic annotation layer, and (3) the asset layer. It provides respectively, a common vocabulary within a CoPE aiming to enable a shared understanding between its members, a semantic support to annotate its knowledge assets facilitating their retrieval and reuse, and a means of storage and indexing its different assets. The paper is illustrated with a case study related to a semantic adaptive wiki, a service proposed for a CoPE made up of a teaching staff in computer science at the USTHB University in Algeria.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Boiron, Pierre, et Valère Dussaux. « Software Services Delivered from the Cloud ». International Journal of Information Systems in the Service Sector 7, no 1 (janvier 2015) : 22–37. http://dx.doi.org/10.4018/ijisss.2015010102.

Texte intégral
Résumé :
Picture Archiving and Communication Systems (PACS), alongside Radiological Information Systems (RIS) are nowadays widely disseminated, proven useful, hospital information systems components. The “Région Sans Film” (“Filmless Region”) program was launched in 2009 by the French ministry of health in order to help the generalization to all healthcare structures such as hospitals or general physician practices, of PACS, RIS, and archiving of medical images. It is done by means of a mutualized service platform whom building and running has been entrusted to an industrial consortium. This platform implements the latest technologies of medical image processing and of cloud computing. It is built in order to support service-oriented enterprise architecture composed of one main layer of software services. This natively scalable platform is innovative because it is the first one which contains all the materials for the implementation of all services in the cloud. The corresponding SLA are defined in order to be adaptable to the needs of further health structures which could later join the platform by participating in its mutualized purchasing. The goal is not only to share the costs but also to deliver new images sharing services. New business processes/services around sharing of images such as teleradiology or access to the images produced in hospitals to the general practitioners are defined towards the exercise of real filmless radiology.
Styles APA, Harvard, Vancouver, ISO, etc.
9

He, Chun Lin. « The Design and Implementation of the Information Remote Monitoring and Security Management System Based on Internet ». Advanced Materials Research 846-847 (novembre 2013) : 1414–17. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1414.

Texte intégral
Résumé :
With the development of economy, the existence and application of the inflammable, explosive, toxic and harmful gases irresistible but dangerous at the same time in the industrial production application. for the sake of minimizing potential dangers, the remote security monitoring is of great significance. With the rapid development of network technology, the Internet network technology to implement the remote monitoring can effectively avoid some potential hazards in the industrial production and other dangerous things. We can draw a conclusion from the feedback that the effect of user experience is not ideal in the actual application. So based on the analysis of the traditional structure of remote monitoring system, a new remote monitoring system is created which can avoid these shortcomings through further research. This new system consists of three parts: 1. The client: using Flex rich client technology is more convenient and suitable for communication interface and let the customer feel familiar and easy to use. 2. data management layer: it contains three parts : the Web server layer, application server and database server layer . Application server promotes system real-time performance through Web Service technology, Shared memory and streaming Socket technology, which enables clients to have direct access to the site. 3. Data acquisition layer: data will be collected in a timely manner to send to data management with GPRS technology.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ding, Fei, Aiguo Song, En Tong et Jianqing Li. « A Smart Gateway Architecture for Improving Efficiency of Home Network Applications ». Journal of Sensors 2016 (2016) : 1–10. http://dx.doi.org/10.1155/2016/2197237.

Texte intégral
Résumé :
A smart home gateway plays an important role in the Internet of Things (IoT) system that takes responsibility for the connection between the network layer and the ubiquitous sensor network (USN) layer. Even though the home network application is developing rapidly, researches on the home gateway based open development architecture are less. This makes it difficult to extend the home network to support new applications, share service, and interoperate with other home network systems. An integrated access gateway (IAGW) is proposed in this paper which upward connects with the operator machine-to-machine platform (M2M P/F). In this home network scheme, the gateway provides standard interfaces for supporting various applications in home environments, ranging from on-site configuration to node and service access. In addition, communication management ability is also provided by M2M P/F. A testbed of a simple home network application system that includes the IAGW prototype is created to test its user interaction capabilities. Experimental results show that the proposed gateway provides significant flexibility for users to configure and deploy a home automation network; it can be applied to other monitoring areas and simultaneously supports a multi-ubiquitous sensor network.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Wang, Lynn J. « AB 540 : Tuition Waiver Policy in California : How Student Services Professionals Influence College Access for Undocumented Students ». Association of Mexican American Educators Journal 12, no 1 (11 mai 2018) : 67. http://dx.doi.org/10.24974/amae.12.1.378.

Texte intégral
Résumé :
This was an exploratory qualitative study utilizing tenets of phenomenology to examine the lived experiences of front-line student services professionals in Admissions and Financial Aid and their dilemmas in interpreting and implementing California Assembly Bill 540 (2001) in their interactions with undocumented students. Front-line student services professionals are often the make-it or break-it persons for undocumented students to realize their dreams of attaining a postsecondary education because they determine whether students can pay in-state tuition and receive financial aid. California law AB 540 (2001) was created with the intention of providing a fair tuition policy for all California high school graduates entering college in California. AB 540’s (2001) purpose is to allow all California high school graduates, including undocumented immigrant students who meet the requirements, to be exempt from paying nonresident tuition at California public postsecondary institutions. An undocumented student is classified as someone who entered the U.S. without proper immigration documents or someone who entered the country legally as a nonimmigrant but later never exited the country (Internal Revenue Service, 2014). Twelve student service professionals, both part-time and full-time, at public two-year and four-year higher education institutions shared their experiences regarding management of difficult and sensitive conversations with undocumented students, as they attempted to translate state legislation through institutional polices. Many times, these front-line professionals in Admissions and Financial Aid were the first and only people to interact with incoming undocumented students before they set foot in the classroom. These professionals utilized their knowledge, resources, and networks to help students navigate the college-going process. However, unclear and/or non-existent campus policies, departmental silos, along with a lack of professional development, adequate resources, and appropriate guidance, often limited their capacity to help.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Alsobeh, Anas M. R., Aws Abed Al Raheem Magableh et Emad M. AlSukhni. « Runtime Reusable Weaving Model for Cloud Services Using Aspect-Oriented Programming ». International Journal of Web Services Research 15, no 1 (janvier 2018) : 71–88. http://dx.doi.org/10.4018/ijwsr.2018010104.

Texte intégral
Résumé :
Cloud computing technology has opened an avenue to meet the critical need to securely share distributed resources and web services, and especially those that belong to clients who have sensitive data and applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from the nature of distributed Web-based technology architecture and infrastructure. One of the key concerns is security logic, which is scattered and tangled across all the cloud service layers. In addition, maintenance and modification of the security aspect is a difficult task. Therefore, cloud services need to be extended by enriching them with features to support adaptation so that these services can become better structured and less complex. Aspect-oriented programming is the right technical solution for this problem as it enables the required separation when implementing security features without the need to change the core code of the server or client in the cloud. Therefore, this article proposes a Runtime Reusable Weaving Model for weaving security-related crosscutting concerns through layers of cloud computing architecture. The proposed model does not require access to the source code of a cloud service and this can make it easier for the client to reuse the needed security-related crosscutting concerns. The proposed model is implemented using aspect orientation techniques to integrate cloud security solutions at the software-as-a-service layer.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Bourgeois, Amber, Ashley Mollison, Tara C. Horrill, Leah Lambert et Kelli Stajduhar. « Falling off the treatment wagon : Barriers to cancer treatment and care for people experiencing health and social inequities. » Journal of Clinical Oncology 40, no 28_suppl (1 octobre 2022) : 135. http://dx.doi.org/10.1200/jco.2022.40.28_suppl.135.

Texte intégral
Résumé :
135 Background: A key pillar of Canada’s healthcare system is universal access, yet significant barriers to cancer services remain for those impacted by health and social inequities (e.g., poverty, homelessness, racism). For this reason, cancer is diagnosed at a later stage, resulting in worse patient outcomes, a reduced quality of life, and at a higher cost to the healthcare system. Those who face significant barriers to access are under-represented in cancer control services Consequently, these inequities result in people dying from cancers that are highly treatable and preventable, however; little is known about their treatment and care course. The aim of this study was to explore barriers to accessing cancer treatment among people experiencing health and social inequities within a Canadian context. Methods: We conducted a secondary analysis of ethnographic data informed by critical theoretical perspectives of equity and social justice. The original research draws from 30 months of repeated interviews (n = 147) and 300 hours of observational fieldwork with people experiencing health and social inequities at the end-of-life, their support persons, and service providers. Results: Our analysis identified four themes presenting as ‘modifiable’ barriers to inequitable access to cancer treatment: (1) housing as a key determinant for cancer treatment (2) health literacy and ‘missing the window’ for shared decision making (3) invisibility of the social/structural determinants of health (4) navigating a complex and fractured system. These inter-related themes point to how people impacted by health and social inequities are at times ‘dropped’ out of the cancer system and therefore unable to access cancer treatment. Conclusions: Findings make visible the contextual and structural factors contributing to inequitable access to cancer treatment within a publicly funded health care system. Identifying people with social and health inequities and approaches to delivering cancer services are explicitly equity-oriented are urgently needed.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Hussain, Md, et M. M. Beg. « Fog Computing for Internet of Things (IoT)-Aided Smart Grid Architectures ». Big Data and Cognitive Computing 3, no 1 (19 janvier 2019) : 8. http://dx.doi.org/10.3390/bdcc3010008.

