Finding the sweet spot: Exploring the optimal communication delay for AI feedback tools

Y Shi, B Deng - Information Processing & Management, 2024 - Elsevier
AI writing assistants that are capable of offering rapid, automatic, and corrective feedback
are becoming increasingly powerful, providing accurate and automatic feedback to …

A novel logistics data privacy protection method based on blockchain

J Liu, J Zhao, H Huang, G Xu - Multimedia Tools and Applications, 2022 - Springer
This paper is dedicated to investigating the application of blockchain in e-commerce
logistics. In the traditional logistics system, the protection mechanism of complete logistics …

Health Data Sharing towards Knowledge Creation

LB Elvas, JC Ferreira, MS Dias, LB Rosário - Systems, 2023 - mdpi.com
Data sharing and service reuse in the health sector pose significant privacy and security
challenges. The European Commission recognizes health data as a unique and cost …

A comparative study of Chinese named entity recognition with different segment representations

J Pan, C Zhang, H Wang, Z Wu - Applied Intelligence, 2022 - Springer
Named entity recognition (NER) is a fundamental but crucial task in the field of natural
language processing and has been widely studied. Nevertheless, little attention has been …

An event-based opinion summarization model for long chinese text with sentiment awareness and parameter fusion mechanism

S Liao, X Li, J Liu, A Zhou, K Li, S Peng - Applied Intelligence, 2023 - Springer
During the outbreak of a specific social event, end-to-end automatic opinion summarization
is needed to analyze the surge of text related to the event. However, in the Chinese domain …

Improved biharmonic kernel signature for 3D non-rigid shape matching and retrieval

Y Yan, M Zhou, D Zhang, S Geng - The Visual Computer, 2024 - Springer
Object retrieval, in particular 3D shape retrieval, recently has many applications such as
molecular biology, medical research and computer-aided manufacturing. As the internet and …

[PDF][PDF] A Blockchain and CP-ABE Based Access Control Scheme with Fine-Grained Revocation of Attributes in Cloud Health

Y Lu, T Feng, C Liu, W Zhang - CMC-COMPUTERS MATERIALS …, 2024 - cdn.techscience.cn
The Access control scheme is an effective method to protect user data privacy. The access
control scheme based on blockchain and ciphertext policy attribute encryption (CP–ABE) …

Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data

X Liu, R Sun, L Li, W Li, T Liu - KSII Transactions on Internet and …, 2023 - koreascience.kr
Epidemiological survey is an important means for the prevention and control of infectious
diseases. Due to the particularity of the epidemic survey, 1) epidemiological survey in …

Application of Hierarchical Protection Security Mechanism in Database to Party Building in Colleges and Universities

J Xue - Applied Mathematics and Nonlinear Sciences - sciendo.com
With the deepening of digital development, the security protection of databases becomes
more important while carrying out the digital transformation of party-building work in colleges …

[PDF][PDF] CAD GALIMYBĖS IR PRIORITETAI PRAMONĖJE IR MOKYMO SRITYSE

D Putnaitė, D Martišienė, R Šertvytis - INŽINERINĖ IR KOMPIUTERINĖ …, 2021 - vb.vgtu.lt
Galimybė kurti būsimą produktą virtualiojoje aplinkoje padarė didžiulę įtaką CAD
programinės įrangos galimybių tobulinimui. Programinės įrangos galimybė braižyti ir …