Results 91 to 100 of about 4,825 (248)

Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things

open access: yesIEEE Access, 2020
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security ...
Bo Mi   +4 more
doaj   +1 more source

An Overview of Data Storage in Cloud Computing [PDF]

open access: yes, 2017
Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be
Ahuja, Ravin   +3 more
core  

Linking the Comparison and Graphical Approaches to Bipartite Matching

open access: yesInternational Statistical Review, EarlyView.
Summary Bipartite record linkage has the goal of identifying observations referring to the same individual, called coreferent observations, across two distinct non‐duplicated datasets. The two main approaches to solve this task are the Fellegi–Sunter model, which relies on pairwise comparisons of observations, and the graphical record linkage model ...
Edoardo Redivo
wiley   +1 more source

Security control scheme for cloud data copy based on differential privacy model

open access: yes网络与信息安全学报, 2017
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj   +3 more sources

Post‐Event Strategies for Workplace Violence Affecting Hospital Staff: A Scoping Review

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aims To map the evidence on post‐incident strategies for workplace violence in global hospital settings, define current literature gaps and provide direction for future research. Design Scoping review guided by Joanna Briggs Institute methodology.
Dana Sammut   +2 more
wiley   +1 more source

Preventing DDoS using Bloom Filter: A Survey

open access: yes, 2018
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Borgohain, Samir Kumar   +2 more
core   +1 more source

Annual Research Review: Associations of socioeconomic status with cognitive function, language ability, and academic achievement in youth: a systematic review of mechanisms and protective factors

open access: yesJournal of Child Psychology and Psychiatry, Volume 66, Issue 4, Page 417-439, April 2025.
Low socioeconomic status (SES) is negatively associated with children's cognitive and academic performance, leading to long‐term educational and economic disparities. In particular, SES is a powerful predictor of executive function (EF), language ability, and academic achievement.
Divyangana Rakesh   +3 more
wiley   +1 more source

A Comprehensive Mapping of Intergenerational Caregiving: A Scoping Review of Dyadic and Family Caregiving

open access: yesJournal of Family Theory &Review, EarlyView.
ABSTRACT Families remain central to later‐life support, yet evidence on intergenerational caregiving is fragmented across dyads, generations, and cultural contexts. This scoping review maps how caregiving is organized and negotiated across structural, associational, affectual, functional, consensual, and normative dimensions.
Chuen Wei Alvin Seah   +6 more
wiley   +1 more source

Mapping the Landscape of the Economics of AI Literature: Gaps and Opportunities for Research and Policy

open access: yesJournal of Economic Surveys, EarlyView.
ABSTRACT This paper investigates the evolving landscape of research on the economics of artificial intelligence (AI). Using topic modeling on a corpus of over 4,600 academic papers, we identify the dominant themes that have shaped the literature to date and highlight areas that remain relatively underexplored. In addition, we assess the extent to which
Lucy Hampton, John Lourenze Poquiz
wiley   +1 more source

Cross-platform deduplication of athletes’ medical cases considering data integrity

open access: yesDiscover Artificial Intelligence
The heterogeneity of Electronic Health Record (EHR) systems leads to significant differences in data formats and structures across different platforms.
Tanwei Shang, Ziqing Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy