997 resultados para electronic signatures
Resumo:
Performance comparisons between File Signatures and Inverted Files for text retrieval have previously shown several significant shortcomings of file signatures relative to inverted files. The inverted file approach underpins most state-of-the-art search engine algorithms, such as Language and Probabilistic models. It has been widely accepted that traditional file signatures are inferior alternatives to inverted files. This paper describes TopSig, a new approach to the construction of file signatures. Many advances in semantic hashing and dimensionality reduction have been made in recent times, but these were not so far linked to general purpose, signature file based, search engines. This paper introduces a different signature file approach that builds upon and extends these recent advances. We are able to demonstrate significant improvements in the performance of signature file based indexing and retrieval, performance that is comparable to that of state of the art inverted file based systems, including Language models and BM25. These findings suggest that file signatures offer a viable alternative to inverted files in suitable settings and positions the file signatures model in the class of Vector Space retrieval models.
Resumo:
Dye-sensitised solar cells have emerged as an important developing technology for low-cost solar energy conversion and a crucial element of these is the dye, responsible for light harvesting and control of interfacial electron-transfer processes.[1] A number of examples of dye exist in the literature which link a ruthenium polypyridyl complex to another platinum group metal complex such as Ru (II), Os (II), Re (I) or Rh (III) via a bridging ligand.[2-6] These systems are often referred to as heterosupramolecular triads when adsorbed on the surface of TiO2 as the semiconductor becomes an active component in the system. A number of problems can arise with these types of sensitisers, for example if a flexible linker, e.g. bis-pyridylethane, is used to couple the two complexes it can be hard to control the orientation of the whole dye. This may lead to the resultant dye cation hole being closer to the surface than desired, and hence the long-lived charge-separated state is not achieved. In addition the size of these dyes may be much larger than that of a mononuclear complex and can lead to poor pore filling on the TiO2 and lower dye coverage, leading to a lower efficiency cell.[7] Despite these issues, efficient charge-separation has been achieved with polynuclear complexes and a long-lived state on the millisecond timescale has been observed for a trinuclear ruthenium complex.[8]
Resumo:
Intermediaries have introduced electronic services with varying success. One of the problems an intermediary faces is deciding what kind of exchange service it should offer to its customers and suppliers. For example, should it only provide a catalogue or should it also enable customers to order products? Developing the right exchange design is a complex undertaking because of the many design options on the one hand and the interests of multiple actors to be considered on the other. This is far more difficult than simple prescriptions like ‘creating a win-win situation’ suggest. We address this problem by developing design patterns for the exchanges between customers, intermediary, and suppliers related to role, linkage, transparency, and ovelty choices. For developing these design patterns, we studied four distinct electronic intermediaries and dentified exchange design choices that require trade-offs relating to the interests of customers, intermediary, and suppliers. The exchange design patterns contribute to the development of design theory for electronic intermediaries by filling a gap between basic business models and detailed business process designs.
Resumo:
A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.
Resumo:
This edition of the ALAR Action learning action research journal aims to capture some of the current dilemmas, solutions and actions researchers experience in the decolonising space. This collection of papers demonstrates that researchers are not only undertaking action research with and within Indigenous and non-Indigenous contexts, but that they are doing so in exciting and dynamic ways across a diversity of situations. First we will address some of the literature on decolonisation. Then we will explain how this specific edition of the Journal came to fruition and aspects of action research.
Resumo:
For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.