scispace - formally typeset
Search or ask a question

Showing papers on "Upload published in 2016"


Journal ArticleDOI
TL;DR: A significant update to one of the tools in this domain called Enrichr, a comprehensive resource for curated gene sets and a search engine that accumulates biological knowledge for further biological discoveries is presented.
Abstract: Enrichment analysis is a popular method for analyzing gene sets generated by genome-wide experiments. Here we present a significant update to one of the tools in this domain called Enrichr. Enrichr currently contains a large collection of diverse gene set libraries available for analysis and download. In total, Enrichr currently contains 180 184 annotated gene sets from 102 gene set libraries. New features have been added to Enrichr including the ability to submit fuzzy sets, upload BED files, improved application programming interface and visualization of the results as clustergrams. Overall, Enrichr is a comprehensive resource for curated gene sets and a search engine that accumulates biological knowledge for further biological discoveries. Enrichr is freely available at: http://amp.pharm.mssm.edu/Enrichr.

6,201 citations


Journal ArticleDOI
TL;DR: The proposed ID-PUIC protocol is provably secure based on the hardness of computational Diffie-Hellman problem, efficient and flexible, and can realize private remote data integrity checking, delegated remote dataintegrity checking, and public remote data Integrity checking.
Abstract: More and more clients would like to store their data to public cloud servers (PCSs) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data are kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: identity-based proxy-oriented data uploading and remote data integrity checking in public cloud (ID-PUIC). We give the formal definition, system model, and security model. Then, a concrete ID-PUIC protocol is designed using the bilinear pairings. The proposed ID-PUIC protocol is provably secure based on the hardness of computational Diffie–Hellman problem. Our ID-PUIC protocol is also efficient and flexible. Based on the original client’s authorization, the proposed ID-PUIC protocol can realize private remote data integrity checking, delegated remote data integrity checking, and public remote data integrity checking.

127 citations


Journal ArticleDOI
TL;DR: The START (Shiny Transcriptome Analysis Resource Tool) App has the power and flexibility to be resident on a local computer or serve as a web‐based environment, enabling easy sharing of data between researchers and collaborators.
Abstract: Summary: Transcriptional profiling using RNA sequencing (RNAseq) has emerged as a powerful methodology to quantify global gene expression patterns in various contexts from single cells to whole tissues. The tremendous amount of data generated by this profiling technology presents a daunting challenge in terms of effectively visualizing and interpreting results. Convenient and intuitive data interfaces are critical for researchers to easily upload, analyze and visualize their RNAseq data. We designed the START (Shiny Transcriptome Analysis Resource Tool) App with these requirements in mind. This application has the power and flexibility to be resident on a local computer or serve as a web-based environment, enabling easy sharing of data between researchers and collaborators. Availability and Implementation: Source Code for the START App is written entirely in R and can be freely available to download at https://github.com/jminnier/STARTapp with the code licensed under GPLv3. It can be launched on any system that has R installed. The START App is also hosted on https://kcvi.shinyapps.io/START for researchers to temporarily upload their data. Contact: minnier@ohsu.edu

87 citations


Patent
28 Mar 2016
TL;DR: In this paper, the authors describe a system that allows an entity to identify and autonomously contract via a blockchain database with an unknown and anonymous host device for access rights to a high volume raw data stream generated by a sensor of the host device.
Abstract: The systems, apparatus, methods, and computer program products described herein provide the capability for an entity to identify and autonomously contract via a blockchain database with an unknown and anonymous host device for access rights to a high volume raw data stream generated by a sensor of the host device. The systems, apparatus, methods, and computer program products further provide the capability for the entity to push or upload a software module to the host device to allow the entity to process the high volume raw data stream into a low volume data stream directly on the host device, i.e., at the source of the high volume raw data stream.

