Showing 181 - 200 results of 237 for search '"Data sharing"', query time: 0.10s Refine Results
  1. 181

    NASSDA as a Data-Collaborative Network to Enhance Social Science Research in East Asia by Pei-Shan Liao, Shuai Wang, Hiroshi Ishida, Hearan Koo, Won-ho Park

    Published 2025-01-01
    “…International organizations that promote data sharing and collaboration among data depositories have emerged globally and regionally. …”
    Get full text
    Article
  2. 182

    Rehabilomics Strategies Enabled by Cloud-Based Rehabilitation: Scoping Review by Sejun Oh, SangHeon Lee

    Published 2025-01-01
    “…Cloud platforms offer new possibilities for data sharing and collaboration in rehabilomics research, underpinning a patient-centered approach and enhancing the development of personalized therapeutic strategies. …”
    Get full text
    Article
  3. 183

    Vibration Images-Driven Fault Diagnosis Based on CNN and Transfer Learning of Rolling Bearing under Strong Noise by Hongwei Fan, Ceyi Xue, Xuhui Zhang, Xiangang Cao, Shuoqi Gao, Sijie Shao

    Published 2021-01-01
    “…Each kind of sample research compares the impact of thirteen data sharing schemes on the TL accuracy and efficiency, and finally, the test accuracy and time index are introduced to evaluate the model. …”
    Get full text
    Article
  4. 184

    A hybrid blockchain-based solution for secure sharing of electronic medical record data by Gang Han, Yan Ma, Zhongliang Zhang, Yuxin Wang

    Published 2025-01-01
    “…Unlike traditional privacy protection schemes, our approach employs a novel tripartite blockchain architecture that segregates healthcare data across distinct blockchains for patients and healthcare providers while introducing a separate social blockchain to enable privacy-preserving data sharing with authorized external entities. This structure enhances both security and transparency while fostering collaborative efforts across different stakeholders. …”
    Get full text
    Article
  5. 185

    THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA by Kasim Tatić, Zijad Džafić, Mahir Haračić, Merima Haračić

    Published 2020-05-01
    “…According to the re-search results, the respondents believe the key drivers of cloud migration comprise the following: improving effi-ciency, enabling more extensive data sharing capabilities, improving security, increasing innovations, reducing costs. …”
    Get full text
    Article
  6. 186
  7. 187

    Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing by Shang LIU, Yinzhang GUO

    Published 2022-06-01
    “…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
    Get full text
    Article
  8. 188

    A Review of AI Applications in Unconventional Oil and Gas Exploration and Development by Feiyu Chen, Linghui Sun, Boyu Jiang, Xu Huo, Xiuxiu Pan, Chun Feng, Zhirong Zhang

    Published 2025-01-01
    “…Based on existing work, this paper proposes the following future research directions: establishing standardized data sharing and labeling systems; integrating domain knowledge with engineering mechanisms; and advancing interpretable modeling and transfer learning techniques. …”
    Get full text
    Article
  9. 189

    A Novel Federated & Ensembled Learning-Based Battery State-of-Health Estimation for Connected Electric Vehicles by Praveen Abbaraju, Subrata Kumar Kundu

    Published 2024-01-01
    “…The proposed model-agnostic FEL algorithm shows its effectiveness in precise SoH estimation through efficient data sharing among stakeholders and could bring significant benefits for realizing data-centric intelligent solutions for connected EVs.…”
    Get full text
    Article
  10. 190

    Effect of electrical stimulation with a cochlear implant on tinnitus impact: protocol of an individual patient data meta-analysis by Inge Stegeman, Adriana L Smit, Kelly Assouly

    Published 2022-06-01
    “…Methodological quality of eligible studies will be assessed using the Risk of Bias In Non-randomised Studies of Intervention tool (ROBINS-I). Based on a data-sharing agreement, authors of the eligible studies will be invited to share their deidentified and complete IPD. …”
    Get full text
    Article
  11. 191

    Tree mapping and carbon inventory on a university campus in South Korea: Case study and global review by Songhee Lee, Woo Bin Park, Seungmin Lee, Jeong‐Min Lee, Yowhan Son, Tae Kyung Yoon

    Published 2025-01-01
    “…This review identified the following challenges: (1) Few cases have been reported outside North America, (2) publications and data sharing are limited, and (3) participants' experiences have not been evaluated. …”
    Get full text
    Article
  12. 192

    Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls by Syed Imran Akhtar, Abdul Rauf, Muhammad Faisal Amjad, Ifra Batool

    Published 2024-01-01
    “…Therefore, this paper proposes an inter-cloud data security framework, which is a set of controls and a mechanism to measure trust for data sharing based on compliance with the controls. The proposed framework for building inter-cloud trust for data security (FBI-TDS) defines a set of data security controls extracted to cover the possible data-related threats linked with various inter-cloud use cases. …”
    Get full text
    Article
  13. 193

    Research on IFC- and FDS-Based Information Sharing for Building Fire Safety Analysis by Jianyong Shi, Jicao Dao, Liu Jiang, Zeyu Pan

    Published 2019-01-01
    “…Although nowadays building information modeling (BIM) has become a buzzword in the Architecture, Engineering, and Construction (AEC) field to facilitate information integration and interoperability, data sharing and exchange are still weak in the traditional interoperability between BIM applications and fire simulation software, since the data schema of them are totally different. …”
    Get full text
    Article
  14. 194
  15. 195

    Geoscience Solutions for Sustainable Offshore Wind Development by A. P. M. Velenturf, A. R. Emery, D. M. Hodgson, N. L. M. Barlow, A. M. Mohtaj Khorasani, J. Van Alstine, E. L. Peterson, S. Piazolo, M. Thorp

    Published 2021-12-01
    “…Recommendations include industry collaboration and systems for effective data sharing and archiving, as well as further research, education and skills.…”
    Get full text
    Article
  16. 196

    Multi-omics approaches for understanding gene-environment interactions in noncommunicable diseases: techniques, translation, and equity issues by Robel Alemu, Nigussie T. Sharew, Yodit Y. Arsano, Muktar Ahmed, Fasil Tekola-Ayele, Tesfaye B. Mersha, Azmeraw T. Amare

    Published 2025-01-01
    “…We highlight the need for standardized protocols, harmonized data-sharing policies, and advanced approaches such as artificial intelligence/machine learning to integrate multi-omics data and study gene-environment interactions. …”
    Get full text
    Article
  17. 197

    Every little helps: exploring meat and animal product consumption in the Tesco 1.0 dataset by Rakefet Cohen Ben-Arye, Christopher Bryant, Katharina Hofmann

    Published 2023-09-01
    “…We also combined the Tesco 1.0 dataset with datasets from the London Datastore (a free and open data-sharing portal that provides over a thousand datasets to understand the city and develop solutions to its problems), and identified several demographic factors as predictors for the meat consumption. …”
    Get full text
    Article
  18. 198

    Optimising the secondary use of primary care prescribing data to improve quality of care: a qualitative analysis by Robert A Verheij, Niek Klazinga, Erica Barbazza, Lotte Ramerman, Dionne Kringos

    Published 2022-07-01
    “…Five main themes were identified as areas for optimising data use: (1) measuring what matters, (2) increasing data linkages, (3) improving data quality, (4) facilitating data sharing and (5) optimising fit for use analysis.Conclusions To make primary care prescribing data useful for improving quality, consolidated patient-specific data on the indication for a prescription and dispensed medicine, over time, is needed. …”
    Get full text
    Article
  19. 199

    ‘I haven’t met them, I don’t have any trust in them. It just feels like a big unknown’: a qualitative study exploring the determinants of consent to use Human Fertilisation and Emb... by Claire Carson, Lisa Hinton, Jenny Kurinczuk, Maria Quigley

    Published 2019-05-01
    “…Patients were influenced by the wider context of infertility, as well as general concerns about data sharing and security. Low consent rates, which vary by clinic and likely also by patients’ characteristics, have adverse implications for research conducted using HFEA data collected after 2008. …”
    Get full text
    Article
  20. 200

    Changing trends in human brucellosis in pastoral and agricultural China, 2004–2019: a Joinpoint regression analysis by Xiaojuan Ma, Zhuo Liu, Yuhui Geng, Yuan Zhao, Hua Meng, Mingbo Chen, Ting Pan, Dongfeng Pan, Peifeng Liang

    Published 2025-02-01
    “…Methods Annual and monthly incidence and numbers of reported cases of human brucellosis in regional China between 2004 and 2019 were accessed from the National Public Health Science Data Sharing Center, and the annual percentage change (APC) in pastoral and agricultural areas was calculated. …”
    Get full text
    Article