Fuzzy c means is a conventional clustering algorithm that uses complete data sets for the clustering process, making it difficult to deal with incomplete data which is a critical problem in medical research that canno...
详细信息
data mining is a useful method for extracting meaningful information from massive volumes of records. Statistics and machine learning may be utilised to evaluate large-scale patterns in massive databases. Numerous res...
详细信息
Scheduling tasks close to their associated data is crucial in distributed systems to minimize network traffic and latency. Some Big data frameworks like Apache Spark employ locality functions and job allocation algori...
详细信息
In this paper, I will be discussing quantum computing in cybersecurity. Quantum computing is in development and will be released to the public sooner rather than later. With how quickly technology evolves, it will get...
详细信息
ISBN:
(数字)9798350361513
ISBN:
(纸本)9798350361513;9798350372304
In this paper, I will be discussing quantum computing in cybersecurity. Quantum computing is in development and will be released to the public sooner rather than later. With how quickly technology evolves, it will get here faster than we know it. However, this opens the door for cyberattacks with strength never seen before, possibly breaching the privacy of millions of individuals and organizations around the world. I have gathered information and data surrounding the involvement of cybersecurity within the quantum computing world. This research involves how this type of computing is being utilized with cybersecurity today, possible risks of both the security and the introduction of computers with exponential computing power compared to current devices, along with what encryption methods are strong enough to hold firm against quantum powered attacks. Technology is the future humanity has made for themselves, and understanding the security risks and benefits are critical to remaining safe and ethical while new techniques emerge.
This article sheds light on legal implications and challenges surrounding emotion dataprocessing within the EU's legal framework. Despite the sensitive nature of emotion data, the GDPR does not categorize it as s...
详细信息
ISBN:
(纸本)9798350327434
This article sheds light on legal implications and challenges surrounding emotion dataprocessing within the EU's legal framework. Despite the sensitive nature of emotion data, the GDPR does not categorize it as special data, resulting in a lack of comprehensive protection. The article also discusses the nuances of different approaches to affective computing and their relevance to the processing of special data under the GDPR. Moreover, it points to potential tensions with data protection principles, such as fairness and accuracy. Our article also highlights some of the consequences, including harm, that processing of emotion data may have for individuals concerned. Additionally, we discuss how the AI Act proposal intends to regulate affective computing. Finally, the article outlines the new obligations and transparency requirements introduced by the DSA for online platforms utilizing emotion data. Our article aims at raising awareness among the affective computing community about the applicable legal requirements when developing AC systems intended for the EU market, or when working with study participants located in the EU. We also stress the importance of protecting the fundamental rights of individuals even when the law struggles to keep up with technological developments that capture sensitive emotion data.
Indoor navigation is a topical issue in the use of robotics and unmanned aerial vehicles (UAVs) in a smart city, especially in the absence/weak signals of satellite navigation. One of the promising solutions of these ...
详细信息
Clustering is a widely used technique in statistics mining for exploring and reading records with AI. It is an unsupervised gaining knowledge of technique, which may be used for exploratory facts evaluation. Clusterin...
详细信息
Urban digital modeling is the process of digitizing urban three-dimensional space and physical scenes based on computer technology. As a high-performance computing and storage technology, cloud computing has been wide...
详细信息
In the information age, with the continuous growth of massive data, the demand for processingdata to obtain information in various fields is increasing. Among various data mining methods, CART, the classification and...
详细信息
This study investigates the utilization of fuzzy association rule algorithms for the secure storage of enterprise economic data. The study applies the concept of fuzzy partitioning to the mining of industrial producti...
详细信息
暂无评论