Results 61 to 70 of about 27,811 (284)
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan +3 more
doaj +1 more source
Objective Rheumatoid arthritis (RA) is a chronic autoimmune disease characterized by joint pain, swelling, and stiffness. Although smoking is a well‐established risk factor for RA, the role of occupational inhalants in RA development is less well recognized.
Qianwen Liu +7 more
wiley +1 more source
Data popularity-based encrypted deduplication scheme without third-party servers
It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording ...
Guanxiong HA +3 more
doaj +2 more sources
Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems
The deduplication based on attribute-based encryption can be well used in eHealth systems to save storage space and share medical records. However, the excessive computation costs of existing schemes lead to inefficient deduplication.
Hua Ma +4 more
doaj +1 more source
A Secure Two-Phase Data Deduplication Scheme [PDF]
—Data grows at the impressive rate of 50% per year, and 75% of the digital world is a copy 1 ! Although keeping multiple copies of data is necessary to guarantee their availability and long term durability, in many situations the amount of data redundancy is immoderate.
Meye, Pierre +3 more
openaire +2 more sources
Regulators use expedited approval pathways to speed market approval and patient access to promising new drugs. However, there is uncertainty about whether these pathways are successful in approving drugs with significant therapeutic advantages. This systematic review aims to examine the safety, effectiveness and cost‐effectiveness of drugs approved via
Ashleigh Hooimeyer +4 more
wiley +1 more source
A Compression Technique Exploiting References for Data Synchronization Services [PDF]
Department of Computer Science and EngineeringIn a variety of network applications, there exists significant amount of shared data between two end hosts. Examples include data synchronization services that replicate data from one node to another.
Nam, Wooseung
core
This systematic review identified 112 population pharmacokinetic models of vancomycin in neonates and children. To support rational model selection for model‐informed precision, we developed and applied expert‐driven, transparent criteria that integrate both methodological rigour and clinical relevance.
Zoë Vander Elst +8 more
wiley +1 more source
Fast distributed video deduplication via locality-sensitive hashing with similarity ranking
The exponentially growing amount of video data being produced has led to tremendous challenges for video deduplication technology. Nowadays, many different deduplication approaches are being rapidly developed, but they are generally slow and their ...
Yeguang Li, Liang Hu, Ke Xia, Jie Luo
doaj +1 more source
ERBlox: Combining Matching Dependencies with Machine Learning for Entity Resolution
Entity resolution (ER), an important and common data cleaning problem, is about detecting data duplicate representations for the same external entities, and merging them into single representations. Relatively recently, declarative rules called "matching
Bahmani, Zeinab +2 more
core +1 more source

