Дисертації з теми "Data sharing approach"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-22 дисертацій для дослідження на тему "Data sharing approach".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Slocumb, Calvin D. "Common data sharing system infrastructure : an object-oriented approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304500.
Повний текст джерела"June 1995." Thesis advisor(s): Orin E. Marvel. Includes bibliographical references. Also available online.
Tbahriti, Salah Eddine. "Web services oriented approach for privacy-preserving data sharing." Thesis, Lyon 1, 2012. http://www.theses.fr/2012LYO10253.
Повний текст джерелаWhile Web service composition technologies have been beneficial to the integration of a wealth of information sources and the realization of complex and personalized operations, the issue of privacy is considered by many as a major concern in services computing. Central to the development of the composition process is the exchange of sensitive and private data between all parties: Web services collecting and providing data, individuals whose data may be provided and managed by Web services, systems composing Web service to answer complex queries, and requesters. As a consequence, managing privacy between all parties of the system is far from being an easy task. Our goal in this thesis is to build the foundations of an integrated framework to enhance Web service composition with privacy protection capabilities. To this aim, we firstly propose a formal privacy model to allow Web services to describe their privacy specifications. Our privacy model goes beyond traditional data-oriented models by dealing with privacy not only at the data level but also service level. Secondly, we develop a compatibility-matching algorithm to check privacy compatibility between privacy requirements and policies within a composition. Thirdly, in the case where some services in the composition are incompatible regarding their privacy specifications, we introduce a novel approach based on a negotiation model to reach compatibility of concerned services (i.e. services that participate in a composition which are incompatible). Finally, we conduct an extensive performance study of the proposed algorithms. The techniques presented in this dissertation are implemented in PAIRSE prototype
Molema, Karabo Omphile. "The conflict of interest between data sharing and data privacy : a middleware approach." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2415.
Повний текст джерелаPeople who are referred to as data owners in this study, use the Internet for various purposes and one of those is using online services like Gmail, Facebook, Twitter and so on. These online services are offered by organizations which are referred to as data controllers. When data owners use these service provided by data controllers they usually have to agree to the terms and conditions which gives data controllers indemnity against any privacy issues that may be raised by the data owner. Data controllers are then free to share that data with any other organizations, referred to as third parties. Though data controllers are protected from lawsuits it does not necessarily mean they are free of any act that may be considered a privacy violation by the data owner. This thesis aims to arrive at a design proposition using the design science research paradigm for a middleware extension, specifically focused on the Tomcat server which is a servlet engine running on the JVM. The design proposition proposes a client side annotation based API to be used by developers to specify classes which will carry data outside the scope of the data controller's system to a third party system, the specified classes will then have code weaved in that will communicate with a Privacy Engine component that will determine based on data owner's preferences if their data should be shared or not. The output of this study is a privacy enhancing platform that comprises of three components the client side annotation based API used by developers, an extension to Tomcat and finally a Privacy Engine.
Garza, Gutierrez Kristian. "Facilitating data sharing : a design approach to incorporate context into the research data repository." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/facilitating-data-sharing-a-design-approach-to-incorporate-context-into-the-research-data-repository(3cecddc6-e51e-4263-84f1-08675cb7c9ed).html.
Повний текст джерелаVu, Xuan Truong. "User-centered and group-based approach for social data filtering and sharing." Thesis, Compiègne, 2015. http://www.theses.fr/2015COMP2179/document.
