Big data in corneal diseases and cataract: Current applications and future directions [0.03%]
角膜病和白内障的大数据应用及未来方向
Darren S J Ting,Rashmi Deshmukh,Daniel S W Ting et al.
Darren S J Ting et al.
The accelerated growth in electronic health records (EHR), Internet-of-Things, mHealth, telemedicine, and artificial intelligence (AI) in the recent years have significantly fuelled the interest and development in big data research. Big dat...
An extended approach to appraise electricity distribution and carbon footprint of bitcoin in a smart city [0.03%]
一种扩展方法评估比特币在智慧城市中的电力分配和碳足迹
Ayushi Sharma,Pratham Sharma,Harsh Bamotra et al.
Ayushi Sharma et al.
A nation cannot sustain a highly productive and efficient population without smart cities. Due to their significant reliance on digital technologies, these cities require a high level of cybercrime protection. Cryptocurrencies have gained s...
Hybridized bio-inspired intrusion detection system for Internet of Things [0.03%]
面向物联网的混合生物启发式入侵检测系统
Richa Singh,R L Ujjwal
Richa Singh
The Internet of Things (IoT) consists of several smart devices equipped with computing, sensing, and network capabilities, which enable them to collect and exchange heterogeneous data wirelessly. The increasing usage of IoT devices in daily...
Fresh takes on five health data sharing domains: Quality, privacy, equity, incentives, and sustainability [0.03%]
五大健康数据共享领域的全新观点:质量、隐私、公平性、激励和可持续性
Christi J Guerrini,Mary A Majumder,Jill O Robinson et al.
Christi J Guerrini et al.
As entities around the world invest in repositories and other infrastructure to facilitate health data sharing, scalable solutions to data sharing challenges are needed. We conducted semi-structured interviews with 24 experts to explore vie...
A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness [0.03%]
一种关于网络拓扑和活动结果的三维混合现实可视化可改善网络二人组团队沟通和态势感知能力
Torvald F Ask,Kaur Kullman,Stefan Sütterlin et al.
Torvald F Ask et al.
Background: Cyber defense decision-making during cyber threat situations is based on human-to-human communication aiming to establish a shared cyber situational awareness. Previous studies suggested that communication ine...
Daniela van Geenen,Jonathan W Y Gray,Liliana Bounegru et al.
Daniela van Geenen et al.
Networks have risen to prominence as intellectual technologies and graphical representations, not only in science, but also in journalism, activism, policy, and online visual cultures. Inspired by approaches taking trouble as occasion to (r...
Predicting the distribution of COVID-19 through CGAN-Taking Macau as an example [0.03%]
基于CGAN的新冠肺炎疫情预测方法及应用——以澳门特区为例
Liang Zheng,Yile Chen,Shan Jiang et al.
Liang Zheng et al.
Machine learning (ML) is an innovative method that is widely used in data prediction. Predicting the COVID-19 distribution using ML is essential for urban security risk assessment and governance. This study uses conditional generative adver...
A machine learning approach to quantify gender bias in collaboration practices of mathematicians [0.03%]
一种量化数学家合作实践中性别偏见的机器学习方法
Christian Steinfeldt,Helena Mihaljević
Christian Steinfeldt
Collaboration practices have been shown to be crucial determinants of scientific careers. We examine the effect of gender on coauthorship-based collaboration in mathematics, a discipline in which women continue to be underrepresented, espec...
Sharing social media data: The role of past experiences, attitudes, norms, and perceived behavioral control [0.03%]
社交媒体数据共享:过去经验、态度、规范和感知行为控制的作用
Esra Akdeniz,Kerrin Emilia Borschewski,Johannes Breuer et al.
Esra Akdeniz et al.
Social media data (SMD) have become an important data source in the social sciences. The purpose of this paper is to investigate the experiences and practices of researchers working with SMD in their research and gain insights into research...
Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review [0.03%]
基于区块链的访问控制以防止物联网中的网络攻击:系统回顾文献
Rinki Singh,Deepika Kukreja,Deepak Kumar Sharma
Rinki Singh
Internet of Things (IoT) enables communication among objects to collect information and make decisions to improve the quality of life. There are several unresolved security and privacy concerns in IoT due to multiple resource constrained de...