-
181
NASSDA as a Data-Collaborative Network to Enhance Social Science Research in East Asia
Published 2025-01-01“…International organizations that promote data sharing and collaboration among data depositories have emerged globally and regionally. …”
Get full text
Article -
182
Rehabilomics Strategies Enabled by Cloud-Based Rehabilitation: Scoping Review
Published 2025-01-01“…Cloud platforms offer new possibilities for data sharing and collaboration in rehabilomics research, underpinning a patient-centered approach and enhancing the development of personalized therapeutic strategies. …”
Get full text
Article -
183
Vibration Images-Driven Fault Diagnosis Based on CNN and Transfer Learning of Rolling Bearing under Strong Noise
Published 2021-01-01“…Each kind of sample research compares the impact of thirteen data sharing schemes on the TL accuracy and efficiency, and finally, the test accuracy and time index are introduced to evaluate the model. …”
Get full text
Article -
184
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01“…Unlike traditional privacy protection schemes, our approach employs a novel tripartite blockchain architecture that segregates healthcare data across distinct blockchains for patients and healthcare providers while introducing a separate social blockchain to enable privacy-preserving data sharing with authorized external entities. This structure enhances both security and transparency while fostering collaborative efforts across different stakeholders. …”
Get full text
Article -
185
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“…According to the re-search results, the respondents believe the key drivers of cloud migration comprise the following: improving effi-ciency, enabling more extensive data sharing capabilities, improving security, increasing innovations, reducing costs. …”
Get full text
Article -
186
Wastewater metagenomics in Africa: Opportunities and challenges.
Published 2024-01-01“…Socio-political and ethical issues also complicate data sharing and the equitable distribution of benefits. …”
Get full text
Article -
187
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
Get full text
Article -
188
A Review of AI Applications in Unconventional Oil and Gas Exploration and Development
Published 2025-01-01“…Based on existing work, this paper proposes the following future research directions: establishing standardized data sharing and labeling systems; integrating domain knowledge with engineering mechanisms; and advancing interpretable modeling and transfer learning techniques. …”
Get full text
Article -
189
A Novel Federated & Ensembled Learning-Based Battery State-of-Health Estimation for Connected Electric Vehicles
Published 2024-01-01“…The proposed model-agnostic FEL algorithm shows its effectiveness in precise SoH estimation through efficient data sharing among stakeholders and could bring significant benefits for realizing data-centric intelligent solutions for connected EVs.…”
Get full text
Article -
190
Effect of electrical stimulation with a cochlear implant on tinnitus impact: protocol of an individual patient data meta-analysis
Published 2022-06-01“…Methodological quality of eligible studies will be assessed using the Risk of Bias In Non-randomised Studies of Intervention tool (ROBINS-I). Based on a data-sharing agreement, authors of the eligible studies will be invited to share their deidentified and complete IPD. …”
Get full text
Article -
191
Tree mapping and carbon inventory on a university campus in South Korea: Case study and global review
Published 2025-01-01“…This review identified the following challenges: (1) Few cases have been reported outside North America, (2) publications and data sharing are limited, and (3) participants' experiences have not been evaluated. …”
Get full text
Article -
192
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…Therefore, this paper proposes an inter-cloud data security framework, which is a set of controls and a mechanism to measure trust for data sharing based on compliance with the controls. The proposed framework for building inter-cloud trust for data security (FBI-TDS) defines a set of data security controls extracted to cover the possible data-related threats linked with various inter-cloud use cases. …”
Get full text
Article -
193
Research on IFC- and FDS-Based Information Sharing for Building Fire Safety Analysis
Published 2019-01-01“…Although nowadays building information modeling (BIM) has become a buzzword in the Architecture, Engineering, and Construction (AEC) field to facilitate information integration and interoperability, data sharing and exchange are still weak in the traditional interoperability between BIM applications and fire simulation software, since the data schema of them are totally different. …”
Get full text
Article -
194
Understanding transmission pathways and integrated digital surveillance potential of antimicrobial resistance in Ethiopia in a One Health approach: a mixed-method study protocol
Published 2022-06-01“…In addition, the new European Union Global Data Protection Guidelines for data sharing, storage and protection will be followed. …”
Get full text
Article -
195
Geoscience Solutions for Sustainable Offshore Wind Development
Published 2021-12-01“…Recommendations include industry collaboration and systems for effective data sharing and archiving, as well as further research, education and skills.…”
Get full text
Article -
196
Multi-omics approaches for understanding gene-environment interactions in noncommunicable diseases: techniques, translation, and equity issues
Published 2025-01-01“…We highlight the need for standardized protocols, harmonized data-sharing policies, and advanced approaches such as artificial intelligence/machine learning to integrate multi-omics data and study gene-environment interactions. …”
Get full text
Article -
197
Every little helps: exploring meat and animal product consumption in the Tesco 1.0 dataset
Published 2023-09-01“…We also combined the Tesco 1.0 dataset with datasets from the London Datastore (a free and open data-sharing portal that provides over a thousand datasets to understand the city and develop solutions to its problems), and identified several demographic factors as predictors for the meat consumption. …”
Get full text
Article -
198
Optimising the secondary use of primary care prescribing data to improve quality of care: a qualitative analysis
Published 2022-07-01“…Five main themes were identified as areas for optimising data use: (1) measuring what matters, (2) increasing data linkages, (3) improving data quality, (4) facilitating data sharing and (5) optimising fit for use analysis.Conclusions To make primary care prescribing data useful for improving quality, consolidated patient-specific data on the indication for a prescription and dispensed medicine, over time, is needed. …”
Get full text
Article -
199
‘I haven’t met them, I don’t have any trust in them. It just feels like a big unknown’: a qualitative study exploring the determinants of consent to use Human Fertilisation and Emb...
Published 2019-05-01“…Patients were influenced by the wider context of infertility, as well as general concerns about data sharing and security. Low consent rates, which vary by clinic and likely also by patients’ characteristics, have adverse implications for research conducted using HFEA data collected after 2008. …”
Get full text
Article -
200
Changing trends in human brucellosis in pastoral and agricultural China, 2004–2019: a Joinpoint regression analysis
Published 2025-02-01“…Methods Annual and monthly incidence and numbers of reported cases of human brucellosis in regional China between 2004 and 2019 were accessed from the National Public Health Science Data Sharing Center, and the annual percentage change (APC) in pastoral and agricultural areas was calculated. …”
Get full text
Article