Research Contributions Sample Clauses

Research Contributions. In this dissertation, we propose a novel framework for location-aware task manage- ment to handle uncertainty and ensure privacy in MCS applications while achieving desired task coverage with minimal cost. In Chapter 3 and Chapter 4, we present two spatial task assignment and selection methods to address the location privacy concerns of the participants in our framework. Chapter 5 and 6 extend the task management framework using an adaptive data-driven solution which deals with the continuous change and the uncertainty of dynamic environments in MCS. The rest of this section highlights the details of our contributions.
AutoNDA by SimpleDocs
Research Contributions. The article makes the following major contributions: • The proposed protocol offers a mechanism for secure mutual authentication utilizing multi-factors, such as a user’s password, real-identity, personal biometrics and mobile de- vice as four factors, to establish the session keys among the communicating parties (here, drones and users). In the proposed scheme, a major advantage is that limited payload and processing power of the deployed drones do not affect the scalability of the proposed scheme irrespective of the number of deployed drones. At the same time, a drone establishes a session key with the ground station (GS) for secret sharing. Here, a user Ui can not only access the real time data from a deployed drone DRj securely, but the GS also aggregates the same data securely with a session key with each other for storing into a blockchain center. • A detailed formal security verification using broadly- accepted Scyther automated software validation tool and the informal (non-mathematical) security analysis show the pro- posed scheme’s robustness against various potential attacks needed for air-smart vehicular networks. • A real-time testbed experiment for various cryptographic primitives as well as for the proposed authentication protocol is used to show the feasibility, the testbed uses Raspberry Pi 4 (model B) devices with cryptographic standard library (cryptography 37.0.2). Moreover, a blockchain simulation on the real data (image type) is also presented for this protocol which identifies the uniqueness of the scheme. In this article, our primary focus is to tackle the security concerns surrounding the communication channels between drones and users.
Research Contributions. The contributions and novelties of this dissertation have been drawn from and are disseminated through the following technical papers: [C1] X. Xxxxxxxxx, X. X. Xxxxxxx, and X.X.X Xxxx, ”Problem formulation for joint cooperative downlink scheduling and power allocation for joint pro- cessing coordinated multipoint,” in International Conference on Consumer Electronics, IEEE, April 2014, pp. 1-3, [C2] X. Xxxxxxxxx, X. Xxxxxxxxxxx, and X. X. Xxxxxxx, ”Joint inter-cell inter- xxxxxxx coordination and forced cooperative scheduling for the downlink of LTE systems,” in Wireless Communications and Networking Conference, WCNC, IEEE, November 2014, pp. 1880-1884, [J1] X. Xxxxxxxxx, X. Xxxx, and A. Xxxxx Xxxxxxx, ”Joint Adaptive Power Allocation and Resource Management for the Downlink of a Load-Balanced Multi-Carrier LTE HetNet,” submitted to IEEE Transactions on Wireless Communications, August, 2015. [J2] X. Xxxxxxxxx, M. A. Xxxx, X. Xxxxxx, and A. Xxxxx Xxxxxxx, ”Fronthaul- Aware UL-DL Decoupling (FA-DUDe) for CoMP-enabled Heterogeneous Systems,” submitted to Elsevier, International Journal of Computer and Telecommunications Networking, September, 2015. Chapter 2
Research Contributions. Without limiting the foregoing, the Parties agree to commit the resources set forth in this Section 2.2 to perform their obligations under the Research Plan:
Research Contributions. ‌ In this dissertation, we address the following research problems: • How to sample high-dimensional and large data from original data while guaranteeing high utility under differential privacy? • How to release series of dynamic datasets in real time under differential privacy? • How to handle personalized differential privacy when record owners have different privacy preferences?
Research Contributions 

Related to Research Contributions

  • Contributions Without creating any rights in favor of any third party, the Member may, from time to time, make contributions of cash or property to the capital of the Company, but shall have no obligation to do so.

  • Initial Contributions The Members initially shall contribute to the Company capital as described in Schedule 2 attached to this Agreement.

  • Employer Contributions 8.1 Rates at which the Employer shall contribute for each hour of work performed on behalf of each employee employed under the terms of this Agreement are contained in the Appendices attached to and forming part of this Agreement.

  • Additional Contributions The Member is not required to make any additional capital contribution to the Company. However, the Member may at any time make additional capital contributions to the Company in cash or other property.

  • Initial Capital Contributions (a) The Partners have made, on or prior to the date hereof, Capital Contributions and, in exchange, the Partnership has issued to the Partners the number of Class A Units as specified in the books and records of the Partnership.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!