The COVID-19 pandemic is stress-testing existing health information exchange systems. There exists an increasing demand for sharing patient information and efficiently responding to patient medial data requests. Curre...
详细信息
ISBN:
(数字)9781728143514
ISBN:
(纸本)9781728143514
The COVID-19 pandemic is stress-testing existing health information exchange systems. There exists an increasing demand for sharing patient information and efficiently responding to patient medial data requests. Current health information technologies lack data fluidity, especially for remotely sharing medical data beyond their protected, local data storage. This paper presents a blockchain-based data-sharing framework that leverages the properties of immutability and decentralization to ensure a secure, user-centric approach for accessing and controlling access to sensitive medical data. The proposed framework builds its foundations on a peer-to-peer network fueled by the distributed InterPlanetary File System combined with on-chain tagging, and on the use of cryptographic generation techniques for enabling a secure way of sharing medical data. The flow of information is orchestrated by a smart-contract deployed on a blockchain-based protocol to ensure traceability and data integrity. The effectiveness of the framework is demonstrated with the implementation of the framework over a pilot study.
Edge computing (EC) emerges as an alternative to process the large volume of data generated by devices connected to the Internet, through the Internet of Things (IoT). This article is an introduction to EC and applica...
详细信息
Since the standardization of ac power distribution, reactive power compensation has become an essential part of commercial power system operation. This paper will review the history of the development of reactive powe...
详细信息
Since the standardization of ac power distribution, reactive power compensation has become an essential part of commercial power system operation. This paper will review the history of the development of reactive power compensation strategy, analyze the equipment and methods of reactive power compensation, and discuss the strategy of reactive power compensation in low-voltage distribution network. Under conventional switching control, the switching of capacitors produces voltage transients that are disruptive for some users, and the fixed impedance causes the compensation level to fall below the optimal level. Therefore, the intelligent control switch will be used to calculate the power quality by the single chip microcomputer, control the intelligent switch to switch in the best position, in order to reduce the generated voltage transients, improve the power quality.
This paper presents a brief overview of the remote real time monitoring system of the smart micro grid at Dayalbagh Educational Institute. Various components of smart micro grid i.e., battery, inverter etc., are smart...
详细信息
Asset management deals with the process of identifying, monitoring, controlling, and supervising the assets for reliable, stable, and uninterrupted operation of the smart grid. Installing and distributing asset manage...
详细信息
ISBN:
(纸本)9781665447539
Asset management deals with the process of identifying, monitoring, controlling, and supervising the assets for reliable, stable, and uninterrupted operation of the smart grid. Installing and distributing asset management analytics requires a centralized asset health unit to deploy a proactive, high precession network. This paper throws light on the fundamental aspects, giving the main focus on digital twin technology, current trends in the management of transformers and circuit breakers using intelligent relays. The overwhelming importance of Finite Element Analysis, a numerical tool based on minimum potential energy for complex problems with intricate geometry, in the field of asset monitoring and analysis is portrayed using simulations. The Finite element formulation in two-dimensional fields is given primary emphasis. Reliability centered maintenance and Root Cause Failure Analysis increases the independence of the grid, but is prone to data theft and vulnerability attacks. The future trends in this field and the cyber security risk that a smart grid poses are also taken into consideration
Utility providers face power planning challenges regarding energy efficiency and managing electricity generation based on consumer peak demand patterns. smart homes and smart meters provide Big data that can assist in...
详细信息
Based on the balanced panel data of 31 provinces in China from 2003 to 2016, this paper studies the impact of FDI on the innovation ability of China’s provinces through an econometric model. The results show that FDI...
详细信息
In order to promote data distribution and utilization of personal data, the concept of data portability attracts attention. As an example of such personal data, there is a study document of a high school student used ...
详细信息
ISBN:
(纸本)9783030290351;9783030290344
In order to promote data distribution and utilization of personal data, the concept of data portability attracts attention. As an example of such personal data, there is a study document of a high school student used for entrance examination etc. Since study documents are still paper medium in Japan, computerization of study documents is planned. However, since a study document contains a lot of confidential information, the information must not be leaked even if erroneous transmission or mistake occurs. In addition, it is necessary to prevent falsification of information. The format of a study document is now planned to be updated by Ministry of Education, Culture, Sports, Science and Technology, and, in a updated study document, not only teachers input information but also student him/herself also conducts research activities, extra-curricular activities, qualifications/certification etc. Consequently, the authority of input/viewing becomes extremely complicated. In this paper, we propose a digital university admission application system with study documents and e-portfolio using smart contracts on blockchain. Furthermore, we implement the proposed system using Ethereum platform. Due to the property of the blockchain, the falsification of information is extremely difficult, information leakage is prevented by combining with encryption, and it is effective from the viewpoint of data portability.
Vehicular Ad-Hoc Network (VANET) is a network of smart moving vehicles in which vehicles can communicate with each other and form a Mobile Ad-Hoc Network (MANET). This network is formed by smart vehicles, fixed Road S...
详细信息
ISBN:
(纸本)9783030398750;9783030398743
Vehicular Ad-Hoc Network (VANET) is a network of smart moving vehicles in which vehicles can communicate with each other and form a Mobile Ad-Hoc Network (MANET). This network is formed by smart vehicles, fixed Road Side Units (RSUs) and Trusted Authority (TA). This setup of the network is called a smart network because it is integrated with smart traffic management system to monitor the traffic movement in the network. In this system data exchange between the vehicles in VANET is very crucial. It means any type of security failure may affect system performance. There is a need for security in the network in such a way that unauthorized user cannot access the network. To achieve security of the communication channel is very important for isolating intruders/attackers. This paper proposes a scheme which uses the concept of Self Generated Session Key (SGSK). This scheme protects the secret key which is shared over the network channel. A comparative is also made with some existing schemes.
The proceedings contain 75 papers. The topics discussed include: new color and texture features coding method combined to the simulated annealing algorithm for content based image retrieval;CBPM: an approach for conte...
ISBN:
(纸本)9781728180847
The proceedings contain 75 papers. The topics discussed include: new color and texture features coding method combined to the simulated annealing algorithm for content based image retrieval;CBPM: an approach for contextual business process modeling;deep learning using genetic algorithm optimization for short term solar irradiance forecasting;grid based approach (GBA): a new approach based on the grid-clustering algorithm to solve a CPP type problem for air surveillance using UAVs;big data processing: batch-based processing and stream-based processing;fast 3D image reconstruction by separable moments based on Hahn and Krawtchouk polynomials;dynamic vulnerability detection approaches and tools: state of the art;and deep Q-learning approach for congestion problem in smart cities.
暂无评论