Results 81 to 90 of about 4,735 (235)

Joint social‐ecological outcomes of private land conservation: An evidence synthesis with a well‐being perspective

open access: yesPeople and Nature, EarlyView.
Abstract Private land conservation (PLC) can contribute to sustainability by improving biodiversity and human well‐being but can also result in negative outcomes for people and nature if poorly designed. Informing PLC design to achieve objectives for joint biodiversity and well‐being is challenging because most evaluations assess ecological and social ...
Erica Cseko Nolasco   +6 more
wiley   +1 more source

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems

open access: yesIEEE Access, 2019
The deduplication based on attribute-based encryption can be well used in eHealth systems to save storage space and share medical records. However, the excessive computation costs of existing schemes lead to inefficient deduplication.
Hua Ma   +4 more
doaj   +1 more source

Big data reduction framework for value creation in sustainable enterprises

open access: yes, 2016
Value creation is a major sustainability factor for enterprises, in addition to profit maximization and revenue generation. Modern enterprises collect big data from various inbound and outbound data sources. The inbound data sources handle data generated
Batool, Aisha   +3 more
core   +1 more source

Six artificial intelligence innovation strategies applied to autism spectrum disorder research: A narrative review

open access: yesPediatric Investigation, EarlyView.
Six artificial intelligence strategies advance autism research from tool optimization to paradigm shift: causal modeling, spatiotemporal networks, multimodal integration, digital twins, social cognition mapping, collaborative learning, and context‐aware interventions for precision care.
Ting Zhang   +3 more
wiley   +1 more source

Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things

open access: yesIEEE Access, 2020
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security ...
Bo Mi   +4 more
doaj   +1 more source

A Survey of Secure Data Deduplication

open access: yesInternational Journal of Computer Applications, 2016
Now days due to advancement of storage technology and computer technology, larger fraction of data is being maintained in digitized form. The same data is stored over and over again, consuming unnecessary storage space on the disc. Deduplication is ideal for highly redundant operations like backup, which requires repeatedly coping and storing the same ...
Harshal Shah, Riddhi Movaliya
openaire   +1 more source

Environmental, Social, and Governance (ESG) Research: A Systematic Review of Recent Trends (2020–2024)

open access: yesSustainable Development, EarlyView.
ABSTRACT The 2020–2024 period marks a pivotal era in sustainable development, characterized by significant regulatory developments, including the EU Corporate Sustainability Reporting Directive (CSRD), the International Sustainability Standards Board standards, and the introduction of mandatory ESG reporting requirements worldwide. This review examines
Jiyeon Kim, Wooyoung Yang
wiley   +1 more source

Security control scheme for cloud data copy based on differential privacy model

open access: yes网络与信息安全学报, 2017
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj   +3 more sources

SECURE DEDUP WITH ENCRYPTED DATA [PDF]

open access: yes, 2018
Cloud computing is one of the way of service provision over the internet today. Cloud computing is the developing a next level from the last decades. One of the drawbacks, cloud storage is a privacy security at the CSP. So, the chunks users stored by the
Anjali, G   +3 more
core  

The Nexus Between Circular Economy and Sustainable Supply Chain Management: PRISMA Methodology

open access: yesSustainable Development, EarlyView.
ABSTRACT The intersection of sustainable supply chain management (SSCM) and circular economy (CE) has attracted increasing academic and practical attention, emphasizing the need for integrated sustainability approaches. This study employs the PRISMA protocol and conceptualizes the CE–SSCM relationship as a dynamic system in which internal capabilities,
Feriel Barkaoui, Khaled Ben abdallah
wiley   +1 more source

Home - About - Disclaimer - Privacy