83 citations


Patent
21 Jan 2016
TL;DR: In this paper, the authors propose a system that includes download location information in an unprotected Uniform Resource Locator (URL) where the download location identifies a download location for downloading an application provided by a cloud system.
Abstract: A system includes download location information in an unprotected Uniform Resource Locator (“URL”), where the download location information identifies a download location for downloading an application provided by a cloud system The system further includes login server information in the unprotected URL, where the login server information identifies a login server that is configured to be logged in before downloading the application from the download location Based on the unprotected URL, the application is configured to be downloaded on a mobile device from the download location and after logging into the login server The application may be developed by accessing a web-based application development server in the cloud system, and after the application is developed, the web-based application development server generates the unprotected URL

60 citations


Journal ArticleDOI
TL;DR: This paper investigates relay-based schemes in cellular systems, where multihop device-to-device (D2D) communications are exploited for content uploading toward the eNodeB, and proposes a constrained coalition formation game, where each UE is a player whose cost is identified as the content upload time.
Abstract: This paper investigates relay-based schemes in cellular systems, where multihop device-to-device (D2D) communications are exploited for content uploading toward the eNodeB. All user equipments (UEs) are sources of their own content and form a multihop D2D chain, with the head of the chain being in charge of uploading all the generated content to the eNodeB. By pooling the cellular radio resources assigned to the D2D chain and by using high-quality short-range radio links, the proposed cooperative content uploading scheme guarantees lower upload delays than in the traditional cellular mode operation. To model the D2D chain formation in a cell and to best characterize self-interested users concerned about their own payoff, a constrained coalition formation game is defined, where each UE is a player whose cost is identified as the content upload time. The solution of the game determines the stable feasible partition for the UEs in the cell. We demonstrate through simulations that with this solution the content uploading time is reduced by 52% with respect to the traditional cellular mode.

60 citations


Journal ArticleDOI
TL;DR: The concept of deduplicatable dynamic proof of storage is introduced and an efficient construction called DeyPoS is proposed, to achieve dynamic PoS and secure cross-user dedUplication, simultaneously, simultaneously.
Abstract: Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to check the integrity of outsourced files and to efficiently update the files in a cloud server. Although researchers have proposed many dynamic PoS schemes in single-user environments, the problem in multi-user environments has not been investigated sufficiently. A practical multi-user cloud storage system needs the secure client-side cross-user deduplication technique, which allows a user to skip the uploading process and obtain the ownership of the files immediately, when other owners of the same files have uploaded them to the cloud server. To the best of our knowledge, none of the existing dynamic PoSs can support this technique. In this paper, we introduce the concept of deduplicatable dynamic proof of storage and propose an efficient construction called DeyPoS, to achieve dynamic PoS and secure cross-user deduplication, simultaneously. Considering the challenges of structure diversity and private tag generation, we exploit a novel tool called Homomorphic Authenticated Tree (HAT). We prove the security of our construction, and the theoretical analysis and experimental results show that our construction is efficient in practice.

57 citations


Journal ArticleDOI
TL;DR: Research was undertaken to determine the types and nature of volatile and non-volatile data that can be recovered from Windows 8, Mac OS X 10.9, Android 4 and iOS 7 devices when a user has carried out different activities such as upload and download of files and folders.
Abstract: Cloud storage services are popular with both individuals and businesses as they offer cost-effective, large capacity storage and multi-functional services on a wide range of devices such as personal computers (PCs), Mac computers, and smart mobile devices (e.g. iPhones). However, cloud services have also been known to be exploited by criminals, and digital forensics in the cloud remains a challenge, partly due to the diverse range of cloud services and devices that can be used to access such services. Using SugarSync (a popular cloud storage service) as a case study, research was undertaken to determine the types and nature of volatile and non-volatile data that can be recovered from Windows 8, Mac OS X 10.9, Android 4 and iOS 7 devices when a user has carried out different activities such as upload and download of files and folders. We then document the various digital artefacts that could be recovered from the respective devices.

57 citations


01 Jan 2016
TL;DR: The computer analysis of images and patterns is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can download it instantly.
Abstract: Thank you very much for downloading computer analysis of images and patterns. Maybe you have knowledge that, people have search numerous times for their favorite readings like this computer analysis of images and patterns, but end up in infectious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they juggled with some malicious virus inside their computer. computer analysis of images and patterns is available in our book collection an online access to it is set as public so you can download it instantly. Our books collection spans in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the computer analysis of images and patterns is universally compatible with any devices to read.

56 citations


Proceedings Article
01 Jan 2016
TL;DR: In this paper, the authors propose a query planner that automatically identifies the minimal set of coordination points between parties in a given query plan, and the planner translates these distributed steps into secure multiparty computation (SMC) as needed and feeds the secure code into the query executor.
Abstract: People and machines are recording data at an unprecedented rate. At the same time, progress has been slow in making data available for open science and other research initiatives. Many of these efforts are stymied by privacy concerns and regulatory compliance issues. For example, numerous hospitals are interested in combining their patient records with those of other healthcare sites for clinical data research, but they cannot disclose the contents of their databases without violating patient confidentiality. We propose a novel generalization of federated database systems called a private data network (PDN), and it is designed for querying over the collective data of mutually distrustful parties. In a PDN, participants do not reveal their raw data, nor do they encrypt and upload it to the cloud. Rather, they perform secure multiparty computation (SMC) with other federation members to produce query results over the data of both parties. Here, a user submits their SQL query to an honest broker that plans and coordinates its distributed execution using SMC. Within SMC, the participating database providers compute a joint function with an output that is only revealed to the user and the honest broker. The databases computing the query learn nothing about the inputs provided by their peers, nor can they see the output of the group's computation. This capability comes at a high cost-SMC programs typically have runtimes that are orders of magnitude slower than their insecure counterparts. We address this challenge with a query planner that automatically identifies the minimal set of coordination points between parties in a given query plan. The planner translates these distributed steps into SMC as needed and feeds the secure code into our query executor. Our framework, SMCQL, plans and executes PDN queries. We are preparing SMCQL for an open-source release.

42 citations


Proceedings ArticleDOI
14 Nov 2016
TL;DR: This work conducts to its knowledge the first comprehensive characterization of cellular upload traffic and investigates its interaction with other concurrent traffic, revealing rather poor performance associated with applications running concurrently with cellular Upload traffic, due to excessive on-device buffering.
Abstract: Despite the extensive characterization of the growth of cellular network traffic, we observe two important trends not yet thoroughly investigated. First, fueled by the LTE technology and applications involving wearable devices and device-to-device (D2D) communication, device upload traffic is increasingly popular. Second, the multi-tasking and multi-window features of modern mobile devices allow many concurrent TCP connections, resulting in potentially complex interactions. Motivated by these new observations, we conduct to our knowledge the first comprehensive characterization of cellular upload traffic and investigate its interaction with other concurrent traffic. In particular, we reveal rather poor performance associated with applications running concurrently with cellular upload traffic, due to excessive on-device buffering (i.e., on-device bufferbloat). This leads to significant performance degradation on real mobile applications, eg.,66% of download throughput degradation and more than doubling of page load times. We further systematically study a wide range of solutions for mitigating on-device bufferbloat, and provide concrete recommendations by proposing a system called QCUT to control the firmware buffer occupancy from the OS kernel.

Journal ArticleDOI
TL;DR: This paper proposes and experimentally studies a scheme that keeps the training samples private while enabling accurate construction of predictive models and shows that the scheme is highly efficient and scalable to a large number of mHealth users.
Abstract: Advances in biomedical sensors and mobile communication technologies have fostered the rapid growth of mobile health (mHealth) applications in the past years. Users generate a high volume of biomedical data during health monitoring, which can be used by the mHealth server for training predictive models for disease diagnosis and treatment. However, the biomedical sensing data raise serious privacy concerns because they reveal sensitive information such as health status and lifestyles of the sensed subjects. This paper proposes and experimentally studies a scheme that keeps the training samples private while enabling accurate construction of predictive models. We specifically consider logistic regression models which are widely used for predicting dichotomous outcomes in healthcare, and decompose the logistic regression problem into small subproblems over two types of distributed sensing data, i.e., horizontally partitioned data and vertically partitioned data. The subproblems are solved using individual private data, and thus mHealth users can keep their private data locally and only upload (encrypted) intermediate results to the mHealth server for model training. Experimental results based on real datasets show that our scheme is highly efficient and scalable to a large number of mHealth users.

