Gotowa bibliografia na temat „Decentralized data management”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Decentralized data management”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Decentralized data management"

1

Lamehamedi, Houda, i Boleslaw K. Szymanski. "Decentralized data management framework for Data Grids". Future Generation Computer Systems 23, nr 1 (styczeń 2007): 109–15. http://dx.doi.org/10.1016/j.future.2006.06.005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wu, Lynn, Bowen Lou i Lorin Hitt. "Data Analytics Supports Decentralized Innovation". Management Science 65, nr 10 (październik 2019): 4863–77. http://dx.doi.org/10.1287/mnsc.2019.3344.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Bidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade i Suprakash Sudarsanan Nair. "Patient data management using blockchain technology". Indonesian Journal of Electrical Engineering and Computer Science 32, nr 3 (1.12.2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.

Pełny tekst źródła
Streszczenie:
<span>The patient data management is an essential component of healthcare systems, the secure and efficient data processing is important for the medical data. Data security, interoperability and privacy are the key requirements of data storage systems of healthcare organizations. The electronic medical records have become a key technique to maintain patient information in hospitals due to the technology revolution. Some hospital systems are also using server-based patient detail management systems, they require considerable storage to record all of the patient's medical reports, limiting scalability. They are facing difficulties, including interoperability, security and privacy worries, cyberattacks on centralized storage, and maintaining medical policy compliance simultaneously. The blockchain technology has come up with solution having decentralized and irreversible data storage. A distributed secure ledger of blockchain is the solution, enabling safe storage and retrieval of data. The proposed work yields effectively deployed smart contracts based on the system's functions, real-time patient health monitoring. The main goal of this system is to bring the whole medical data together on a single platform, employing a secured decentralized approach to store and retrieve medical information effectively.</span>
Style APA, Harvard, Vancouver, ISO itp.
4

Zhang, Yun, Zhi Tang, Jing Huang, Yue Ding, Hao He, Xiaosheng Xia i Chunhua Li. "A Decentralized Model for Spatial Data Digital Rights Management". ISPRS International Journal of Geo-Information 9, nr 2 (1.02.2020): 84. http://dx.doi.org/10.3390/ijgi9020084.

Pełny tekst źródła
Streszczenie:
The copyright of data is a key point that needs to be solved in spatial data infrastructure for data sharing. In this paper, we propose a decentralized digital rights management model of spatial data, which can provide a novel way of solving the existing copyright management problem or other problems in spatial data infrastructure for data sharing. An Ethereum smart contract is used in this model to realize spatial data digital rights management function. The InterPlanetary File System is utilized as external data storage for storing spatial data in the decentralized file system to avoid data destruction that is caused by a single point of failure. There is no central server in the model architecture, which has a completely decentralized nature and it makes spatial data rights management not dependent on third-party trust institutions. We designed three spatial data copyright management algorithms, developed a prototype system to implement and test the model, used the smart contract security verification tool to check code vulnerabilities, and, finally, discussed the usability, scalability, efficiency, performance, and security of the proposed model. The result indicates that the proposed model not only has diversified functions of copyright management compared with previous studies on the blockchain-based digital rights management, but it can also solve the existing problems in traditional spatial data infrastructure for data sharing due to its characteristics of complete decentralization, mass orientation, immediacy, and high security.
Style APA, Harvard, Vancouver, ISO itp.
5

Berezko, Leonid, i V. Tatianchuk. "Decentralized access management scheme to the cloud data storage". Computer systems and network 1, nr 1 (3.12.2019): 9–14. http://dx.doi.org/10.23939/csn2019.01.009.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Meisami, Sajad, Sadaf Meisami, Melina Yousefi i Mohammad Reza Aref. "Combining Blockchain and IoT for Decentralized Healthcare Data Management". International Journal on Cryptography and Information Security 13, nr 1 (30.03.2023): 35–50. http://dx.doi.org/10.5121/ijcis.2023.13102.

Pełny tekst źródła
Streszczenie:
The emergence of the Internet of Things (IoT) has resulted in a significant increase in research on e-health. As the amount of patient data grows, it has become increasingly challenging to protect patients' privacy. Patient data is commonly stored in the cloud, making it difficult for users to control and protect their information. Moreover, the recent rise in security and surveillance breaches in the healthcare industry has highlighted the need for a better approach to data storage and protection. Traditional models that rely on third-party control over patients' healthcare data are no longer reliable, as they have proven vulnerable to security breaches. To address these issues, blockchain technology has emerged as a promising solution. Blockchain-based protocols have the potential to provide a secure and efficient system for e-health applications that does not require trust in third-party intermediaries. The proposed protocol outlined in this paper uses a blockchain-based approach to manage patient data securely and efficiently. Unlike Bitcoin, which is primarily used for financial transactions, the protocol described here is designed specifically for e-health applications. It employs a consensus mechanism that is more suitable for resource constrained IoT devices, thereby reducing network costs and increasing efficiency. The proposed protocol also provides a privacy-preserving access control mechanism that enables patients to have more control over their healthcare data. By leveraging blockchain technology, the protocol ensures that only authorized individuals can access the patient's data, which helps prevent data breaches and other security issues. Finally, the security and privacy of the proposed protocol are analysed to ensure that it meets the necessary standards for data protection. The protocol's effectiveness and efficiency are tested under different scenarios to ensure that it can perform reliably and consistently. Finally, the protocol proposed in this paper shows that how blockchain can be used to provide a secure and efficient system that empowers patients to take control of their healthcare data.
Style APA, Harvard, Vancouver, ISO itp.
7

Jorwekar, Harshal. "Medical Records Management with Decentralized Framework". International Journal for Research in Applied Science and Engineering Technology 9, nr VII (10.07.2021): 193–200. http://dx.doi.org/10.22214/ijraset.2021.35703.

Pełny tekst źródła
Streszczenie:
The mystery between the emotional improvement of medical information protection interest and long periods of administrative guideline has eased back advancement for electronic medical records (EMRs). In this paper, we propose a efficient, secure and decentralized Blockchain system for data privacy preserving and sharing. This manages confidentiality, authentication, data preserving and data sharing when handling sensitive information. We exploit consortium Blockchain and smart contracts to accomplish secure information storage and sharing, which forestalls information sharing without consent. The patient’s historical data, medical record, patient’s private information is very critical and needs to be stored and maintained securely. The proposed framework builds information security and eliminates the cost, time, and assets needed to deal with the medical care information records.
Style APA, Harvard, Vancouver, ISO itp.
8

Smita Chaudhari, Soham Mohite, Shreya Kumbhakarn, Viren Rathod i Sakshi Khairnar. "Blockchain based solution for academic certificate management system using smart contract". International Journal of Science and Research Archive 8, nr 1 (30.01.2023): 291–197. http://dx.doi.org/10.30574/ijsra.2023.8.1.0037.

Pełny tekst źródła
Streszczenie:
Educational certificates serve as proof of qualification for their recipients. These certificates are subject to forgery and manipulation. The traditional way to verify the authenticity and integrity of certificates has not shown much efficiency in preventing fraud. Universities and companies need to collect, keep and update an unmanageable number of documents and papers from the applicants, in order to verify the competencies that the applicant claims and to determine forged documents. Another concern is about cyber criminals trying to hack the university’s centralized databases to alter the data. Moreover, corrupt officials may be bribed to illegally change a student’s academic data without fulfilling the requirements. Blockchain technology has emerged as a new approach to building decentralized reliable systems. It provides an effective and efficient way to protect sensitive data from subsequent change or deletion. Smart contracts decentralize the critical services in the certification process to improve transparency, accuracy, data privacy, and reliability. Unlike the traditional verification methods, the system will be designed in a decentralized way by using blockchain technology. Decentralization enhances the security and robustness features of the system by avoiding single points of failure and removing the need to put trust in any single party.
Style APA, Harvard, Vancouver, ISO itp.
9

Botchkaryov, A. "METHOD FOR DECENTRALIZED CONTROL OF ADAPTIVE DATA COLLECTION PROCESSES IN AUTONOMOUS DISTRIBUTED SYSTEMS". Computer systems and network 5, nr 1 (16.12.2023): 8–19. http://dx.doi.org/10.23939/csn2023.01.008.

Pełny tekst źródła
Streszczenie:
The problem of monitoring a computer network under conditions of limitations on the use of system resources and high requirements for the survivability of the monitoring system has been considered. An autonomous decentralized computer network monitoring system has been developed, consisting of a team of software agents. Each agent can operate in two modes: main mode and monitoring system management console mode. In the main mode, the agent collects information about the computer network. In management console mode, the agent provides the user with access to information collected by all agents and allows the user to execute commands to manage the monitoring system. The developed monitoring system allows you to obtain more reliable information about the operation of the network with greater efficiency under the conditions of limitations on the use of system resources specified by the user. The autonomous monitoring system is created on the basis of the concept of multi-agent systems, within which a software agent of the system has some initiative for planning and implementing monitoring scenarios. The operation of software agents implements methods for organizing adaptive processes for collecting information using the principles of self-organization and the concept of structural adaptation. A decentralized software architecture for an autonomous monitoring system without a control center has been proposed. This ensures high reliability and survivability of the monitoring system. The software architecture of the autonomous monitoring system implements the SMA application software interface and the corresponding software library, which allows you to collect statistical data on the operation of the computer network and its nodes. The implementation of a software agent and a management console for an autonomous computer network monitoring system has been considered. Key words: computer network monitoring, autonomous system, decentralized control, software agent
Style APA, Harvard, Vancouver, ISO itp.
10

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma i Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain". Journal of Global Information Management 31, nr 2 (29.12.2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Pełny tekst źródła
Streszczenie:
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, central, or federated identity management models. In this exploratory work, the authors employ qualitative secondary case-based study research methodology to understand the challenges of the current digital identity management landscape and explore the possible benefits of DID as an emerging identity management paradigm. They propose a conceptual cube framework for analysing and studying various DID platforms thereby contributing to both the theory and practice of digitally secure identity.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Decentralized data management"

1

Essilfie-Conduah, Nana S. M. Massachusetts Institute of Technology. "A systems analysis of insider data exfiltration : a decentralized framework for disincentivizing and auditing data exfiltration". Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122440.

Pełny tekst źródła
Streszczenie:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 105-110).
It has become common place to hear of data breaches. Typically, we hear of external hackers as the perpetrators, however, the reality is there is a high frequency of threats from insiders within an organization and that the cost and challenge in detecting these threats is considerable. The issue has affected companies in multiple private sectors (finance, retail) and the public sector is also at risk as apparent with the Edward Snowden and Chelsea Manning cases. This thesis explores the current space of insider threats in terms of frequency, cost and complexity in attack assessment. It also explores the multiple perspectives and stakeholders that make up the complex insider threat systems. Insights from multiple insider threat cases as well as subject matter experts in cyber security were used to model and pinpoint the high value metrics around access management and logging that will aid audit efforts. Following this an exploration of kill chains, blockchain technology and hierarchical organization exploration is made. Research findings highlight the wide reach of excessive privileges and the crucial role resource access and event logging of stakeholder actions plays in the success of insider threat prevention. In response to this finding a proposal is made for a combined solution that aims to provide an easy and accessible interface for searching and requesting access to resources that scales with an organization. This proposal suggests the capitalization of the transparent and immutable properties of blockchain to ledger the requesting and approval of file access through dynamic and multi user approval logic. The solution combines simplistic file-based resource access in an accessible manner with a multi layered security approach that adds further hurdles for bad actors but provides a visible and reliable look back on an immutable audit path.
by Nana Essilfie-Conduah.
S.M. in Engineering and Management
S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
Style APA, Harvard, Vancouver, ISO itp.
2

Hull, R. "Decentralized resource and data management in a fault tolerant distributed computer system". Thesis, University of Sussex, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.356505.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Fleming, Theodor. "Decentralized Identity Management for a Maritime Digital Infrastructure : With focus on usability and data integrity". Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-155115.

Pełny tekst źródła
Streszczenie:
When the Internet was created it did not include any protocol for identifying the person behind the computer. Instead, the act of identification has primarily been established by trusting a third party. But, the rise of Distributed Ledger Technology has made it possible to authenticate a digital identity and build trust without the need of a third party. The Swedish Maritime Administration are currently validating a new maritime digital infrastructure for the maritime transportation industry. The goal is to reduce the number of accidents, fuel consumption and voyage costs. Involved actors has their identity stored in a central registry that relies on the trust of a third party. This thesis investigates how a conversion from the centralized identity registry to a decentralized identity registry affects the usability and the risk for compromised data integrity. This is done by implementing a Proof of Concept of a decentralized identity registry that replaces the current centralized registry, and comparing them. The decentralized Proof of Concept’s risk for compromised data integrity is 95.1% less compared with the centralized registry, but this comes with a loss of 53% in efficiency.
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Mianyu Kam Moshe Kandasamy Nagarajan. "A decentralized control and optimization framework for autonomic performance management of web-server systems /". Philadelphia, Pa. : Drexel University, 2007. http://hdl.handle.net/1860/2643.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ponnakanti, Hari Priya. "A Hyperledger based Secure Data Management and Disease Diagnosis Framework Design for Healthcare". University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1627662565879478.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Diallo, El-hacen. "Study and Design of Blockchain-based Decentralized Road Traffic Data Management in VANET (Vehicular Ad hoc NETworks)". Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG017.

