Showing 121 - 140 results of 237 for search '"Data sharing"', query time: 0.07s Refine Results
  1. 121

    Cross-border cooperation as a key element of internal security – selected aspects by Ireneusz Fabia, Urszula Fabia, Sebastian Piotrowski

    Published 2024-09-01
    “…The study discusses the practical dimensions of cooperation, focusing on areas such as data-sharing, joint law enforcement operations, and disaster response mechanisms. …”
    Get full text
    Article
  2. 122

    A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography by Haibao Zhang, Wenbao Jiang, Jin Ding

    Published 2024-12-01
    “…Permissioned blockchains are increasingly used in areas like supply chain management, financial transactions, and medical data sharing, where ensuring data consistency and security is critical. …”
    Get full text
    Article
  3. 123

    Nano–bio surface interactions, cellular internalisation in cancer cells and e‐data portals of nanomaterials: A review by Ram Dhan Yadav, Abha Chaudhary

    Published 2021-08-01
    “…The increased activity of NPs may also result in toxicity on health and environment, thus emphasis should be given to assess the toxicity of NMs in the medical field. The e‐data sharing portals of NMs have also been discussed in this review that will be helpful in providing the information about the chemical, physical, biological properties and toxicity of NMs.…”
    Get full text
    Article
  4. 124

    Módulo de Dados Dinâmicos - MDD: o emprego prático da inteligência territorial by Rodrigo de Freitas Amorim, Thiago França Simonetti

    Published 2023-10-01
    “…It is necessary to make the most of the entire available infrastructure network, using data sharing between different public bodies to advance decision-making more efficiently, enhancing results and reducing operational costs. …”
    Get full text
    Article
  5. 125

    A worldwide itinerary of research ethics in science for a better social responsibility and justice: a bibliometric analysis and review by Ingrid Sonya Mawussi Adjovi

    Published 2025-02-01
    “…To address these issues, this study recommends promoting transparency and data sharing, enhancing education, and training programs, establishing robust mechanisms to identify and address misconduct, and encouraging collaborative research and open science practices. …”
    Get full text
    Article
  6. 126

    Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network by Haojie HUANG, Xiaoxiao WU, Gangqiang LI

    Published 2020-06-01
    “…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
    Get full text
    Article
  7. 127

    Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data by Finn Hedefalk, Lars Harrie, Patrick Svensson

    Published 2014-09-01
    “…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
    Get full text
    Article
  8. 128

    The Enforcement of Law and Policy on STM with the Emergence of Advanced Technologies by Elham Farahani, Shouping Li

    Published 2024-12-01
    “…Space Traffic Management (STM) using advanced technologies is effective for the safety and sustainability of outer space by improving Space Situational Awareness (SSA), data sharing information system, collision avoidance, and space debris mitigation methods. …”
    Get full text
    Article
  9. 129

    The Effect of Platform Data Quality on Tax Compliance in Digital Economy: A Multiagent Based Simulation by Peng Jin, Zhangwei Feng, Guiping Li

    Published 2023-01-01
    “…Recent reforms and technological changes, such as the emergency of platform data sharing, perform as potential instruments to potentially solve the tax compliance issue in the digital economy. …”
    Get full text
    Article
  10. 130

    Surveillance, integrity and metadata in the information age by Peter Bennesved

    Published 2025-01-01
    “…The article also connects the commission’s history to contemporary discussions about surveillance cultures and asks if the Commission – in a longer perspective – can be said to have fostered a positive attitude toward data sharing. …”
    Get full text
    Article
  11. 131

    Design and Implementation of BIM-Based Construction Supervision Platform for Hydraulic Engineering by YANG Chuhua, RAO Fanwei, FU Zhihao, LIAO Xiangjun

    Published 2022-01-01
    “…With the continuous promotion of high-quality development of water conservancy in the new era,it has become an inevitable trend to make full use of information technologies such as BIM,digital twins,and simulations to integrate and innovate with the water conservancy industry.In hydraulic engineering,an intelligent management system focusing on “BIM+a whole life cycle” has been gradually formed.Centering on the construction stage of hydraulic engineering,this study uses the new generation of information technologies such as BIM,big data,3S,and three-dimensional (3D) visualization to build an advanced,practical,and safe construction supervision platform for hydraulic engineering that can integrate the basic and overall construction process information resources.It is expected that the platform can greatly reduce the risks and solve the problems such as insufficient cooperation among institutions,difficult information collection,poor data sharing and consistency,and low construction management efficiency. …”
    Get full text
    Article
  12. 132

    Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data by Finn Hedefalk, Lars Harrie, Patrick Svensson

    Published 2014-09-01
    “…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
    Get full text
    Article
  13. 133

    Hadoop-Based Painting Resource Storage and Retrieval Platform Construction and Testing by Chenhua Zu

    Published 2021-01-01
    “…The constructed private cloud platform for remote sensing image data can realize online retrieval of remote sensing image metadata and fast download of remote sensing image data and solve the problems in storage, data sharing, and management of remote sensing image data to a certain extent.…”
    Get full text
    Article
  14. 134

    Gradient purification federated adaptive learning algorithm for Byzantine attack resistance by YANG Hui, QIU Ziyou, LI Zhongmei, ZHU Jianyong

    Published 2024-10-01
    “…In the context of industrial big data, data security and privacy are key challenges. Traditional data-sharing and model-training methods struggle against risks like Byzantine and poisoning attacks, as federated learning typically assumes all participants are trustworthy, leading to performance drops under attacks. …”
    Get full text
    Article
  15. 135

    Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data by Finn Hedefalk, Lars Harrie, Patrick Svensson

    Published 2014-09-01
    “…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
    Get full text
    Article
  16. 136

    On the Readiness of Scientific Data Papers for a Fair and Transparent Use in Machine Learning by Joan Giner-Miguelez, Abel Gómez, Jordi Cabot

    Published 2025-01-01
    “…Abstract To ensure the fairness and trustworthiness of machine learning (ML) systems, recent legislative initiatives and relevant research in the ML community have pointed out the need to document the data used to train ML models. Besides, data-sharing practices in many scientific domains have evolved in recent years for reproducibility purposes. …”
    Get full text
    Article
  17. 137

    Researchers and Research Data: Improving and Incentivising Sharing and Archiving by Minna Ventsel, Beth Montague-Hellen

    Published 2025-01-01
    “…This article uses observations and metrics from data sharing and research integrity related activities, undertaken by a Research Integrity and Data Specialist at the Francis Crick Institute, to discuss potential reasons behind a slow uptake of FAIR data practices. …”
    Get full text
    Article
  18. 138

    Extending the Intermediate Data Structure (IDS) for longitudinal historical databases to include geographic data by Finn Hedefalk, Lars Harrie, Patrick Svensson

    Published 2014-09-01
    “…Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. …”
    Get full text
    Article
  19. 139

    Dynamic multi-keyword searchable encryption scheme by Chenghao YUAN, Yong LI, Shuang REN

    Published 2023-04-01
    “…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
    Get full text
    Article
  20. 140

    Personalized Federated Learning Scheme for Autonomous Driving Based on Correlated Differential Privacy by Yuan Tian, Yanfeng Shi, Yue Zhang, Qikun Tian

    Published 2024-12-01
    “…As for each individual user, data sharing can be an essential part of the process of data collection and transmission. …”
    Get full text
    Article