نتایج جستجو برای: phan privacy model

تعداد نتایج: 2140719  

2015
Ida Schoultz Catherine M. McKay Rabea Graepel Van C. Phan Arthur Wang Johan Söderholm Derek M. McKay Joan Snyder

Citation for the original published paper (version of record): Schoultz, I., McKay, C., Graepel, R., Phan, V., Wang, A. et al. (2012) Indomethacin-induced translocation of bacteria across enteric epithelia is reactive oxygen species-dependent and reduced by vitamin C. American Journal of Physiology Gastrointestinal and Liver Physiology, 303(5): G536-G545 http://dx.doi.org/10.1152/ajpgi.00125.2012

Journal: :J. AIS 2011
Heng Xu Tamara Dinev H. Jeff Smith Paul J. Hart

Organizational information practices can result in a variety of privacy problems that can increase consumers’ concerns for information privacy. To explore the link between individuals and organizations regarding privacy, we study how institutional privacy assurances such as privacy policies and industry self-regulation can contribute to reducing individual privacy concerns. Drawing on Communica...

2015
Younghoon Chang Siew Fan Wong Hwansoo Lee

Consumer data is asset to organizations. Analysis of consumers’ transactional data helps organizations to understand customer behaviors and preferences. Before organizations could capitalize on these data, they ought to have effective plans to address consumers’ privacy concerns because violation of consumer privacy brings long-term reputational damage to organizations. This paper proposes and ...

2012
Smruti Rekha Das

This paper proposed a feature selection with privacy preservation in centralized network. Data can be preserved for privacy by perturbation technique as alias name. In centralized data evaluation, it makes data classification and feature selection for data mining decision model which make the structural information of model in this paper. The application of gain ratio technique for better perfo...

2008
Xiaoxun Sun Hua Wang Jiuyong Li Traian Marius Truta Ping Li

Publishing data for analysis from a microdata table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While focusing on identity disclosure, k-anonymity model fails to protect attribute disclosure to some extent. Many efforts are made to enhance the kan...

ژورنال: حیات 2010
آقاجانی, محمد, دهقان‌نیری, ناهید,

Background & Objective: Privacy is a basic humanity principle. Protecting patients;apos privacy is a necessity in health care organizations and along with the patients;apos satisfaction, is one of the main indicators of quality of care. The objective of this study was to assess patients;apos privacy protecting by medical staff and its relation to patients;apos satisfaction.Methods & Materials: ...

Journal: :The Russian Journal of Vietnamese Studies 2022

Phan Chau Trinh (18721926) is one of the most typical reformist in Vietnam early twentieth century. The article analyzes his political views and concept national salvation he proposed. For a more complete objective disclosure role Chu Trinh, archival documents, mainly collected France, as well proceedings scientific seminars conferences recent years, were involved. In context Đoi moi reforms ca...

2016
Matthew D. Marrero

This study tested a conceptual model of adolescents' feelings of privacy invasion derived from CPM. Specifically, goals were to describe adolescents' expectations of privacy, to describe how often adolescents are exposed to behaviors that threaten privacy, and to test privacy beliefs, potentially invasive behaviors, and having things to hide as predictors of individual differences in feelings o...

Journal: :حقوق اسلامی 0
جلیل قنواتی استادیار دانشگاه تهران ـ پردیس قم حسین جاور استادیار دانشگاه حضرت معصومه

0

Journal: :IACR Cryptology ePrint Archive 2008
Jiqiang Lu Orr Dunkelman Nathan Keller Jongsung Kim

In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to the best known impossible differential attacks on 7-round AES-128 and AES-192, as well as to the best kno...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید

function paginate(evt) { url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term pg=parseInt(evt.target.text) var data={ "year":filter_year, "term":term, "pgn":pg } filtered_res=post_and_fetch(data,url) window.scrollTo(0,0); } function update_search_meta(search_meta) { meta_place=document.getElementById("search_meta_data") term=search_meta.term active_pgn=search_meta.pgn num_res=search_meta.num_res num_pages=search_meta.num_pages year=search_meta.year meta_place.dataset.term=term meta_place.dataset.page=active_pgn meta_place.dataset.num_res=num_res meta_place.dataset.num_pages=num_pages meta_place.dataset.year=year document.getElementById("num_result_place").innerHTML=num_res if (year !== "unfilter"){ document.getElementById("year_filter_label").style="display:inline;" document.getElementById("year_filter_place").innerHTML=year }else { document.getElementById("year_filter_label").style="display:none;" document.getElementById("year_filter_place").innerHTML="" } } function update_pagination() { search_meta_place=document.getElementById('search_meta_data') num_pages=search_meta_place.dataset.num_pages; active_pgn=parseInt(search_meta_place.dataset.page); document.getElementById("pgn-ul").innerHTML=""; pgn_html=""; for (i = 1; i <= num_pages; i++){ if (i===active_pgn){ actv="active" }else {actv=""} pgn_li="
  • " +i+ "
  • "; pgn_html+=pgn_li; } document.getElementById("pgn-ul").innerHTML=pgn_html var pgn_links = document.querySelectorAll('.mypgn'); pgn_links.forEach(function(pgn_link) { pgn_link.addEventListener('click', paginate) }) } function post_and_fetch(data,url) { showLoading() xhr = new XMLHttpRequest(); xhr.open('POST', url, true); xhr.setRequestHeader('Content-Type', 'application/json; charset=UTF-8'); xhr.onreadystatechange = function() { if (xhr.readyState === 4 && xhr.status === 200) { var resp = xhr.responseText; resp_json=JSON.parse(resp) resp_place = document.getElementById("search_result_div") resp_place.innerHTML = resp_json['results'] search_meta = resp_json['meta'] update_search_meta(search_meta) update_pagination() hideLoading() } }; xhr.send(JSON.stringify(data)); } function unfilter() { url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term var data={ "year":"unfilter", "term":term, "pgn":1 } filtered_res=post_and_fetch(data,url) } function deactivate_all_bars(){ var yrchart = document.querySelectorAll('.ct-bar'); yrchart.forEach(function(bar) { bar.dataset.active = false bar.style = "stroke:#71a3c5;" }) } year_chart.on("created", function() { var yrchart = document.querySelectorAll('.ct-bar'); yrchart.forEach(function(check) { check.addEventListener('click', checkIndex); }) }); function checkIndex(event) { var yrchart = document.querySelectorAll('.ct-bar'); var year_bar = event.target if (year_bar.dataset.active == "true") { unfilter_res = unfilter() year_bar.dataset.active = false year_bar.style = "stroke:#1d2b3699;" } else { deactivate_all_bars() year_bar.dataset.active = true year_bar.style = "stroke:#e56f6f;" filter_year = chart_data['labels'][Array.from(yrchart).indexOf(year_bar)] url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term var data={ "year":filter_year, "term":term, "pgn":1 } filtered_res=post_and_fetch(data,url) } } function showLoading() { document.getElementById("loading").style.display = "block"; setTimeout(hideLoading, 10000); // 10 seconds } function hideLoading() { document.getElementById("loading").style.display = "none"; } -->