Research Contributions Sample Clauses

The Research Contributions clause defines how the results, data, inventions, or intellectual property generated during a research project are handled. It typically outlines the ownership, sharing, and publication rights of any findings or materials developed by the parties involved, and may specify how credit is attributed among collaborators. This clause ensures that all parties have a clear understanding of their rights and responsibilities regarding the use and dissemination of research outputs, thereby preventing disputes and promoting fair recognition of contributions.
Research Contributions. The article makes the following major contributions: The proposed protocol offers a mechanism for secure mutual authentication utilizing multi-factors, such as a user’s password, real-identity, personal biometrics and mobile de- vice as four factors, to establish the session keys among the communicating parties (here, drones and users). In the proposed scheme, a major advantage is that limited payload and processing power of the deployed drones do not affect the scalability of the proposed scheme irrespective of the number of deployed drones. At the same time, a drone establishes a session key with the ground station (GS) for secret sharing. Here, a user Ui can not only access the real time data from a deployed drone DRj securely, but the GS also aggregates the same data securely with a session key with each other for storing into a blockchain center. A detailed formal security verification using broadly- accepted Scyther automated software validation tool and the informal (non-mathematical) security analysis show the pro- posed scheme’s robustness against various potential attacks needed for air-smart vehicular networks. A real-time testbed experiment for various cryptographic primitives as well as for the proposed authentication protocol is used to show the feasibility, the testbed uses Raspberry Pi 4 (model B) devices with cryptographic standard library (cryptography 37.0.2). Moreover, a blockchain simulation on the real data (image type) is also presented for this protocol which identifies the uniqueness of the scheme. In this article, our primary focus is to tackle the security concerns surrounding the communication channels between drones and users.
Research Contributions. Without limiting the foregoing, the Parties agree to commit the resources set forth in this Section 2.2 to perform their obligations under the Research Plan: (a) Axys will initially provide Cytovia with approximately [ * ] each of approximately four hundred thousand (400,000) compounds (each, an "Axys Compound") in a [ * ] format to be delivered to Cytovia in approximately equal installments over the first [ * ] of the Research Term, or as soon as reasonably practicable thereafter. After Cytovia completes its screening of such compounds, or within thirty (30) days after [ * ], whichever is earlier, the Parties will determine in good faith whether screening of additional compounds is appropriate. If such additional screening is agreed to, Axys will provide Cytovia with an additional quantity of compounds as determined by the JRC, not to exceed an additional three hundred thousand (300,000) compounds in total, as soon as reasonably practicable following such determination. Upon completion of all screening hereunder Cytovia will, at Axys' election, return or destroy remaining compound inventories provided by Axys to Cytovia. (b) Cytovia will initially contribute to the Research, from its libraries of compounds, [ * ] compounds (each, a "Cytovia Compound"), identified by the Parties and set forth on the attached Schedule 2.2(b), which will be the subject of initial research related activities as provided in the Research Plan. If and at such time as a Cytovia Compound fails either the second or third of the Lead Compound tests set forth on Schedule 1.27, Cytovia will contribute an additional Cytovia Compound mutually identified and agreed to by the Parties from Cytovia's libraries of compounds which compound will become the subject of research activities under the Research Plan. Notwithstanding anything to the contrary herein, unless otherwise agreed by the Parties, Cytovia will only be required to contribute a maximum of [ * ] such replacement Cytovia Compounds (for a maximum total of [ * ] Cytovia Compounds contributed altogether). Cytovia will provide Axys with the synthetic route for the Cytovia Compounds and such quantities of such Cytovia Compounds as Axys reasonably requests for [ * ] = CERTAIN CONFIDENTIAL INFORMATION CONTAINED IN THIS DOCUMENT, MARKED BY BRACKETS, HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION PURSUANT TO RULE 24b-2 OF THE SECURITIES EXCHANGE ACT OF 1934, AS AMENDED.
Research Contributions. In this dissertation, we propose a novel framework for location-aware task manage- ment to handle uncertainty and ensure privacy in MCS applications while achieving desired task coverage with minimal cost. In Chapter 3 and Chapter 4, we present two spatial task assignment and selection methods to address the location privacy concerns of the participants in our framework. Chapter 5 and 6 extend the task management framework using an adaptive data-driven solution which deals with the continuous change and the uncertainty of dynamic environments in MCS. The rest of this section highlights the details of our contributions.
Research Contributions. The contributions and novelties of this dissertation have been drawn from and are disseminated through the following technical papers: [C1] ▇. ▇▇▇▇▇▇▇▇▇, ▇. ▇. ▇▇▇▇▇▇▇, and ▇.▇.▇ ▇▇▇▇, ”Problem formulation for joint cooperative downlink scheduling and power allocation for joint pro- cessing coordinated multipoint,” in International Conference on Consumer Electronics, IEEE, April 2014, pp. 1-3, [C2] ▇. ▇▇▇▇▇▇▇▇▇, ▇. ▇▇▇▇▇▇▇▇▇▇▇, and ▇. ▇. ▇▇▇▇▇▇▇, ”Joint inter-cell inter- ▇▇▇▇▇▇▇ coordination and forced cooperative scheduling for the downlink of LTE systems,” in Wireless Communications and Networking Conference, WCNC, IEEE, November 2014, pp. 1880-1884, [J1] ▇. ▇▇▇▇▇▇▇▇▇, ▇. ▇▇▇▇, and A. ▇▇▇▇▇ ▇▇▇▇▇▇▇, ”Joint Adaptive Power Allocation and Resource Management for the Downlink of a Load-Balanced Multi-Carrier LTE HetNet,” submitted to IEEE Transactions on Wireless Communications, August, 2015. [J2] ▇. ▇▇▇▇▇▇▇▇▇, M. A. ▇▇▇▇, ▇. ▇▇▇▇▇▇, and A. ▇▇▇▇▇ ▇▇▇▇▇▇▇, ”Fronthaul- Aware UL-DL Decoupling (FA-DUDe) for CoMP-enabled Heterogeneous Systems,” submitted to Elsevier, International Journal of Computer and Telecommunications Networking, September, 2015.
Research Contributions. ‌ In this dissertation, we address the following research problems: • How to sample high-dimensional and large data from original data while guaranteeing high utility under differential privacy? • How to release series of dynamic datasets in real time under differential privacy? • How to handle personalized differential privacy when record owners have different privacy preferences?
Research Contributions. The main contributions of the proposed scheme are as follows: 1) We propose a novel session key agreement scheme for protecting re- ▇▇▇▇ user authentication of the IIoT. The scheme uses smart cards, passwords and biometrics so it is a three-factor authentication scheme. There will be three types of mutual authentication in this scheme: a) between a user and the sever; b) between the sever and the smart ter- ▇▇▇▇▇ node; c) between the user and the smart terminal node. Finally, a symmetric session key is established between the user and the smart terminal node. 2) The proposed scheme is lightweight by using fuzzy extractor, one-way hash function and simple bit operation XOR. This is suitable for ter- ▇▇▇▇▇ nodes with limited computing and storage resources. 3) We perform a formal security analysis using the widely accepted real- or-random (ROR) model. Formal security analysis proves the semantic security of the adversary’s acquisition of the session key between the user and the device in the proposed scheme. 4) The proposed scheme use proxy re-encryption to reduce communication and computational overhead, and simplifies the key agreement process. The user’s pseudo-name and private key are dynamically updated dur- ing each session key agreement to ensure one-time pad. Our scheme guarantee the anonymity and unlinkability of users.
Research Contributions 

Related to Research Contributions

  • User Contributions The Website may contain message boards, chat rooms, personal web pages or profiles, forums, bulletin boards, and other interactive features (collectively, "Interactive Services") that allow users to post, submit, publish, display, or transmit to other users or other persons (hereinafter, "post") content or materials (collectively, "User Contributions") on or through the Website. All User Contributions must comply with these Terms of Use. Any User Contribution you post to the site will be considered non-confidential and non- proprietary. By providing any User Contribution on the Website, you grant us and our affiliates and service providers, and each of their and our respective licensees, successors, and assigns the right to use, reproduce, modify, perform, display, distribute, and otherwise disclose to third parties any such material. You represent and warrant that: • You own or control all rights in and to the User Contributions and have the right to grant the license granted above to us and our affiliates and service providers, and each of their and our respective licensees, successors, and assigns. • All of your User Contributions do and will comply with these Terms of Use. You understand and acknowledge that you are responsible for any User Contributions you submit or contribute, and you, not the Company, have full responsibility for such content, including its legality, reliability, accuracy, and appropriateness. We are not responsible or liable to any third party for the content or accuracy of any User Contributions posted by you or any other user of the Website.

  • Campaign Contributions The CONTRACTOR is hereby notified of the applicability of 11-355, HRS, which states that campaign contributions are prohibited from specified state or county government contractors during the terms of their contracts if the contractors are paid with funds appropriated by a legislative body.

  • Contributions Without creating any rights in favor of any third party, the Member may, from time to time, make contributions of cash or property to the capital of the Company, but shall have no obligation to do so.

  • Initial Contributions The Members initially shall contribute to the Company capital as described in Schedule 2 attached to this Agreement.

  • Matching Contributions The Employer will make matching contributions in accordance with the formula(s) elected in Part II of this Adoption Agreement Section 3.01.