DS-Chain: A secure and auditable multi-cloud assisted EHR storage model on efficient deletable blockchain

Author(s):  
Rahul Mishra ◽  
Dharavath Ramesh ◽  
Damodar Reddy Edla ◽  
Lianyong Qi
Keyword(s):  
2020 ◽  
Vol 12 (12) ◽  
pp. 31-43
Author(s):  
Tatiana A. VASKOVSKAYA ◽  
◽  
Boris A. KLUS ◽  

The development of energy storage systems allows us to consider their usage for load profile leveling during operational planning on electricity markets. The paper proposes and analyses an application of an energy storage model to the electricity market in Russia with the focus on the day ahead market. We consider bidding, energy storage constraints for an optimal power flow problem, and locational marginal pricing. We show that the largest effect for the market and for the energy storage system would be gained by integration of the energy storage model into the market’s optimization models. The proposed theory has been tested on the optimal power flow model of the day ahead market in Russia of 10000-node Unified Energy System. It is shown that energy storage systems are in demand with a wide range of efficiencies and cycle costs.


2019 ◽  
Vol 7 (1) ◽  
pp. 30-38
Author(s):  
P. Sen ◽  
D.Sarddar . ◽  
S.K. Sinha ◽  
R. Pandit

2020 ◽  
Vol 10 (2) ◽  
pp. 1-4
Author(s):  
Ashok Kumar

The Business continuity plan and strategy provide effective solutions to Multi-cloud and Microservice approach. The business continuity plan helps to maintain backup and disaster recovery. It ensures continuous business processes during disasters and emergencies. The business continuity planning methods that include risk assessment, analyze impacts, and entire business continuity strategies.


2010 ◽  
Vol 30 (4) ◽  
pp. 868-871
Author(s):  
Hong ZHAO ◽  
Silamu Woxur ◽  
Zheng-liang YAO ◽  
Lei YIN
Keyword(s):  

1997 ◽  
Vol 36 (8-9) ◽  
pp. 57-63 ◽  
Author(s):  
Homayoun Motiee ◽  
Bernard Chocat ◽  
Olivier Blanpain

This paper presents a model for the hydraulic simulation of a drainage network using the storage concept. This model is easier to use than the complete Barre de Saint Venant equations and gives better results than the usual conceptual models, i.e. the Muskingum model, or than models obtained by the simplification of the Saint Venant equations (kinematic wave model and diffusion wave model).


2019 ◽  
Vol 23 (2) ◽  
pp. 797-836 ◽  
Author(s):  
Seyedeh Yasaman Rashida ◽  
Masoud Sabaei ◽  
Mohammad Mehdi Ebadzadeh ◽  
Amir Masoud Rahmani

Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


Sign in / Sign up

Export Citation Format

Share Document