Results 61 to 70 of about 4,825 (248)

Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications [PDF]

open access: yes, 2018
As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication.
Archana, A   +2 more
core  

Landscape of Research on Accounting Scope 3 Emissions: A Review of Methodologies and Data

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT Scope 3 emissions have been proposed as a critical metric for evaluating corporate carbon footprint, identifying emission sources, and developing mitigation solutions. Yet, widespread corporate reporting of Scope 3 emissions remains limited, highlighting a critical gap in both research and practice.
Zeyu Wang   +3 more
wiley   +1 more source

Fast and secure laptop backups with encrypted de-duplication [PDF]

open access: yes, 2010
Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure.
Anderson, Paul, Zhang, Le
core   +1 more source

Forecasting New Employment Using Nonrepresentative Online Job Advertisements With an Application to the Italian and EU Labor Market

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT Using online job advertisement data improves the timeliness and granularity depth of analysis in the labor market in domains not covered by official data. Specifically, its variation over time may be used as an anticipator of official employment variations.
Pietro Giorgio Lovaglio   +1 more
wiley   +1 more source

Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication

open access: yesApplied Sciences
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality.
Chuang Gan   +7 more
doaj   +1 more source

A Survey of Secure Data Deduplication

open access: yesInternational Journal of Computer Applications, 2016
Now days due to advancement of storage technology and computer technology, larger fraction of data is being maintained in digitized form. The same data is stored over and over again, consuming unnecessary storage space on the disc. Deduplication is ideal for highly redundant operations like backup, which requires repeatedly coping and storing the same ...
Harshal Shah, Riddhi Movaliya
openaire   +1 more source

Deciphering nodal burden in thyroid carcinoma: A dedicated survey of age, lymph node ratio, log odds of positive nodes, and preoperative prediction models

open access: yesJournal of Intelligent Medicine, EarlyView.
Abstract Evidence regarding the prognosis of thyroid carcinoma is heterogeneous, ranging from age effects and nodal burden metrics, such as lymph node ratio (LNR) and log odds of positive nodes (LODDS), to preoperative imaging models comprising ultrasound, CEUS, and radiomics.
Mennatallah Sherif   +2 more
wiley   +1 more source

The Nexus Between Circular Economy and Sustainable Supply Chain Management: PRISMA Methodology

open access: yesSustainable Development, EarlyView.
ABSTRACT The intersection of sustainable supply chain management (SSCM) and circular economy (CE) has attracted increasing academic and practical attention, emphasizing the need for integrated sustainability approaches. This study employs the PRISMA protocol and conceptualizes the CE–SSCM relationship as a dynamic system in which internal capabilities,
Feriel Barkaoui, Khaled Ben abdallah
wiley   +1 more source

PoSW:novel secure deduplication scheme for collaborative cloud applications

open access: yesTongxin xuebao, 2017
In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme ...
Jin-bo XIONG   +5 more
doaj   +2 more sources

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy