Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
841
Application of edge computing technology in smart grid data security
Published 2025-02-01“…By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. …”
Get full text
Article -
842
Integrating Data Analytics into Traditional Media: Opportunities and Strategic Advantages
Published 2025-05-01“…Moreover, the use of personal data raises concerns in terms of privacy and ethical standards, which necessitates a careful balancing act between leveraging data for analysing and maintaining the users’ trust. …”
Get full text
Article -
843
Improved Private Data Protection Scheme for Blockchain Smart Contracts
Published 2023-01-01“…To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. …”
Get full text
Article -
844
Particular qualities of evaluation of electronic card data in modern healthcare
Published 2025-01-01“…The article discusses various aspects of the implementation and use of EHR, including technical difficulties, data privacy and security issues. …”
Get full text
Article -
845
ARTIFICIAL INTELLIGENCE AND BIG DATA ANALYSIS IN CRIME PREVENTION AND COMBAT
Published 2025-03-01“…In the era of accelerated digitalization, the use of artificial intelligence (AI) and big data analysis has become a necessity in crime prevention and combat. …”
Get full text
Article -
846
The Ethics of Data and Its Governance: A Discourse Theoretical Approach
Published 2025-06-01“…This can refer to specific ethical values that data governance is meant to preserve, most obviously in the area of privacy and data protection. …”
Get full text
Article -
847
Bringing it All Together: Data from Everywhere to Build Dashboards
Published 2023-12-01“…Using Power BI, Power Automate and a Microsoft gateway, we can see the power of easy access to data without knowing all of the disparate systems. …”
Get full text
Article -
848
Revolutionizing Data Exchange Through Intelligent Automation: Insights and Trends
Published 2025-05-01“…Furthermore, it underscores the urgent need for robust ethical frameworks to guide the responsible use of AI and to protect data privacy. In addressing these challenges, the paper calls for innovative research aimed at overcoming current limitations in scalability and security. …”
Get full text
Article -
849
SoK: The Impact of Educational Data Mining on Organisational Administration
Published 2024-11-01“…It outlines key data mining techniques used in tasks like resource allocation, staff evaluation, and institutional planning. …”
Get full text
Article -
850
Fingerprint-Based Deduplication for Renewable Energy Data On-Site Analyzing
Published 2025-01-01“…By studying fine-grained data fingerprinting and neural network-based renewable energy data edge-analysis technologies, we have enabled edge processing of data, reducing latency and privacy issues, and enhancing the system’s real-time processing capabilities and responsiveness.…”
Get full text
Article -
851
Synthetic data in medicine: Legal and ethical considerations for patient profiling
Published 2025-01-01“…Synthetic data is increasingly used in healthcare to facilitate privacy-preserving research, algorithm training, and patient profiling. …”
Get full text
Article -
852
BioGAN: Enhancing Transcriptomic Data Generation with Biological Knowledge
Published 2025-06-01“…The advancement of computational genomics has significantly enhanced the use of data-driven solutions in disease prediction and precision medicine. …”
Get full text
Article -
853
Smart Grids Data Aggregation Method on Paillier Homomorphic Encryption
Published 2024-12-01“…Smart grid (SGs) is a highly integrated power system, it is gradually replacing the traditional power grid, but at present there are problems in the SGs data aggregation, such as user privacy leakage, grid data query inflexibly and data leakage. …”
Get full text
Article -
854
Synthetic data distillation enables the extraction of clinical information at scale
Published 2025-05-01“…Abstract Large-language models (LLMs) show promise for clinical note information extraction, but deployment challenges include high computational costs and privacy concerns. We used synthetic data distillation to fine-tune smaller, open-source LLMs to achieve performance comparable to larger models while enabling local hardware deployment or reduced cloud costs. …”
Get full text
Article -
855
Legal paternalism’s influence on the balancing data protection and fundamental rights
Published 2025-03-01“…Soft paternalism, on the other hand, can be seen in EU lawmakers’ attempts to nudge data subjects into using their data carefully and reasonably in digital environments without heavily restricting their data autonomy. …”
Get full text
Article -
856
Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security
Published 2025-01-01“…Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). …”
Get full text
Article -
857
Cardiac disease diagnosis based on GAN in case of missing data.
Published 2024-01-01“…In daily life, two common algorithms are used for collecting medical disease data: data integration of medical institutions and questionnaires. …”
Get full text
Article -
858
Literature data-based de novo candidates for drug repurposing
Published 2025-08-01Get full text
Article -
859
Recognition of Human Activities Based on Ambient Audio and Vibration Data
Published 2024-01-01“…The data obtained by the AMSNs is classified using two distinct neural networks. …”
Get full text
Article -
860
Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications
Published 2025-01-01“…This architectural decision does not come without additional costs when managing isolation and data privacy between tenants. That is a known challenge in cloud computing that translates to systems closer to the users, namely edge computing and micro clouds. …”
Get full text
Article