Pełny tekst źródła
Streszczenie:
La prolifération des véhicules autonomes a imposé la nécessité d'une gestion plus sécurisée des données du trafic routier (c'est-à-dire les événements liés aux accidents, l'état de la circulation, le rapport d'attaque, etc.) dans les réseaux Ad hoc pour véhicules (VANET). Les systèmes centralisés traditionnels répondent à ce besoin en exploitant des serveurs distants éloignés des véhicules. Cette solution n’est pas optimale, car les données relatives au trafic routier doivent être distribuées et mises en cache de manière sécurisée à proximité des véhicules. Cela améliore la latence et réduit la surcharge sur la bande passante du réseau de communication.La technologie Blockchain est apparue comme une solution prometteuse grâce à sa propriété de décentralisation. Certaines questions restent néanmoins sans réponse. Comment concevoir une validation appropriée des données du trafic routier par blockchain, qui semble plus complexe qu'une transaction financière ? Quelles sont les performances attendues dans les scénarios VANET ?Cette thèse offre des réponses à ces questions en concevant une gestion des données du trafic routier adaptée aux contraintes imposée par la blockchain. La performance ainsi que la validité des protocoles proposés sont ensuite évaluées à travers diverses simulations de scénarios pris d’un trafic routier réel.Nous proposons d'abord une adaptation du mécanisme de consensus Preuve de Travail (PoW) dans un réseau VANET, où les infrastructures situées aux bords de routes (RSUs) maintiennent une base de données décentralisée des données du trafic routier. Ensuite, une évaluation rigoureuse des performances en présence de véhicules malveillants est réalisée. Les résultats ont montré que le schéma proposé permet de construire une base de données sécurisée et décentralisée des données du trafic routier au niveau des RSUs.Ensuite, motivés par nos résultats, nous utilisons PBFT (Practical Byzantine Fault Tolerance), un mécanisme de consensus établi grâce au vote, pour réduire la latence dans le processus de validation dans une blockchain. Les RSUs validatrices de données de trafic sont sélectionnées dynamiquement en fonction de la localisation des événements du trafic. Nous proposons un nouveau schéma de réplication de la blockchain entre les RSUs. Cette réplication choisit un compromis entre les performances en termes de latence et la fréquence de réplication des blocs de la chaine. Les résultats de simulation montrent de meilleures performances, lorsque les RSUs validatrices, sont réduites au minimum.Dans la dernière partie de la thèse, nous proposons un modèle de confiance pour réduire au minimum le nombre de validatrices sans compromettre la décentralisation et l'équité de la création de blocs. Ce modèle de confiance s'appuie sur la distance géographique et la confiance des RSUs pour former dynamiquement un groupe de validateurs pour chaque bloc de la chaîne. Nous formalisons et évaluons ce modèle de réputation, en considérant divers scénarios avec des RSUs malicieuses. Les résultats démontrent l'efficacité de la proposition pour minimiser le groupe de validateurs tout en isolant les RSUs malicieuses
The prominence of autonomous vehicles has imposed the need for more secure road traffic data (i.e., events related to accidents, traffic state, attack report, etc.) management in VANET (Vehicular Ad hoc NETworks). Traditional centralized systems address this need by leveraging remote servers far from the vehicles. That is not an optimal solution as road traffic data must be distributed and securely cached close to cars to enhance performance and reduce bandwidth overhead. Blockchain technology offers a promising solution thanks to its decentralization property. But some questions remain unanswered: how to design blockchain-adapted traffic data validation, which is more complex than an economic transaction? What is the performance in real-world VANET scenarios?This thesis addresses those questions by designing blockchain-adapted traffic data management. The performance analysis and the validation of the proposed schemes are conducted through various simulations of real scenarios.We first adapt the PoW (Proof of Work) consensus mechanism to the VANET context whereby the RSUs (Road Side Units) maintain the decentralized database of road traffic data. After that, the proposed scheme is evaluated in the presence of malicious vehicles. The results show that the proposed approach enables a secure and decentralized database of road traffic data at the RSUs level.Next, motivated by our findings, we adopt PBFT (Practical Byzantine Fault Tolerance), a voting-based consensus mechanism, to reduce the blockchain latency. The traffic data validators are dynamically selected based on traffic event appearance location. Finally, we propose a novel blockchain replication scheme between RSUs. This scheme offers a trade-off between the blockchain latency and replication frequency. Simulation results show better performance when the validators (i.e., RSUs) are minimized.Finally, we propose a trust model to minimize the validators without compromising the decentralization and fairness of block-creation. This trust model leverages the geographical distance and the RSUs trust to dynamically form a group of validators for each block in the blockchain. We formalize and evaluate this trust model, considering various scenarios with malicious RSUs. Results show the efficiency of the proposed model to minimize the validators group while isolating malicious RSUs
Style APA, Harvard, Vancouver, ISO itp.
7

Bögels, Machteld. "Digital Waste : ELIMINATING NON-VALUE ADDING ACTIVITIES THROUGH DECENTRALIZED APPLICATION DEVELOPMENT". Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-263903.

Pełny tekst źródła
Streszczenie:
In an era where the network of interconnected devices is rapidly expanding, it is difficult for organizations to adapt to the increasingly data-rich and dynamic environment while remaining competitive. Employees experience that much of their time and resources is spent daily on repetitive, inefficient and mundane tasks. Whereas lean manufacturing has manifested itself as a well-known optimization concept, lean information management and the removal of waste is not yet being used to its full potential as its direct value is less visible. A case study was conducted to define which types of non-value adding activities can be identified within information flows and to determine whether decentralized application development can eliminate this digital waste. An internal information flow was modelled, analyzed and optimized by developing customized applications on the Microsoft Power Platform. Based on literature from the field of manufacturing and software development, a framework was developed to categorize digital waste as well as higher order root causes in terms of business strategy and IT infrastructure. While decentralized app development provides the ability to significantly reduce operational digital waste in a simplified manner, it can also enable unnecessary expansion of a common data model and requires application lifecycle management efforts as well as edge security to ensure data compliance and governance. Although limited to one case study, the suggested framework could give insights to organizations that aim to optimize internal workflows by identifying and eliminating digital waste and its root causes.
I en tid där nätverk av sammankopplade enheter expanderar snabbt, är det svårt för organisationer att anpassa sig till den allt mer datoriserade och dynamiska miljön och samtidigt förbli konkurrenskraftiga. Anställda upplever att mycket av deras tid och resurser spenderas på repetitiva, ineffektiva och vardagliga uppgifter. Lean manufacturing har visat sig vara ett välkänt optimeringskoncept, dock har informationshantering och avlägsnande av slöseri inte ännu nått sin fulla potential eftersom dess direkta värde är svårare att se och räkna. En fallstudie genomfördes för att definiera vilka typer av icke-värdeskapande aktiviteter som kan identifieras inom informationsflöden och för att avgöra om decentraliserad applikationsutveckling kan eliminera detta digitala slöseri. Ett internt informationsflöde modellerades, analyserades och optimerades genom att utveckla anpassade applikationer på Microsoft Power Platform. Baserat på litteratur från tillverknings- och mjukvaruutvecklingsområdet utvecklades en ram för att kategorisera digitalt slöseri samt högre grundorsaker när det gäller affärsstrategi och ITinfrastruktur. Medan decentraliserad apputveckling ger möjlighet att avsevärt minska det operativa digitala slöseriet på ett förenklat sätt, så kan det också möjliggöra onödig expansion av en gemensam datamodell och kräver hantering av livscykelanalyser samt kantsäkerhet för att säkerställa datahantering och styrning. Trots begränsad till en fallstudie, så kan det föreslagna ramverket ge insikter till organisationer som syftar till att optimera interna arbetsflöden genom att identifiera och eliminera digitalt slöseri och dess grundläggande orsaker.
Style APA, Harvard, Vancouver, ISO itp.
8

Mehra, Varun S. M. Massachusetts Institute of Technology. "Optimal sizing of solar and battery assets in decentralized micro-grids with demand-side management". Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/108959.

Pełny tekst źródła
Streszczenie:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2017.
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 199-209).
Solar-based community micro-grids and individual home systems have been recognized as key enablers of electricity provision to the over one billion people living without energy access to-date. Despite significant cost reductions in solar panels, these options can still be cost-prohibitive mainly due over-sizing of generation assets corresponding with a lack of ability to actively manage electricity demand. The main contribution shared is the methodology and optimization approach of least-cost combinations of generation asset sizes, in solar panels and batteries, subject to meeting reliability constraints; these results are based on a techno-economic modeling approach constructed for assessing decentralized micro-grids with demand-side management capabilities. The software model constructed is implemented to represent the technical characteristics of a low-voltage, direct current network architecture and computational capabilities of a power management device. The main use-case of the model presented is based on serving representative, aggregated, household-level load profiles combined with simulated power output from solar photovoltaic modules and the kinetic operating constraints of lead-acid batteries at hourly timesteps over year-long simulations. The state-space for solutions is based on available solar module and battery capacities from distributors in Jharkhand, India. Additional work presented also extends to real-time operation of such isolated micro-grids with requisite local computation. First, for load disaggregation and forecasting purposes, clustering algorithms and statistical learning techniques are applied on quantitative results from inferred load profiles based on data logged from off-grid solar home systems. Second, results from an optimization approach to accurately parametrize a lead-acid battery model for potential usage in real-time field implementation are also shared. Economic results, sensitivity analyses around key technical and financial input assumptions, and comparisons in cost reductions due to the optimization of solar and battery assets for decentralized micro-grids with demand-side management capabilities are subsequently presented. The work concludes with insights and policy implications on establishing differentiated willingness-to-pay, tiers of service, and dynamic price-setting in advanced micro-grids.
by Varun Mehra.
S.M. in Technology and Policy
S.M.
Style APA, Harvard, Vancouver, ISO itp.
9

Rodriguez, German Darío Rivas. "Decentralized Architecture for Load Balancing in District Heating Systems". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3329.

Pełny tekst źródła
Streszczenie:
Context. In forthcoming years, sustainability will lead the development of society. Implementation of innovative systems to make the world more sustainable is becoming one of the key points for science. Load balancing strategies aim to reduce economic and ecological cost of the heat production in district heating systems. Development of a decentralized solution lies in the objective of making the load balancing more accessible and attractive for the companies in charge of providing district-heating services. Objectives. This master thesis aims to find a new alternative for implementing decentralized load balancing in district heating systems. Methods. The development of this master thesis involved the review of the state-of-the-art on demand side management in district heating systems and power networks. It also implied the design of the architecture, creation of a software prototype and execution of a simulation of the system to measure the performance in terms of response time. Results. Decentralized demand side management algorithm and communication framework, software architecture description and analysis of the prototype simulation performance. Conclusions. The main conclusion is that it is possible to create a decentralized algorithm that performs load balancing without compromising the individuals’ privacy. It is possible to say that the algorithm shows good levels of performance not only from the system aggregated response time, but also from the individual performance, in terms of memory consumption and CPU consumption.
(+46) 709706206
Style APA, Harvard, Vancouver, ISO itp.
10

Ribe-Baumann, Elizabeth [Verfasser], Kai-Uwe [Akademischer Betreuer] Sattler, Jochen [Akademischer Betreuer] Seitz i Manfred [Akademischer Betreuer] Hauswirth. "Resource and Location Aware Robust Decentralized Data Management / Elizabeth Ribe-Baumann. Gutachter: Jochen Seitz ; Manfred Hauswirth. Betreuer: Kai-Uwe Sattler". Ilmenau : Universitätsbibliothek Ilmenau, 2015. http://d-nb.info/1074139607/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Decentralized data management"

1

Yu, Ting, i Sushil Jajodia, red. Secure Data Management in Decentralized Systems. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-27696-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Manyika, J. Data fusion and sensor management: A decentralized information-theoretic approach. New York: Ellis Horwood, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

IFIP Working Conference on Information Systems Development for Decentralized Organizations (1995). Information systems development for decentralized organizations: Proceedings of the IFIP working conference on information systems development for decentralized organizations, 1995. London: Chapman & Hall, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Hospitals and Health Care. Veterans' Administration's decentralized hospital computer program: Hearing before the Subcommittee on Hospitals and Health Care of the Committee on Veterans' Affairs, House of Representatives, One hundredth Congress, first session, April 8, 1987. Washington: U.S. G.P.O., 1987.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Society, IEEE Computer, Jōhō Shori Gakkai (Japan) i Keisoku Jidō Seigyo Gakkai (Japan), red. ISADS 97, Third International Symposium on Autonomous Decentralized Systems: Proceedings, April 9-11, 1997, Berlin, Germany. Los Alamitos, Calif: IEEE Computer Society Press, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kramer, Joe. Managing a year 2000 program in a decentralized environment at Amoco. [Atlanta, Ga.]: Information Management Forum, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Jajodia, Sushil, i Ting Yu. Secure Data Management in Decentralized Systems. Springer London, Limited, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Jajodia, Sushil, i Ting Yu. Secure Data Management in Decentralized Systems. Springer, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

(Editor), Ting Yu, i Sushil Jajodia (Editor), red. Secure Data Management in Decentralized Systems (Advances in Information Security). Springer, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Solvberg, Arne, John Krogstie i Anne Helga Seltveit. Information Systems Development for Decentralized Organization. Springer, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Decentralized data management"

1

Prathibha, Soma, V. Saiganesh, S. Lokesh, Avudaiappan Maheshwari i M. A. Kishore. "Propchain: Decentralized Property Management System". W Advances in Data and Information Sciences, 347–58. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-6906-7_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Venkatesan, Subramanian, Shubham Sahai, Sandeep Kumar Shukla i Jaya Singh. "Secure and Decentralized Management of Health Records". W Studies in Big Data, 115–39. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9547-9_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wang, Pengfei, Wenjuan Cui i Jianhui Li. "A Framework of Data Sharing System with Decentralized Network". W Big Scientific Data Management, 255–62. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-28061-1_25.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sonakshi, Sujal Garg, Taanvi Jain, Priyanka Rani i Neha Batra. "Decentralized Library Management System Using Blockchain Technology". W Proceedings of Data Analytics and Management, 355–62. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6289-8_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Asano, Yasuhito, Yang Cao, Soichiro Hidaka, Zhenjiang Hu, Yasunori Ishihara, Hiroyuki Kato, Keisuke Nakano i in. "Bidirectional Collaborative Frameworks for Decentralized Data Management". W Communications in Computer and Information Science, 13–51. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93849-9_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Messanakis, Kostas, Petros Demetrakopoulos i Yannis Kotidis. "Smart-Views: Decentralized OLAP View Management Using Blockchains". W Big Data Analytics and Knowledge Discovery, 216–21. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86534-4_20.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Yu, Weihai. "Decentralized Orchestration of BPEL Processes with Execution Consistency". W Advances in Data and Web Management, 665–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00672-2_68.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Rathore, Shikha, Jitendra Agrawal, Sanjeev Sharma i Santosh Sahu. "Efficient Decentralized Key Management Approach for Vehicular Ad Hoc Network". W Data, Engineering and Applications, 147–61. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Spenger, Jonas, Paris Carbone i Philipp Haller. "WIP: Pods: Privacy Compliant Scalable Decentralized Data Services". W Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 70–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93663-1_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Schanzenbach, Martin, i Christian Banse. "Managing and Presenting User Attributes over a Decentralized Secure Name System". W Data Privacy Management and Security Assurance, 213–20. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Decentralized data management"

1

Rodrig, Maya, i Anthony LaMarca. "Decentralized weighted voting for P2P data management". W the 3rd ACM international workshop. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/940923.940939.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Utete, Simukai W., i Hugh F. Durrant-Whyte. "Network management in decentralized data fusion networks". W Photonics for Industrial Applications, redaktor Paul S. Schenker. SPIE, 1994. http://dx.doi.org/10.1117/12.189071.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ahmad, Mumtaz, i Abdessamad Imine. "Decentralized Collaborative Editing Platform". W 2015 16th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2015. http://dx.doi.org/10.1109/mdm.2015.26.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Carvalho Ota, Fernando Kaway, Cristina G. B. de Oliveira, Rafael Meira Silva i Radu State. "A Decentralized Super App". W 2023 24th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2023. http://dx.doi.org/10.1109/mdm58254.2023.00024.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Lucking, Markus, Raphael Manke, Markus Schinle, Lukas Kohout, Stefan Nickel i Wilhelm Stork. "Decentralized patient-centric data management for sharing IoT data streams". W 2020 International Conference on Omni-layer Intelligent Systems (COINS). IEEE, 2020. http://dx.doi.org/10.1109/coins49042.2020.9191653.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Heyden, Marco, Jürgen Wilwer, Edouard Fouché, Steffen Thoma, Sven Matthiesen i Thomas Gwosch. "Tandem Outlier Detectors for Decentralized Data". W SSDBM 2022: 34th International Conference on Scientific and Statistical Database Management. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3538712.3538748.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kusunoki, Kei, Yoshihiro Kawahara i Tohru Asami. "Supervisor application for content management in named data networking". W 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE, 2013. http://dx.doi.org/10.1109/isads.2013.6513423.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Moon, Jaewon, Seungwoo Kum, Youngkee Kim, Vlado Stankovski, Uros Pascinski i Petar Kochovski. "A Decentralized AI Data Management System In Federated Learning". W 2020 International Conference on Intelligent Systems and Computer Vision (ISCV). IEEE, 2020. http://dx.doi.org/10.1109/iscv49265.2020.9204271.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Manyika, James M., i Hugh F. Durrant-Whyte. "Information-theoretic approach to management in decentralized data fusion". W Applications in Optical Science and Engineering, redaktor Paul S. Schenker. SPIE, 1992. http://dx.doi.org/10.1117/12.131652.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Greenway, Phil, i Rob H. Deaves. "Information filter for decentralized data fusion and sensor management". W SPIE's International Symposium on Optical Engineering and Photonics in Aerospace Sensing, redaktorzy Ivan Kadar i Vibeke Libby. SPIE, 1994. http://dx.doi.org/10.1117/12.177768.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Decentralized data management"

1

Jamasb, Tooraj, Emanuele Giovannetti, Manuel Llorca, Daniel Davi-Arderius i Golnoush Soroush. A Brief Economics of Energy Data Space: The EDDIE Project. Copenhagen School of Energy Infrastructure, 2023. http://dx.doi.org/10.22439/csei.pb.016.

Pełny tekst źródła
Streszczenie:
The appeal of decentralised approaches to structure energy generation, transmission and distribution networks, and consumption to scholars and practitioners has grown in the past 20-30 years. Moreover, in the coming years digitalisation will become a key enabler for the sustainable and efficient management of key areas in our economies including the energy sector. A European, decentralised, and open-source energy data space solution such as the one proposed in the Horizon Europe Innovation Action project EDDIE (European Distributed Data Infrastructure for Energy), fits into this trend. In this policy brief the authors outline their initial views on EDDIE and some economic concepts related to the project’s vision.
Style APA, Harvard, Vancouver, ISO itp.
2

Bourrier, Mathilde, Michael Deml i Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, listopad 2022. http://dx.doi.org/10.31265/usps.254.

