Search
Search Results
-
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph
Knowledge graph is an extended graphical data structure tool that can store interrelated data and visually display the relationships between... -
Bringing AIED, Public Policy and GDPR to Promote Educational Opportunities in Brazil
This article explores the intersection between Artificial Intelligence in Education (AIED), public policies, and the General Data Protection... -
Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future
The healthcare industry is increasingly reliant on access to large volumes of patient data, which is critical for improving patient outcomes,...
-
Technical Implementation Framework of AI Governance Policies for Cross-Modal Privacy Protection
AI governance has been increasingly preeminent in digital world which presents a practical challenge of combining technical digital implementation... -
Exploring Brazilian Teachers’ Perceptions and a priori Needs to Design Smart Classrooms
Smart classrooms offer innovative opportunities to enhance teaching and learning. However, most existing research in this field predominantly focuses...
-
How scientific research incorporates policy: an examination using the case of China’s science and technology evaluation system
Governments typically formulate sets of policies to guide the direction of scientific research. And the possible effects of these policies on...
-
Malleable and Adaptive Ad-Hoc File System for Data Intensive Workloads in HPC Applications
Advancement in storage technologies, such as NVMe and persistent memory, enables the acceleration of I/O operations in HPC systems. However, relying... -
Distributional offline continuous-time reinforcement learning with neural physics-informed PDEs (SciPhy RL for DOCTR-L)
This paper addresses distributional offline continuous-time reinforcement learning (DOCTR-L) with stochastic policies for high-dimensional optimal...
-
Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering
As a company grows, so does its infrastructure—especially its information technology (IT) infrastructure. Maintaining a transparent and manageable... -
A survey of automated data augmentation algorithms for deep learning-based image classification tasks
In recent years, one of the most popular techniques in the computer vision community has been the deep learning technique. As a data-driven...
-
SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers
The extensive deployment of large cloud data centers has led to substantial energy consumption. Energy conservation is a critical concern for cloud...
-
Windows Registry Forensics Part 2
In Chapter 5 , you were provided a general introduction to the Windows Registry and to specific keys that are... -
Gendered Responses to AI Governance: Insights from a Quantitative National Survey on ChatGPT Usage Among Students and Educators
This study employs quantitative analysis to investigate how gender differences and educational policies influence students’ and educators’... -
Electronic Simple European Network Services (e-SENS) Social Media Analysis for Interoperability on Twitter
Over the last two decades, research on e-Government found that e-government is a strategy to increase the effectiveness of public service policies... -
Synthetic Individual Income Tax Data: Methodology, Utility, and Privacy Implications
The United States Internal Revenue Service Statistics of Income (SOI) Division possesses invaluable administrative tax data from individual income... -
Additional Essential ECRM Program Elements
The ECRM Program and Cybersecurity Strategy topics and related documentation covered in this chapter are education and training, automation and... -
Platform-independent and curriculum-oriented intelligent assistant for higher education
Miscommunication between instructors and students is a significant obstacle to post-secondary learning. Students may skip office hours due to...
-
The many publics of science: using altmetrics to identify common communication channels by scientific field
Altmetrics have led to new quantitative studies of science through social media interactions. However, there are no models of science communication...
-
Scalability and performance analysis of BDPS in clouds
The increasing demand for big data processing leads to commercial off-the-shelf (COTS) and cloud-based big data analytics services. Giant cloud...
-
Sentiment analysis of tweets on social security and medicare
The field of politics can be greatly aided through the use of natural language processing techniques on places like social media. Twitter hosts...