To see the other types of publications on this topic, follow the link: Sensitive date.

Dissertations / Theses on the topic 'Sensitive date'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Sensitive date.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ema, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Folkesson, Carl. "Anonymization of directory-structured sensitive data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-160952.

Full text
Abstract:
Data anonymization is a relevant and important field within data privacy, which tries to find a good balance between utility and privacy in data. The field is especially relevant since the GDPR came into force, because the GDPR does not regulate anonymous data. This thesis focuses on anonymization of directory-structured data, which means data structured into a tree of directories. In the thesis, four of the most common models for anonymization of tabular data, k-anonymity, ℓ-diversity, t-closeness and differential privacy, are adapted for anonymization of directory-structured data. This adapt
APA, Harvard, Vancouver, ISO, and other styles
3

Subbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.

Full text
Abstract:
Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail. In proactively-secure systems, this requirement is modified to hold only in a time interval (also called epoch), resulting in increased security. An attacker or adversary could compromise distinct sets of nodes in any two time intervals. This attack model is also called the mobile adversary model. Proactively-secure systems require all nodes to "refresh" themselves periodically to a clean state to maintain the availability, integrity, and co
APA, Harvard, Vancouver, ISO, and other styles
4

Bakri, Mustafa al. "Uncertainty-Sensitive Reasoning over the Web of Data." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM073.

Full text
Abstract:
Dans cette thèse, nous étudions plusieurs approches destinées à aider les utilisateurs à trouver des informations utiles et fiables dans le Web de données, en utilisant les technologies du Web sémantique. Nous abordons pour cela deux thèmes de recherche: le liage de données dans le Linked-Data et la confiance dans les réseaux P2P sémantiques. Nous modélisons le problème de liage dans le Web de données comme un problème de raisonnement sur des données incomplètes, qu'il s'agit d'enrichir en interrogeant de façon précise et pertinente le cloud du Linked Data. Nous avons conçu et implémenté un no
APA, Harvard, Vancouver, ISO, and other styles
5

Ljus, Simon. "Purging Sensitive Data in Logs Using Machine Learning." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411610.

Full text
Abstract:
This thesis investigates how to remove personal data from logs using machine learning when rule-based scripts are not enough and manual scanning is too extensive. Three types of machine learning models were created and compared. One word model using logistic regression, another word model using LSTM and a sentence model also using LSTM. Data logs were cleaned and annotated using rule-based scripts, datasets from various countries and dictionaries from various languages. The created dataset for the sentence based model was imbalanced, and a lite version of data augmentation was applied. A hyper
APA, Harvard, Vancouver, ISO, and other styles
6

Oshima, Sonoko. "Neuromelanin‐Sensitive Magnetic Resonance Imaging Using DANTE Pulse." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

El-Khoury, Hiba. "Introduction of New Products in the Supply Chain : Optimization and Management of Risks." Thesis, Jouy-en Josas, HEC, 2012. http://www.theses.fr/2012EHEC0001/document.

Full text
Abstract:
Les consommateurs d’aujourd’hui ont des goûts très variés et cherchent les produits les plus récents. Avec l’accélération technologique, les cycles de vie des produits se sont raccourcis et donc, de nouveaux produits doivent être introduits au marché plus souvent et progressivement, les anciens doivent y être retirés. L’introduction d’un nouveau produit est une source de croissance et d’avantage concurrentiel. Les directeurs du Marketing et Supply Chain se sont confrontés à la question de savoir comment gérer avec succès le remplacement de leurs produits et d’optimiser les coûts de la chaîne d
APA, Harvard, Vancouver, ISO, and other styles
8

Gholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.

Full text
Abstract:
Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. These make it much easier to meet organizational goals as organizations can easily deploy cloud services. However, the shift in paradigm that accompanies the adoption of cloud computing is increasingly giving rise
APA, Harvard, Vancouver, ISO, and other styles
9

Mathew, George. "A Perturbative Decision Making Framework for Distributed Sensitive Data." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/269109.

