scholarly journals An Umbrella Converse for Data Exchange: Applied to Caching, Computing, and Shuffling

Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 985
Author(s):  
Prasad Krishnan ◽  
Lakshmi Natarajan ◽  
Vadlamani Lalitha

The problem of data exchange between multiple nodes with storage and communication capabilities models several current multi-user communication problems like Coded Caching, Data Shuffling, Coded Computing, etc. The goal in such problems is to design communication schemes which accomplish the desired data exchange between the nodes with the optimal (minimum) amount of communication load. In this work, we present a converse to such a general data exchange problem. The expression of the converse depends only on the number of bits to be moved between different subsets of nodes, and does not assume anything further specific about the parameters in the problem. Specific problem formulations, such as those in Coded Caching, Coded Data Shuffling, and Coded Distributed Computing, can be seen as instances of this generic data exchange problem. Applying our generic converse, we can efficiently recover known important converses in these formulations. Further, for a generic coded caching problem with heterogeneous cache sizes at the clients with or without a central server, we obtain a new general converse, which subsumes some existing results. Finally we relate a “centralized” version of our bound to the known generalized independence number bound in index coding and discuss our bound’s tightness in this context.


2021 ◽  
Vol 30 (1) ◽  
pp. 728-738
Author(s):  
Dmitry Gura ◽  
Victor Rukhlinskiy ◽  
Valeriy Sharov ◽  
Anatoliy Bogoyavlenskiy

Abstract Over the past decade, unmanned aerial vehicles (UAVs) have received increasing attention and are being used in the areas of harvesting, videotaping, and the military industry. In this article, the consideration is focused on areas where video recording is required for ground inspections. This paper describes modern communication technologies and systems that enable interaction and data exchange between UAVs and a ground control station (GCS). This article focuses on different architectures of communication systems, establishing the characteristics of each to identify the preferred architecture that does not require a significant consumption of resources and whose data transmission is reliable. A coherent architecture that includes multiple UAVs, wireless sensor networks, cellular networks, GCSs, and satellite network to duplicate communications for enhanced system security has been offered. Some reliability problems have been discussed, the solution of which was suggested to be a backup connection via satellite, i.e., a second connection. This study focused not only on the communication channels but also on the data exchanged between system components, indicating the purpose of their application. Some of the communication problems and shortcomings of various systems, as well as further focus areas and improvement recommendations were discussed.



10.28945/2356 ◽  
2001 ◽  
Author(s):  
Zeljko Hutinski ◽  
Neven Vrcek ◽  
G. Bubas

The relevance of the communication in the complex information system (IS) development projects is becoming issue of primary importance. Various researches show that many projects failed due to inadequate management of communication. Project data exchange is still not performed in a structured and standardised manner, which leads to misunderstandings between team members. Too many complex IS projects do not have established an adequate project communication management subsystems. This paper analyses results of a survey performed on information technology (IT) professionals and presents degree of communication problems during various project phases. (This research was supported by the Croatian Ministry of Science and Technology under projects: "Strategic planning of Information Systems" and "Information Systems Security.) It reveals that average rating of a degree of communication problems varies at different project stages and among different communication subjects. The paper also proposes software tools that, if properly used, might enhance project communication. Such technologies are still not completely mature but they are developing fast and might play an important role in project management, by providing support to its holism.



2009 ◽  
Vol 12 (4) ◽  
pp. 235-242 ◽  
Author(s):  
Qingyuan Li ◽  
Deguo Su ◽  
Hongsheng Li ◽  
Haochen Liu ◽  
Lijian Sun




2021 ◽  
Vol 12 (1) ◽  
pp. 261-268
Author(s):  
Angel Manchev ◽  

The protection of personal data is one of the core values of modern European societies. This protection is provided by the law of the European Union and by the national legislations of the Member States, to which the Republic of Bulgaria also belongs. As of May 25, 2018, the protection of personal data is being expanded and updated in response to technological progress and the increasingly accelerated data exchange. The reason for this is the entry into force of Regulation (EU ) 2016/679 (General Data Protection Regulation, GDPR) and the changes in our national law that it imposes. In the sense of what has been said so far, the issues of personal data protection in children’s institutions are especially relevant, because these organizations actively handle personal data at any level of children, parents, teachers and staff. In this article, we will try to give short answers to some of the most important questions regarding personal data and the rules for their protection, according to European and Bulgarian legislation.