Proceedings Article
10 Aug 2016
TL;DR: This paper proposes a novel solution for proving data replication and retrievability in the cloud, Mirror, which allows to shift the burden of constructing replicas to the cloud provider itself-thus conforming with the current cloud model.
Abstract: Proofs of Retrievability (POR) and Data Possession (PDP) are cryptographic protocols that enable a cloud provider to prove that data is correctly stored in the cloud. PDP have been recently extended to enable users to check in a single protocol that additional file replicas are stored as well. To conduct multi-replica PDP, users are however required to process, construct, and upload their data replicas by themselves. This incurs additional bandwidth overhead on both the service provider and the user and also poses new security risks for the provider. Namely, since uploaded files are typically encrypted, the provider cannot recognize if the uploaded content are indeed replicas. This limits the business models available to the provider, since e.g., reduced costs for storing replicas can be abused by users who upload different files-while claiming that they are replicas. In this paper, we address this problem and propose a novel solution for proving data replication and retrievability in the cloud, Mirror, which allows to shift the burden of constructing replicas to the cloud provider itself-thus conforming with the current cloud model. We show that Mirror is secure against malicious users and a rational cloud provider. Finally, we implement a prototype based on Mirror, and evaluate its performance in a realistic cloud setting. Our evaluation results show that our proposal incurs tolerable overhead on the users and the cloud provider.

Journal ArticleDOI
01 Jan 2016
TL;DR: Two novel routing algorithms, specifically designed for crowd sensing vehicular networks (CSVNs), GF with available relays (GFAVR), fully distributed and independent of the scenario, and GF with virtual roadside units (GFVIR), exploiting a preliminary design phase where local minima are located are proposed.
Abstract: Using vehicles as sensors allows to collect high amount of information on large areas without the need to deploy extensive infrastructures. Although cellular technologies are presently the only solution to upload data from vehicles to control centers, in the next future short range wireless technologies could be used to offload part of this data traffic through vehicle to vehicle and vehicle to roadside communications. In such scenario, the greedy forwarding (GF) position based routing is an interesting algorithm to efficiently route packets from vehicles to the destination. However, GF suffers from the well known problem of local minima, which causes part of the packets to remain blocked in certain areas of the scenario. To deal with this issue, we propose two novel routing algorithms, specifically designed for crowd sensing vehicular networks (CSVNs): GF with available relays (GFAVR), fully distributed and independent of the scenario, and GF with virtual roadside units (GFVIR), exploiting a preliminary design phase where local minima are located. Through extensive simulations performed in different realistic urban scenarios, results demonstrate that both algorithms allow to improve data delivery by 10-40%, with negligible overhead and limited increase of complexity.

Patent
22 Sep 2016
TL;DR: In this article, a system and process for coordinating streaming content or messages is provided, where a network-connected server maintains a database containing media content-related data, such as the text of a message, accompanying media, time of airing, payment and related comments.
Abstract: A system and process for coordinating streaming content or messages is provided. A network-connected server maintains a database containing media content-related data, such as the text of a message, accompanying media, time of airing, payment and related comments. A user can view these feeds or streams of these consciousness messages by downloading a mobile application or browsing to a website. The application can also be used to create, schedule and pay for a media content message.

Patent
11 Oct 2016
TL;DR: In this paper, a synchronization protocol for multi-premises hosting of digital content items is proposed, comprising of detecting creation or modification of a content item, determining a content items namespace to which the content item belongs, obtaining an identifier of a block server to which content item namespace is assigned, and uploading any content item blocks of the content items to the block server that are not already stored at the block servers.
Abstract: A synchronization protocol for multi-premises hosting of digital content items. In one embodiments, for example, a method, comprising: detecting creation or modification of a content item; determining a content item namespace to which the content item belongs; obtaining an identifier of a block server to which the content item namespace is assigned; and uploading any content item blocks of the content item to the block server that are not already stored at the block server.

Proceedings ArticleDOI
28 Nov 2016
TL;DR: An adaptive multi-instance container-based architecture called Autonomous Self-Adaptation Platform (ASAP) is proposed that applies an edge computing concept with technologies, such as Docker and Kubernetes to facilitate the desired QoS for every single usage event of the time-critical functionality.
Abstract: Software developers increasingly need to include time-critical functionalities in their Web applications. Examples of these can be Internet-of-Things (IoT), gaming systems, instant messaging, video conferencing, and similar. Ensuring the Quality of Service (QoS) for such applications has been a challenging issue mostly due to runtime variations in the network quality between the clients and the service running in the Cloud. In this paper, we propose an adaptive multi-instance container-based architecture called Autonomous Self-Adaptation Platform (ASAP) that applies an edge computing concept with technologies, such as Docker and Kubernetes to facilitate the desired QoS for every single usage event of the time-critical functionality. We use a "File Upload" use case as an example to explore time-critical functionality. Each time a client needs to use the File Upload functionality, a specific setup, physical host selection and resources allocation is made in order to provide the desired QoS to that functionality.

Journal ArticleDOI
TL;DR: This work presents a systematic participatory-sensing-based high-quality map generation scheme, PMG, that meets the privacy demand of individual users and utilize the Crust, a technique from computational geometry for curve reconstruction, to estimate the unobserved map as well as evaluate the degree of privacy leakage.
Abstract: Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols that rely on users to provide their traces have been proposed. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based map generation method does need individual locations. To address the issue, we present a systematic participatory-sensing-based high-quality map generation scheme, PMG, that meets the privacy demand of individual users. To be specific, the individual users merely need to upload unorganized sparse location points to reduce the risk of exposing users’ traces and utilize the Crust , a technique from computational geometry for curve reconstruction, to estimate the unobserved map as well as evaluate the degree of privacy leakage. Experiments show that our solution is able to generate high-quality maps for a real environment that is robust to noisy data. The difference between the ground-truth map and the produced map is less than 10 m, even when the collected locations are about 32 m apart after clustering for the purpose of removing noise.

Journal ArticleDOI
TL;DR: This paper proposes an efficient resource management scheme that exploits D2D communication in the uplink case and minimizes packet loss, upload time, and number of resource blocks, whereas it increases the throughput of the network.
Abstract: Device-to-device (D2D) communication is a promising technology for 5G networks, providing high data rates, increased spectral and energy efficiency, and reduced end-to-end delay and transmission power. However, in current cellular systems, the performance of cell edge devices suffers when multimedia content is directly uploaded toward the base station side due to poor link quality. This requires a greater number of resource blocks and additional upload time, thus degrading the quality of service. To reduce the number of resource blocks and upload time, this paper proposes an efficient resource management scheme that exploits D2D communication in the uplink case. This scheme consists of two phases. In the first phase, in the case of poor link quality, a novel relay selection scheme is used in the multihop (two-hop) communication strategy; in the second phase, an effective new resource allocation scheme is used in multihop communication. This scheme minimizes packet loss, upload time, and number of resource blocks, whereas it increases the throughput of the network. Simulation result demonstrates the superiority of the proposed scheme over other schemes in the literature.

Patent
Chaoxin Hu1, Kecheng Lu
13 May 2016
TL;DR: In this paper, the authors proposed a hybrid blockchain-based approach for secure and scalable data transfers using a first computer system at a first site can transmit a token to a second computer systems at a second site, where the token includes metadata regarding a data set to be transferred from the first computer systems to the second computer system.
Abstract: Techniques for facilitating secure and scalable data transfers using a hybrid blockchain-based approach are provided. In one embodiment, a first computer system at a first site can transmit a token to a second computer system at a second site, where the token includes metadata regarding a data set to be transferred from the first computer system to the second computer system and one or more cloud storage service addresses where the data set will be temporarily stored. The token can be transmitted using a blockchain network that is accessible to the first and second computer systems via a public network. The first computer system can then upload the data set to the one or more cloud storage service addresses via the public network, and the second computer system can download the data set from the one or more cloud storage service addresses via the public network.

Proceedings ArticleDOI
16 May 2016
TL;DR: A novel D2D communication protocol is contributed in this work, which enables user equipments to become the hubs of machine-type traffic by means of a suitable radio interface and upload data in the Web via the mobile network, thus opening to new cloud services.
Abstract: The Internet-of-Things (IoT) is promising to inter-connect physical objects and machines in an intelligent network. In this context, scalable and resilient Machine-to-Machine (M2M) communication protocols are required, and the new Device-to-Device (D2D) feature of the 4G system constitutes an appealing solution. Standardization activities are still in progress, but the rapid diffusion of both LTE and IoT devices and applications leads to development of experimental proposals aimed at merging these two technologies. We contribute in this work with a novel D2D communication protocol, which enables user equipments (UEs) to become the hubs of machine-type traffic by means of a suitable radio interface and upload data in the Web via the mobile network, thus opening to new cloud services. The protocol we propose is designed for multi-hop communications between D2D-enabled terminals and it is equipped with a light-weight security mechanism. It is meant to address the communication needs of UEs inside mobile network coverage, and those of UEs that suffer from scarce radio coverage. In terms of performance, we analyse connectivity and security in the multi-hop D2D network, taking into account the interference created by the transmission of beacon signals during the discovery phase of the wide network. We resort to stochastic geometry to model the end-to-end delay and communication resilience of the multi-hop D2D network.

Journal ArticleDOI
TL;DR: This paper presents SecureRun, a secure privacy-preserving system for reporting location-based activity summaries that can achieve tight lower-bounds of the distance covered and of the elevation gain while protecting the location privacy of the users with respect to both the social network operator and the access point network operator.
Abstract: Activity-tracking applications, where people record and upload information about their location-based activities (e.g., the routes of their activities), are increasingly popular. Such applications enable users to share information and compete with their friends on activity-based social networks but also, in some cases, to obtain discounts on their health insurance premiums by proving they conduct regular fitness activities. However, they raise privacy and security issues: the service providers know the exact locations of their users; the users can report fake location information, for example, to unduly brag about their performance. In this paper, we present SecureRun, a secure privacy-preserving system for reporting location-based activity summaries (e.g., the total distance covered and the elevation gain). SecureRun is based on a combination of cryptographic techniques and geometric algorithms, and it relies on existing Wi-Fi access-point networks deployed in urban areas. We evaluate SecureRun by using real data-sets from the FON hotspot community networks and from the Garmin Connect activity-based social network, and we show that it can achieve tight (up to a median accuracy of more than 80 percent) verifiable lower-bounds of the distance covered and of the elevation gain, while protecting the location privacy of the users with respect to both the social network operator and the access point network operator(s). The results of our online survey, targeted at RunKeeper users recruited through the Amazon Mechanical Turk platform, highlight the lack of awareness and significant concerns of the participants about the privacy and security issues of activity-tracking applications. They also show a good level of satisfaction regarding SecureRun and its performance.

Patent
23 Nov 2016
TL;DR: In this article, a smart home system consisting of a user terminal, a cloud server and a sensor group is proposed, where the user terminal is for uploading indoor scene materials of a family to be modeled to the cloud server, and the Cloud server is for performing three-dimensional modeling according to the indoor scene material to form an indoor scene mimic diagram of the family, adopting an image recognition method to identify the name of each household equipment.
Abstract: The invention provides a smart home system comprising a user terminal, a cloud server and a sensor group, wherein the user terminal is for uploading indoor scene materials of a family to be modeled to a cloud server; the cloud server is for performing three-dimensional modeling according to the indoor scene materials to form an indoor scene mimic diagram of the family to be modeled, adopting an image recognition method to identify the name of each household equipment in the indoor scene mimic diagram and making annotations for the names of the various household equipment in the indoor scene mimic diagram; and the sensor group is for sensing the parameter values of index parameters of each room in the family to be modeled, uploading the parameter values of the sensed index parameters to the cloud server and marking in the indoor scene mimic diagram through the cloud server The smart home system of the invention solves the technical problem that smart home systems in the prior art can not realize individualized and real control for different families and improves the user experience

Patent
21 Dec 2016
TL;DR: In this paper, a hospital remote diagnosis and treatment method is described, which includes the following steps that: S1, a patient performs registration; S2, the patient performs login; S3, the patients finds a doctor; S4, the doctor enters a consultation room; S5, the user enters the consultation room, step S6, the management system of a hospital uploads the data of the patient to a cloud server through a data interface, a check device and an inspection device upload related check and inspection data to the cloud server, through a network, voice
Abstract: The invention discloses a hospital remote diagnosis and treatment method The method includes the following steps that: S1, a patient performs registration; S2, the patient performs login; S3, the patient finds a doctor; S4, the doctor enters a consultation room; S5, the patient enters the consultation room; step S6, the management system of a hospital uploads the data of the patient to a cloud server through a data interface, a check device and an inspection device upload related check and inspection data to the cloud server through a network, voice description data, picture data and video data of the patient are directly uploaded to the cloud server, and the cloud server displays the information of the corresponding patient on a diagnosis and treatment main interface; step S, prescriptions are prescribed; and S8, consultation is terminated, WebSocket video connection is cut off, and the termination of the consultation is indicated by the consultation termination action of the doctor With the hospital remote diagnosis and treatment method provided by the invention adopted, cross-platform real-time video doctor consultation can be realized, and cross-platform performance and efficiency of interaction can be improved

Patent
Wang Yutao, Zhang Hong, Nie Yan, Teng Wei, Zhao Yuhua 
13 Apr 2016
TL;DR: In this paper, an application service platform standard embedded system based on agricultural Internet of Things (IoT) is proposed for intelligent agriculture field, which includes an alarm unit, an electric power unit, a master control center platform, a cloud server, an automatic irrigation unit, data acquisition unit, and a ventilation unit.
Abstract: The invention relates to the intelligent agriculture field, and concretely relates to an application service platform standard embedded system based on agricultural Internet of Things. The system comprises an alarm unit, an electric power unit, a master control center platform, a cloud server, an automatic irrigation unit, a data acquisition unit and a ventilation unit. The data acquisition unit communicates with the master control center platform through wireless communication technology. The automatic irrigation unit, the alarm unit, the ventilation unit and the electric power unit are connected to the master control center platform. The system also comprises the cloud server. The master control center platform is connected to the cloud server and uploads data to the cloud server. The cloud server includes a client and a management end. Through adoption of the data acquisition unit, the automatic irrigation unit, the ventilation unit, and the like, crop growth is completely managed in an intelligent manner. Moreover, a user can access the cloud server through a mobile phone APP unit in real time so as to observe all activities during production in real time.

Journal Article
TL;DR: In this article, a successive omniscience protocol is proposed, where subgroups of users first recover the information of other users in the same subgroup at an earlier stage, and then all the users recover information of all other users at a later stage.
Abstract: Because the exchange of information among all the users in a large network can take a long time, a successive omniscience protocol is proposed. Namely, subgroups of users first recover the information of other users in the same subgroup at an earlier stage called local omniscience. Then, the users recover the information of all other users at a later stage called global omniscience. To facilitate the information exchange, a distributed storage system is used, so that users can conveniently upload and download messages through some reliable central servers. The minimum upload bandwidth is characterized and a bandwidth-storage trade-off is discovered. The results reveal the new connections to the problem of secret key agreement and, consequently, provide meaningful interpretations of a recently proposed multivariate mutual information measure that was inspired by the secret key agreement problem.

Patent
13 Apr 2016
TL;DR: In this article, an application interface updating method and device belonging to the network technical field is described, where an updating request is sent to a server; the version number of the interface layout configuration file and the application identifier of application are carried in the updating request; when the server determines that the interface configuration file is updated, the downloading address of the updated interface layout config file is returned; the server at least is used for storing the application identifiers and the version of the latest configuration file.
Abstract: The invention discloses an application interface updating method and device belonging to the network technical field. According to the invention, an updating request is sent to a server; the version number of the interface layout configuration file and the application identifier of application are carried in the updating request; when the server determines that the interface layout configuration file is updated, the downloading address of the updated interface layout configuration file is returned; the server at least is used for storing the application identifier and the version number of the latest configuration file; when the downloading address sent by the server is received, the updated interface layout configuration file is downloaded according to the downloading address; and the application interface is updated according to the updated interface layout configuration file. The application interface is updated through downloading the updated interface layout configuration file; according to the technical solution, downloading a preset resource packet is avoided; the interface is updated only by downloading the updated interface layout configuration file; because the data volume of the interface layout configuration file is relatively small, the downloading speed is increased; and the traffic is saved.

13 May 2016
TL;DR: This work uses the use of Internet and emerging web technologies to develop a system where anyone can upload their image datasets and run any of the proposed algorithms without the need of any specific installation or configuration.
Abstract: This work proposes a new way to publicly distribute image analysis methods and software. This approach is particularly useful when the software code and the datasets cannot be made open source. We leverage the use of Internet and emerging web technologies to develop a system where anyone can upload their image datasets and run any of the proposed algorithms without the need of any specific installation or configuration. This service has been named NiftyWeb (http://cmictig.cs.ucl.ac.uk/niftyweb).

Patent
03 Feb 2016
TL;DR: In this article, a cloud terminal communication server acquires operation state information of the intelligent equipment, and a data processing server collects the operation states information in real time, determines a working state of the Intelligent Equipment according to the operation state, and triggers a remote diagnosis service signal corresponding to an abnormal state when the abnormal state of intelligent equipment is determined.
Abstract: The invention provides a remote service device, a system and a method of intelligent equipment, and the method comprises that a cloud terminal communication server acquires operation state information of the intelligent equipment; a data processing server collects the operation state information in real time, determines a working state of the intelligent equipment according to the operation state information, and triggers a remote diagnosis service signal corresponding to an abnormal state when the abnormal state of the intelligent equipment is determined; a service processing server carries out remote diagnosis to the intelligent equipment according to the remote diagnosis service signal, uploads a diagnosis result to a display interface and triggers a fault repair service corresponding to the diagnosis result; and a dispatching management server dispatches corresponding management resources according to the demand for the fault repair service in order to realize fault repair. The remote service device, the system and the method of the intelligent equipment can diagnose and maintain faults of the intelligent equipment, realize rapid networking, the fault diagnosis and remote services of the intelligent equipment, increase after-sales serving efficiency of the intelligent equipment with the faults and provide better experience to users.

Patent
Jonghan Park1, Lee Duckey1, Sang-Soo Lee1, Taesun Yeom1, Hye Won Lee1 
12 Apr 2016
TL;DR: In this paper, a method for downloading a profile of an electronic apparatus is described, which includes receiving profile information from a profile information transfer server, transmitting a profile request to an identified profile providing server based on the profile information, and receiving a profile installable in a universal integrated circuit card (UICC) of the electronic apparatus.
Abstract: A method for downloading a profile of an electronic apparatus is provided. The method includes receiving profile information from a profile information transfer server, transmitting a profile request to an identified profile providing server based on the profile information, and receiving a profile installable in a universal integrated circuit card (UICC) of the electronic apparatus from the profile providing server, and an electronic apparatus. Further, the present disclosure may provide a profile information providing server providing the profile information to the electronic apparatus and an operation thereof, and a profile providing server providing a profile to the electronic apparatus and an operation thereof. Further, the present disclosure may provide a method for swapping a profile between apparatuses, a method for acquiring profile information using code information, a method for modifying a profile providing server, and an apparatus performing the same.