Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1001
Digital twins, synthetic patient data, and in-silico trials: can they empower paediatric clinical trials?
Published 2025-05-01“…However, such digital innovations have been rarely used in paediatric trials. In this Viewpoint, we propose using virtual patient data to empower paediatric trials. …”
Get full text
Article -
1002
HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes
Published 2024-01-01“…Furthermore, the scheme supports attribute revocation and forward secrecy to enhance user privacy. The security of HA-Med is rigorously verified through theoretical analysis, and its feasibility is demonstrated through experiments conducted using the Java-based JPBC library.…”
Get full text
Article -
1003
Harnessing multi-source data for AI-driven oncology insights: Productivity, trend, and sentiment analysis
Published 2025-03-01“…The most prominent article emphasized the Explainability of AI methods (XAI) with a profound discussion of their potential implications and privacy in data fusion contexts. Current trends involve the utilization of supervised learning methods such as CNN, Bayesian networks, and extreme learning machines for various cancers, particularly breast, lung, brain, and skin cancer. …”
Get full text
Article -
1004
Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
Published 2025-01-01“…Data breaches in the government sector are severe threats to cybersecurity and illegal acts that flagrantly violate security and privacy laws. …”
Get full text
Article -
1005
GABs: A Game-Based Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks
Published 2015-03-01“…The content herein models homogeneous WSN environment of highly linked nodes, in a theoretical game with synchronized actions, where, in order to transmit their readings securely across the network in some level of hierarchy, using the technique of data aggregation, sensor nodes with communication and computational resources constraint should establish trusted and direct links between their neighbors for the privacy and integrity of their data against faulty nodes, while ensuring energy saving. …”
Get full text
Article -
1006
Using fuzzy decision support to create a positive mental health environment for preschoolers
Published 2025-04-01“…To assess their mental health before starting school, preschoolers need early detection, intervention, and assessment. However, data shortages, heterogeneity, privacy issues, model interpretability, and generalization restrictions hamper the review process. …”
Get full text
Article -
1007
Impact of Normalization Techniques on Synthetic Load Profile Generation Using Deep Generative Models
Published 2025-01-01“…However, the impact of data normalization on their performance remains insufficiently explored. …”
Get full text
Article -
1008
Security access permission authentication simulation of multi-source network big data based on blockchain
Published 2024-02-01“…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
Get full text
Article -
1009
Using electronic health record data to establish a chronic kidney disease surveillance system in China: protocol for the China Kidney Disease Network (CK-NET)-Yinzhou Study
Published 2019-08-01“…The China Kidney Disease Network (CK-NET) was established as a comprehensive surveillance system for CKD using various data sources. As part of this, the proposed CK-NET-Yinzhou study aims to build a regional surveillance system in a developed coastal area in China to obtain detailed dynamic information about kidney disease and to improve the ability to manage the disease effectively.Methods and analysis Yinzhou is a district of Ningbo city, Zhejiang province. …”
Get full text
Article -
1010
F-DATA: A Fugaku Workload Dataset for Job-centric Predictive Modelling in HPC Systems
Published 2025-07-01“…The encoding is based on a Natural Language Processing model and retains sensitive but useful job information for prediction purposes without violating privacy concerns.…”
Get full text
Article -
1011
CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data Generation
Published 2025-02-01“…It employs a data generator that integrates artificially generated data with the existing data from local clients by employing label correction and data generation techniques. …”
Get full text
Article -
1012
Next Arrival and Destination Prediction via Spatiotemporal Embedding with Urban Geography and Human Mobility Data
Published 2025-02-01“…In this paper, we develop an embedding method to predict the next arrival using the origin–destination (O-D) pair trajectory information and point of interest (POI) data. …”
Get full text
Article -
1013
How machine learning on real world clinical data improves adverse event recording for endoscopy
Published 2025-07-01“…This study evaluates a machine learning-based approach for systematically detecting endoscopic adverse events from real-world clinical metadata, including structured hospital data such as ICD-codes and procedure timings. Using a random forest classifier detecting adverse events perforation, bleeding, and readmission, we analysed 2490 inpatient cases, achieving significant improvements over baseline prediction accuracy. …”
Get full text
Article -
1014
Evolution, topics and relevant research methodologies in business intelligence and data analysis in the academic management of higher education institutions. A literature review
Published 2025-03-01“…In the digital era, Business Intelligence (BI) and data analytics have become essential for optimizing academic management in higher education institutions. …”
Get full text
Article -
1015
Automated redaction of names in adverse event reports using transformer-based neural networks
Published 2024-12-01“…Because the Yellow Card data contained few names, we used predictive models to select narratives for training. …”
Get full text
Article -
1016
Unraveling the role of data sharing in open finance diffusion: an evolutionary game approach on complex networks
Published 2025-05-01“…In this study, we develop a diffusion model using evolutionary game theory on complex networks to explore how data sharing influences lenders’ micro-level decision-making and promotes the macro-level diffusion of open finance. …”
Get full text
Article -
1017
Making trauma ecological momentary assessment studies FAIR: review of design considerations and data procedures
Published 2025-12-01“…Many challenges remain for the implementation of these practices including balancing privacy concerns and efforts to make trauma EMA data readily shareable.…”
Get full text
Article -
1018
Boosting EEG and ECG Classification with Synthetic Biophysical Data Generated via Generative Adversarial Networks
Published 2024-11-01“…By addressing the challenges of limited biophysical data, including privacy concerns and restricted volunteer availability, our model generates realistic synthetic waveforms learned from real data. …”
Get full text
Article -
1019
A Robust Image Encryption Protocol for Secure Data Sharing in Brain Computer Interface Applications
Published 2025-01-01“…However, the susceptibility of BCI data to tampering during transmission underscores the critical need for robust security and privacy measures. …”
Get full text
Article -
1020
An Adaptive Window Size Selection Method for Differentially Private Data Publishing over Infinite Trajectory Stream
Published 2018-01-01“…Differential privacy techniques are being used as a de facto standard to prevent such privacy violation caused by data analysis. …”
Get full text
Article