2020 ◽  
Vol 2 (1) ◽  
pp. 55-61
Author(s):  
Żywiołek Justyna ◽  
Nedeliaková Eva

AbstractThe article presents results of research on the information flow between the client and the company, inside the company, and the problems encountered by both parties in the data exchange process. Also included are methods of securing information through unauthorized disclosure, disclosing ideas to other clients. The basis of the study was a survey directed to 75 customers ordering in the examined enterprise and a survey among 40 employees of that enterprise. The study was also based on an in-depth conversation with employees of the examined company employed at various levels. The survey shows that the clients and employees of the surveyed company are aware of the high value of information, and its security is considered one of the priorities. The survey clearly shows that customers praise data protection activities, they treat it as an element used to care for the interests of the customer, as a further environment of the product or service they purchase. However, there are often errors due to customer ignorance, communication problems, and lack of knowledge of employees. The study covered the importance of information in an enterprise as part of its competitive advantage, the reasons for investing in information protection, the occurrence of incidents, the degree of information security, and actions taken to protect information in an enterprise.



Entropy ◽  
2020 ◽  
Vol 22 (7) ◽  
pp. 766
Author(s):  
Nujoom Sageer Karat ◽  
Anoop Thomas ◽  
Balaji Sundar Rajan

For coded caching problems with small buffer sizes and the number of users no less than the amount of files in the server, an optimal delivery scheme was proposed by Chen, Fan, and Letaief in 2016. This scheme is referred to as the CFL scheme. In this paper, an extension to the coded caching problem where the link between the server and the users is error prone, is considered. The closed form expressions for average rate and peak rate of error correcting delivery scheme are found for the CFL prefetching scheme using techniques from index coding. Using results from error correcting index coding, an optimal linear error correcting delivery scheme for caching problems employing the CFL prefetching is proposed. Another scheme that has lower sub-packetization requirement as compared to CFL scheme for the same cache memory size was considered by J. Gomez-Vilardebo in 2018. An optimal linear error correcting delivery scheme is also proposed for this scheme.





2019 ◽  
Author(s):  
David Hawig ◽  
Chao Zhou ◽  
Sebastian Fuhrhop ◽  
Andre S Fialho ◽  
Navin Ramachandran

BACKGROUND Distributed ledger technology (DLT) holds great potential to improve health information exchange. However, the immutable and transparent character of this technology may conflict with data privacy regulations and data processing best practices. OBJECTIVE The aim of this paper is to develop a proof-of-concept system for immutable, interoperable, and General Data Protection Regulation (GDPR)–compliant exchange of blood glucose data. METHODS Given that there is no ideal design for a DLT-based patient-provider data exchange solution, we proposed two different variations for our proof-of-concept system. One design was based purely on the public IOTA distributed ledger (a directed acyclic graph-based DLT) and the second used the same public IOTA ledger in combination with a private InterPlanetary File System (IPFS) cluster. Both designs were assessed according to (1) data reversal risk, (2) data linkability risks, (3) processing time, (4) file size compatibility, and (5) overall system complexity. RESULTS The public IOTA design slightly increased the risk of personal data linkability, had an overall low processing time (requiring mean 6.1, SD 1.9 seconds to upload one blood glucose data sample into the DLT), and was relatively simple to implement. The combination of the public IOTA with a private IPFS cluster minimized both reversal and linkability risks, allowed for the exchange of large files (3 months of blood glucose data were uploaded into the DLT in mean 38.1, SD 13.4 seconds), but involved a relatively higher setup complexity. CONCLUSIONS For the specific use case of blood glucose explored in this study, both designs presented a suitable performance in enabling the interoperable exchange of data between patients and providers. Additionally, both systems were designed considering the latest guidelines on personal data processing, thereby maximizing the alignment with recent GDPR requirements. For future works, these results suggest that the conflict between DLT and data privacy regulations can be addressed if careful considerations are made regarding the use case and the design of the data exchange system.



2018 ◽  
Vol 6 ◽  
pp. 1056-1061
Author(s):  
Paweł Drąg ◽  
Mateusz Szymura

In the modern era, information is not only a valuable commodity, but also a potential source of threat, especially when it comes to personal data. The implementation of the General Data Protection Regulation seeks to unify regulations and safeguards in a same manner across the EU. The following paper surveys how the legal aspects of GDPR influence the existing technical framework of databases containing personal data. In this research we want to show if the already existing technical infrastructure and safeguards implemented in databases containing personal data are sufficient and if not, if implementing new ways of protecting of data will require creating entire new system of databases or only changing of existing framework. Therefore, we combine an analysis of legal texts with a technical analysis of existing and newly implemented safeguards. While the GDPR doesn’t answer what safeguards should be implemented (in the spirit of technological neutrality), the notion of pseudonymisation of the data is strongly advocated through the Regulation. In our paper we tried to show the algorithm, which create a pseudonymisation function that can change personal data into generic data with the possibility to reverse that process ad utilise data after de-pseudonymisation. Implementing safeguards based on the following function create a more safe environment for data safekeeping, while give nearly immediate access to data for authorised person, who can reverse pseudonymisation and transform generic data once more into personal data.



Sign in / Sign up

Export Citation Format

Share Document