Повний текст джерелаThe social media have played an increasingly important role in many areas of our every day life. Among others, social network sites such as Facebook, LinkedIn, Twitter and Google+ have recently exploded in popularity by attracting millions of users, who communicate with each other, share and publish information and contents at an unprecedented rate. Besides the recognized advantages, social network sites have also raised various issues and challenges. We are particularly interested in two of them, information overload and "walled gardens". These two problems prevent the users from fully and efficiently exploiting thewealth of information available on social network sites. The users have difficulties to filter all incoming contents, to discover additional contents from outside of their friend circles, and importantly to share interesting contents with their different groups of interest. For helping the users to overcome such difficulties, we propose a User-centered and group- based approach for social data filtering and sharing. This novel approach has a twofold purpose : (1) allow the users to aggregate their social data from different social network sites, and to extract from those data the contents of their interest, and (2) organize and share the contents within different groups. The members of a group are moreover able to choose which part of their social data to share with the group, and collectively define its topics of interest. To achieve the proposed approach, we define a modular system architecture including a number of extensible modules, and accordingly build a working Web-based prototype, called SoCoSys. The experimental results, obtained from the two different tests, confirm the added values of our approach
Peng, Peng. "A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/96401.
Повний текст джерелаMaster of Science
Phishing attack is the fraudulent attempt to lure the target users to give away sensitive information such as usernames, passwords and credit card details. Cybercriminals usually build phishing websites (mimicking a trustworthy entity), and trick users to reveal important credentials. However, the data flow of phishing process is still unclear. From attackers' per- spective, we want to know how attackers collect the sensitive information stolen by phishing websites. On the other hand, from defenders' perspective, we are trying to figure out how online scan engines (e.g., VirusTotal) detect phishing URLs and how reliable their detection results are. In this thesis, we perform an empirical measurement to help answer the two questions above. By monitoring and analyzing a large number of real-world phishing websites, we draw a clear picture of the credential sharing process during phishing attacks. Also, by building our own phishing websites and submitting to VirusTotal for scanning, we find that more rigorous methodologies to use VirusTotal labels are desperately needed.
Reda, Roberto. "A Semantic Web approach to ontology-based system: integrating, sharing and analysing IoT health and fitness data." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14645/.
Повний текст джерелаRuokamo, S. (Simo). "Single shared model approach for building information modelling." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526223704.
Повний текст джерелаTiivistelmä Rakentamisen tietomallinnuksen (BIM) nykyisenä tiedonjakamisen käytäntönä on hajautettu tietojärjestelmä, joka perustuu konversioihin. Konversiot ovat ongelmallisia tiedon häviämisen, ristiriitojen ja päällekkäisyyksien vuoksi. Tämän tutkimuksen hypoteesit olivat: i) konversiovapaa tiedonjakaminen on mahdollista, ii) etuja on saavutettavissa ilman konversioita tapahtuvassa tiedonsiirrossa ja iii) laajemmalle teolliselle käytölle ei ole periaatteellisia esteitä. Konversiovapaa tiedon jakaminen edellyttää yhden dataformaatin käyttöä. Alati kasvavien tietomallien koko vaatii tiedon järjestämismenetelmän, joko mahdollistaa osamallit. Datan ristiriidat ja päällekkäisyydet voidaan estää yhden jaetun mallin menetelmällä. Informaatio on parhaiten kaikkien osapuolien saatavilla, kun jaettu malli sijoitetaan pilvipalveluun. Kun tietomallia käsitellään vain web-palvelun rajapintafunktioilla, tiedon eheys ja kelpoisuus säilyvät. Tietoteknisten ratkaisujen kelpoisuus voidaan viime kädessä osoittaa vain toimivilla ohjelmistoilla. Konversiovapaan menetelmän testausta varten kehitettiin vaadittavat ominaisuudet sisältävä ohjelmistokehityspaketti (SDK), joka on edellytys sovellusten yhteensopivuudelle. Kolme sovellusta eli 3DTrussme, Leonardo ja Viewer ohjelmoitiin SDK:n avulla. Ohjelmointirajapinta sisälsi tarvittavat toiminnallisuudet tiedonjakamiseen, ja se toteutettiin pilvipalveluna. Testiajossa Leonardo-sovelluksella mallinnettiin seinät, 3DTrussmellä suunniteltiin naulalevyristikot ja Viewer-sovelluksella tarkasteltiin mallia. Kaikki kolme sovellusta käyttivät samaa jaettua mallia pilvipalvelussa. Suoritetussa testissä kaikki informaatio jaettiin ilman konversioita ja tallennettiin vain kerran. Ilman konversioita ja päällekkäisyyksiä saavutettiin parempi datan eheys ja integraatio. SDK:n avulla uudet sovellukset pystyivät liittymään yhden jaetun mallin ekosysteemiin ilman teknisiä esteitä. Toisaalta, ilman merkittäviä muutoksia nykyiset BIM sovellukset eivät ole yhteensopivia. Testiajossa suorituskyky oli hyväksyttävä, mutta todellisuudessa mallien koko sekä sovellusten ja käyttäjien lukumäärä ovat paljon suurempia. Tutkimus osoitti, että konversiovapaa yhden jaetun mallin menetelmä voi olla seuraava BIM-kehityssuunta ja vaihtoehto nykyisille tiedonsiirtoratkaisuille, jotka käyttävät erillisiä tiedostoja, konversioita ja linkkejä
Francq, Pascal. "Structured and collaborative search: an integrated approach to share documents among users." Doctoral thesis, Universite Libre de Bruxelles, 2003. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211315.
Повний текст джерелаAujourd'hui, la gestion des documents est l'un des problèmes les plus importants en informatique. L'objectif de cette thèse est de proposer un système de gestion documentaire basé sur une approche appelée recherche structurée et collaborative. Les caractéristiques essentielles sont :
Dès lors que les utilisateurs ont plusieurs centres d'intérêts, ils sont décrits par des profils, un profil correspondant à un centre d'intérêt particulier. C'est la partie structurée du système.
Pour construire une description des profils, les utilisateurs jugent des documents en fonction de leur intérêt
Le système regroupe les profils similaires pour former un certain nombre de communautés virtuelles
Une fois les communautés virtuelles définies, des documents jugés comme intéressants par certains utilisateurs d'une communauté peuvent être partagés dans toute la communauté. C'est la partie collaborative du système.
Le système a été validé sur plusieurs corpora de documents en utilisant une méthodologie précise et offre des résultats prometteurs.
Doctorat en sciences appliquées
info:eu-repo/semantics/nonPublished
Даценко, Сергій Олександрович. "Програмні засоби підвищення продуктивності роботи СУБД MongoDB". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26713.
Повний текст джерелаActuality of theme. To date, MongoDB is a database, often used in the development of systems focused on the processing of poorly structured data. One reason for this is the ability to use horizontal scaling (shading) and data distribution settings, which greatly affects the performance of the system as a whole. Therefore, various strategies for data splitting in the cluster were developed, such as: a burning house strategy, hot spots strategy, and so on. These strategies have their own applications, their advantages and disadvantages, but the general disadvantage of these strategies is the uneven distribution of data in the presence of so-called "jumbo chunk", which in turn affects the performance of the system. The object of the study is the distribution of data between servers in the MongoDB cluster. The subject of the study is software tools to improve the performance of the MongoDB database, which are designed to configure the distribution of data in accordance with the permissible percentage loads of nodes of the cluster, taking into account the influence of "jumbo chunks". The purpose of the work: to increase the productivity of the DBMS MongoDB. Scientific novelty: 1. A data-sharing approach is proposed that incorporates the ideas of existing approaches and, unlike existing approaches, takes into account the possibility of having "jumbo chunks" when distributing data. 2. A comparative analysis of the proposed approach with existing ones is made, it is determined in what situations it is necessary to use this approach of approach, its advantages and disadvantages in comparison with existing approaches of data distribution. The practical value of the results obtained in the work is that the proposed approach provides the possibility of adjusting the distribution of data in accordance with the permissible percentages of nodes of the cluster, taking into account the influence of "jumbo chunks". In addition, the software developed in the work can be used to implement automated data distribution with the specified settings. Test work. The proposed approach was presented and discussed at the scientific conference of undergraduates and postgraduates "Applied Mathematics and Computing", PMK-2018 (Kyiv, November 14-16, 2018) and at the V International Scientific and Technical Internet Conference "Modern Methods, Information, software and technical support of control systems for organizational, technical and technological complexes", held on November 22, 2018 at the National University of Food Technologies. Structure and scope of work. The master's thesis consists of an introduction, four chapters and conclusions. The introduction gives a general description of the work, assesses the current state of the problem, substantiates the relevance of the research direction, formulates the purpose and objectives of the research, shows the scientific novelty of the results obtained. The first chapter examines the existing approaches to data distribution, their features, disadvantages and advantages, and discusses different implementations. The second chapter proposes a data-sharing approach that addresses the problem identified. The third chapter, algorithmic features of implementation of the developed software tools for implementation of the proposed approach are presented. The fourth chapter presents the results of testing the proposed approach. The conclusions are the results of the work. The master's dissertation is presented on 80 sheets, contains a link to the list of used literary sources.
Актуальность темы. На сегодняшний день MongoDB является СУБД, которая часто используется при разработке систем, ориентированных на обработку слабо структурированных данных. Одной из причин этого является возможность использования горизонтального масштабирования (шардингу) и настройки распределения данных, что в значительной мере влияет на производительность работы системы в целом. Поэтому были разработаны различные стратегии распределения данных в кластере, такие как: стратегия горящего дома, стратегия горячих точек и тому подобное. Данные стратегии имеют свои области применения, свои преимущества и недостатки, но общим недостатком данных стратегий является неравномерное распределение данных при наличии так называемых «джамбо-чанков», что в свою очередь влияет на производительность работы системы. Объектом исследования является распределение данных между серверами в кластере MongoDB. Предметом исследования являются программные средства для повышения производительности работы СУБД MongoDB, которые предназначены для настройки распределения данных в соответствии с допустимых процентных нагрузок узлов кластера, учитывая влияние «джамбо-чанков». Цель работы: повышение производительности работы СУБД MongoDB. Научная новизна: 1. Предложен подход распределения данных, который включает в себя идеи существующих подходов и, в отличие от существующих подходов, при распределении данных учитывает возможность наличия «джамбо-чанков». 2. Выполнен сравнительный анализ предложенного подхода с существующими, определено в каких именно ситуациях нужно использовать данный подход, его преимущества и недостатки по сравнению с существующими подходами распределения данных. Практическая ценность полученных в работе результатов заключается в том, что предложенный подход предоставляет возможность настройки распределения данных в соответствии с допустимыми процентных нагрузками узлов кластера, учитывая влияние «джамбо-чанков». Кроме того разработанные в работе программные средства могут быть использованы для реализации автоматизированного распределения данных с заданными настройками. Апробация работы. Предложенный подход был представлен и обсужден на научной конференции магистрантов и аспирантов «Прикладная математика и компьютинг» ПМК-2018 (Киев, 14 - 16 ноября 2018) и на V Международной научно-технической Internet-конференции «Современные методы, информационное, программное и техническое обеспечение систем управления организационно-техническими и технологическими комплексами», которая проводилась 22 ноября 2018 в Национальном университете пищевых технологий. Структура и объем работы. Магистерская диссертация состоит из введения, четырех глав и выводов. Во введении представлена общая характеристика работы, произведена оценка современного состояния проблемы, обоснована актуальность направления исследований, сформулированы цели и задачи исследований, показано научную новизну полученных результатов. В первой главе рассмотрены существующие подходы распределения данных, их особенности, недостатки и преимущества, рассмотрены различные реализации. Во втором разделе предложено подход распределения данных который будет решать обнаруженную проблему. В третьем разделе приведены алгоритмические особенности реализации разработанных программных средств для реализации предложенного подхода. В четвертом разделе представлены результаты тестирования предложенного подхода. В выводах представлены результаты проведенной работы. Магистерская диссертация представлена на 80 листах, содержит ссылки на список использованных литературных источников.
Mnie, Filali Imane. "Distribution multi-contenus sur Internet." Thesis, Université Côte d'Azur (ComUE), 2016. http://www.theses.fr/2016AZUR4068/document.
Повний текст джерелаIn this study, we focused on peer-to-peer protocols (P2P), which represent a promising solution for data dissemination and content delivery at low-cost in the Internet. We performed, initially, a behavioral study of various P2P protocols for file sharing (content distribution without time constraint) and live streaming. Concerning file sharing, we have shown the impact of Hadopi on users’ behavior and discussed the effectiveness of protocols according to content type, based on users’ choice. BitTorrent appeared as the most efficient approach during our study, especially when it comes to large content. As for streaming, we studied the quality of service of Sopcast, a live distribution network that accounts for more than 60% of P2P broadcast live events. Our in-depth analysis of these two distributionmodes led us to focus on the BitTorrent protocol because of its proven efficiency in file sharing and the fact that it is open source. In the second part of the thesis, we proposed and implemented a new protocol based on BitTorrent, in a controlled environment. The modifications that we proposed allow to increase the efficiency of the protocol through improved dissemination of metadata (the rarest piece), both for live and file sharing. An enhanced version is introduced with a push method, where nodes that lag behind receive an extra service so as to improve the overall performance
Attasena, Varunya. "Secret sharing approaches for secure data warehousing and on-line analysis in the cloud." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22014/document.
Повний текст джерелаCloud business intelligence is an increasingly popular solution to deliver decision support capabilities via elastic, pay-per-use resources. However, data security issues are one of the top concerns when dealing with sensitive data. Many security issues are raised by data storage in a public cloud, including data privacy, data availability, data integrity, data backup and recovery, and data transfer safety. Moreover, security risks may come from both cloud service providers and intruders, while cloud data warehouses should be both highly protected and effectively refreshed and analyzed through on-line analysis processing. Hence, users seek secure data warehouses at the lowest possible storage and access costs within the pay-as-you-go paradigm.In this thesis, we propose two novel approaches for securing cloud data warehouses by base-p verifiable secret sharing (bpVSS) and flexible verifiable secret sharing (fVSS), respectively. Secret sharing encrypts and distributes data over several cloud service providers, thus enforcing data privacy and availability. bpVSS and fVSS address five shortcomings in existing secret sharing-based approaches. First, they allow on-line analysis processing. Second, they enforce data integrity with the help of both inner and outer signatures. Third, they help users minimize the cost of cloud warehousing by limiting global share volume. Moreover, fVSS balances the load among service providers with respect to their pricing policies. Fourth, fVSS improves secret sharing security by imposing a new constraint: no cloud service provide group can hold enough shares to reconstruct or break the secret. Five, fVSS allows refreshing the data warehouse even when some service providers fail. To evaluate bpVSS' and fVSS' efficiency, we theoretically study the factors that impact our approaches with respect to security, complexity and monetary cost in the pay-as-you-go paradigm. Moreover, we also validate the relevance of our approaches experimentally with the Star Schema Benchmark and demonstrate its superiority to related, existing methods
Zhu, Dianzhuo. "Understanding Motivations and Impacts of Ridesharing : Three Essays on Two French Ridesharing Platforms The Impact of SNCF Strike on Ridesharing: A Novel Approach of Consumer Surplus Estimation Using BlaBlaCar.com Data The limit of money in daily ridesharing: Evidence from a field experiment,Technical report More Generous for Small Favour? Exploring the Role of Monetary and Prosocial Incentives of Daily Ride Sharing Using a Field Experiment in Rural Île-de-France." Thesis, Université Paris sciences et lettres, 2020. https://basepub.dauphine.fr/discover?query=%222020UPSLD003%22.
Повний текст джерелаModern societies are faced with multiple challenges caused by widespread car usage. In urban cities, too many cars on the road are creating traffic jams, air pollution, and noise. In rural villages, residents are becoming more and more dependent on cars, limiting the mobility rights of a vulnerable population. Ridesharing could be a solution to both challenges. The thesis adds to the understanding of the behavior of ridesharing participants. The first two papers are two field experiments with Ecov on the monetary and prosocial motivations of drivers. For trips of very short distances, prosocial motivations are more salient for promoting the practice, while for middle-distance trips, monetary incentives are more salient. However, putting a very high monetary incentive does not outperform a lower but sufficient one. The third paper examines the impact of the French railway worker strike in 2018 on long-distance ridesharing using data from BlaBlaCar. An average strike day induces the ridesharing seat supply to increase by 7% and the seat demand to increase by 29%. The ridesharing passengers' consumer surplus also increases by 17,753€ during an average strike day across the whole of France
Cecchinel, Cyril. "DEPOSIT : une approche pour exprimer et déployer des politiques de collecte sur des infrastructures de capteurs hétérogènes et partagées." Thesis, Université Côte d'Azur (ComUE), 2017. http://www.theses.fr/2017AZUR4094/document.
Повний текст джерелаSensing infrastructures are classically used in the IoT to collect data. However, a deep knowledge of sensing infrastructures is needed to properly interact with the deployed systems. For software engineers, targeting these systems is tedious. First, the specifies of the platforms composing the infrastructure compel them to work with little abstractions and heterogeneous devices. This can lead to code that badly exploit the network infrastructure. Moreover, by being infrastructure specific, these applications cannot be easily reused across different systems. Secondly, the deployment of an application is outside the domain expertise of a software engineer as she needs to identify the required platform(s) to support her application. Lastly, the sensing infrastructure might not be designed to support the concurrent execution of various applications leading to redundant deployments when a new application is contemplated. In this thesis we present an approach that supports (i) the definition of data collection policies at high level of abstraction with a focus on their reuse, (ii) their deployment over a heterogeneous infrastructure driven by models designed by a network export and (iii) the automatic composition of the policy on top of the heterogeneous sensing infrastructures. Based on these contributions, a software engineer can exploit sensor networks without knowing the associated details, while reusing architectural abstractions available off-the-shelf in their policy. The network will also be shared automatically between the policies
Ngo, Thanh Nghi. "Une approche PLM pour supporter les collaborations et le partage des connaissances dans le secteur médical : Application aux processus de soins par implantation de prothèses." Thesis, Ecole centrale de Nantes, 2018. http://www.theses.fr/2018ECDN0013/document.
Повний текст джерелаMedical sector is a dynamic domain that requires continuous improvement of its business processes and assistance to the actors involved. This research focuses on the medical treatment process requiring prosthesis implantation. The specificity of such a process is that it makes in connection two lifecyclesbelonging to medical and engineering domains respectively. This implies several collaborative actions between stake holders from heterogeneous disciplines. However, several problems of communication and knowledge sharing may occur because of the variety of semantic used and the specific business practices in each domain. In this context, this PhD work is interested in the potential of knowledge engineering and product lifecycle management approaches to cope with the above problems. To do so, a conceptual framework is proposed for the analysis of links between the disease (medicaldomain) and the prosthesis (engineering domain) lifecycles. Based on this analysis, a semantic ontology model for medical domain is defined as part of a global knowledge-based PLM approach proposition. The application of the proposition is demonstrated through an implementation of useful function in the AUDROS PLM software
Lo, Ching-Cheng, and 羅京城. "A Data Sharing Approach for Secure VoIP Delivery." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/23568684915524150784.
Повний текст джерела國立交通大學
資訊工程系所
92
In recent years, because the speed of network transmission increases, a lot of time-sensitive applications begin to prevail. The most obvious example is the network telephone (Voice over IP). The advantages of voice over IP network are lower cost and flexible. The IP network transmits packet using the “best effort” method, so the quality of VoIP should be taken in consideration by the supplier. More and more network attacks are discovered in recent years, like Deny of Service (DoS), Man-In-Middle attack, and the eavesdropping program (Wiretap).In this thesis, we will focus on the security of voice data in public IP network. Traditional methods used for secure transmission, such as encryption, spend too much time in data encryption and decryption. Those encryption methods also spend much time in key establishment, key exchange and protection. When using visual cryptography and data sharing methods, we can reduce the influence of those problems that mentioned above. Therefore we use this concept in voice data transmission over Internet to prevent from the wiretap attack, and to transit the voice data through the network more efficiently. In addition, we utilize the disjoint multipath routing algorithm to send data, so we can reduce the occurrence of network hot-spot.
Trigo, Dinis Filipe da Silva. "Blockchain-based Approach for Sharing Health Research Data." Dissertação, 2020. https://hdl.handle.net/10216/129072.
Повний текст джерелаTrigo, Dinis Filipe da Silva. "Blockchain-based Approach for Sharing Health Research Data." Master's thesis, 2020. https://hdl.handle.net/10216/129072.
Повний текст джерелаMai, Guan-Shuo, and 麥舘碩. "Linked Open Data of Ecology : A New Approach of Data Sharing." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/27784016812414137765.
Повний текст джерела國立東華大學
自然資源與環境學系
99
Ecology is a discipline emphasizing integrative and collaborative approaches, and data sharing could facilitate integration among different ecology subdisciplines. However, the lack of semantics and unified access platform in prevalent ecological information management systems hamper the data sharing considerably. In this study, a newly developing framework to connect data on the Web, Linked Data, is proposed to be a suitable practice for exposing, sharing and connecting pieces of ecological data. The four principles built upon standard Web technologies and Resource Description Framework (RDF) make data linkable and machine-readable in the finest level of granularity, interweaving data silos into the Web of Data. The new-proposed framework for sharing ecological data is named Linked Open Data of Ecology (LODE). As a case study, five existing datasets with different but related contents was published as LODE. The data sets are forest fire database, plant and insect specimen databases established byTFRI, the Nanshi forest dynamics plot census data provided by Providence University, and the database of catalogue of life in Taiwan provided by Academia Sinica. The data publishing workflow can be summarized into 4 steps: 1) to prepare raw data and to build general data models, 2) to transform raw data into RDF data fitting models from step 1, 3) to load RDF data and models into RDF repositories with reasoners to merge data and to complete semantics,4) to publish through Linked Data interface. Using the above schema links among 5 source datasets as well as other datasets on the Web of Data could then be established. The scalability and interpretability of this data framework were demonstrated with dynamic data discovery by link traversing, federated querying multiple static datasets, exploring relationships among data instances, and advanced queries. The suitability of this new approach in ecological data sharing is then discussed. Problems on data quality, integrating taxonomic data, analysis of ecological data automatically under LODE framework using scientific workflow tools such as Kepler, and the need to improve current data models were also explored. This study concludes that Linked Data is suitable for ecological data sharing but improvement of data publishing workflow and the user interface are needed.
Coetzee, Serena Martha. "An analysis of a data grid approach for spatial data infrastructures." Thesis, 2009. http://hdl.handle.net/2263/28232.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2009.
Computer Science
unrestricted
(9380318), Min Namgung. "Performance Comparison of Public Bike Demand Predictions: The Impact of Weather and Air Pollution." Thesis, 2020.
Знайти повний текст джерела"Informatics Approaches to Understand Data Sensitivity Perspectives of Patients with Behavioral Health Conditions." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57265.
Повний текст джерелаDissertation/Thesis
Doctoral Dissertation Biomedical Informatics 2020