Results 71 to 80 of about 4,231 (188)
Generative AI and the Future of Musical Diversity
Abstract I argue that the current proliferation of generative artificial intelligence (AI) represents a new stage in a longer historical process of distancing humans from their unique individual psyches and of reducing participation and cultural diversity in music. The argument consists of six parts: (1) reiterating the uniqueness of individual psyches,
Dor Shilton
wiley +1 more source
Robust and Scalable Data Access Control in D2D Communications
As an emerging technique in 5G cellular networks, D2D communication efficiently utilizes the available resources. However, the concerns of data security, identity privacy, and system scalability have not been sufficiently addressed.
Qi Li +4 more
doaj +1 more source
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners [PDF]
The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing.
Li, Frank, Paxson, Vern, Shin, Richard
core
ABSTRACT The Flexible and Interactive Tradeoff Elicitation (FITradeoff) method is a Multi‐Attribute Decision‐Making (MADM) approach designed to capture the preferences of a Decision Maker (DM) while minimising cognitive effort. To reduce the frequency of interactions and optimise the preference elicitation process, this paper introduces an innovative ...
Qian Zhao +3 more
wiley +1 more source
Traceable Ciphertext‐Policy Attribute‐Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud [PDF]
In cloud‐assisted electronic health care (eHealth) systems, a patient can enforce access control on his/her personal health information (PHI) in a cryptographic way by employing ciphertext‐policy attribute‐based encryption (CP‐ABE) mechanism. There are two features worthy of consideration in real eHealth applications.
Qi Li +3 more
openaire +1 more source
ABSTRACT This article explores the role of the COVID‐19 virus in changing healthcare policies in Wales and their effects on pandemic inequalities. It draws on the analysis of policy documents and key informant interviews with government and healthcare officials in Wales conducted during the cross‐European study on the varying impacts of pandemic ...
Sergei Shubin, Diana Beljaars
wiley +1 more source
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user ...
Jiawei ZHANG +3 more
doaj +2 more sources
ABSTRACT This study examines how carbon accounting can be used to govern, not merely report, circular economy principles in shipping corporations. Grounded in institutional theory and aligned with the UN 2030 Agenda, this study introduces circular harmony as an accounting design principle: Circular interventions are embedded in a single well‐to‐wake ...
Assunta Di Vaio +2 more
wiley +1 more source
In this paper, we present an efficient revocable signcryption (CP-ABSC) with outsourced unsigncryption scheme based on ciphertext-policy attribute based encryption (CP-ABE) to secure the data sharing in cloud computing that require access control, data ...
Ningzhi Deng +3 more
doaj +1 more source
A dialogic theoretical foundation for integrating generative AI into pedagogical design
Generative AI presents a profound challenge to the existing structures and purposes of education. It forces us to reconsider not only how we teach and learn but also, more fundamentally, what education is for. This conceptual paper argues that, in order to integrate AI into education in a way that can meet the major challenges facing humanity, ranging ...
Rupert Wegerif, Imogen Casebourne
wiley +1 more source

