Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
801
Ethical Challenges in Blood Donation from Viewpoint of Blood Transfusion Policymakers, Experts and Stakeholders: A Qualitative Study
Published 2025-01-01“…Purposeful sampling and focus group discussion were used to collect data. Data analysis was performed by Graneheim and Lundman inductive content analysis. …”
Get full text
Article -
802
Factors influencing the perceived usability of line pay: An extended technology acceptance model approach
Published 2025-05-01“…Utilizing an extended Technology Acceptance Model (TAM), the research integrated additional variables such as social influence, trust, security, and environmental concerns, offering a comprehensive framework to understand user adoption dynamics. 120 Taiwanese participants were surveyed by employing the Purposive Sampling Method and data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
Get full text
Article -
803
Based on model randomization and adaptive defense for federated learning schemes
Published 2025-02-01“…Abstract Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data. …”
Get full text
Article -
804
Analyzing the concept of solitude with the spatial syntax technique in the spatial organization of rural homes; case Study: Bushehr province
Published 2023-03-01“…In the next stage, graph analysis technique was used to extract data from the drawn maps using tools such as connectivity, relationship, step depth, metric depth, and angle of view with the help of Depth Map software for sample analysis. …”
Get full text
Article -
805
A data management system for precision medicine.
Published 2025-01-01“…This paper evaluates a MedDMS in five types of use cases for precision medicine, ranging from data collection to algorithm development and from implementation to integration with real-world data. …”
Get full text
Article -
806
Medical data sharing and synthetic clinical data generation – maximizing biomedical resource utilization and minimizing participant re-identification risks
Published 2025-08-01“…This article introduces an end-to-end, titratable pipeline that generates privacy-preserving “digital twin” datasets from complex EHR and wearable-device records (Apple Watch data from 3029 participants) using DataSifter and Synthetic Data Vault (SDV) methods. …”
Get full text
Article -
807
Cybersecurity and Liability in a Big Data World
Published 2018-10-01“…We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use “contractual shields” and escape liability. …”
Get full text
Article -
808
Data Protection in Pre-Tertiary Schools In Ghana
Published 2025-05-01“…The study also identifies a lack of coordination, formal guidance, inadequate consent procedures, and fragmented implementation strategies in data protection practices. Furthermore, the use of varied data protection mechanisms by different schools suggests a lack of standardised security protocols, which is likely to result in security gaps. …”
Get full text
Article -
809
Using electronic health record data to establish a chronic kidney disease surveillance system in China: protocol for the China Kidney Disease Network (CK-NET)-Yinzhou Study
Published 2019-08-01“…The China Kidney Disease Network (CK-NET) was established as a comprehensive surveillance system for CKD using various data sources. As part of this, the proposed CK-NET-Yinzhou study aims to build a regional surveillance system in a developed coastal area in China to obtain detailed dynamic information about kidney disease and to improve the ability to manage the disease effectively.Methods and analysis Yinzhou is a district of Ningbo city, Zhejiang province. …”
Get full text
Article -
810
Heterogeneous bioinformatic data encryption on portable devices
Published 2025-04-01“…Abstract With the popularity of mobile health monitoring and genome sequencing techniques, the scale of biomedical and genomic data grow rapidly, with their privacy receiving more and more concerns. …”
Get full text
Article -
811
Blockchain Technology for Secure Patient Data Sharing
Published 2025-05-01“… This paper presents a decentralized healthcare data management system that utilizes blockchain technology to address critical challenges in data security, patient privacy, and interoperability of electronic medical records (EMR). …”
Get full text
Article -
812
The Venus score for the assessment of the quality and trustworthiness of biomedical datasets
Published 2025-01-01Get full text
Article -
813
GraphXplore: Visual exploration and accessible preprocessing of medical data
Published 2025-02-01“…It enables explainable, easy-to-use exploratory data analysis paired with dataset preparation and metadata annotation accessible for physicians. …”
Get full text
Article -
814
MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM
Published 2025-01-01“…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
Get full text
Article -
815
Mannaging medical records with blockchain
Published 2025-07-01“…Therefore, the goal of this work is to evaluate, through a systematic literature review (SLR), the use of blockchain to guarantee data privacy and security in e-Health systems. …”
Get full text
Article -
816
A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol
Published 2022-07-01“…Hence, public cloud storage auditing is critical, so users can use a Third-party auditor (TPA) to verify data integrity. …”
Get full text
Article -
817
Edge Computing and Cloud Computing for Internet of Things: A Review
Published 2024-09-01“…These hybrid models optimize bandwidth use and support low-latency, privacy-sensitive applications in IoT ecosystems. …”
Get full text
Article -
818
Patient Confidentiality of Electronic Health Records: A Recent Review of the Saudi Literature
Published 2022-07-01“…Background Health systems harbor lucrative data that can be targeted for illegal access, thus posing a serious privacy breach. …”
Get full text
Article -
819
Modelling Users` Trust in Online Social Networks
Published 2014-02-01“…We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS) based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks) explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. …”
Get full text
Article -
820
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
Get full text
Article