Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
1561
Data Visualization and Prediction Model Analysis
Published 2025-01-01“…The purpose of this paper is to study the application of data visualization and compare different prediction models. …”
Get full text
Article -
1562
ODM Data Analysis-A tool for the automatic validation, monitoring and generation of generic descriptive statistics of patient data.
Published 2018-01-01“…Objective of this work is to design, implement and evaluate an open source application, called ODM Data Analysis, for the semi-automatic analysis of clinical study data.…”
Get full text
Article -
1563
DATA MODELS FOR INCIDENT RESPONSE AUTOMATIZATION
Published 2025-05-01“…As a development of this research, the author is developing a physical data model and its testing.…”
Get full text
Article -
1564
Examining UTAUT model for mobile food ordering applications (MOFAs): A case study of Food-panda application
Published 2025-01-01“… The purpose of the study was to examine the effectiveness of the Mobile Food Ordering Application (MFOA) in a collectivist country like Pakistan. …”
Get full text
Article -
1565
Big Data and High Performance Computing
Published 2015-05-01“…Big data and HPC with several aspects were compared, such as the research paradigm, main application domain and underlying hardware/software systems.…”
Get full text
Article -
1566
Who Owns and Controls Farming Data?
Published 2021-10-01“… This publication aims to clarify the concerns regarding data ownership and explain the responsibilities of that ownership, sharing, and benefits in a collaborative smart farming application. …”
Get full text
Article -
1567
Data sharing of mobile internet vehicles
Published 2016-12-01“…The data content of mobile internet vehicles was analyzed, the application of mobile internet vehicles data was studied, the composition of the industry chain of mobile internet vehicles data was analyzed, and a data sharing framework for mobile internet vehicles based on data collection, management and sharing was proposed.…”
Get full text
Article -
1568
Who Owns and Controls Farming Data?
Published 2021-10-01“… This publication aims to clarify the concerns regarding data ownership and explain the responsibilities of that ownership, sharing, and benefits in a collaborative smart farming application. …”
Get full text
Article -
1569
Data sharing of mobile internet vehicles
Published 2016-12-01“…The data content of mobile internet vehicles was analyzed, the application of mobile internet vehicles data was studied, the composition of the industry chain of mobile internet vehicles data was analyzed, and a data sharing framework for mobile internet vehicles based on data collection, management and sharing was proposed.…”
Get full text
Article -
1570
Who’s in? Lifestyle data and geographical research
Published 2000-02-01“…Lifestyle databases offer up-to-date, geographically relevant data about individuals. Yet, their application has been slow to extended beyond marketing and into geographical research. …”
Get full text
Article -
1571
Florida Rainfall Data Sources and Types
Published 2017-05-01“… This new 5-page document introduces the sources, providers, and types of rainfall data available to Florida researchers and residents to promote understanding of the rainfall data and their application in studies and daily life. …”
Get full text
Article -
1572
Research on data circulation security standardization
Published 2024-11-01“…The article offers suggestions on data circulation security standardization, including refining legal design, strengthening technology research and development, expanding talent training, promoting standard application, and strengthening international cooperation.…”
Get full text
Article -
1573
The Training Method for Digital Data Operation
Published 2020-09-01“…As a result, students better learn knowledge and practical skills that are also applicable to working with other types of social media and global data platforms. …”
Get full text
Article -
1574
-
1575
Artificial intelligence and Big Data in neurology
Published 2022-08-01“…Together with the enormous opportunities, we also face challenges related to data quality, ethics and intrinsic difficulties related to the application of data science in healthcare. …”
Get full text
Article -
1576
Provable data possession scheme with authentication
Published 2016-10-01“…To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.…”
Get full text
Article -
1577
INSURANCE DEVELOPMENTS IN THE LIGHT OF DATA USE
Published 2023-12-01“…The study concludes that despite the safeguards offered by data and consumer protection laws, the unregulated and unconstrained application of data analytics and algorithms in risk evaluation could potentially harm policyholders by infringing on their privacy and leading to discrimination, thereby impinging on their rights.…”
Get full text
Article -
1578
Data and algorithm security in platform economy
Published 2022-07-01“…Artificial intelligence, big data, and other technologies are rapidly promoting the development of the platform economy.While Internet platforms use the two-wheel mechanism of “data + algorithm” to provide users with accurate and personalized information services, they also have fair competition for national network security and market due to the platform’s “ecological monopoly” and irregular application of algorithms.The legitimate interests of users pose a threat and bring serious challenges to government supervision and platform governance.Under this background, the connotation, extension, and research status of data and algorithm security in the platform economy were discussed, and the technical system and key technical problems that promote the innovation and development of the platform under the premise of ensuring security were sorted out, and the promotion suggestions for ecological innovation and development of the platform economy from four aspects were given: architecture construction, perfection of supervison systems, breakthrough of core technology, and platform model innovation.…”
Get full text
Article -
1579
-
1580
Data subject rights in the era of AI
Published 2025-06-01“…To answer these questions, we propose to examine what rights are granted to data subjects under article 16 of the GDPR; what is the current state of play regarding the application of this right to inferences; to which extent should data subjects have a right to rectify or complete inferences about them made by AI systems; and what are the obligations and good practices that could be implemented to facilitate the exercise of this right in the aforementioned context. …”
Get full text
Article