Explore chapters and articles related to this topic
New Year for a New Davanti
Published in Norbert Majerus, George Taninecz, Winning Innovation, 2022
Norbert Majerus, George Taninecz
Anika also mentions a couple new experiments that she has planned: The first one is to make the Volta team a permanent working group, and maybe collocate the members. She suggests rotating membership and leadership and using the team for needs beyond innovation excellence. She also considers membership or leadership with Volta an important part of corporate leadership development. Another experiment, called “pairing,” will collocate key people—leaders or associates—who must work closely together to succeed, such as design and manufacturing staff or accounting and procurement personnel. “I’d also like to experiment pairing professionals for certain difficult tasks,” she adds. “They’ll work together on one drawing, one calculation, etc. and share responsibility for an aggressive goal. I not only expect synergy and better results but also knowledge sharing and relationship building. I’m convinced that there is hidden developmental and human potential that might come out of that experiment.”
Interactive Visual Exploration of Big Relational Datasets
Published in International Journal of Human–Computer Interaction, 2023
Katerina Vitsaxaki, Stavroula Ntoa, George Margetis, Nicolas Spyratos
In the HIFUN model, the data of an application is represented as a set of functions arranged in a graph called the application context (or context for short). Queries over a context are formed by combining functions using the following operations: composition, restriction, pairing, and Cartesian product projection. These operations are called collectively the functional algebra of the context. They are well known elementary operations on functions except probably for pairing, which is defined as follows: (Pairing). Let f: X→Y and g: X→Z be two functions with common source X. The pairing of f and g, denoted f∧g, is a function from X to Y × Z defined by: f∧g(x) = (f(x),g(x)), for all x in X.
Deep Learning: Differential Privacy Preservation in the Era of Big Data
Published in Journal of Computer Information Systems, 2023
The need to improve big data security and privacy is increasing rapidly due to the increasing growth of big data in several fields. The cryptographic method enables data encryption before transferring the data for analysis. Moreover, it enhances data utility. Thus, Vijey Thayananthan & Aiiad Albeshri42 proposed quantum cryptography with a pair hand protocol. In that approach, the complexity of searching operations was reduced for increasing q-bits. To ease the patient’s telemedicine services by electronic medical record (EMR), Hadeal Abdulaziz Al Hamid et al.43 proposed a fog computing facility with pairing-based cryptography. Combining fog computing and the decoy approach, decoy medical big data (DMBD) was generated. That DMBD had a trap gallery for distracting the attacker and securing the original MBD. Several cryptographic methods are depicted in Figure 8.
Fuzzy based hybrid BAT and firefly algorithm for optimal path selection and security in wireless sensor network
Published in Automatika, 2023
P. Dinesh Kumar, K. Valarmathi
As a result, academics have begun to look for solutions in this new field. An important feature of WSN security is described in this work. A variety of encryption techniques are investigated, including symmetric and public keys, as also Elliptic Curve Cryptography (ECC), Pairing Basis Cryptography (PBC), and Identity Based Cryptography (IBC). Because information is delivered across an unpredictable connection, information security is a key priority in every sector. Cryptographic techniques aid in the transformation of comprehensible data into incomprehensible data. Asymmetric keys and usually indicators are two major techniques of cryptography. The symmetric key employs only one secret for both encrypting and decrypting, which saves time and energy. The asymmetrical key is made up of 2 keys: a secret key for decryption and a public key for encryption. Since it uses two keys, the asymmetric encryption approach is substantially safer than the symmetrical approach. The production of two keys requires a lot of energy, time, and memory. Block and stream ciphers are two types of cryptographic techniques.