-
121
Cross-border cooperation as a key element of internal security – selected aspects
Published 2024-09-01“…The study discusses the practical dimensions of cooperation, focusing on areas such as data-sharing, joint law enforcement operations, and disaster response mechanisms. …”
Get full text
Article -
122
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01“…Permissioned blockchains are increasingly used in areas like supply chain management, financial transactions, and medical data sharing, where ensuring data consistency and security is critical. …”
Get full text
Article -
123
Nano–bio surface interactions, cellular internalisation in cancer cells and e‐data portals of nanomaterials: A review
Published 2021-08-01“…The increased activity of NPs may also result in toxicity on health and environment, thus emphasis should be given to assess the toxicity of NMs in the medical field. The e‐data sharing portals of NMs have also been discussed in this review that will be helpful in providing the information about the chemical, physical, biological properties and toxicity of NMs.…”
Get full text
Article -
124
Módulo de Dados Dinâmicos - MDD: o emprego prático da inteligência territorial
Published 2023-10-01“…It is necessary to make the most of the entire available infrastructure network, using data sharing between different public bodies to advance decision-making more efficiently, enhancing results and reducing operational costs. …”
Get full text
Article -
125
A worldwide itinerary of research ethics in science for a better social responsibility and justice: a bibliometric analysis and review
Published 2025-02-01“…To address these issues, this study recommends promoting transparency and data sharing, enhancing education, and training programs, establishing robust mechanisms to identify and address misconduct, and encouraging collaborative research and open science practices. …”
Get full text
Article -
126
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01“…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
Get full text
Article -
127
Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data
Published 2014-09-01“…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
Get full text
Article -
128
The Enforcement of Law and Policy on STM with the Emergence of Advanced Technologies
Published 2024-12-01“…Space Traffic Management (STM) using advanced technologies is effective for the safety and sustainability of outer space by improving Space Situational Awareness (SSA), data sharing information system, collision avoidance, and space debris mitigation methods. …”
Get full text
Article -
129
The Effect of Platform Data Quality on Tax Compliance in Digital Economy: A Multiagent Based Simulation
Published 2023-01-01“…Recent reforms and technological changes, such as the emergency of platform data sharing, perform as potential instruments to potentially solve the tax compliance issue in the digital economy. …”
Get full text
Article -
130
Surveillance, integrity and metadata in the information age
Published 2025-01-01“…The article also connects the commission’s history to contemporary discussions about surveillance cultures and asks if the Commission – in a longer perspective – can be said to have fostered a positive attitude toward data sharing. …”
Get full text
Article -
131
Design and Implementation of BIM-Based Construction Supervision Platform for Hydraulic Engineering
Published 2022-01-01“…With the continuous promotion of high-quality development of water conservancy in the new era,it has become an inevitable trend to make full use of information technologies such as BIM,digital twins,and simulations to integrate and innovate with the water conservancy industry.In hydraulic engineering,an intelligent management system focusing on “BIM+a whole life cycle” has been gradually formed.Centering on the construction stage of hydraulic engineering,this study uses the new generation of information technologies such as BIM,big data,3S,and three-dimensional (3D) visualization to build an advanced,practical,and safe construction supervision platform for hydraulic engineering that can integrate the basic and overall construction process information resources.It is expected that the platform can greatly reduce the risks and solve the problems such as insufficient cooperation among institutions,difficult information collection,poor data sharing and consistency,and low construction management efficiency. …”
Get full text
Article -
132
Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data
Published 2014-09-01“…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
Get full text
Article -
133
Hadoop-Based Painting Resource Storage and Retrieval Platform Construction and Testing
Published 2021-01-01“…The constructed private cloud platform for remote sensing image data can realize online retrieval of remote sensing image metadata and fast download of remote sensing image data and solve the problems in storage, data sharing, and management of remote sensing image data to a certain extent.…”
Get full text
Article -
134
Gradient purification federated adaptive learning algorithm for Byzantine attack resistance
Published 2024-10-01“…In the context of industrial big data, data security and privacy are key challenges. Traditional data-sharing and model-training methods struggle against risks like Byzantine and poisoning attacks, as federated learning typically assumes all participants are trustworthy, leading to performance drops under attacks. …”
Get full text
Article -
135
Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data
Published 2014-09-01“…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
Get full text
Article -
136
On the Readiness of Scientific Data Papers for a Fair and Transparent Use in Machine Learning
Published 2025-01-01“…Abstract To ensure the fairness and trustworthiness of machine learning (ML) systems, recent legislative initiatives and relevant research in the ML community have pointed out the need to document the data used to train ML models. Besides, data-sharing practices in many scientific domains have evolved in recent years for reproducibility purposes. …”
Get full text
Article -
137
Researchers and Research Data: Improving and Incentivising Sharing and Archiving
Published 2025-01-01“…This article uses observations and metrics from data sharing and research integrity related activities, undertaken by a Research Integrity and Data Specialist at the Francis Crick Institute, to discuss potential reasons behind a slow uptake of FAIR data practices. …”
Get full text
Article -
138
Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data
Published 2014-09-01“…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
Get full text
Article -
139
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01“…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
Get full text
Article -
140
Personalized Federated Learning Scheme for Autonomous Driving Based on Correlated Differential Privacy
Published 2024-12-01“…As for each individual user, data sharing can be an essential part of the process of data collection and transmission. …”
Get full text
Article