Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedddds » \\"useddddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
701
A data flow process for confidential data and its application in a health research project.
Published 2022-01-01“…However, using healthcare data for secondary purposes raises legal and ethical concerns relating to confidentiality, privacy and data protection rights. …”
Get full text
Article -
702
EXPLORING USER PERSPECTIVES ON THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN FINANCIAL TECHNOLOGY
Published 2024-12-01“…Structural equation modeling was employed to study the relationships between the adoption of fintech AI and its predictors, namely Perceived Usefulness, Perceived Privacy and Security, Perceived Ease of Use, and Satisfaction of Fintech AI. …”
Get full text
Article -
703
Rich Data Versus Quantity of Data in Code Generation AI: A Paradigm Shift for Healthcare
Published 2025-06-01“…Using Self-Evolving Software (SES) as a case study, the research contrasts outcomes from both paradigms and proposes a weighted matrix for data selection in Code Gen AI systems. …”
Get full text
Article -
704
-
705
Can synthetic data be a proxy for real clinical trial data? A validation study
Published 2021-04-01“…However, data availability remains a challenge due to complex privacy requirements. …”
Get full text
Article -
706
A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks
Published 2014-01-01“…To support privacy-preserving data aggregation and integrity checking, our technique makes use of the additive property of complex numbers. …”
Get full text
Article -
707
A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain
Published 2023-12-01“…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
Get full text
Article -
708
A federated LSTM network for load forecasting using multi-source data with homomorphic encryption
Published 2025-03-01“…These challenges drive the adoption of federated learning (FL) to address issues related to data silos and privacy. In this paper, a novel framework for short-term load forecasting was proposed using historical data from industries such as power, meteorology, and finance. …”
Get full text
Article -
709
Analysis of Service Quality in Smart Running Applications Using Big Data Text Mining Techniques
Published 2024-11-01Get full text
Article -
710
GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence
Published 2025-08-01“…Federated learning is incorporated to maintain data privacy by training models locally on each device without sharing raw data. …”
Get full text
Article -
711
Investigating Sensitive Issues in Class Through Randomized Response Polling
Published 2024-10-01“…This article provides an introduction to randomized response polling, a technique which was designed to allow for questioning on sensitive issues while protecting the respondent’s privacy and avoiding social desirability bias. It is described in terms that are suitable for presentation and use in any classroom environment. …”
Get full text
Article -
712
Predictive Model to Analyse Real and Synthetic Data for Learners' Performance Prediction Using Regression Techniques
Published 2025-03-01“…Real-world data availability is often hampered by privacy concerns, prompting a shift towards synthetic data generation. …”
Get full text
Article -
713
Federated Learning Model Using CBDPL for Medical Image Segmentation
Published 2025-01-01Get full text
Article -
714
Efficient Keyset Design for Neural Networks Using Homomorphic Encryption
Published 2025-07-01Get full text
Article -
715
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
Published 2023-12-01“… Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. …”
Get full text
Article -
716
Secure healthcare data sharing and attack detection framework using radial basis neural network
Published 2025-05-01“…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
Get full text
Article -
717
Face-to-Face Interactions Estimated Using Mobile Phone Data to Support Contact Tracing Operations
Published 2024-12-01Get full text
Article -
718
Respiratory Rate Estimation from Thermal Video Data Using Spatio-Temporal Deep Learning
Published 2024-10-01“…Thermal videos provide a privacy-preserving yet information-rich data source for remote health monitoring, especially for respiration rate (RR) estimation. …”
Get full text
Article -
719
‘Over Time Everyone’s Gonna Be Open to It’: User Attitudes Toward Security and Privacy in Continuous Authentication for Smart Homes
Published 2025-01-01“…Participants also envisioned CA systems that offer more granular permission controls over personal data. Our findings indicate the contextual dependencies in balancing usability with privacy and security concerns. …”
Get full text
Article -
720
Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring
Published 2024-12-01“…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
Get full text
Article