Full text
Abstract:
Computer and Information Science<br>Ph.D.<br>In various business domains, intelligence garnered from data owned by peer institutions can provide useful information. But, due to regulations, privacy concerns and legal ramifications, peer institutions are reluctant to share raw data. For example, in medical domain, HIPAA regulations, Personally Identifiable Information and privacy issues are impediments to data sharing. However, intelligence can be learned from distributed data sets if their key characteristics are shared among desired parties. In scenarios where samples are rare locally, but ad
APA, Harvard, Vancouver, ISO, and other styles
10

Ansell, Peter. "A context sensitive model for querying linked scientific data." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/49777/1/Peter_Ansell_Thesis.pdf.

Full text
Abstract:
This thesis provides a query model suitable for context sensitive access to a wide range of distributed linked datasets which are available to scientists using the Internet. The model is designed based on scientific research standards which require scientists to provide replicable methods in their publications. Although there are query models available that provide limited replicability, they do not contextualise the process whereby different scientists select dataset locations based on their trust and physical location. In different contexts, scientists need to perform different data cleaning
APA, Harvard, Vancouver, ISO, and other styles
11

Sobel, Louis (Louis A. ). "Secure Input Overlays : increasing security for sensitive data on Android." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100624.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 44-47).<br>Mobile devices and the applications that run on them are an important part of people's lives. Often, an untrusted mobile application will need to obtain sensitive inputs, such as credit card information or passwor
APA, Harvard, Vancouver, ISO, and other styles
12

Landegren, Nils. "How Sensitive Are Cross-Lingual Mappings to Data-Specific Factors?" Thesis, Stockholms universitet, Institutionen för lingvistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-185069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Lindblad, Christopher John. "A programming system for the dynamic manipulation of temporally sensitive data." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/37744.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1994.<br>Includes bibliographical references (p. 255-277).<br>by Christopher John Lindblad.<br>Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
14

Le, Tallec Yann. "Robust, risk-sensitive, and data-driven control of Markov Decision Processes." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38598.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2007.<br>Includes bibliographical references (p. 201-211).<br>Markov Decision Processes (MDPs) model problems of sequential decision-making under uncertainty. They have been studied and applied extensively. Nonetheless, there are two major barriers that still hinder the applicability of MDPs to many more practical decision making problems: * The decision maker is often lacking a reliable MDP model. Since the results obtained by dynamic programming are sensitive to the assumed MDP mod
APA, Harvard, Vancouver, ISO, and other styles
15

Torabian, Hajaralsadat. "Protecting sensitive data using differential privacy and role-based access control." Master's thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26580.

Full text
Abstract:
Dans le monde d'aujourd'hui où la plupart des aspects de la vie moderne sont traités par des systèmes informatiques, la vie privée est de plus en plus une grande préoccupation. En outre, les données ont été générées massivement et traitées en particulier dans les deux dernières années, ce qui motive les personnes et les organisations à externaliser leurs données massives à des environnements infonuagiques offerts par des fournisseurs de services. Ces environnements peuvent accomplir les tâches pour le stockage et l'analyse de données massives, car ils reposent principalement sur Hadoop MapRedu
APA, Harvard, Vancouver, ISO, and other styles
16

Hedlin, Johan, and Joakim Kahlström. "Detecting access to sensitive data in software extensions through static analysis." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162281.

Full text
Abstract:
Static analysis is a technique to automatically audit code without having to execute or manually read through it. It is highly effective and can scan large amounts of code or text very quickly. This thesis uses static analysis to find potential threats within a software's extension modules. These extensions are developed by third parties and should not be allowed to access information belonging to other extensions. However, due to the structure of the software there is no easy way to restrict this and still keep the software's functionality intact. The use of a static analysis tool could detec
APA, Harvard, Vancouver, ISO, and other styles
17

Barreau, Emilie. "Accès aux droits sociaux et numérique : les enjeux de la digitalisation dans l’accès aux aides sociales départementales." Electronic Thesis or Diss., Angers, 2024. http://www.theses.fr/2024ANGE0012.

Full text
Abstract:
La dématérialisation des procédures est un fait général qui revêt une portée spécifique en matière de droits sociaux. En matière d’aide sociale, ces droits s’adressent à un public vulnérable qui peut cumuler des facteurs de difficultés. La dématérialisation des procédures qui se traduit par l’absence de guichets et d’interlocuteurs, se déploie sans que la particularité des droits sociaux ou de la vulnérabilité des personnes concernées ne soient prises en compte. Les potentialités du numérique permettent d’envisager des moyens pour renforcer l’accès aux droits sociaux desdites personnes. Néanmo
APA, Harvard, Vancouver, ISO, and other styles
18

Krishnaswamy, Vijaykumar. "Shared state management for time-sensitive distributed applications." Diss., Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/8197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

El, KHOURY Hiba. "Introduction of New Products in the Supply Chain : Optimization and Management of Risks." Phd thesis, HEC, 2012. http://pastel.archives-ouvertes.fr/pastel-00708801.

Full text
Abstract:
Shorter product life cycles and rapid product obsolescence provide increasing incentives to introduce newproducts to markets more quickly. As a consequence of rapidly changing market conditions, firms focus onimproving their new product development processes to reap the benefits of early market entry. Researchershave analyzed market entry, but have seldom provided quantitative approaches for the product rolloverproblem. This research builds upon the literature by using established optimization methods to examine howfirms can minimize their net loss during the rollover process. Specifically, ou
APA, Harvard, Vancouver, ISO, and other styles
20

Khire, Sourabh Mohan. "Time-sensitive communication of digital images, with applications in telepathology." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/29761.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010.<br>Committee Chair: Jayant, Nikil; Committee Member: Anderson, David; Committee Member: Lee, Chin-Hui. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
21

Murphy, Brian R. "Order-sensitive XML query processing over relational sources." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.

Full text
Abstract:
Thesis (M.S.)--Worcester Polytechnic Institute.<br>Keywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
APA, Harvard, Vancouver, ISO, and other styles
22

McCullagh, Karen. "The social, cultural, epistemological and technical basis of the concept of 'private' data." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/the-social-cultural-epistemological-and-technical-basis-of-the-concept-of-private-data(e2ea538a-8e5b-43e3-8dc2-4cdf602a19d3).html.

Full text
Abstract:
In July 2008, the UK Information Commissioner launched a review of EU Directive 95/46/EC on the basis that: “European data protection law is increasingly seen as out of date, bureaucratic and excessively prescriptive. It is showing its age and is failing to meet new challenges to privacy, such as the transfer of personal details across international borders and the huge growth in personal information online. It is high time the law is reviewed and updated for the modern world.” Legal practitioners such as Bergkamp have expressed a similar sense of dissatisfaction with the current legislative a
APA, Harvard, Vancouver, ISO, and other styles
23

Raber, Frederic Christian [Verfasser]. "Supporting lay users in privacy decisions when sharing sensitive data / Frederic Christian Raber." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1220691127/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ailem, Melissa. "Sparsity-sensitive diagonal co-clustering algorithms for the effective handling of text data." Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCB087.

Full text
Abstract:
Dans le contexte actuel, il y a un besoin évident de techniques de fouille de textes pour analyser l'énorme quantité de documents textuelles non structurées disponibles sur Internet. Ces données textuelles sont souvent représentées par des matrices creuses (sparses) de grande dimension où les lignes et les colonnes représentent respectivement des documents et des termes. Ainsi, il serait intéressant de regrouper de façon simultanée ces termes et documents en classes homogènes, rendant ainsi cette quantité importante de données plus faciles à manipuler et à interpréter. Les techniques de classi
APA, Harvard, Vancouver, ISO, and other styles
25

Ailem, Melissa. "Sparsity-sensitive diagonal co-clustering algorithms for the effective handling of text data." Electronic Thesis or Diss., Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCB087.

Full text
Abstract:
Dans le contexte actuel, il y a un besoin évident de techniques de fouille de textes pour analyser l'énorme quantité de documents textuelles non structurées disponibles sur Internet. Ces données textuelles sont souvent représentées par des matrices creuses (sparses) de grande dimension où les lignes et les colonnes représentent respectivement des documents et des termes. Ainsi, il serait intéressant de regrouper de façon simultanée ces termes et documents en classes homogènes, rendant ainsi cette quantité importante de données plus faciles à manipuler et à interpréter. Les techniques de classi
APA, Harvard, Vancouver, ISO, and other styles
26

Jarvis, Ryan D. "Protecting Sensitive Credential Content during Trust Negotiation." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd192.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Becerra, Bonache Leonor. "On the learnibility of Mildly Context-Sensitive languages using positive data and correction queries." Doctoral thesis, Universitat Rovira i Virgili, 2006. http://hdl.handle.net/10803/8780.

Full text
Abstract:
Con esta tesis doctoral aproximamos la teoría de la inferencia gramatical y los estudios de adquisición del lenguaje, en pos de un objetivo final: ahondar en la comprensión del modo como los niños adquieren su primera lengua mediante la explotación de la teoría inferencial de gramáticas formales.<br/><br/>Nuestras tres principales aportaciones son:<br/><br/>1. Introducción de una nueva clase de lenguajes llamada Simple p-dimensional external contextual (SEC). A pesar de que las investigaciones en inferencia gramatical se han centrado en lenguajes regulares o independientes del contexto, en nue
APA, Harvard, Vancouver, ISO, and other styles
28

Vilsmaier, Christian. "Contextualized access to distributed and heterogeneous multimedia data sources." Thesis, Lyon, INSA, 2014. http://www.theses.fr/2014ISAL0094/document.

Full text
Abstract:
Rendre les données multimédias disponibles en ligne devient moins cher et plus pratique sur une base quotidienne, par exemple par les utilisateurs eux-mêmes. Des phénomènes du Web comme Facebook, Twitter et Flickr bénéficient de cette évolution. Ces phénomènes et leur acceptation accrue conduisent à une multiplication du nombre d’images disponibles en ligne. La taille cumulée de ces images souvent publiques et donc consultables, est de l’ordre de plusieurs zettaoctets. L’exécution d’une requête de similarité sur de tels volumes est un défi que la communauté scientifique commence à cibler. Une
APA, Harvard, Vancouver, ISO, and other styles
29

Darshana, Dipika. "DELAY SENSITIVE ROUTING FOR REAL TIME TRAFFIC OVER AD-HOC NETWORKS." Master's thesis, University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2802.

Full text
Abstract:
Wireless ad hoc network consists of inexpensive nodes that form a mobile communication network. Due to limitations of the transmission range, the nodes rely on each other to forward packets such that messages can be delivered across the network. The selection of the path along which a packet is forwarded from the source node to the destination node is done by the routing algorithm. Most commonly used routing algorithms, though effective for non-real time applications, cannot handle real-time applications that require strict delay bounds on packet delivery. In this thesis, we propose a routing
APA, Harvard, Vancouver, ISO, and other styles
30

Winandy, Marcel [Verfasser]. "Security and Trust Architectures for Protecting Sensitive Data on Commodity Computing Platforms / Marcel Winandy." Aachen : Shaker, 2012. http://d-nb.info/106773497X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Vaskovich, Daria. "Cloud Computing and Sensitive Data : A Case of Beneficial Co-Existence or Mutual Exclusiveness?" Thesis, KTH, Hållbarhet och industriell dynamik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169597.

Full text
Abstract:
I dag anses molntjänster vara ett omtalat ämne som har ändrat hur IT-tjänster levereras och som skapat nya affärsmodeller. Några av molntjänsternas mest frekvent nämnda fördelar är flexibilitet och skalbarhet. Molntjänster är i dagsläget extensivt använda av privatpersoner genom tjänster så som Google Drive och Dropbox. Å andra sidan kan en viss försiktighet gentemot molntjänster uppmärksammas hos de organisationer som innehar känslig data. Denna försiktighet kan anses leda till en långsammare tillämpningshastighet för dessa organisationer. Detta examensarbete har som syfte att undersöka samba
APA, Harvard, Vancouver, ISO, and other styles
32

Peng, Zhen. "Novel Data Analytics for Developing Sensitive and Reliable Damage Indicators in Structural Health Monitoring." Thesis, Curtin University, 2022. http://hdl.handle.net/20.500.11937/89064.

Full text
Abstract:
This thesis focuses on developing novel data analytics and damage detection methods that are applicable to the condition assessment of civil engineering structures subjected to operational and environmental condition changes, nonlinearity and/or measurement noise. Comprehensive numerical and experimental studies validate the effectiveness and performance of using the proposed approaches for practical structural health monitoring applications.
APA, Harvard, Vancouver, ISO, and other styles
33

Flory, Long Mrs. "A WEB PERSONALIZATION ARTIFACT FOR UTILITY-SENSITIVE REVIEW ANALYSIS." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3739.

Full text
Abstract:
Online customer reviews are web content voluntarily posted by the users of a product (e.g. camera) or service (e.g. hotel) to express their opinions about the product or service. Online reviews are important resources for businesses and consumers. This dissertation focuses on the important consumer concern of review utility, i.e., the helpfulness or usefulness of online reviews to inform consumer purchase decisions. Review utility concerns consumers since not all online reviews are useful or helpful. And, the quantity of the online reviews of a product/service tends to be very large. Manual as
APA, Harvard, Vancouver, ISO, and other styles
34

Aljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ording, Marcus. "Context-Sensitive Code Completion : Improving Predictions with Genetic Algorithms." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205334.

Full text
Abstract:
Within the area of context-sensitive code completion there is a need for accurate predictive models in order to provide useful code completion predictions. The traditional method for optimizing the performance of code completion systems is to empirically evaluate the effect of each system parameter individually and fine-tune the parameters. This thesis presents a genetic algorithm that can optimize the system parameters with a degree-of-freedom equal to the number of parameters to optimize. The study evaluates the effect of the optimized parameters on the prediction quality of the studied code
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Xinfeng. "Time-sensitive Information Communication, Sensing, and Computing in Cyber-Physical Systems." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397731767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Engin, Melih. "Text Classificaton In Turkish Marketing Domain And Context-sensitive Ad Distribution." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610457/index.pdf.

Full text
Abstract:
Online advertising has a continuously increasing popularity. Target audience of this new advertising method is huge. Additionally, there is another rapidly growing and crowded group related to internet advertising that consists of web publishers. Contextual advertising systems make it easier for publishers to present online ads on their web sites, since these online marketing systems automatically divert ads to web sites with related contents. Web publishers join ad networks and gain revenue by enabling ads to be displayed on their sites. Therefore, the accuracy of automated ad systems in dete
APA, Harvard, Vancouver, ISO, and other styles
38

Forde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.

Full text
Abstract:
IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The
APA, Harvard, Vancouver, ISO, and other styles
39

He, Yuting. "RVD2: An ultra-sensitive variant detection model for low-depth heterogeneous next-generation sequencing data." Digital WPI, 2014. https://digitalcommons.wpi.edu/etd-theses/499.

Full text
Abstract:
Motivation: Next-generation sequencing technology is increasingly being used for clinical diagnostic tests. Unlike research cell lines, clinical samples are often genomically heterogeneous due to low sample purity or the presence of genetic subpopulations. Therefore, a variant calling algorithm for calling low-frequency polymorphisms in heterogeneous samples is needed. Result: We present a novel variant calling algorithm that uses a hierarchical Bayesian model to estimate allele frequency and call variants in heterogeneous samples. We show that our algorithm improves upon current classifiers
APA, Harvard, Vancouver, ISO, and other styles
40

Hsu, William. "Using knowledge encoded in graphical disease models to support context-sensitive visualization of medical data." Diss., Restricted to subscribing institutions, 2009. http://proquest.umi.com/pqdweb?did=1925776141&sid=13&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hoang, Van-Hoan. "Securing data access and exchanges in a heterogeneous ecosystem : An adaptive and context-sensitive approach." Thesis, La Rochelle, 2022. http://www.theses.fr/2022LAROS009.

Full text
Abstract:
Les services de stockage et de partage de données basés sur le Cloud sont largement adoptés depuis des décennies. Le modèle sous-jacent permet aux utilisateurs de minimiser le coût de services en étant en mesure d'accéder et de partager des données facilement. Dans ce contexte, la sécurité est essentielle pour protéger les utilisateurs et leurs ressources. Concernant les utilisateurs, ils doivent prouver leur éligibilité pour pouvoir accéder aux ressources. Cependant, l’envoi direct des informations personnelles permet aux fournisseurs de services de détecter qui partage des données avec qui e
APA, Harvard, Vancouver, ISO, and other styles
42

Sankara, Krishnan Shivaranjani. "Delay sensitive delivery of rich images over WLAN in telemedicine applications." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/29673.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Jayant, Nikil; Committee Member: Altunbasak, Yucel; Committee Member: Sivakumar, Raghupathy. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
43

Bhattacharya, Arindam. "Gradient Dependent Reconstruction from Scalar Data." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1449181983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ljungberg, Lucas. "Using unsupervised classification with multiple LDA derived models for text generation based on noisy and sensitive data." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-255010.

