Results 101 to 110 of about 33,844 (282)
Privacy preservation in big data:a survey
Privacy disclosure issue becomes more and more serious due to big data analysis.Privacy-preserving techniques should be conductive to the big data applications while preserving data privacy.Since big data has the characteristics of huge scale,numerous ...
Binxing FANG +3 more
doaj
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
A two‐phase workflow (OFAT screening followed by central composite design) maps how processing variables tune PFCE‐PLGA nanoparticle size, dispersity, surface charge, loading, and 19F‐MRI signal. In situ, time‐resolved synchrotron SAXS tracks albumin‐corona growth on intact dispersions and reveals PFCE‐dependent adsorption pathways.
Joice Maria Joseph +11 more
wiley +1 more source
A More Efficient Conditional Private Preservation Scheme in Vehicular Ad Hoc Networks
It is a challenging issue to provide a secure and conditional anonymous authentication scheme in vehicle ad hoc networks (VANETs) with low storage space and computational cost. In 2008, Lu et al.
Tao Wang, Xiaohu Tang
doaj +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
IntroductionThe potential for secondary use of health data to improve healthcare is currently not fully exploited. Health data is largely kept in isolated data silos and key infrastructure to aggregate these silos into standardized bodies of knowledge is
Martin Baumgartner +23 more
doaj +1 more source
Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks, where privacy preservation is a crucial issue.
Wei Feng, Zheng Yan, Haomeng Xie
doaj +1 more source
Price-Based Combinatorial Auction: Connectedness and Representative Valuations [PDF]
We investigate combinatorial auctions from a practical perspective. The auctioneer gathers information according to a dynamical protocol termed ask price procedure.
Hitoshi Matsushima
core
Ensuring differential privacy of models learned from sensitive user data is an important goal that has been studied extensively in recent years. It is now known that for some basic learning problems, especially those involving high-dimensional data, producing an accurate private model requires much more data than learning without privacy.
Dwork, Cynthia, Feldman, Vitaly
openaire +2 more sources
Metamaterial Antennas Enhance MRI of the Eye and Occipital Brain
A radiofrequency antenna platform comprising planar and bend configurations is developed, incorporating structurally integrated epsilon‐negative metamaterial unit cells to enhance MRI. These antennas enable high‐resolution in vivo human MRI of the eye, orbit, and occipital brain. Comprehensive validation, including simulations, phantom experiments, SAR,
Nandita Saha +14 more
wiley +1 more source

