878 resultados para Shamir secret-sharing
Resumo:
As identified by Griffin (1997) and Kahn (2012), manufacturing organisations typically improve their market position by accelerating their product development (PD) cycles. One method for achieving this is to reduce the time taken to design, test and validate new products, so that they can reach the end customer before competition. This paper adds to existing research on PD testing procedures by reporting on an exploratory investigation carried out in a UK-based manufacturing plant. We explore the organisational and managerial factors that contribute to the time spent on testing of new products during development. The investigation consisted of three sections, viz. observations and process modelling, utilisation metrics and a questionnaire-based investigation, from which a proposed framework to improve and reduce the PD time cycle is presented. This research focuses specifically on the improvement of the utilisation of product testing facilities and the links to its main internal stakeholders - PD engineers.
Resumo:
Cloud storage has rapidly become a cornerstone of many businesses and has moved from an early adopters stage to an early majority, where we typically see explosive deployments. As companies rush to join the cloud revolution, it has become vital to create the necessary tools that will effectively protect users' data from unauthorized access. Nevertheless, sharing data between multiple users' under the same domain in a secure and efficient way is not trivial. In this paper, we propose Sharing in the Rain – a protocol that allows cloud users' to securely share their data based on predefined policies. The proposed protocol is based on Attribute-Based Encryption (ABE) and allows users' to encrypt data based on certain policies and attributes. Moreover, we use a Key-Policy Attribute-Based technique through which access revocation is optimized. More precisely, we show how to securely and efficiently remove access to a file, for a certain user that is misbehaving or is no longer part of a user group, without having to decrypt and re-encrypt the original data with a new key or a new policy.
Resumo:
In this article, as part of the Erasmus+ project “Divercity”, we focus on the collection and analysis of good practices in Spain and other countries in Europe. The project revolves around the development of methods that valorize cultural diversity and in this respect, identifying and sharing best practices on diversity and inclusion through artistic mediation inside museums, culture institutions, our urban walks, forms an mandatory stage of the research process.
Resumo:
This thesis explores how to design a peer support system to facilitate self-organized knowledge sharing in non-formal learning environments, in particular when learners work on complex tasks. The peer support system aims to replace two teacher-led didactic arrangements: selecting a tutor at the initial stage, and guidance during the interaction process (Dillenbourg, 1999; Topping, 1996). Such a system has previously been developed by Van Rosmalen (2008) and De Bakker (2010) and has been tentatively used to facilitate knowledge sharing on content-related questions. In this thesis, we would like to find out how to further improve the design of this peer support system, especially to facilitate knowledge sharing on complex tasks. Since little pedagogical theory is available to inform the design of our peer support system, this thesis attempts to apply cognitive load theory (Sweller, Van Merriënboer, & Paas, 1998; Van Merriënboer & Sweller, 2005) that informs instructional designs in classroom settings to the design of our peer support system in Learning Networks.
Resumo:
BACKGROUND: Eighty per cent of Malawi's 8 million children live in rural areas, and there is an extensive tiered health system infrastructure from village health clinics to district hospitals which refers patients to one of the four central hospitals. The clinics and district hospitals are staffed by nurses, non-physician clinicians and recently qualified doctors. There are 16 paediatric specialists working in two of the four central hospitals which serve the urban population as well as accepting referrals from district hospitals. In order to provide expert paediatric care as close to home as possible, we describe our plan to task share within a managed clinical network and our hypothesis that this will improve paediatric care and child health.
PRESENTATION OF THE HYPOTHESIS: Managed clinical networks have been found to improve equity of care in rural districts and to ensure that the correct care is provided as close to home as possible. A network for paediatric care in Malawi with mentoring of non-physician clinicians based in a district hospital by paediatricians based at the central hospitals will establish and sustain clinical referral pathways in both directions. Ultimately, the plan envisages four managed paediatric clinical networks, each radiating from one of Malawi's four central hospitals and covering the entire country. This model of task sharing within four hub-and-spoke networks may facilitate wider dissemination of scarce expertise and improve child healthcare in Malawi close to the child's home.
TESTING THE HYPOTHESIS: Funding has been secured to train sufficient personnel to staff all central and district hospitals in Malawi with teams of paediatric specialists in the central hospitals and specialist non-physician clinicians in each government district hospital. The hypothesis will be tested using a natural experiment model. Data routinely collected by the Ministry of Health will be corroborated at the district. This will include case fatality rates for common childhood illness, perinatal mortality and process indicators. Data from different districts will be compared at baseline and annually until 2020 as the specialists of both cadres take up posts.
IMPLICATIONS OF THE HYPOTHESIS: If a managed clinical network improves child healthcare in Malawi, it may be a potential model for the other countries in sub-Saharan Africa with similar cadres in their healthcare system and face similar challenges in terms of scarcity of specialists.
Resumo:
We propose cyclic prefix single carrier full-duplex transmission in amplify-and-forward cooperative spectrum sharing networks to achieve multipath diversity and full-duplex spectral efficiency. Integrating full-duplex transmission into cooperative spectrum sharing systems results in two intrinsic problems: 1) the residual loop interference occurs between the transmit and the receive antennas at the secondary relays and 2) the primary users simultaneously suffer interference from the secondary source (SS) and the secondary relays (SRs). Thus, examining the effects of residual loop interference under peak interference power constraint at the primary users and maximum transmit power constraints at the SS and the SRs is a particularly challenging problem in frequency selective fading channels. To do so, we derive and quantitatively compare the lower bounds on the outage probability and the corresponding asymptotic outage probability for max–min relay selection, partial relay selection, and maximum interference relay selection policies in frequency selective fading channels. To facilitate comparison, we provide the corresponding analysis for half-duplex. Our results show two complementary regions, named as the signal-to-noise ratio (SNR) dominant region and the residual loop interference dominant region, where the multipath diversity and spatial diversity can be achievable only in the SNR dominant region, however the diversity gain collapses to zero in the residual loop interference dominant region.
Resumo:
In this paper, we propose three relay selection schemes for full-duplex heterogeneous networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the cognitive small-cell nodes (secondary network) can share the spectrum licensed to the macro-cell system (primary network) on the condition that the quality-of-service of the primary network is always satisfied subjected to its outage probability constraint. The messages are delivered from one small-cell base station to the destination with the help of full-duplex small-cell base stations, which act as relay nodes. Based on the availability of the network’s channel state information at the secondary information source, three different selection criteria for full-duplex relays, namely: 1) partial relay selection; 2) optimal relay selection; and 3) minimal self-interference relay selection, are proposed. We derive the exact closed-form and asymptotic expressions of the secrecy outage probability for the three criteria under the attack of non-colluding/colluding eavesdroppers. We demonstrate that the optimal relay selection scheme outperforms the partial relay selection and minimal self-interference relay selection schemes at the expense of acquiring full channel state information knowledge. In addition, increasing the number of the full-duplex small-cell base stations can improve the security performance. At the illegitimate side, deploying colluding eavesdroppers and increasing the number of eavesdroppers put the confidential information at a greater risk. Besides, the transmit power and the desire outage probability of the primary network have great influences on the secrecy outage probability of the secondary network.
Resumo:
In this paper, we investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels. In particular, the outdated channel state information is considered at the process of antenna selection due to feedback delay. Considering a practical passive eavesdropper scenario, we derive the exact and asymptotic closed-form expressions of secrecy outage probability, which enable us to evaluate the secrecy performance with high efficiency and present a new design insight into the impact of key parameters on the secrecy performance. In addition, the analytical results demonstrate that the achievable secrecy diversity order is only determined by the parameters of the secondary network, while other parameters related to primary or eavesdropper’s channels have a significantly impact on the secrecy coding gain.
Resumo:
Questo elaborato ha il fine di approfondire ed esplicitare criticità e leve del sempre crescente fenomeno collaborativo detto Sharing Economy. In appendice il Business Plan della startup Dimitto: progetto svolto durante il corso di Creazione D'Impresa - Riccardo Fini
Resumo:
Design is being performed on an ever-increasing spectrum of complex practices arising in response to emerging markets and technologies, co-design, digital interaction, service design and cultures of innovation. This emerging notion of design has led to an expansive array of collaborative and facilitation skills to demonstrate and share how such methods can shape innovation. The meaning of these design things in practice can't be taken for granted as matters of fact, which raises a key challenge for design to represent its role through the contradictory nature of matters of concern. This paper explores an innovative, object-oriented approach within the field of design research, visually combining an actor-network theory framework with situational analysis, to report on the role of design for fledgling companies in Scotland, established and funded through the knowledge exchange hub Design in Action (DiA). Key findings and visual maps are presented from reflective discussions with actors from a selection of the businesses within DiA's portfolio. The suggestion is that any notions of strategic value, of engendering meaningful change, of sharing the vision of design, through design things, should be grounded in the reflexive interpretations of matters of concern that emerge.
Resumo:
The purpose of this study was to identify the structural pathways of personal cognition and social context as they influence knowledge sharing behaviors in communities of practice. Based on the existing literature, ten hypotheses and a conceptual model built on the basis of the social cognitive theory were developed regarding the interrelationships of the five constructs: self-efficacy for knowledge sharing, outcome expectations, sense of community, leadership of a community, and knowledge sharing. The data were collected through an online questionnaire from the employees who have participated in communities of practice in a Fortune 100 corporation. A total of 438 usable questionnaires were collected. Overall, three analyses were conducted in order to prove the given hypotheses: (a) hypothesized measurement model fit, (b) relational and influential associations among the constructs, and (c) structural equation model analysis (SEM). In addition, open-ended responses were analyzed. The results presented that (a) hypothesized measurement models were valid and reliable, (b) personal cognitive factors, self-efficacy and outcome expectations for knowledge sharing, were found to be significant predictors of community members’ sense of community and knowledge sharing behaviors, (c) sense of community had the most significant impact on the knowledge sharing, (d) as the perceived social context, sense of community mediated the effects of personal cognition on knowledge sharing behaviors, and (e) personal cognition and social context jointly contributed to knowledge sharing. In brief, all of the hypotheses were positively supported. A conclusive summary is provided along with contributive discussion. Implications and contributions to HRD researchers and practitioners are discussed, and recommendations are provided.
Resumo:
Peer-to-peer information sharing has fundamentally changed customer decision-making process. Recent developments in information technologies have enabled digital sharing platforms to influence various granular aspects of the information sharing process. Despite the growing importance of digital information sharing, little research has examined the optimal design choices for a platform seeking to maximize returns from information sharing. My dissertation seeks to fill this gap. Specifically, I study novel interventions that can be implemented by the platform at different stages of the information sharing. In collaboration with a leading for-profit platform and a non-profit platform, I conduct three large-scale field experiments to causally identify the impact of these interventions on customers’ sharing behaviors as well as the sharing outcomes. The first essay examines whether and how a firm can enhance social contagion by simply varying the message shared by customers with their friends. Using a large randomized field experiment, I find that i) adding only information about the sender’s purchase status increases the likelihood of recipients’ purchase; ii) adding only information about referral reward increases recipients’ follow-up referrals; and iii) adding information about both the sender’s purchase as well as the referral rewards increases neither the likelihood of purchase nor follow-up referrals. I then discuss the underlying mechanisms. The second essay studies whether and how a firm can design unconditional incentive to engage customers who already reveal willingness to share. I conduct a field experiment to examine the impact of incentive design on sender’s purchase as well as further referral behavior. I find evidence that incentive structure has a significant, but interestingly opposing, impact on both outcomes. The results also provide insights about senders’ motives in sharing. The third essay examines whether and how a non-profit platform can use mobile messaging to leverage recipients’ social ties to encourage blood donation. I design a large field experiment to causally identify the impact of different types of information and incentives on donor’s self-donation and group donation behavior. My results show that non-profits can stimulate group effect and increase blood donation, but only with group reward. Such group reward works by motivating a different donor population. In summary, the findings from the three studies will offer valuable insights for platforms and social enterprises on how to engineer digital platforms to create social contagion. The rich data from randomized experiments and complementary sources (archive and survey) also allows me to test the underlying mechanism at work. In this way, my dissertation provides both managerial implication and theoretical contribution to the phenomenon of peer-to-peer information sharing.
Resumo:
Research has pointed to the importance of artists in the early stages of gentrification; however, few studies have examined specifically the meaning of gentrification and place-change from the perspective of artists themselves, and few studies have investigated the role of ‘creative city’ policies as unintended drivers of gentrification processes. This study generates insights into artists’ own views of gentrification processes within the gentrifying bohemia of the Ouseburn Valley in Newcastle upon Tyne in the North East of England. We stress that gentrification in this area cannot solely be understood as a process of displacement, but is also clearly linked to the growth of modes of regulation and commercialisation within social space. Increasing regulation, brought about by greater local state focus on ‘creative districts’, has impacted the Valley. Alongside this, projects of property development as well as a general growth in the popularity of the Valley as a nightlife consumption district and area of production for commercially-orientated creative class workers have challenged artists’ values of the area as a ‘secret garden’ where romantically inflected values of self-expression, autonomy, spontaneity and non-instrumental artist cooperation can be found.
Resumo:
Introduction. Research design should take into account both (a) the specific nature of the object under scrutiny, and (b) approaches to its study in the past. This is to ensure that informed decisions are made regarding research design in future empirical studies. Here these factors are taken into account with reference to methodological choice for a doctoral study on tacit knowledge sharing, and the extent to tacit knowledge sharing may be facilitated by online tools. The larger study responds to calls for the two domains of knowledge management and human information behaviour to be considered together in terms of their research approaches and theory development. Method. Relevant literature – both domain-specific (knowledge management) and general (research methods in social science) - was identified and analysed to identify the most appropriate approaches for an empirical study of tacit knowledge sharing. Analysis. The analysis shows that there are a number of challenges associated with studying an intangible entity such as tacit knowledge. Quantitative, qualitative and mixed methods have been adopted in prior work on this theme, each with their own strengths and weaknesses. Results. The analysis has informed a decision to adopt a research approach that deploys mixed methods for an inductive case study to extend knowledge of the influence of online tools on tacit knowledge sharing. Conclusion. This work intends to open the debate on methodological choice and routes to implementation for studies that are subject to practical constraints imposed by the context in which they are situated.