Full text
Abstract:
Creating models to generate contextual responses to input queries is a difficult problem. It is even more difficult when available data contains noise and sensitive data. Finding models or methods to handle such issues is important in order to use data for productive means.This thesis proposes a model based on a cooperating pair of Topic Models of differing tasks (LDA and GSDMM) in order to alleviate the problematic properties of data. The model is tested on a real-world dataset with these difficulties as well as a dataset without them. The goal is to 1) look at the behaviour of the different
APA, Harvard, Vancouver, ISO, and other styles
45

Qi, Hao. "Computing resources sensitive parallelization of neural neworks for large scale diabetes data modelling, diagnosis and prediction." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/6346.

Full text
Abstract:
Diabetes has become one of the most severe deceases due to an increasing number of diabetes patients globally. A large amount of digital data on diabetes has been collected through various channels. How to utilize these data sets to help doctors to make a decision on diagnosis, treatment and prediction of diabetic patients poses many challenges to the research community. The thesis investigates mathematical models with a focus on neural networks for large scale diabetes data modelling and analysis by utilizing modern computing technologies such as grid computing and cloud computing. These comp
APA, Harvard, Vancouver, ISO, and other styles
46

Koop, Martin [Verfasser], and Stefan [Akademischer Betreuer] Katzenbeisser. "Preventing the Leakage of Privacy Sensitive User Data on the Web / Martin Koop ; Betreuer: Stefan Katzenbeisser." Passau : Universität Passau, 2021. http://d-nb.info/1226425577/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Oguchi, Chizoba. "A Comparison of Sensitive Splice Aware Aligners in RNA Sequence Data Analysis in Leaping towards Benchmarking." Thesis, Högskolan i Skövde, Institutionen för biovetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18513.

Full text
Abstract:
Bioinformatics, as a field, rapidly develops and such development requires the design ofalgorithms and software. RNA-seq provides robust information on RNAs, both alreadyknown and new, hence the increased study of the RNA. Alignment is an important step indownstream analyses and the ability to map reads across splice junctions is a requirement ofan aligner to be suitable for mapping RNA-seq reads. Therefore, the necessity for a standardsplice-aware aligner. STAR, Rsubread and HISAT2 have not been singly studied for thepurpose of benchmarking one of them as a standard aligner for spliced RNA-se
APA, Harvard, Vancouver, ISO, and other styles
48

Olorunnimbe, Muhammed. "Intelligent Adaptation of Ensemble Size in Data Streams Using Online Bagging." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32340.

Full text
Abstract:
In this era of the Internet of Things and Big Data, a proliferation of connected devices continuously produce massive amounts of fast evolving streaming data. There is a need to study the relationships in such streams for analytic applications, such as network intrusion detection, fraud detection and financial forecasting, amongst other. In this setting, it is crucial to create data mining algorithms that are able to seamlessly adapt to temporal changes in data characteristics that occur in data streams. These changes are called concept drifts. The resultant models produced by such algorithms
APA, Harvard, Vancouver, ISO, and other styles
49

Jun, Mi Kyung. "Effects of survey mode, gender, and perceived sensitivity on the quality of data regarding sensitive health behaviors." [Bloomington, Ind.] : Indiana University, 2005. http://wwwlib.umi.com/dissertations/fullcit/3167794.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, School of Health, Physical Education and Recreation, 2005.<br>Source: Dissertation Abstracts International, Volume: 66-04, Section: B, page: 2011. Adviser: Nathan W. Shier. "Title of dissertation home page (viewed Nov. 22, 2006)."
APA, Harvard, Vancouver, ISO, and other styles
50

Hellman, Hanna. "Data Aggregation in Time Sensitive Multi-Sensor Systems : Study and Implementation of Wheel Data Aggregation for Slip Detection in an Autonomous Vehicle Convoy." Thesis, KTH, Mekatronik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217857.

Full text
Abstract:
En övergång till bilar utrustade med avancerade automatiska säkerhetssystem (ADAS) och även utvecklingen mot självkörande fordon innebär ökad trafik på den lokala databussen. Det finns således ett behov av att både minska den faktiska mängden data som överförs, samtidigt som värdet på datat ökas. Data aggregation tillämpas i dagsläget inom områden såsom trådlösasensornätverk och mindre mobila robotar (WMR’s) och skulle kunna vara en del av en lösning. Denna rapport avser undersöka aggregation av sensordata i ett tidskänsligt system. För ett användarfall gällande halka under konvojkörning testa
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!