Pełny tekst źródła
Streszczenie:
The purpose of this report is to compare the risk communication strategies and public health mitigation measures implemented by Germany, Norway, Sweden, Switzerland, and the United Kingdom (UK) in 2020 in response to the COVID-19 pandemic based on publicly available documents. The report compares the country responses both in relation to one another and to the recommendations and guidance of the World Health Organization where available. The comparative report is an output of Work Package 1 from the research project PAN-FIGHT (Fighting pandemics with enhanced risk communication: Messages, compliance and vulnerability during the COVID-19 outbreak), which is financially supported by the Norwegian Research Council's extraordinary programme for corona research. PAN-FIGHT adopts a comparative approach which follows a “most different systems” variation as a logic of comparison guiding the research (Przeworski & Teune, 1970). The countries in this study include two EU member States (Sweden, Germany), one which was engaged in an exit process from the EU membership (the UK), and two non-European Union states, but both members of the European Free Trade Association (EFTA): Norway and Switzerland. Furthermore, Germany and Switzerland govern by the Continental European Federal administrative model, with a relatively weak central bureaucracy and strong subnational, decentralised institutions. Norway and Sweden adhere to the Scandinavian model—a unitary but fairly decentralised system with power bestowed to the local authorities. The United Kingdom applies the Anglo-Saxon model, characterized by New Public Management (NPM) and decentralised managerial practices (Einhorn & Logue, 2003; Kuhlmann & Wollmann, 2014; Petridou et al., 2019). In total, PAN-FIGHT is comprised of 5 Work Packages (WPs), which are research-, recommendation-, and practice-oriented. The WPs seek to respond to the following research questions and accomplish the following: WP1: What are the characteristics of governmental and public health authorities’ risk communication strategies in five European countries, both in comparison to each other and in relation to the official strategies proposed by WHO? WP2: To what extent and how does the general public’s understanding, induced by national risk communication, vary across five countries, in relation to factors such as social capital, age, gender, socio-economic status and household composition? WP3: Based on data generated in WP1 and WP2, what is the significance of being male or female in terms of individual susceptibility to risk communication and subsequent vulnerability during the COVID-19 outbreak? WP4: Based on insight and knowledge generated in WPs 1 and 2, what recommendations can we offer national and local governments and health institutions on enhancing their risk communication strategies to curb pandemic outbreaks? WP5: Enhance health risk communication strategies across five European countries based upon the knowledge and recommendations generated by WPs 1-4. Pre-pandemic preparedness characteristics All five countries had pandemic plans developed prior to 2020, which generally were specific to influenza pandemics but not to coronaviruses. All plans had been updated following the H1N1 pandemic (2009-2010). During the SARS (2003) and MERS (2012) outbreaks, both of which are coronaviruses, all five countries experienced few cases, with notably smaller impacts than the H1N1 epidemic (2009-2010). The UK had conducted several exercises (Exercise Cygnet in 2016, Exercise Cygnus in 2016, and Exercise Iris in 2018) to check their preparedness plans; the reports from these exercises concluded that there were gaps in preparedness for epidemic outbreaks. Germany also simulated an influenza pandemic exercise in 2007 called LÜKEX 07, to train cross-state and cross-department crisis management (Bundesanstalt Technisches Hilfswerk, 2007). In 2017 within the context of the G20, Germany ran a health emergency simulation exercise with WHO and World Bank representatives to prepare for potential future pandemics (Federal Ministry of Health et al., 2017). Prior to COVID-19, only the UK had expert groups, notably the Scientific Advisory Group for Emergencies (SAGE), that was tasked with providing advice during emergencies. It had been used in previous emergency events (not exclusively limited to health). In contrast, none of the other countries had a similar expert advisory group in place prior to the pandemic. COVID-19 waves in 2020 All five countries experienced two waves of infection in 2020. The first wave occurred during the first half of the year and peaked after March 2020. The second wave arrived during the final quarter. Norway consistently had the lowest number of SARS-CoV-2 infections per million. Germany’s counts were neither the lowest nor the highest. Sweden, Switzerland and the UK alternated in having the highest numbers per million throughout 2020. Implementation of measures to control the spread of infection In Germany, Switzerland and the UK, health policy is the responsibility of regional states, (Länders, cantons and nations, respectively). However, there was a strong initial centralized response in all five countries to mitigate the spread of infection. Later on, country responses varied in the degree to which they were centralized or decentralized. Risk communication In all countries, a large variety of communication channels were used (press briefings, websites, social media, interviews). Digital communication channels were used extensively. Artificial intelligence was used, for example chatbots and decision support systems. Dashboards were used to provide access to and communicate data.
Style APA, Harvard, Vancouver, ISO itp.
3

Occhiali, Giovanni, i Michael Falade. Missing the Forest for the Trees: Ekiti State’s Quest for Forestry Revenue and its Impact on Forest Management. Institute of Development Studies, sierpień 2023. http://dx.doi.org/10.19088/ictd.2023.039.

Pełny tekst źródła
Streszczenie:
Forests are important socio-economic assets in many low-income countries. However, they are often over-exploited as governments do not sufficiently valorise them, including by taxing them inefficiently. This is the case across Nigeria, where forest management and taxation has been effectively decentralised from the federal government to individual states. In this paper we assess the current forestry tax regime in Ekiti State, one of the eight Nigerian states where forests represent more than 50 per cent of land area, and where forest revenue has been historically relevant. Based on 16 interviews with government state officials, forest officers and actors from the industry, as well as data from the Forestry Commission, our analysis suggests that the ongoing depletion of forest resources in the state seems to be partially connected to an excessive focus on their capacity to generate revenue. The conceptualisation of the Ekiti State Forestry Commission as a revenue-raising agency rather than a management one, a continuous drive to extract revenue from the sector through outdated tax rates, and a view of the industry potential disconnected from the existing stock, all perversely led to a lower contribution from forestry to the state budget. While there is potential to reform both the structure of forestry taxes and their method of administration, evidence from our interviews suggests that priority should be given to enforcing a ban on forest exploitation for a period that is long enough to allow for its regrowth, at least in government reserves. This will require substantial sensitisation and engagement with actors in the sector, as well as increasing the monitoring capacity of the Forestry Commission. The Forestry Commission does not currently have enough staff to guarantee the enforcement of existing legislation, let alone a ban on all forest activities.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii