期刊文献+
共找到5,734篇文章
< 1 2 250 >
每页显示 20 50 100
Challenges and strategies of Thailand's personal data protection act in Traditional Chinese Medicine clinical research
1
作者 WAN Gengxin ZHAO Ye ZHANG Meihong 《Journal of Traditional Chinese Medicine》 2025年第6期1435-1436,共2页
The development of Traditional Chinese Medicine(TCM)in Thailand can be traced back to the Sukhothai Kingdom period in the 13th century,which was introduced by immigrants.In 1995,the Ministry of Public Health in Thaila... The development of Traditional Chinese Medicine(TCM)in Thailand can be traced back to the Sukhothai Kingdom period in the 13th century,which was introduced by immigrants.In 1995,the Ministry of Public Health in Thailand established the Thai-Chinese Medicine Exchange Center to specifically support the development of TCM.In 1997,the health departments of Thailand and China signed a Memorandum of Understanding regarding cooperation in the fields of health sciences and pharmaceuticals. 展开更多
关键词 clinical research development traditional chinese medicine tcm Sukhothai kingdom Chinese medicine personal data protection act health sciences traditional chinese medicine
原文传递
Changing the whole game:effects of the COVID-19 pandemic's accelerated digitalization on European bank staff's data protection capabilities
2
作者 Ine van Zeeland Jo Pierson 《Financial Innovation》 2024年第1期3296-3323,共28页
The COVID-19 pandemic accelerated the acceptance of digital banking services such as online payment and banking apps.As bank clients become more likely to use online services and contactless payment,the amount of cons... The COVID-19 pandemic accelerated the acceptance of digital banking services such as online payment and banking apps.As bank clients become more likely to use online services and contactless payment,the amount of consumer data available for banks’digitalization strategies has increased.This acceleration in digital banking has placed a spotlight on retail banks’efforts to protect personal data.Bank staff are on the frontlines of both protecting personal data and communicating their banks’efforts in this respect to maintain consumer trust.Our study aimed to answer the following question:How did the sudden increase in digitalization during the pandemic affect bank staff’s capabilities in protecting personal data?In a two-stage qualitative study,we collected empirical data on bank staff’s data protection efforts during accelerated digitalization.Analyzing our findings from the perspective of technological mediation theory,which focuses on the relationships between technologies,practices,and social arrangements,we found that in banking platformization,bank staff are disempowered in supporting clients,who are responsibilized for protecting themselves from fraud.Competitive pressures push retail banks into using client data in ways beyond sector norms,endangering the contextual integrity of data flows.Further,our findings show that digitalization presents bank clients with new risks,of which they are informed only after changing their banking practices,and it may be difficult to return to former arrangements.The application of mediation theory,combined with contextual integrity theory,clarified the shifting positions of different digital technology users in the infrastructural network of platformized banking and allowed for an in-depth analysis of conflicting interests.By clarifying these interests,difficulties were identified that need to be addressed in public policy and digital innovation projects to prevent loss of trust among bank clients. 展开更多
关键词 DIGITALIZATION PANDEMIC BANKS Privacy and data protection Bank staff
在线阅读 下载PDF
The COVID-19 and the“European Solution”of Data-based Approach to Governance:Public Security or Data Protection?
3
作者 刘洋 李益斌 NIU Huizi(Translated) 《The Journal of Human Rights》 2022年第3期483-503,共21页
To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussio... To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection. 展开更多
关键词 European solution data-based approach to governance data protection public security
原文传递
Study on Setting up and Improving China’s Drug Testing Data Protection System
4
作者 Li Sirui Yuan Xiaoliang Dong Li 《Asian Journal of Social Pharmacy》 2026年第1期92-97,共6页
Objective To study the drug test data protection system in foreign countries,and to foster pharmaceutical innovation and increase drug accessibility in China.Methods The development history of drug test data protectio... Objective To study the drug test data protection system in foreign countries,and to foster pharmaceutical innovation and increase drug accessibility in China.Methods The development history of drug test data protection was analyzed to examine and evaluate China’s current drug test data protection system so as to offer recommendations for its improvement.Finally,the drug test data protection system in China can be officially implemented.Results and Conclusion The drug test data protection system aims to promote innovation by protecting the trial data of innovative drugs.In a broad sense,this belongs to intellectual property protection,but it is different from patent protection.Although China has established a drug testing data protection system after joining the“Agreement on Trade-Related Aspects of Intellectual Property Rights(TRIPS)”,the relevant provisions and regulations have not yet been formally formed,and the system has not yet been implemented.Therefore,some suggestions for improving China’s drug testing data protection system are proposed to achieve good social benefits. 展开更多
关键词 drug test data drug test data protection system TRIPS
暂未订购
Perception of privacy and data protection in the context of the development of artificial intelligence 被引量:6
5
作者 Grzegorz Mazurek Karolina Małagocka 《Journal of Management Analytics》 EI 2019年第4期344-364,共21页
Customer privacy perception and the principles of its regulatory protection determine how the tech sector is operating,striking a new balance between economic winners and losers.Nevertheless,not all countries that are... Customer privacy perception and the principles of its regulatory protection determine how the tech sector is operating,striking a new balance between economic winners and losers.Nevertheless,not all countries that are leaders in the latest technologies are strongly in favor of flexible and pro-business regulations.This can be clearly seen in the field of artificial intelligence(AI).Self-regulation as a key strategic approach to AI may be seen as an essential factor of broader implementation of AI solutions.The purpose of this paper is to present approaches to AI while indicating the differences that result from the understanding of privacy,increasing customers privacy concerns and regulations related to data privacy which come together with official administrative strategies.The impact of AI implementation on relationships between customers and companies has been emphasized and analyzed in the context of regulations and customer perception of privacy. 展开更多
关键词 artificial intelligence online privacy data privacy data protection
原文传递
A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication 被引量:4
6
作者 Bo Zhao Yu Xiao +1 位作者 Yuqing Huang Xiaoyu Cui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期218-225,共8页
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka... In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security. 展开更多
关键词 embedded system TrustZone Trusted Application(TA) identity authentication private data protection
原文传递
An attribute-based access control scheme using blockchain technology for IoT data protection
7
作者 Zenghui Yang Xiubo Chen +5 位作者 Yunfeng He Luxi Liu Yinmei Che Xiao Wang Ke Xiao Gang Xu 《High-Confidence Computing》 EI 2024年第3期41-50,共10页
With the wide application of the Internet of Things(IoT),storing large amounts of IoT data and protecting data privacy has become a meaningful issue.In general,the access control mechanism is used to prevent illegal u... With the wide application of the Internet of Things(IoT),storing large amounts of IoT data and protecting data privacy has become a meaningful issue.In general,the access control mechanism is used to prevent illegal users from accessing private data.However,traditional data access control schemes face some non-ignorable problems,such as only supporting coarse-grained access control,the risk of centralization,and high trust issues.In this paper,an attribute-based data access control scheme using blockchain technology is proposed.To address these problems,attribute-based encryption(ABE)has become a promising solution for encrypted data access control.Firstly,we utilize blockchain technology to construct a decentralized access control scheme,which can grant data access with transparency and traceability.Furthermore,our scheme also guarantees the privacy of policies and attributes on the blockchain network.Secondly,we optimize an ABE scheme,which makes the size of system parameters smaller and improves the efficiency of algorithms.These optimizations enable our proposed scheme supports large attribute universe requirements in IoT environments.Thirdly,to prohibit attribute impersonation and attribute replay attacks,we design a challenge-response mechanism to verify the ownership of attributes.Finally,we evaluate the security and performance of the scheme.And comparisons with other related schemes show the advantages of our proposed scheme.Compared to existing schemes,our scheme has more comprehensive advantages,such as supporting a large universe,full security,expressive policy,and policy hiding. 展开更多
关键词 Attribute-based encryption Access control Blockchain IoT data protection
在线阅读 下载PDF
PERSONAL DATA PROTECTION: RETHINKING THE REASONS, NATURE, AND LEGAL FRAMEWORK
8
作者 DING Xiaodong 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2018年第3期380-389,共10页
This paper rethinks the reasons for and the nature and means of personal data protection. The reasons for personal data protection are that it could promote the fairness and effectiveness of information flow, help ind... This paper rethinks the reasons for and the nature and means of personal data protection. The reasons for personal data protection are that it could promote the fairness and effectiveness of information flow, help individuals develop their independent personality, and equip them to deal with risks. With respect to the nature of personal data, this paper argues that such data should not be perceived from a purely individualistic point of view. Rather, there should be a contextualized understanding of the data, which considers the appropriate information flow of personal data within a particular context. Regarding the legal framework of personal data protection, this paper suggests that consumer protection law and public law are better equipped to protect personal data than tort, contract, or property law. 展开更多
关键词 PRIVACY data protection CONTEXT information flow INDIVIDUALISM
原文传递
To Whom Do Data Belong?——Data Ownership and Protection in the Context of Web-Crawlers
9
作者 Ding Xiaodong Ryan(翻译) 《Contemporary Social Sciences》 2020年第6期134-155,共22页
Platform data has already become an important asset for web-based companies,but this sort of data frequently includes large amounts of personal information.Platform data can be seen as belonging to an individual,belon... Platform data has already become an important asset for web-based companies,but this sort of data frequently includes large amounts of personal information.Platform data can be seen as belonging to an individual,belonging to a platform,belonging to some combinations of the two,or can be seen as a form of Internet-based public data.Analysis of legal clauses and doctrines as well as analysis based in legitimacy and consequentialism both fail to completely delineate data ownership.One potential reason for this is that there are many types of platform data,and that each type is highly dependent on circumstances.The determination of rights in regard to platform data should be done in a way which revolves around a contextual regulatory framework,one in which the rules of reason is applied on a case-by-case basis and in which gradual changes are done in a bottom-up manner,and not one which seeks to establish a universal set of data regulations.In actual judgments,factors such as the nature of the platform and the nature of the data crawling behavior should be comprehensively considered while ensuring a balance of data circulation and data protection. 展开更多
关键词 data ownership data protection web-crawling unfair competition
在线阅读 下载PDF
Cyber Security-Protecting Personal Data
10
作者 Kevin McCormack Mary Smyth 《Journal of Mathematics and System Science》 2021年第2期18-29,共12页
Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This... Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This is an important issue for big data holders such as public sector organizations(e.g.,Public Health Organizations)and social media companies.This paper looks at how individuals can be identified from big data using a mathematical approach and how to apply this mathematical solution to prevent accidental disclosure of a person’s details.The mathematical concept is known as the“Identity Correlation Approach”(ICA)and demonstrates how an individual can be identified without a name or address using a unique set of characteristics(variables).Secondly,having identified the individual person,it shows how a solution can be put in place to prevent accidental disclosure of the personal details.Thirdly,how to store data such that accidental leaks of the datasets do not lead to the disclosure of the personal details to unauthorized users. 展开更多
关键词 data protection big data identity correlation approach cyber security data privacy.
在线阅读 下载PDF
Access and Privacy Control for Healthcare Decision Support System:A Smart Medical Data Exchange Engine(SMDEE)
11
作者 Imran Khan Javed Rashid +3 位作者 Anwar Ghani Muhammad Shoaib Saleem Muhammad Faheem Humera Khan 《CAAI Transactions on Intelligence Technology》 2025年第6期1616-1632,共17页
Secure and automated sharing of medical information among different medical entities/stakeholders like patients,hospitals,doctors,law enforcement agencies,health insurance companies etc.,in a standard format has alway... Secure and automated sharing of medical information among different medical entities/stakeholders like patients,hospitals,doctors,law enforcement agencies,health insurance companies etc.,in a standard format has always been a challenging problem.Current methods for ensuring compliance with medical privacy laws require specialists who are deeply familiar with these laws'complex requirements to verify the lawful exchange of medical information.This article introduces a Smart Medical Data Exchange Engine(SDEE)designed to automate the extracting of logical rules from medical privacy legislation using advanced techniques.These rules facilitate the secure extraction of information,safeguarding patient privacy and confidentiality.In addition,SMDEE can generate standardised clinical documents according to Health Level 7(HL7)standards and also standardise the nomenclature of requested medical data,enabling accurate decision-making when accessing patient data.All access requests to patient information are processed through SMDEE to ensure authorised access.The proposed system's efficacy is evaluated using the Health Insurance Portability and Accountability Act(HIPAA),a fundamental privacy law in the United States.However,SMDEE's flexibility allows its application worldwide,accommodating various medical privacy laws.Beyond facilitating global information exchange,SMDEE aims to enhance international patients'timely and appropriate treatment. 展开更多
关键词 data protection decision making information retrieval intelligent information processing medical applications privacy issues security security of data
在线阅读 下载PDF
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain 被引量:4
12
作者 Ze Xu Sanxing Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期861-881,共21页
Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemin... Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data.However,it also faces serious problems in terms of protecting user and data privacy.Many privacy protectionmethods have been proposed to solve the problemof privacy leakage during the process of data sharing,but they suffer fromtwo flaws:1)the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;2)the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection,resulting in long encryption and decryption times.In this paper,we propose a multi-source data privacy protection method based on homomorphic encryption and blockchain technology,which solves the privacy protection problem ofmulti-source heterogeneous data in the dissemination ofmedia and reduces ciphertext processing time.We deployed the proposedmethod on theHyperledger platformfor testing and compared it with the privacy protection schemes based on k-anonymity and differential privacy.The experimental results showthat the key generation,encryption,and decryption times of the proposedmethod are lower than those in data privacy protection methods based on k-anonymity technology and differential privacy technology.This significantly reduces the processing time ofmulti-source data,which gives it potential for use in many applications. 展开更多
关键词 Homomorphic encryption blockchain technology multi-source data data privacy protection privacy data processing
在线阅读 下载PDF
Residential Energy Consumption Forecasting Based on Federated Reinforcement Learning with Data Privacy Protection
13
作者 You Lu Linqian Cui +2 位作者 YunzheWang Jiacheng Sun Lanhui Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期717-732,共16页
Most studies have conducted experiments on predicting energy consumption by integrating data formodel training.However, the process of centralizing data can cause problems of data leakage.Meanwhile,many laws and regul... Most studies have conducted experiments on predicting energy consumption by integrating data formodel training.However, the process of centralizing data can cause problems of data leakage.Meanwhile,many laws and regulationson data security and privacy have been enacted, making it difficult to centralize data, which can lead to a datasilo problem. Thus, to train the model while maintaining user privacy, we adopt a federated learning framework.However, in all classical federated learning frameworks secure aggregation, the Federated Averaging (FedAvg)method is used to directly weight the model parameters on average, which may have an adverse effect on te model.Therefore, we propose the Federated Reinforcement Learning (FedRL) model, which consists of multiple userscollaboratively training the model. Each household trains a local model on local data. These local data neverleave the local area, and only the encrypted parameters are uploaded to the central server to participate in thesecure aggregation of the global model. We improve FedAvg by incorporating a Q-learning algorithm to assignweights to each locally uploaded local model. And the model has improved predictive performance. We validatethe performance of the FedRL model by testing it on a real-world dataset and compare the experimental results withother models. The performance of our proposed method in most of the evaluation metrics is improved comparedto both the centralized and distributed models. 展开更多
关键词 Energy consumption forecasting federated learning data privacy protection Q-LEARNING
在线阅读 下载PDF
The Influence of Abnormal Data on Relay Protection 被引量:1
14
作者 Xuze Zhang Xiaoning Kang +2 位作者 Yali Ma Hao Wang Qiyue Huang 《Energy and Power Engineering》 2017年第4期95-101,共7页
The parameters of abnormal data are defined and their influence on the original data and Fourier Algorithm is studied. A formula is proposed to quantify how the abnormal data influences the amplitude calculated by Fou... The parameters of abnormal data are defined and their influence on the original data and Fourier Algorithm is studied. A formula is proposed to quantify how the abnormal data influences the amplitude calculated by Fourier Algorithm. Two simulation models are established in Matlab to study the influence of abnormal data on relay protection. The simulation results show that the abnormal data can make distance protection extend the fault’s influence and make over current protection start by error. 展开更多
关键词 RELAY protectION ABNORMAL data FOURIER ALGORITHM
在线阅读 下载PDF
Privacy Cost Analysis and Privacy Protection Based on Big Data 被引量:1
15
作者 ZHOU Qiang YUE Kaixu DUAN Yao 《Journal of Donghua University(English Edition)》 EI CAS 2019年第1期96-105,共10页
A comprehensive analysis of the impact privacy incidents on its market value is given.A broad set of instances of the exposure of personal information from a summary of some security mechanisms and the corresponding r... A comprehensive analysis of the impact privacy incidents on its market value is given.A broad set of instances of the exposure of personal information from a summary of some security mechanisms and the corresponding results are presented. The cumulative effect increases in magnitude over day following the breach announcement, but then decreases. Besides, a new privacy protection property, that is, p-sensitive k-anonymity is presented in this paper to protect against identity disclosure. We illustrated the inclusion of the two necessary conditions in the algorithm for computing a p-k-minimal generalization. Algorithms such as k-anonymity and l-diversity remain all sensitive attributes intact and apply generalization and suppression to the quasi-identifiers. This will keep the data "truthful" and provide good utility for data-mining applications, while achieving less perfect privacy. We aim to get the problem based on the prior analysis, and study the issue of privacy protection from the perspective of the model-benefit. 展开更多
关键词 PRIVACY SECURITY ECONOMICS PRIVACY protectION BIG data
在线阅读 下载PDF
The Information Protection in Automatic Reconstruction of Not Continuous Geophysical Data Series 被引量:1
16
作者 Osvaldo Faggioni 《Journal of Data Analysis and Information Processing》 2019年第4期208-227,共20页
We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the infor... We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the information acquired before and after the interruption by means of a numerical protocol with the lowest possible calculation weight. The signal reconstruction process is based on the synthesis of the low frequency signal extracted for subsampling (subsampling &#8711Dirac = ΔT in phase with ΔT) with the high frequency signal recorded before the crash. The SYRec (SYnthetic REConstruction) method for simplicity and speed of calculation and for spectral response stability is particularly effective in the studies of high speed transient phenomena that develop in very perturbed fields. This operative condition is found a mental when almost immediate informational responses are required to the observation system. In this example we are dealing with geomagnetic data coming from an uw counter intrusion magnetic system. The system produces (on time) information about the transit of local magnetic singularities (magnetic perturbations with low spatial extension), originated by quasi-point form and kinematic sources (divers), in harbors magnetic underwater fields. The performances of stability of the SYRec system make it usable also in long and medium period of observation (activity of geomagnetic observatories). 展开更多
关键词 Geomatic GEOMAGNETISM Not Continuous data SERIES Synthetic RECONSTRUCTION protection of the PHYSIC Informations data Manipulation
在线阅读 下载PDF
Development of data acquisition and over-current protection systems for a suppressor-grid current with a neutral-beam ion source
17
作者 刘伟 胡纯栋 +5 位作者 刘胜 宋士花 汪金新 王艳 赵远哲 梁立振 《Plasma Science and Technology》 SCIE EI CAS CSCD 2017年第12期154-158,共5页
Neutral beam injection is one of the effective auxiliary heating methods in magnetic-confinementfusion experiments. In order to acquire the suppressor-grid current signal and avoid the grid being damaged by overheatin... Neutral beam injection is one of the effective auxiliary heating methods in magnetic-confinementfusion experiments. In order to acquire the suppressor-grid current signal and avoid the grid being damaged by overheating, a data acquisition and over-current protection system based on the PXI(PCI e Xtensions for Instrumentation) platform has been developed. The system consists of a current sensor, data acquisition module and over-current protection module. In the data acquisition module,the acquired data of one shot will be transferred in isolation and saved in a data-storage server in a txt file. It can also be recalled using NBWave for future analysis. The over-current protection module contains two modes: remote and local. This gives it the function of setting a threshold voltage remotely and locally, and the forbidden time of over-current protection also can be set by a host PC in remote mode. Experimental results demonstrate that the data acquisition and overcurrent protection system has the advantages of setting forbidden time and isolation transmission. 展开更多
关键词 neutral beam injection high-current ion source suppression grid current data acquisition and protection system
在线阅读 下载PDF
Application and Research of Meteorological Data in Lightning Protection Technical Service of Oil Depot
18
作者 Liu Fengjiao He Qiuyan +2 位作者 Tang Yao Su Kai Liu Yueyu 《Meteorological and Environmental Research》 CAS 2019年第1期26-30,共5页
In this paper,lightning protection technical service of oil depot is taken as research object. It is proposed using various meteorological data to carry out multiple lightning protection technical services( risk asses... In this paper,lightning protection technical service of oil depot is taken as research object. It is proposed using various meteorological data to carry out multiple lightning protection technical services( risk assessment,potential forecast,monitoring and early warning of lightning disasters) based on conventional detection of lightning protection system,to improve technical content of lightning protection service and benefits of disaster prevention and mitigation. It mainly analyzes the application of lightning monitoring data in pre-assessment of lightning disaster,to guide site selection of new oil depot; guidance of lightning disaster status assessment on regular inspection of lightning protection system,to determine lightning protection detection time and update and maintenance time of lightning protection system; potential prediction and early warning of lightning,to guide daily operation of oil depot. 展开更多
关键词 METEOROLOGICAL data OIL DEPOT LIGHTNING protectION
在线阅读 下载PDF
A Compound Relay Protection Operation Criterion Based on Kirchhoff’s Current Law and Abnormal Data Detecting Algorithm
19
作者 Xuze Zhang Xiaoning Kang +2 位作者 Hao Wang Qiyue Huang Yali Ma 《Energy and Power Engineering》 2017年第4期88-94,共7页
A compound relay protection operation criterion is proposed based on Kirchhoff’s Current Law and abnormal data detecting algorithm. The abnormal data detecting algorithm are proposed after deep research on the abnorm... A compound relay protection operation criterion is proposed based on Kirchhoff’s Current Law and abnormal data detecting algorithm. The abnormal data detecting algorithm are proposed after deep research on the abnormal data properties. The current transformer status monitoring system and current phase angle detecting system is introduced. A simulation model containing different power sources and loads is established in Matlab. The simulation results show that this compound criterion can work quickly and reliably in all conditions. 展开更多
关键词 RELAY protection ABNORMAL data Smart SUBSTATION
暂未订购
On the Right to the Protection of Personal Data as a Constitutional Right
20
作者 戴激涛 LIU Zhao(Translated) 《The Journal of Human Rights》 2021年第5期851-874,共24页
The right to the protection of personal data is an important human right in the era of big data and a constitutional right based on the national protection obligation and the theory of human dignity,making it of speci... The right to the protection of personal data is an important human right in the era of big data and a constitutional right based on the national protection obligation and the theory of human dignity,making it of special significance for the realization of citizenship in a digital society.It can be seen from an examination of the constitutional texts of various countries in the world that the right to the protection of personal data as a constitutional right has rich normative connotations,and the key legal link to realize this right lies in the national legislature actively fulfilling its obligation to shape and specify the protection of personal data in accordance with the entrustment of the constitutional norms.Given the constitutional principles of fundamental rights protection,i.e.,realizing the constitutional status of the right to the protection of personal data as a basic right by means of institutional guarantees,the legislature should first adhere to the constitutionality principle of data protection legislation.Second,a multi-level data protection legal system centered on the right to the protection of personal data should be established.Finally,the institutional guarantee mechanism for the protection of personal data should be continuously improved through constitutional interpretation. 展开更多
关键词 the right to the protection of personal data constitutional rights institutional guarantees constitutional principles constitutional interpretations
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部