Texte intégral
Résumé :
The fast-paced development of power systems necessitates the smart grid (SG) to facilitate real-time control and monitoring with bidirectional communication and electricity flows. In order to meet the computational requirements for SG applications, cloud computing (CC) provides flexible resources and services shared in network, parallel processing, and omnipresent access. Even though CC model is considered to be efficient for SG, it fails to guarantee the Quality-of-Experience (QoE) requirements for the SG services, viz. latency, bandwidth, energy consumption, and network cost. Fog Computing (FC) extends CC by deploying localized computing and processing facilities into the edge of the network, offering location-awareness, low latency, and latency-sensitive analytics for mission critical requirements of SG applications. By deploying localized computing facilities at the premise of users, it pre-stores the cloud data and distributes to SG users with fast-rate local connections. In this paper, we first examine the current state of cloud based SG architectures and highlight the motivation(s) for adopting FC as a technology enabler for real-time SG analytics. We also present a three layer FC-based SG architecture, characterizing its features towards integrating massive number of Internet of Things (IoT) devices into future SG. We then propose a cost optimization model for FC that jointly investigates data consumer association, workload distribution, virtual machine placement and Quality-of-Service (QoS) constraints. The formulated model is a Mixed-Integer Nonlinear Programming (MINLP) problem which is solved using Modified Differential Evolution (MDE) algorithm. We evaluate the proposed framework on real world parameters and show that for a network with approximately 50% time critical applications, the overall service latency for FC is nearly half to that of cloud paradigm. We also observed that the FC lowers the aggregated power consumption of the generic CC model by more than 44%.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Farooq, Muhammad Omer, et Thomas Kunz. « Contiki-Based IEEE 802.15.4 Channel Capacity Estimation and Suitability of Its CSMA-CA MAC Layer Protocol for Real-Time Multimedia Applications ». Mobile Information Systems 2015 (2015) : 1–9. http://dx.doi.org/10.1155/2015/398637.

Texte intégral
Résumé :
Real-time multimedia applications require quality of service (QoS) provisioning in terms of bounds on delay and packet loss along with soft bandwidth guarantees. The shared nature of the wireless communication medium results in interference. Interference combined with the overheads, associated with a medium access control (MAC) protocol, and the implementation of a networking protocol stack limit the available bandwidth in IEEE 802.15.4-based networks and can result in congestion, even if the transmission rates of nodes are well below the maximum bandwidth supported by an underlying communication technology. Congestion degrades the performance of admitted real-time multimedia flow(s). Therefore, in this paper, we experimentally derive the IEEE 802.15.4 channel capacity using an unslotted CSMA-CA MAC protocol. We experimentally derive channel capacity for two cases, that is, when the CSMA-CA protocol is working without ACKs and when it is working with ACKs. Moreover, for both cases, we plot the relationship of offered data load with delay and packet loss rate. Simulation results demonstrate that the parameters that affect the choice of a CSMA-CA MAC layer protocol are end-to-end delay and packet loss requirements of a real-time multimedia flow, data load within the interference range of transmitters along the forwarding path, and length of the forwarding path.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Bolton, Rosie, Simone Campana, Andrea Ceccanti, Xavier Espinal, Aristeidis Fkiaras, Patrick Fuhrmann et Yan Grange. « ESCAPE prototypes a data infrastructure for open science ». EPJ Web of Conferences 245 (2020) : 04019. http://dx.doi.org/10.1051/epjconf/202024504019.

Texte intégral
Résumé :
The European-funded ESCAPE project will prototype a shared solution to computing challenges in the context of the European Open Science Cloud. It targets Astronomy and Particle Physics facilities and research infrastructures and focuses on developing solutions for handling Exabyte scale datasets. The DIOS work package aims at delivering a Data Infrastructure for Open Science. Such an infrastructure would be a non HEP specific implementation of the data lake concept elaborated in the HSF Community White Paper and endorsed in the WLCG Strategy Document for HL-LHC. The science projects in ESCAPE are in different phases of evolution. While HL-LHC can leverage 15 years of experience of distributed computing in WLCG, other sciences are building now their computing models. This contribution describes the architecture of a shared ecosystem of services fulfilling the needs in terms of data organisation, management and access for the ESCAPE community. The backbone of such a data lake will consist of several storage services operated by the partner institutes and connected through reliable networks. Data management and organisation will be orchestrated through Rucio. A layer of caching and latency hiding services, supporting various access protocols will serve the data to heterogeneous facilities, from conventional Grid sites to HPC centres and Cloud providers. The authentication and authorisation system will be based on tokens. For the success of the project, DIOS will integrate open source solutions which demonstrated reliability and scalability as at the multi petabyte scale. Such services will be configured, deployed and complemented to cover the use cases of the ESCAPE sciences which will be further developed during the project.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Ahmad, Noman, Guftaar Ahmad Sardar Sidhu et Wali Ullah Khan. « A Learning Based Framework for Enhancing Physical Layer Security in Cooperative D2D Network ». Electronics 11, no 23 (30 novembre 2022) : 3981. http://dx.doi.org/10.3390/electronics11233981.

Texte intégral
Résumé :
Next-generation wireless communication networks demand high spectrum efficiency to serve the requirements of an enormous number of devices over a limited available frequency spectrum. Device-to-device (D2D) communication with spectrum reuse offers a potential solution to spectrum scarcity. On the other hand, non-orthogonal multiple access (NOMA) as a multiple-access approach has emerged as a key technology to re-use a spectrum among multiple users. A cellular users (CUs) can share their spectrum with D2D users (DUs) and in response, the D2D network can help relay the CU signal to achieve better secrecy from an eavesdropper. Power optimization is known to be a promising technique to enhance system performance in challenging communication environments. This work aimed to enhance the secrecy rate of the CUs where the D2D transmitter (DT) helps in relaying the CU’s message under the amplify and forward (AF) protocol. A power optimization problem is considered under the quality of service constraints in terms of minimum rate requirements at the receivers and maximum power budgets at the transmitters. The problem is a non-convex complex optimization. A deep learning-based solution is proposed and promising results are obtained in terms of the secrecy rate of CU and the rate of D2D users.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Jones, Debra Maria, David Lyle, Claire Brunero, Lindy McAllister, Trish Webb et Stuart Riley. « Improving health and education outcomes for children in remote communities : A cross-sector and developmental evaluation approach ». Gateways : International Journal of Community Research and Engagement 8, no 1 (3 septembre 2015) : 1–22. http://dx.doi.org/10.5130/ijcre.v8i1.4163.

Texte intégral
Résumé :
Early childhood is one of the most influential developmental life stages. Attainments at this stage will have implications for the quality of life children experience as they transition to adulthood. Children residing in remote Australia are exposed to socioeconomic disadvantage that can contribute to developmental delays and resultant poorer education and health outcomes. Complex contributing factors in far west New South Wales have resulted in children with speech and fine motor skill delays experiencing no to limited access to allied health services for a number of decades. More recently, growing awareness that no single policy, government agency, or program could effectively respond to these complexities or ensure appropriate allied health service access for children in these communities has led to the development of the Allied Health in Outback Schools Program, which has been operational since 2009. The program is underpinned by cross-sector partnerships and a shared aspirational aim to improve the developmental outcomes of children to enhance their later life opportunities. It was identified early that the initiative had the potential to deliver mutually beneficial outcomes for communities and participating partner organisations.Over the last five years the program has been the catalyst for partnership consolidation, expansion and diversification. The developmental evaluation approach to continuous program adaptation and refinement has provided valuable insights that have informed health and education policy and enabled the program to be responsive to changing community needs, emerging policy and funding reforms.This article explores the evolution of the program partnerships, their contribution to program success and longevity, and their capacity to respond to an emergent and dynamic environment. The authors propose that a community-centred and developmental approach to program innovation and implementation in remote locations is required. This is based on the premise that contemporary linear, logic-based policy development and funding allocations, with predetermined program deliverables and outcomes, are no longer capable of responding appropriately to the complexities experienced by remote communities.Keywords: allied health, remote communities, cross-sectoral partnerships, service learning
Styles APA, Harvard, Vancouver, ISO, etc.
19

Khisa, Shreya, et Sangman Moh. « Medium Access Control Protocols for the Internet of Things Based on Unmanned Aerial Vehicles : A Comparative Survey ». Sensors 20, no 19 (29 septembre 2020) : 5586. http://dx.doi.org/10.3390/s20195586.

Texte intégral
Résumé :
The Internet of Things (IoT), which consists of a large number of small low-cost devices, has become a leading solution for smart cities, smart agriculture, smart buildings, smart grids, e-healthcare, etc. Integrating unmanned aerial vehicles (UAVs) with IoT can result in an airborne UAV-based IoT (UIoT) system and facilitate various value-added services from sky to ground. In addition to wireless sensors, various kinds of IoT devices are connected in UIoT, making the network more heterogeneous. In a UIoT system, for achieving high throughput in an energy-efficient manner, it is crucial to design an efficient medium access control (MAC) protocol because the MAC layer is responsible for coordinating access among the IoT devices in the shared wireless medium. Thus, various MAC protocols with different objectives have been reported for UIoT. However, to the best of the authors’ knowledge, no survey had been performed so far that dedicatedly covers MAC protocols for UIoT. Hence, in this study, state-of-the-art MAC protocols for UIoT are investigated. First, the communication architecture and important design considerations of MAC protocols for UIoT are examined. Subsequently, different MAC protocols for UIoT are classified, reviewed, and discussed with regard to the main ideas, innovative features, advantages, limitations, application domains, and potential future improvements. The reviewed MAC protocols are qualitatively compared with regard to various operational characteristics and system parameters. Additionally, important open research issues and challenges with recommended solutions are summarized and discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Qiao, Huidong, Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren et Ying Hu. « Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage ». Symmetry 10, no 10 (11 octobre 2018) : 482. http://dx.doi.org/10.3390/sym10100482.

Texte intégral
Résumé :
Cryptographic cloud storage (CCS) is a secure architecture built in the upper layer of a public cloud infrastructure. In the CCS system, a user can define and manage the access control of the data by himself without the help of cloud storage service provider. The ciphertext-policy attribute-based encryption (CP-ABE) is considered as the critical technology to implement such access control. However, there still exists a large security obstacle to the implementation of CP-ABE in CCS. That is, how to identify the malicious cloud user who illegally shares his private keys with others or applies his keys to construct a decryption device/black-box, and provides the decryption service. Although several CP-ABE schemes with black-box traceability have been proposed to address the problem, most of them are not practical in CCS systems, due to the absence of scalability and expensive computation cost, especially the cost of tracing. Thus, we present a new black-box traceable CP-ABE scheme that is scalable and high efficient. To achieve a much better performance, our work is designed on the prime order bilinear groups that results in a great improvement in the efficiency of group operations, and the cost of tracing is reduced greatly to O ( N ) or O ( 1 ) , where N is the number of users of a system. Furthermore, our scheme is proved secure in a selective standard model. To the best of our knowledge, this work is the first such practical and provably secure CP-ABE scheme for CCS, which is black-box traceable.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Walsh, Lucas. « Whose risk and wellbeing ? Three perspectives of online privacy in relation to children and young people’s wellbeing ». Media International Australia 170, no 1 (février 2019) : 90–99. http://dx.doi.org/10.1177/1329878x19828384.

Texte intégral
Résumé :
During the course of applied research into the challenges of providing integrated government services to support children and young people (CYP) at risk, a school principal recounted an incident involving an attempted suicide by a pupil who had recently arrived at the school and had a documented history of mental health issues and previous attempts to take his own life; however, this was not communicated to the school in part because of privacy concerns in sharing his case history. Critical information was not shared with staff at his new school that would have drawn attention to the young male’s suicidal tendency. Sometimes, the privacy of CYP is accorded more importance than their overall wellbeing; however, deeper investigation reveals something more complex at play. This article first examines the macro-perspective of efforts by government policy to mitigate breaches of privacy through regulation of online access and the shaping of CYP’s digital practices. Second, it explores how schools and service providers at the meso-level face difficult challenges in sharing information about CYP. Third, this discussion draws on perspectives of privacy derived from CYP themselves at the micro-level in relation to considerations such as the giving and withholding of personal information online, its theft and legacy issues potentially arising from the disclosure of private information online that may impact the individual’s ‘digital footprint’ later in life. Research suggests that a shift from risk to resilience is taking place that entails a potential move from deficit assumptions about youth ‘at-risk’ and ‘as risk’ to a more nuanced understanding of the privacy of CYP shaped by social ecologies of resilience. However, certain challenges persist in the sharing of information at the meso-level.
Styles APA, Harvard, Vancouver, ISO, etc.
22

King, Kathryn, Dee Ford, Michael Haschker, Jillian Harvey, Ryan Kruis et James McElligott. « Clinical and Technical Considerations of an Open Access Telehealth Network in South Carolina : Definition and Deployment ». Journal of Medical Internet Research 22, no 5 (22 mai 2020) : e17348. http://dx.doi.org/10.2196/17348.

Texte intégral
Résumé :
Background Today, telehealth is experiencing exponential growth in utilization. Paralleling this trend is the growth in the telehealth industry, with sharp increases in the number of platforms, functionalities, and levels of integrations within both the electronic health record and other technical systems supporting health care. When a telehealth network is intended to be used across independent health care systems, an additional layer of complexity emerges. In the context of regionalized telehealth networks that are not within the same health care system, not only are technical interoperability challenges a practical barrier, but administrative, clinical, and competitive elements also quickly emerge, resulting in fragmented, siloed technologies. Objective The study aimed to describe a statewide approach to deploying an interoperable open access telehealth network across multiple health systems. Methods One promising solution to the abovementioned concerns is an open access telehealth network. In the field of telehealth, an open access network (OAN) can be defined as a network infrastructure that can be used by health care providers without a closed or proprietary platform, specific obligatory network, or service-specific telehealth technologies. This framework for the development of an OAN is grounded in practical examples of clinical programs that function in each stage of network maturity based on the experience of the South Carolina Telehealth Alliance (SCTA). The SCTA’s experience details successes and challenges in an ongoing effort to achieve an OAN. The model describes an OAN in stages of collaborative maturity and provides insights into the technological, clinical, and administrative implications of making the collaboration possible. Results The four stages of an OAN are defined according to operational maturity, ranging from feasibility to demonstration of implementation. Each stage is associated with infrastructure and resource requirements and technical and clinical activities. In stage 1, technical standards are agreed upon, and the clinical programs are designed to utilize compliant technologies. In stage 2, collaboration is demonstrated through technical teams working together to address barriers, whereas clinical and administrative teams share best practices. In stage 3, a functional interoperable network is demonstrated with different institutions providing service through common telehealth end points at different patient care sites. In stage 4, clinical workflows are streamlined and standardized across institutions, and economies of scale are achieved through technical and administrative innovations. Conclusions The approach to OAN development described provides a roadmap for achieving a functional telehealth network across independent health systems. The South Carolina experience reveals both successes and challenges in achieving this goal. The next steps toward the development of OANs include advocacy and ongoing engagement with the developers of telehealth technologies regarding their commitment to interoperability.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Calhoun, Karen D., Laura Gultekin, Nikita Buckhoy, Tinetra Burns, Zachary Rowe, Lisa Braddix, Madiha Tariq et al. « 3578 Partnership Development : A learning community to advance institutional responsiveness to the opioid crisis in the city of Detroit and Wayne, County, Michigan ». Journal of Clinical and Translational Science 3, s1 (mars 2019) : 92–93. http://dx.doi.org/10.1017/cts.2019.212.

Texte intégral
Résumé :
OBJECTIVES/SPECIFIC AIMS: Facilitate relationships and partnership development to address the opioid crisis in Detroit and Wayne County Contribute to real-time conversations on opioid epidemic policy and practice to identify and build consensus on research questions Apply findings from each learning community session to policy briefs to better inform policymakers, providers and consumers; and advocate for institutional responsiveness METHODS/STUDY POPULATION: The study population utilizes a purposive sampling approach to intentionally organize relationships and partnership development. For example, participants registered for the December 2018 session, “Detroit/Wayne County Opioid Crisis Learning Community Series: Data Session,” include representation from school-based health clinics, community and faith-based organizations, health systems, city and county level public health, addiction/recovery organizations, law enforcement, academia and citizens. The team feels this approach ensures and builds diverse, team science perspectives and regional collaboration. The Detroit Area Mental Health Leadership Team formed in 2015 at a retreat held by the University of Michigan’s Clinical and Translational Science Initiative attended by nearly 100 community-academic partners. Mental health, stigma and suicide were identified as community priorities by participants who attended the summit. A mental health workgroup formed and later expanded its membership to strengthen diverse perspectives. The team immediately designed and administered a survey amongst its partners creating the following priorities and focus: substance abuse interventions, healthcare access, and consumer awareness of mental health issues/available resources. Since data, policy and service are common threads to design interventions, the partnership decided to facilitate dialogue and discussion from the community on special topics related to the crisis, and share the community’s recommendations on how to address them. The learning community series was designed as a bi-lingual format for sharing and expression. Deliberative democracy encourages inclusion of voices, interests and opinions often not heard or included in decision-making processes; driving the project’s purposive sampling approach. Institutional responsiveness and advocacy for adoption of the community’s recommendations will occur through strategic policy briefs summarizing each learning community session and the entire series. A dissemination plan will be utilized to encourage the policy briefs reach appropriate audiences for capacity building and institutional responsiveness. The learning community series will provide 5 sessions on data (impacting adolescents, emerging adults, and 20-mid 30 year-old adults), recovery/law enforcement, prescribing, and marijuana. The session topics arose from earlier assessment conducted by the Detroit Area Mental Health Leadership Team. RESULTS/ANTICIPATED RESULTS: A response to the opioid crisis should address community priorities identified through data, research and community input. Community providers should have access to real-time data and research to develop appropriate interventions and institutional responsiveness. Equally important is the need for legislators and others impacting resource allocation to hear from the community on priorities they feel should be addressed, and to better understand the need for new types of data and information to drive service delivery, policy and resources to address the crisis. The learning community series will focus on describing the epidemic and building infrastructure to collaborate, and share data and information to strengthen advocacy and responsiveness to address the crisis. We feel this will enable more efficient programming to strengthen service delivery that captures life experiences from those who directly interface with individuals impacted by the crisis. DISCUSSION/SIGNIFICANCE OF IMPACT: There is limited knowledge and consensus on types of data and information to effectively describe the opioid crisis. For example, data and information connecting gateway drugs such as marijuana with more hardcore drugs (i.e., opioids and heroin) is not available; community-based providers have limited access to what research says about the crisis; and local public and community providers are dependent upon the state for surveillance data. Individuals dealing with addiction and recovery often need immediate attention. A gap in access to services exists depending on types of insurance. For example, Medicaid and some HMOs require an assessment before clients can seek treatment, resulting in uncompensated care among providers to immediately address patients need. Access to healthcare is a longstanding issue in medically underserved communities. The impact of the crisis varies geographically in communities and regions due to cultural and ethnic differences, yet data and information on these differences is not readily available. Cultural competency and sensitivity is often an issue in medically underserved areas because stakeholders may feel professionals providing services do not relate to them effectively. Finally, the community does not understand the economic impact of the crisis. These issues make it difficult for community advocates and providers to work with elected officials, providers and others on the opioid crisis because they do not have the data and informed required to effectively flush out a hypothesis and form solutions. Information captured in the learning community series (i.e., presentations by experts, facilitated discussion and personal testimony) will be summarized in a policy brief after each session and the entire series. Recommendations and priorities from the community will be shared with providers, policymakers, the business community, consumers and others to provide community input on problem solving approaches, new interventions, types of data not currently available that should be captured, and other important strategies and information to address the crisis. This information will also encourage designing research questions to guide developing new community engaged and community based participatory research to address the crisis. Finally, utilizing a purposive approach in participant recruitment will encourage partnership development from a team science and capacity building perspective.
Styles APA, Harvard, Vancouver, ISO, etc.
24

CHEN, ZHONGQIANG, ALEX DELIS et PETER WEI. « IDENTIFICATION AND MANAGEMENT OF SESSIONS GENERATED BY INSTANT MESSAGING AND PEER-TO-PEER SYSTEMS ». International Journal of Cooperative Information Systems 17, no 01 (mars 2008) : 1–51. http://dx.doi.org/10.1142/s0218843008001750.

Texte intégral
Résumé :
Sessions generated by Instant Messaging and Peer-to-Peer systems (IM/P2Ps) not only consume considerable bandwidth and computing resources but also dramatically change the characteristics of data flows affecting both the operation and performance of networks. Most IM/P2Ps have known security loopholes and vulnerabilities making them an ideal platform for the dissemination of viruses, worms, and other malware. The lack of access control and weak authentication on shared resources further exacerbates the situation. Should IM/P2Ps be deployed in production environments, performance of conventional applications may significantly deteriorate and enterprise data may be contaminated. It is therefore imperative to identify, monitor and finally manage IM/P2P traffic. Unfortunately, this task cannot be easily attained as IM/P2Ps resort to advanced techniques to hide their traces including multiple channels to deliver services, port hopping, message encapsulation and encryption. In this paper, we propose an extensible framework that not only helps to identify and classify IM/P2P-generated sessions in real time but also assists in the manipulation of such traffic. Consisting of four modules namely, session manager, traffic assembler, IM/P2P dissector, and traffic arbitrator, our proposed framework uses multiple techniques to improve its traffic classification accuracy and performance. Through fine-tuned splay and interval trees that help organize IM/P2P sessions and packets in data streams, we accomplish stateful inspection, traffic re-assembly, data stream correlation, and application layer analysis that combined will boost the framework's identification precision. More importantly, we introduce IM/P2Ps "plug-and-play" protocol analyzers that inspect data streams according to their syntax and semantics; these analyzers render our framework easily extensible. Identified IM/P2P sessions can be shaped, blocked, or disconnected, and corresponding traffic can be stored for forensic analysis and threat evaluation. Experiments with our prototype show high IM/P2Ps detection accuracy rates under diverse settings and excellent overall performance in both controlled and real-world environments.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Ko, Chihjen, et Lex Wang. « Applying Design Thinking in Revising Data Curation of Taiwanese Herbaria ». Biodiversity Information Science and Standards 2 (22 mai 2018) : e25828. http://dx.doi.org/10.3897/biss.2.25828.

Texte intégral
Résumé :
Herbaria in Taiwan face critical data challenges: Different taxonomic views prevent data exchange; There is a lack of development practices to keep up with standard and technological advances; Data is disconnected from researchers’ perspective, thus it is difficult to demonstrate the value of taxonomists’ activities, even though a few herbaria have their specimen catalogue partially exposed in Darwin Core. Different taxonomic views prevent data exchange; There is a lack of development practices to keep up with standard and technological advances; Data is disconnected from researchers’ perspective, thus it is difficult to demonstrate the value of taxonomists’ activities, even though a few herbaria have their specimen catalogue partially exposed in Darwin Core. In consultation with the Herbarium of the Taiwan Forestry Research Institute (TAIF), the Herbarium of the National Taiwan University (TAI) and the Herbarium of the Biodiversity Research Center, Academia Sinica (HAST), which together host most important collections of the vegetation on the island, we have planned the following activities to address data challenges: Investigate a new data model for scientific names that will accommodate different taxonomic views and create a web service for access to taxonomic data; Refactor existing herbarium systems to utilize the aforementioned service so the three herbaria can share and maintain a standardized name database; Create a layer of Application Programming Interface (API) to allow multiple types of accessing devices; Conduct behavioral research regarding various personas engaged in the curatorial workflow; Create a unified front-end that supports data management, data discovery, and data analysis activities with user experience improvements. Investigate a new data model for scientific names that will accommodate different taxonomic views and create a web service for access to taxonomic data; Refactor existing herbarium systems to utilize the aforementioned service so the three herbaria can share and maintain a standardized name database; Create a layer of Application Programming Interface (API) to allow multiple types of accessing devices; Conduct behavioral research regarding various personas engaged in the curatorial workflow; Create a unified front-end that supports data management, data discovery, and data analysis activities with user experience improvements. To manage these developments at various levels, while maximizing the contribution of participating parties, it is crucial to use a proven methodological framework. As the creative industry has been leading in the area of solution development, the concept of design thinking and design thinking process (Brown and Katz 2009) has come to our radar. Design thinking is a systematic approach to handling problems and generating new opportunities (Pal 2016). From requirement capture to actual implementation, it helps consolidate ideas and identify agreed-on key priorities by constantly iterating through a series of interactive divergence and convergence steps, namely the following: Empathize: A divergent step. We learn about our audience, which in this case includes curators and visitors of the herbarium systems, about what they do and how they interact with the system, and collate our findings. Define: A convergent step. We construct a point of view based on audience needs. Ideate: A divergent step. We brainstorm and come up with creative solutions, which might be novel or based on existing practice. Prototype: A convergent step. We build representations of the chosen idea from the previous step. Test: Use the prototype to test whether the idea works. Then refine from step 3 if problems were with the prototyping, or even step 1, if the point of view needs to be revisited. Empathize: A divergent step. We learn about our audience, which in this case includes curators and visitors of the herbarium systems, about what they do and how they interact with the system, and collate our findings. Define: A convergent step. We construct a point of view based on audience needs. Ideate: A divergent step. We brainstorm and come up with creative solutions, which might be novel or based on existing practice. Prototype: A convergent step. We build representations of the chosen idea from the previous step. Test: Use the prototype to test whether the idea works. Then refine from step 3 if problems were with the prototyping, or even step 1, if the point of view needs to be revisited. The benefits by adapting to this process are: Instead of “design for you”, we “design together”, which strengthens the sense of community and helps the communication of what the revision and refactoring will achieve; When put in context, increased awareness and understanding of biodiversity data standards, such as Darwin Core (DwC) and Access to Biological Collections Data (ABCD); As we lend the responsibility of process control to an external facilitator, we are able to focus during each step as a participant. Instead of “design for you”, we “design together”, which strengthens the sense of community and helps the communication of what the revision and refactoring will achieve; When put in context, increased awareness and understanding of biodiversity data standards, such as Darwin Core (DwC) and Access to Biological Collections Data (ABCD); As we lend the responsibility of process control to an external facilitator, we are able to focus during each step as a participant. We illustrate how the planned activities are conducted by the five iterative steps.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Manthiramoorthy, Chinnadurai, K. Mohamed Sayeed Khan et Noorul Ameen A. « Comparing Several Encrypted Cloud Storage Platforms ». International Journal of Mathematics, Statistics, and Computer Science 2 (6 août 2023) : 44–62. http://dx.doi.org/10.59543/ijmscs.v2i.7971.

Texte intégral
Résumé :
Cloud services and cryptographic cloud storage systems have gained popularity in recent years due to their availability and accessibility. The present systems are nonetheless still ineffectual. They are the best since they demand a lot of trust from the user or the provider. To ensure they are not violating any End-User License Agreement (EULA) clauses, providers typically keep the ability to examine the files that have been saved, and some even keep the ability to share the data. It is simple to create a copy of every piece of data when a provider has access to go through it, which is considered abuse. A typical user would have a very difficult time proving these claims because they have no method of finding any evidence supporting such claims. Due to the growing quantity of Machine Learning (ML) performed on personal user data for either tailoring advertisements or, in more severe cases, manipulating public opinion, this issue has only gotten worse in modern times. Due to the volume of users and files kept, cloud storage services are the ideal location for getting such information, whether personal or not. To retain complete anonymity, the user could take the simple step of adding a local layer of encryption. This will prevent the cloud provider from being able to decrypt the data. The requirement for ongoing key management, which becomes more challenging as the number of keys rises, is another drawback of this. To better understand normal behaviors and pinpoint potential weaknesses, this study aims to explore and assess the security of a few well-known existing cryptographic cloud storage options. Among the vendors investigated are Microsoft Azure, Tresorit, Amazon S3, and Google Cloud. Based on documentation particular to each service, this comparison was done. However, the majority of providers frequently provide only a limited amount of information or don't go into great detail about specific ideas or procedures (for instance, security in Google Cloud), leaving room for interpretation. The authors conclude by outlining a unique approach for encrypted cloud storage that employs Cocks Identity Based Encryption (IBE) and Advanced Encryption Standard (AES)-256 Cipher Block Chaining (CBC) to limit potential abuse by alerting the user anytime a file 1 inspection takes place. Cocks IBE will be utilized as an alternate cryptographic method for access controls, and AES-256 will be used for the Initialization Vector (IV) features' encryption. Additionally, Fiat-Shamir authentication will be zero-knowledge. A system like this might be used by companies who offer services in the actual world because it would boost customer confidence.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Tsyrulnyk, Serhii. « MOBILE APPLICATIONS AND ONLINE WI-FI MONITORING PLATFORMS OF WEATHER STATIONS ». OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, no 9 (2020) : 181–92. http://dx.doi.org/10.28925/2414-0325.2020.9.15.

Texte intégral
Résumé :
Networks that allow digital devices to connect and transmit data are covering the world fast. Thanks to the networks, it is possible to connect all mobile devices, electronic sensors, electronic measuring devices, medical devices and sensors. They track, share, evaluate, and in some cases automatically adjust the data that is collected and transmitted. The concept of "Internet of Things" is complex and has several levels: end devices (sensors, actuators), transport layer (telecommunications environment, including wired and wireless networks) and the level of data processing (collection, storage and processing). The market environment creates requirements for young professionals, and competition between higher education institutions and vocational education institutions provides an opportunity to train a highly qualified specialist who can study and create modern hardware and software for smart electronic devices and systems that are nodes of the Internet of Things network. The article deals with issues related to the peculiarities of creating simple devices within the concept of the Internet of Things based on the popular Wi-Fi module ESP8266 and the introduction of this research into the educational process. The technical possibilities, features of connection and interaction of the ESP8266 module for meteorological monitoring are revealed. The organization of the module's access to the Internet, data sending and their monitoring using the popular mobile applications Blynk, Virtuino and the cloud IoT service ThingSpeak is shown. Their work in non-commercial tasks and ease of use for educational institutions are analyzed. The article provides the source codes of programs for the Wi-Fi module ESP8266 with a digital sensor BME280
Styles APA, Harvard, Vancouver, ISO, etc.
28

V L, Pavani. « A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network ». International Journal of Interactive Mobile Technologies (iJIM) 12, no 8 (24 décembre 2018) : 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.

Texte intégral
Résumé :
The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The perception of single sign-on allows a legitimate user to access a different service provider on a DCN using a single session key. Recently, several user identification techniques being proposed for DCN. Unfortunately, the existing proposals cannot maintain user anonymity when the majority of probable attacks. In addition, the further time synchronization mechanism they use can result in widespread overhead costs. To overcome these shortcomings, we propose a novel authentication mechanism to prevent unauthorized service access for a mobile device in distributed networks. The mechanism implements methods to generate securely encrypted keys using RSA algorithm to validate the authentication of user login id and password. Later, it implements a secure session key generation using DH algorithm which allows accessing the different services without repeating the authentication mechanism. An experimental evaluation was performed to measure execution time overhead for the registration process, an authentication process, session key generation process and Service Request Performance. The comparison results with existing authentication mechanism show an improvisation in all the measures.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Guleria, Pratiyush. « Data Access Layer : A Programming Paradigm on Cloud ». INTERNATIONAL JOURNAL OF COMPUTERS & ; TECHNOLOGY 11, no 3 (15 octobre 2013) : 2341–45. http://dx.doi.org/10.24297/ijct.v11i3.1164.

Texte intégral
Résumé :
Database is important for any application and critical part of private and public cloud platforms. For compatibility with cloud computing we can follow architectures like three tier architecture in .Net Technologies such that database layer should be separate from user and business logic layers. There are some other issues like following ACID properties in databases, providing dynamic scalability by using Shared-disk Architecture and efficient multi-tenancy, elastic scalability, and database privacy.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Ray, Asok, et Shashi Phoha. « Service access procedure (SAP) for a transport layer protocol ». Telematics and Informatics 5, no 1 (janvier 1988) : 65–73. http://dx.doi.org/10.1016/s0736-5853(88)80009-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Temple, RM, et A. Donley. « The future hospital – implications for acute care ». Acute Medicine Journal 13, no 1 (1 janvier 2014) : 4–5. http://dx.doi.org/10.52964/amja.0330.

Texte intégral
Résumé :
Acute physicians are confronted daily by the relentless increase in clinical demand, inadequate continuity of care, breakdown in out of hours care and a looming crisis in the medical workforce. The scale and gravity of these factors, together with changes to patient’s needs relating to the ageing demography, were detailed in the RCP report published in September 2012 ‘Hospitals on the edge’. The top concern of RCP members and fellows was the lack of continuity of care, ahead of financial pressures and clinical staff shortages. Worryingly one in ten physicians stated they would not recommend their hospital to a family member, and a further 25% were ambivalent on this question. Concern about the provision of acute medical care is not confined to consultants and specialist registrars. Another RCP report, ‘Hospital workforce, fit for the future?’ (2013) highlighted that 37% of FT2s and CMTs considered the workload of the medical registrar on call ‘unmanageable’. The outcome of the Mid Staffs independent inquiry in February 2013 provided critical context for the launch of the Future Hospital Commission (FHC) report, which was launched seven months later in September. The report was met with an extremely positive response from patients, carers, NHS staff, healthcare leaders and politicians. Lancet Editor Richard Horton said that the Commission had ‘produced the most important statement about the future of British medicine for a generation.’ Secretary of State for Health Jeremy Hunt praised the report and its ‘buck stops here’ approach. The Daily Mirror even noted that the report was one of the few areas on which the government and the opposition could agree! ‘Future Hospital: caring for medical patients’ places the patient at the centre of healthcare. Organising healthcare delivery around the needs of the patient is at its heart and features extensively in the core principles and 50 recommendations. A series of unequivocal commitments were made to patients, on issues generating considerable patient concern: moving beds in hospital, quality of communication and arrangements to leave hospital. Patients and carers were represented in each of the Commission’s five work streams, led on the recommendations relating to building a culture of compassion and respect, and participated in launch of the report to the media. The primary focus of the FHC report is on the acute care of medical patients and the views of acute physicians were key to articulating these recommendations. However the report is clear that the solution to current acute pressures on hospitals and specifically in-patient pathways, lie across the whole health and social care system. Care must be delivered in the setting in which the patient’s clinical, care and support needs can best be met and not merely delegated to the acute hospital site. This inevitably means 7 day services in the community as well as in hospital and a consistent new level of “joined up care” with integration, collaboration and information sharing across hospital and all healthcare settings. In keeping with this the report highlights the urgent need to establish alternatives to hospital admission including the extensive use of ambulatory emergency care (AEC), the provision of secondary care services in the community and an expansion of intermediate care rehabilitation services. Many of the report’s recommendations arose from clinical staff devising innovative solutions to improve the quality of care and ameliorate clinical demand. The report showcased a range of case studies describing service developments and new patterns of care, innovations that would not have been possible without the leadership and sheer determination of physicians and their teams. Dr Jack Hawkins, Acute Physician in Nottingham Queen’s Medical Centre, described how analysis of performance data showing that 50% of acute medical patients were discharged within 15 hours, led to the starting vision for their new AEC service as “everyone is ambulatory until proven otherwise”. The case studies highlight the resources needed to implement service change and the supportive staff relationships and changes to working practices that underpin their success. The report describes the “acute care hub” as the focus of acute medical services, comprising colocation of the AMU, short stay wards, enhanced care beds and the AEC. Much of this echoes the front door configuration described by the acute medicine task force report in 2007 ‘Acute medical care: The right person, in the right setting, first time’. What the FHC adds are recommendations to co-locate AEC and a clinical co-ordination centre to provide clinicians with real time data on capacity in community-based services (rehabilitation and social services), and link to rapid access specialist clinics or community services to support pathways out of AEC and AMU. Recommendations to structure acute services to maximise continuity of care is a major theme. There should be sufficient capacity in the acute care hub to accommodate admitted patients who do not require a specialist care pathway and are likely to be discharged within 48 hours. This is supported by recommended changes to working practices of consultant led teams where they commit to two or more successive days working in the hub. This allows the consultant led team who first assess the patient in AMU to continue to manage them on the short stay ward through to their discharge – an approach familiar to acute physicians but which may be novel to GIM physicians assigned a single on call day. Striving to deliver continuity by a stable clinical team should also simplify handover, improve training, feedback and the quality and safety of the care delivered. The commission recommends designating enhanced care (level 1) and high dependency (level 2) beds in the acute care hub to improve the care of acutely ill patients requiring an increased intensity of monitoring and treatment. The RCP acute medicine taskforce made the same recommendation in 2007 but acute trusts have been slow to embed level 2 beds in particular, on AMUs. In the future hospital every effort should be made to enhance rapid access to specialist pathways that benefit patients, including entry to pathways for acute coronary disease or stroke or the frail elderly direct from the community or emergency department. Here the report is clear that the responsibility for continuity of care rests with the specialty consultant, who should review the patient on the day of admission. Patient experience should be valued as much as clinical effectiveness. Patients want “joined up care” that is tailored to their acute illness, comorbidities and requirements for social support. From a patient’s perspective, failures of information sharing between primary and secondary care, or specialist services within the same or neighbouring Trusts, are incomprehensible. The report highlights that this informatics disconnect undermines accurate clinical assessment at the time of presentation with an acute illness, when patients are most vulnerable, and this deficit will impact on patient experience, timely access to specialist staff, patient outcome and resource use. Robert Francis, in commenting on the report of the Mid Staffordshire public enquiry highlighted that the subject was ‘too important to suffer the same fate as other previous enquiries .. where after initial courtesy of welcome, implementation was slow or non existent’. The RCP shares this urgency and having accepted the recommendations of the FHC as a comprehensive ‘treatment’ for the care of patients in the future hospital, is determined that the FHC report itself will not sit on a shelf, gathering dust. The RCP is now embarking on a future hospital implementation programme. This programme gathers momentum this month with the appointment of future hospital officers and staff and the immediate priority is to identify partners to set up national development sites. The RCP is seeking enthusiastic clinical teams to investigate changes to a range of hospital and community based medical services in line with the FHC principles and to evaluate the impact on patient care. Over the next 3 years it is envisaged that the programme will also include research and new approaches to commissioning, workforce deployment, healthcare facility design and integrated working across the health economy. The evaluation of these projects, in relation to the quality and safety of patient care and patient experience, will be crucial and will be shared through the RCP and its partners. In addition, from April the RCP will publish a Future Hospital journal to help share the learning from the implementation programme and welcomes submissions of innovative best practice in acute care. The challenge now is to convert the goodwill generated by publication of the FHC principles, into an implementation programme nationally, that helps build an effective evidence base to support new ways of providing high quality, safe, patient care. Acute physicians are crucial partners in meeting this challenge.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Mei, Weidong, Zhi Chen, Jun Fang et Shaoqian Li. « Physical Layer Service Integration in 5G : Potentials and Challenges ». IEEE Access 6 (2018) : 16563–75. http://dx.doi.org/10.1109/access.2018.2805728.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Shaheen, Susan, Adam Cohen et Jacquelyn Broader. « What's the 'Big' Deal with Shared Micromobility ? Evolution, Curb Policy, and Potential Developments in North America ». Built Environment 47, no 4 (1 décembre 2021) : 499–514. http://dx.doi.org/10.2148/benv.47.4.499.

Texte intégral
Résumé :
Shared micromobility – or short-term access to shared bikes and scooters – provides a flexible alternative for households living in urban areas, individuals seeking first- and last-mile connections to public transportation, and those without access to a private vehicle trying to reach jobs and essential services. In this paper, the authors discuss the history, growth, and evolution of bike and scooter sharing in North America; summarize the demographics and impacts of shared micromobility; and explore shared micromobility policies and practices for managing devices and operations such as: device caps, service area limitations, designated parking areas, fees, equipment/operational requirements, and enforcement. In the future, enhancements in device automation, battery range, charging times, and weight are likely to contribute to the evolution and development of additional devices and service models, which could allow improved range and e-hail for shared micromobility devices.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Chandnani, Manali, Mukesh Kumar Khandelwal et Meeta Sharma. « A Survey on Synchronization Approach in MAC Layer Protocols ». International Journal of Business Data Communications and Networking 13, no 1 (janvier 2017) : 9–27. http://dx.doi.org/10.4018/ijbdcn.2017010102.

Texte intégral
Résumé :
The Open Systems Interconnection (OSI) model describes the layered approach for communication between two networked systems. The Data link layer of OSI model consists of a sub layer known as MAC layer for achieving coordination among the communicating nodes to access the shared channel. This channel is shared between multiple nodes in a communication network and the packets transmitted at same time by different nodes collide with each other. This situation leads to loss of data and bandwidth gets wasted. To avoid this situation, MAC layer supports various protocols: TDMA, ALOHA, CSMA/CD, CSMA/CA and many hybrid techniques which employ their own criteria of synchronization for minimizing the collisions. In this paper the authors discuss about the MAC layer and the multiple access protocols which it supports for achieving synchronization among the nodes in the channel.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Pan, Fei, Zhibo Pang, Ming Xiao, Hong Wen et Run-Fa Liao. « Clone Detection Based on Physical Layer Reputation for Proximity Service ». IEEE Access 7 (2019) : 3948–57. http://dx.doi.org/10.1109/access.2018.2888693.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Li, Dong, et Xi Lin Liu. « Study on E-Government Virtual Information Service Center Model Based on Cloud Computing ». Applied Mechanics and Materials 596 (juillet 2014) : 971–75. http://dx.doi.org/10.4028/www.scientific.net/amm.596.971.

Texte intégral
Résumé :
Cloud computing as a shared infrastructure is a kind of super information systems to provide information services according to on-demands. Cloud computing will become the important means and development trend in future E-government information service. This paper expounds the connotation of the concept of cloud computing at first. Cloud computing technology features are analyzed in the information service of E-government. And a framework model of E-government virtual information service center based on cloud computing is put forward. Interface layer, application service layer, and Data Layer of the model are discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Wang, Shouhong, et Hai Wang. « Shared Services Management ». International Journal of Information Systems in the Service Sector 7, no 2 (avril 2015) : 37–53. http://dx.doi.org/10.4018/ijisss.2015040103.

Texte intégral
Résumé :
The cloud computing technology has accelerated shared services in the government and private sectors. This paper proposes a research framework of critical success factors of shared services in the aspects of strategy identification, collaborative partnership networking, optimal shared services process re-designing, and new policies and regulations. A survey has been employed to test the hypotheses. The test results indicate that clear vision of strategies of shared services, long term business relationships among shared services partners, business process re-design, human resource structure re-design, effective governance and service center for shared services, effective cost distribution scheme, and ethical code and access control for shared services significantly positively contribute to the success of shared services.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Rupp, Eduard, Emmanuel Syrmoudis et Jens Grossklags. « Leave No Data Behind – Empirical Insights into Data Erasure from Online Services ». Proceedings on Privacy Enhancing Technologies 2022, no 3 (juillet 2022) : 437–55. http://dx.doi.org/10.56553/popets-2022-0080.

Texte intégral
Résumé :
Privacy regulations such as the General Data Protection Regulation (GDPR) of the European Union promise to empower users of online services and to strengthen competition in online markets. Its Article 17, the Right to Erasure (Right to be Forgotten), is part of a set of user rights that aim to give users more control over their data by allowing them to switch between services more easily and to delete their data from the old service. In our study, we investigated the data deletion practices of a sample of 90 online services. In a twostage process, we first request the erasure of our data and analyze to what extent public data (e.g., posts on a social network) remains accessible in a non-anonymized format. More than six months later, we request information on our data using Right of Access requests under Art. 15 GDPR to find out if and what data remains. Our results show that a majority of services perform data erasures without observable breaches of the provisions of Art. 17 GDPR. At 27%, the share of non-compliant services is not negligible; in particular, we observe differences between requests submitted using a dedicated button and formal requests under Art. 17 GDPR.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Jin, Biao, Mei-Huang Hong, Xue Lin et Jin-Ming Sha. « Service Sites Selection for Shared Bicycles Based on the Location Data of Mobikes ». IEEE Access 6 (2018) : 54965–75. http://dx.doi.org/10.1109/access.2018.2872451.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Oh, Eunsung, et Sung-Yong Son. « Shared Electrical Energy Storage Service Model and Strategy for Apartment-Type Factory Buildings ». IEEE Access 7 (2019) : 130340–51. http://dx.doi.org/10.1109/access.2019.2939406.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Zheng, Linfeng, Juncheng Hu et Yingjun Jiao. « A Cross-Layer Media Access Control Protocol for WBANs ». Sustainability 15, no 14 (21 juillet 2023) : 11381. http://dx.doi.org/10.3390/su151411381.

Texte intégral
Résumé :
Wireless body area network (WBAN) is an emerging comprehensive technology that can deeply integrate with e-health and smart sports. As a wearable network, improving the quality of network service and user experience is crucial. Due to the miniaturized design of sensors, their available energy from batteries is limited, making the extension of their lifetime a key research challenge. Existing studies have proposed methods to improve energy efficiency, but there are still limitations in addressing dynamic adaptive aspects of differential energy distribution and channel conditions. In order to further extend the lifetime of sensor nodes and networks while ensuring quality of service, and to provide a reliable transmission mechanism for heterogeneous application data, this paper presents a cross-layer optimized MAC protocol mechanism. The protocol takes into account the transmission requirements of different types of data and redesigns the superframe. To improve the lifetime of nodes, we propose an energy-adaptive adjustment mechanism considering the channel conditions. At the same time, a cooperative transmission mechanism is proposed to further enhance network lifetime. In experiments conducted on two typical networks, compared to IEEE 802.15.6, the power adjustment scheme improves the network lifetime by 2.8 to 3.7 times, and the cooperative mechanism between nodes further increases the network lifetime by 17% to 44%. Our proposed scheme effectively extends the network lifetime while ensuring quality of service, avoiding frequent battery resets for users, and effectively improving the user experience quality.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Zhu, Quan Yin, Hong Zhou, Xiao Chun Shi et Rong Jing Hu. « The UML Model for Access Management System of Intelligent Warehouse Based on RFID ». Advanced Materials Research 383-390 (novembre 2011) : 5855–60. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.5855.

Texte intégral
Résumé :
As the RFID (Radio Frequency Identification) technologies developing fast, it is used widely on application domain nowadays. The UML model design for Data Access Layer (DAL), Business Logic Layer (BLL), and Service Layer are introduced in detail. The SOA architecture selected for the access management system design is applied for the service program and integrated into Web service applications. The MyEclipse 8.5 and MySQL5.0 database are opted to be the development environment. The C/S design pattern is used to achieve data collection from RF tag and store the synchronization service program. Furthermore, the godown entry and the outbound order are automatically produced respectively. On the other hand, the B/S model is selected for Web services applications.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Blažek, Lukáš. « Sustainability of a shared economy ». 11th GLOBAL CONFERENCE ON BUSINESS AND SOCIAL SCIENCES 11, no 1 (9 décembre 2020) : 59. http://dx.doi.org/10.35609/gcbssproceeding.2020.11(59).

Texte intégral
Résumé :
Shared economy is a current concept associated with the sharing of human, physical and intellectual resources. The penetration of a shared economy into different sectors of human activity is often referred to as a prerequisite for further sustainable development. Thus, a shared economy is one of the basic pillars of sustainable development, as it helps the market to function better, raises awareness of prices and the quality of services, but also enables anyone to have better market access. It is necessary to monitor, research, analyze and focus on identifying positive as well as negative impacts. The speed of technological development has significantly exceeded the legislative, regulatory and tax frameworks, which is often the cause of tensions between old and new business models. In general, a balance between a degree of regulation and freedom is a desirable state of affairs, providing a clear framework and rules for a shared economy while allowing for its further development and change. However, there is no consensus among experts on how to achieve this balance. The tightening of the regulation of individual shared services or, on the contrary, the deregulation of traditional industries is most often mentioned. At the same time, there are critical voices pointing to the fact that a shared economy is the result of technological progress that cannot be suppressed or reversed by any regulation, so it should have its own special laws. Given the popularity and constant development of digital technologies along with consumer habits, it is very real that a shared economy will sooner or later affect almost all areas of business. In order to make the best use of its potential, it will be necessary to find a way to adapt to its development and influence it as needed. The paper deals with the above areas with a possible prediction and proposal for future development. Keywords: Shared Economy; Circular Economics; Sustainability; Consumption; Externality
Styles APA, Harvard, Vancouver, ISO, etc.
44

Al-Otaibi, Yasser D. « A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications ». ACM Transactions on Internet Technology 22, no 2 (31 mai 2022) : 1–17. http://dx.doi.org/10.1145/3430508.

Texte intégral
Résumé :
Cloud services provide decentralized and pervasive access for resources to reduce the complex infrastructure requirements of the user. In decentralized service access, the implication of security is tedious to match the user requirements. Therefore, cloud services incorporate cybersecurity measures for administering standard resource access to users. In this paper, a shared two-way security model (STSM) is proposed to provide adaptable service security for the end-users. In this security model, a cooperative closed access session for information sharing between the cloud and end-user is designed with the help of cybersecurity features. This closed access provides less complex authentication for users and data that is capable of matching the verifications of the cloud services. A deep belief learning algorithm is used to differentiate the cooperative and non-cooperative secure sessions between the users and the cloud to ensure closed access throughout the data sharing time. The output of the belief network decides the actual session time between the user and the cloud, improving the span of the sharing session. Besides, the proposed model reduces false alarm, communication failures, under controlled complexity.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Barth, Matthew, Michael Todd et Susan Shaheen. « Intelligent Transportation Technology Elements and Operational Methodologies for Shared-Use Vehicle Systems ». Transportation Research Record : Journal of the Transportation Research Board 1841, no 1 (janvier 2003) : 99–108. http://dx.doi.org/10.3141/1841-11.

Texte intégral
Résumé :
There has been significant interest and activity in shared-use vehicle systems as an innovative mobility solution. Shared-use vehicle systems, that is, carsharing and station cars, consist of a fleet of vehicles used by several different individuals throughout the day. Shared-use vehicles offer the convenience of a private automobile and more flexibility than public transportation alone. From the 1990s to today, varying degrees of intelligent transportation system technologies have been applied to shared-used systems, providing better manageability and customer service. Many shared-use vehicle service providers today include some degree of advanced technologies (online reservations, vehicle tracking, smart card access) in their operations. Currently, there is a developing need for interoperability among shared-use vehicle service providers (e.g., smart card access among carsharing organizations) and transit operators (e.g., transit fare collection via smart cards). Interoperability will likely result in higher customer satisfaction and use, leading to greater market penetration. Similarly, some standardization will likely unfold for overall operational techniques (online reservations and insurance policies), customer interactions, and to some degree vehicle interfaces. Because shared-use vehicles systems are still a relatively new mobility concept, an industrywide standardization approach is still premature. Nevertheless, there are attempts to identify many of the important issues that will play a significant role in interoperability discussions among shared-use vehicle providers and the development of industry standards in the future. There are key elements in intelligent shared-use vehicle system operations and trade-offs encountered during the pioneering stage of shared-use vehicle system developments. Topics to discuss include vehicles, user–system interactions, user–vehicle interactions, and system operations.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Fletcher, Tim, Déirdre Ní Chróinín, Mary O’Sullivan et Stephanie Beni. « Pre-service teachers articulating their learning about meaningful physical education ». European Physical Education Review 26, no 4 (20 janvier 2020) : 885–902. http://dx.doi.org/10.1177/1356336x19899693.

Texte intégral
Résumé :
The purpose of this research was to examine pre-service teachers’ articulation of their learning through the development of a shared professional language of teaching practice focused on meaningful physical education. Qualitative data gathered from 90 pre-service teachers over four years in Canada and Ireland were analysed. Framed by a didactical research framework, pre-service teachers used elements of the shared language to articulate why they would promote meaningful experiences in physical education, what the features of meaningful experiences tend to consist of, and how they would use particular strategies to promote meaningful experiences. This research demonstrates how a shared language that reflects a coherent approach in physical education teacher education can support pre-service teachers to access, interpret, and articulate their learning about teaching in ways that support meaningful experiences for pupils.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Bates, Karla, Hannah Morgan, Emily Crosby, Keisha Nurse, Alison Flynn, Didi Stern, Roupen Baronian et Emma-Kate Kennedy. « Developing digital approaches for adolescents and young adults with autism and learning disabilities : Tools to facilitate access and shared decision-making ». Educational and Child Psychology 38, no 3 (septembre 2021) : 124–39. http://dx.doi.org/10.53841/bpsecp.2021.38.3.124.

Texte intégral
Résumé :
Aims:Digital living is now an integral part of many children and young people’s (CYP) everyday experience. Practitioners who work with them are increasingly focused on effectively deploying technology to help those with social, emotional and mental health (SEMH) needs. Throughout all aspects and phases of work, practitioners must adhere to legal and professional best practice standards in involving service users, person-centred working and in enhancing accessibility for all.Methods:Measures introduced to reduce the spread of Covid-19 triggered significant service delivery change in a specialist multi-disciplinary child and adolescent mental health service (CAMHS) team. The majority of assessment and intervention work moved to an online audio and web conferencing platform. A shared decision-making approach was developed to support service user understanding of online appointments and to giving informed consent, in line with the i-THRIVE Framework for system change (Wolpert et al., 2019). Three Guides were developed and distributed ahead of online appointments: written, easy-read and video.Findings:Data collected within a Quality Improvement (QI) framework indicated that the Guides supported practitioners to prepare service users, as well as themselves, for digital working. The Guides supported service access, collaborative decision-making and increased CYP autonomy. Their introduction also led to conversations about equity and cultural responsiveness, as well as serving as a model for the development of aids to support shared decision-making for autism diagnostic assessments.Limitations:This paper outlines the first phase of the QI project with a small participant sample and requires further engagement with service users to review the use of Guides and shared decision-making decision aids.Conclusions:Digital approaches present new possibilities and are rapidly changing service delivery across CAMHS. The importance of involving service users in shared decision-making when developing digital practices must be held in mind as part of this change process.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Zhao, Jun, et Tingyu Sheng. « Construction of Shared OCCA Model Based on Mobile Agent Technology ». Recent Advances in Electrical & ; Electronic Engineering (Formerly Recent Patents on Electrical & ; Electronic Engineering) 13, no 6 (4 novembre 2020) : 795–803. http://dx.doi.org/10.2174/2352096512666191016120432.

Texte intégral
Résumé :
Background: The Open Cloud Computing Alliance (OCCA) strives for more Cloud Computing Service Providers (CCSP) to join the alliance. OCCA only requires CCSP to provide virtual computing resources and does not care about the methods of the underlying implementation, which leads the open-source cloud computing to a larger scale and more efficient. Due to the differences in service modes and service categories, the cloud computing platforms formed by CCSP are heterogeneous. How to implement tasks across platforms and ensure the quality of migration are the key issue for sharing the OCCA platform. Methods: The Mobile Agent technology based on a domain is introduced. User tasks are encapsulated into Mobile agent packets by domain client, which realizes the migration of user tasks from one platform to another, and makes it possible to interoperate between OCCA virtual machines. To ensure the service quality of OCCA better, a five-layer logical model of R-OCCA with high commercial availability is proposed, which defines the service content of each layer and gives the setting of key parameters. This paper introduces the architectural composition and operational mechanism of the model, which carries out a qualitative analysis of the model, and establishes an experimental prototype to verify the feasibility of the model on the virtual machine platform. Results: Experiments show that it is feasible to implement Cloud Computing Alliance among cloud computing platforms through Mobile Agent under the existing technical conditions. Conclusion: To better guarantee the quality of OCCA service, a five-level R-OCCA logic model with strong commercial availability is proposed. The service content of each level is defined and the key parameters are given. From the CCSP income, the rationality of the model set is explained. The feasibility of the model was analyzed. The architectural composition and operational mechanisms of the model are introduced. The performance of the model was also analyzed.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Nielsen, Susanne Balslev, et Rikke Brinkø. « Access over ownership : meeting facilities in Lyngby-Taarbæk Knowledge City ». Facilities 36, no 1/2 (5 février 2018) : 13–23. http://dx.doi.org/10.1108/f-01-2017-0001.

Texte intégral
Résumé :
Purpose This study aims to investigate the attitude towards shared space in an urban context with a particular focus on meeting facilities. The Lyngby-Taarbæk City of Knowledge is used as a case, as this organisation has a vision of sharing facilities to stimulate regional development. Design/methodology/approach The attitude towards shared space in the Lyngby-Taarbæk City of Knowledge is studied in a three-step qualitative research process. An initial survey investigated the City of Knowledge’s members’ attitude towards shared space in general, a workshop further explored motivations and practical needs and a second survey investigated the attitude towards shared meeting facilities. The Brinkø Typology of Shared Use of Space and Facilities is used as the theoretical framework for the study (Brinkø et al., 2015). Findings This study shows that the respondents are very positive towards the concept of shared space but more reluctant when it comes to sharing own facilities. A majority of the informants are often using externally owned facilities for meetings and events and prefer professional meeting facilities to schools, universities and sports facilities. This points to a need for developing relevant service concepts, if a shared space strategy with focus on meeting facilities were to be used to increase the use rate of existing buildings not already intended for this use. Originality/value This study adds to the so far limited amount of scientific knowledge on the topic of shared space, by investigating the attitude towards shared space among a specific group of people, in relation to the use of external meeting facilities.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Wang, Yan, Shao Yun Guan et Wei Hong Li. « The Research and Design of the Intelligence Application Platform in Public Security E-Government ». Advanced Materials Research 981 (juillet 2014) : 192–95. http://dx.doi.org/10.4028/www.scientific.net/amr.981.192.

Texte intégral
Résumé :
The paper first expounds the reason that establish intelligence application platform in public security e-government. The data of cross-regional, cross-department, cross-police process through extraction, cleaning, conversion and loading and be shared. It introduces the procedure and methods of intelligence obtaining. Finally system architecture is listed one after another according of data layer, service layer, application layer, presentation layer and security mechanism.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie