scholarly journals The open discovery initiative & promoting transparency in discovery

2021 ◽  
Vol 41 (1-2) ◽  
pp. 91-97
Author(s):  
Geoffrey Morse ◽  
Ken Varnum

NISO recently updated the Open Discovery Initiative Recommended Practice (https://www.niso.org/publications/rp-19-2020-odi), which outlines best practices for working with library discovery services. It defines ways for libraries to assess the level of content provider participation; streamlines the process by which libraries, content providers and discovery service providers work together; defines models for “fair” linking; and suggests usage statistics that should be collected for libraries and for content providers. The recommendations in this document, created by members of the Open Discovery Initiative Standing Committee, enable libraries, discovery service providers, and content providers to work together to the full extent of their abilities - providing the most effective and rich experience to end users.

2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
◽  

Abstract Patient information material (PIM) is omnipresent in healthcare. It is used to convey information or to familiarize potential end-users to offers of support. PIM recaps or elaborates on relevant information and offers recommendation for action. However, the quality of available PIM varies. When the formal and content-related quality of PIM is suboptimal, it not only fails to be effective but can also lead to uncertainty, misunderstandings, resistance or ignorance (e.g. of a support offer). Highly complex information requires much attention on the quality of the PIM, especially with respect to end-users (e.g. vulnerable groups). Excellent communication through the use of PIM is thus essential within complex interventions. Checklists, such as 'Discern' or 'PEMAT', as well as criteria catalogues or evidence-based patient information standards, may assist in the development, quality assessment and optimization of PIM. The inclusion of the end-users is recommended but for various reasons does not often take place. The innovative “integrated, cross-sectional Psycho-Oncology” (isPO) programme, offers needs-driven, professional support to all adult, newly diagnosed cancer patients early in their sickness trajectory. IsPO was developed in 2018. It was implemented and a formative evaluated in 2019. When developing this programme, different PIM were created top-down by the programme designers. During implementation, it became evident that these PIM materials required further improvement. A testing and optimization process started using the participatory health research (PHR) approach and was completed in a five-month period. A PIM-optimisation team was founded, which included the project partners involved in the network support, self-help organisations and the external evaluation institute. A practical instrument (PIM-checklist) for optimising the isPO-PIM was designed, piloted and used for testing by end-users, isPO service providers, and experts. Based on the recommendations in the checklist, the material was revised accordingly. Additionally, the PIM was completed with the design of two new components. Four optimisation rounds were conducted. The optimized PIM was tested on its comprehensibility (for end-users) and its usability (for service providers). During the presentations, the audience is invited to comment on critical questions that may appear during optimization (e.g. timing). Afterwards, there will be a skill building part with a focus on collaborative learning (45 minutes). First, we will focus on the requirements for a practical instrument that is handy for end-users, service providers and experts (mind mapping exercise). Finally, participants will be able to explore the following topics “World Café” discussion: (1) how to plan, conduct and communicate the development of optimization of PIM in a CI program, (2) what needs to be considered for the optimization (e.g. team composition, resources), and (3) how to continuously achieve end-userś participation. Key messages Excellent PIM are essential for a complex interventiońs success in practice and must include information and foster actionability. the iterative PIM design processes benefits from high user participation.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2021 ◽  
Author(s):  
Karam Yateem ◽  
Mohammad Dabbous ◽  
Mohammad Kadem ◽  
Mohammed Khanferi

Abstract The main objective of the paper is to outline initiatives associated with leveraging creativity and innovation to sustain operational excellence. It will cover processes, applications and best practices toward continually leveraging creative and innovation such as the development of innovation team toward creating a collaborative environment in the generation, identification and development of ideas and new technological advancement deployment. The processes described will cover (1) the continuous monitoring and management update of innovation submissions, implementation and self-development course completion, (2) recognition for value addition resultant from technological deployment, (3) Technical Review Committee (TRC) centralization and streamlining of evaluating technologies and best practices, (4) the assignment of challenging targets and (5) the initiation of special innovation campaigns for pressing and challenging matters has resulted in various major accomplishments. The establishment of the 4th Industrial Revolution (IR 4.0) team to address production engineering and well services challenges and collaborate for articulate, smart, more efficient and effective resolutions, process improvements and decision making. The results were remarkable with an incremental increase into intent to submit a patent file consideration, patenting, technology deployment and production of technical manuscripts addressing the unique achievements as well as the submission of awards applications. Technical collaboration toward triggering resolutions to ongoing operational challenges has resulted in various internal in-house built strides of best practices and other collaborative initiatives with other services providers such as: Intelligent Field Equipment Industrial Professionals Training: Special training for intelligent field equipment associated with smart well completion (SWC) exercising and optimization, data retrieval from multiphase flow meters (MPFMs) as well as a permanent downhole monitoring system (PDHMS) and conducting basic preventative maintenance (PM) requirements. Multiphase Flow Metering (MPFM) Advanced Monitoring System: An in-house developed MPFM system advanced monitoring to enable production/Intelligent Field engineers to monitor and diagnose MPFMs healthiness in all fields. It includes a validation mechanism to monitor and verify the different MPFM diagnostic data, alarming mechanism, flow rates and data visualization tools to verify the health of the installed base of equipment toward higher testing efficiency, reduction of manpower exposure to the field, and cost avoidance through minimizing operational logistical arrangements and minimization of unnecessary field visits by service providers. The ultimate intent is to heavily depend upon all employees to successfully propose solutions, and subject matter experts to coach employees in the successful implementation of practical resolutions to improve operations, optimize cost, and enhance employees’ satisfaction and engagement.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
S Salm

Abstract By applying the PHR, a literature-based assessment catalogue was designed and piloted (PIM-check list) with the PIM optimization team (experts, network supporters and experienced end-users). It contains altogether 31 criteria that are clustered into: (1) correctness & validity, (2) 'content-related readability', (3) 'structural readability' and (4) 'graphic-/formatting-related readability'. The PIM is assessable through a traffic light rating system. This simple rating system enables not only experts, but also the end-users (cancer patients) to easily evaluate the PIM without initial and complex training. Moreover, for each criterion, an open text field is provided to write in suggestions for improvement. The available isPO PIM were assessed with this instrument by three groups: (1) experts (network supporters & external evaluators), (2) self-help representatives, and (3) isPO programme service providers. Several feedback loops encouraged all participants to provide critical feedback. In addition to the improvement suggestions from the completed PIM-check lists, a hierarchical overview of the PIM was developed by the PIM-optimization team. It highlights the moment of being in contact with the PIM, the specification of the target group and the depth of information in the specific PIM. These aspects were also considered when creating two new PIM (poster & one-pager document concerning the study consent form). In addition, a uniform design for the 'door-opener' PIM (poster & flyer) was aimed to be a “recognition factor”. Both the optimized and newly designed PIM were presented to and assessed by experienced cancer patients that do not participate in isPO. Suggestions for further improvements were integrated by the PIM-team. The PIM were presented to the isPO service providers for further optimization proposals. A final test for its comprehensibility was conducted using experienced patients in a focus group discussion, and the new PIM were implemented in the field.


Author(s):  
Rupesh Kumar ◽  
Arun Kumar Yadav ◽  
H N Verma

In the Information Technology world, cloud computing technology offering unlimited amount of IT resources and services to end users over the internet on pay-per-use basis. End users are accessing the cloud services on their mobile or personal computers. Service providers are upgrading their services very frequently to enhance the services, and to use their upgraded services, end users are also required to update the specification of their devices. But it will be very costly for the end users to upgrade their devices for high specification to use the enhanced services. Desktop Virtualization is an extensive technology of cloud services. It is the new concept, in which users can access the virtual desktop of required specifications, software and operating system on their old devices anytime and anywhere. With the help of desktop virtualization, users will be benefited by avoiding the cost of frequent upgradation of mobile or personal computer system. Desktop virtualization technology is proving to be a boon for large and small organizations who have to upgrade their computer system with new technology, which is a very costly and challenging process. Desktop virtualization avoids upgrading the hardware of the client machine repeatedly. It allows us to access all applications and data at a low cost on our old machine. This paper presents the comparative analysis of various approaches for desktop virtualization and various challenges which required the solution. Analysis presented in paper has been done based on various performance parameters which will provide the end users low-cost cloud services and best performance on their mobile or personal computers.


2021 ◽  
Author(s):  
Roberta Boscolo ◽  
Hamid Bastani ◽  
Asmerom Beraki ◽  
Nicolas Fournier ◽  
Raül Marcos-Matamoros ◽  
...  

<p><strong><em>FOCUS-Africa</em></strong> is an EU Horizon 2020 project funded to co-develop tailored climate services in the Southern African Development Community (SADC) region. The project, led by the WMO and started in September 2020, gathers 16 partners across Africa and Europe jointly committed to addressing the value of climate services for key economic sectors in Africa: agriculture and food security, water, energy, and infrastructure.</p><p>The project is piloting eight case studies (CSs) in five different countries involving a wide range of end-users. New services derived from seasonal and decadal forecasts are applied for food security and crop production in South Africa, Malawi, Mozambique, and Tanzania. High-resolution climate projections, as well as historical climate reanalyses, are used to support planning and investment decisions for: a railway infrastructure and a mix of renewable energies in Tanzania, hydropower generation assessment under climate change scenarios in Malawi, and water resources management in Mauritius.</p><p>For all the FOCUS-Africa’s case studies, socio-economic impact assessment of the delivered climate services will be carried out in collaboration with the CS leaders, service providers, and end-users, by providing ex-ante and ex-post evaluations grounded in the Global Indicator Framework for the Sustainable Development Goals. The project will align the capacity development efforts with those promoted by WMO for enhancing the capabilities of the NMHSs to deliver climate services to users and will make sure that the project's innovative processes and tools will be part of the WMO training curricula.</p><p>FOCUS-Africa's expected impacts are:</p><ul><li>Build a strong link between the climate scientific community and stakeholders in the SADC region by leveraging the advanced scientific knowledge and strong networks of the implementing team, and by establishing dedicated channels of communications, so as to target the full value chain of our users, from the start of the project</li> <li>Advance the way in which climate information is developed by characterising end-use requirements through regular engagement</li> <li>Contribute to the advancement of the scientific knowledge in the region and strengthened support for international scientific assessments through publications and reports such as those relevant for the IPCC, through the innovative science developed by FOCUS-Africa</li> <li>Demonstrate the effectiveness of the climate information by strengthening the adaptive capacity of end-users by delivering tailored, actionable, and exploitable climate services and by estimating their socio-economic benefits across the full value chain.</li> <li>Enhance policy-making for climate adaptation in the project and other countries</li> <li>Increase women’s access to climate services</li> </ul>


Author(s):  
Ryota Egashira ◽  
Akihiro Enomoto ◽  
Tatsuya Suda

In Service-Oriented Computing, service providers publish their services by deploying service components which implement those services into a network. Since such services are distributed around the network, Service-Oriented Computing requires the functionality to discover the services that meet certain criteria specified by an end user. In order to overcome the scalability issue that the current centralized discovery mechanism inherently has, distributed discovery mechanisms that the P2P research community has developed may be promising alternatives. This chapter outlines existing distributed mechanisms and proposes a novel discovery mechanism that utilizes end users’ preferences. The proposed mechanism allows end users to return their feedback that describes the degree of the preference for discovered services. The returned preference information is stored at nodes and utilized to decide where to forward subsequent queries. The extensive simulation demonstrates that the proposed mechanism meets key requirements such as selectivity, efficiency and adaptability.


2019 ◽  
Vol 16 (3) ◽  
pp. 297-305
Author(s):  
Anna-Leena Saarela ◽  
Anja Walzer ◽  
Anne Mari Juppo

Background Interactive response technologies are used in clinical trials to provide services such as automated randomization and medication logistics management. The objective of this article is to investigate the usage of telephone (Interactive Voice Response) and web (Interactive Web Response) interfaces of interactive response technologies at clinical investigator sites in clinical trials, to obtain information about the preferences of interactive response technology end users between the telephone and web interfaces, and to explore the relevance of the telephone interface in this setting. Methods The data consist of an online survey conducted in spring 2016 with clinical investigators, study nurses, and pharmacists in 13 countries. Results Ninety-eight percent of survey respondents preferred the web interface over the telephone interface, the most important reason being superior usability. However, the respondents indicated the usability of interactive response technology interfaces is not optimal, and lack of integration and consistency across systems is common. A vast majority of interactive response technology end users at clinical sites prefer to use the web interface over the telephone interface, but most also feel there would need to be a back-up system. Conclusions Based on the results, it would be beneficial to improve the usability of the interactive response technology interfaces, and to increase consistency across systems from the current level. Support to and training of the users, as well as clarifying the responsibilities between sites and the sponsor should also be a focal point. Study sponsors should explore with interactive response technology service providers how removing the telephone interface would impact future studies, and whether there could be a more efficient means to achieve a reliable back-up to the web interface instead of a dedicated telephone interface.


2019 ◽  
Vol 11 (3) ◽  
pp. 69 ◽  
Author(s):  
Aris Leivadeas ◽  
George Kesidis ◽  
Mohamed Ibnkahla ◽  
Ioannis Lambadaris

Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). NFV is often complemented with the Cloud Computing paradigm to provide networking functions to enterprise customers and end-users remote from their premises. NFV along with Cloud Computing has also started to be seen in Internet of Things (IoT) platforms as a means to provide networking functions to the IoT traffic. The intermix of IoT, NFV, and Cloud technologies, however, is still in its infancy creating a rich and open future research area. To this end, in this paper, we propose a novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing (MEC) infrastructure for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying the Service Providers’ goal of low deployment costs.


Sign in / Sign up

Export Citation Format

Share Document