Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
761
Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme
Published 2025-05-01“…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. …”
Get full text
Article -
762
Ethical Challenges in Blood Donation from Viewpoint of Blood Transfusion Policymakers, Experts and Stakeholders: A Qualitative Study
Published 2025-01-01“…Purposeful sampling and focus group discussion were used to collect data. Data analysis was performed by Graneheim and Lundman inductive content analysis. …”
Get full text
Article -
763
Factors influencing the perceived usability of line pay: An extended technology acceptance model approach
Published 2025-05-01“…Utilizing an extended Technology Acceptance Model (TAM), the research integrated additional variables such as social influence, trust, security, and environmental concerns, offering a comprehensive framework to understand user adoption dynamics. 120 Taiwanese participants were surveyed by employing the Purposive Sampling Method and data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
Get full text
Article -
764
Based on model randomization and adaptive defense for federated learning schemes
Published 2025-02-01“…Abstract Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data. …”
Get full text
Article -
765
Analyzing the concept of solitude with the spatial syntax technique in the spatial organization of rural homes; case Study: Bushehr province
Published 2023-03-01“…In the next stage, graph analysis technique was used to extract data from the drawn maps using tools such as connectivity, relationship, step depth, metric depth, and angle of view with the help of Depth Map software for sample analysis. …”
Get full text
Article -
766
Self-monitoring of health - user viewpoints on gathering data using consumer health technologies during leisure time
Published 2025-06-01“…It focuses on attitudes toward health data collection, data sharing, privacy concerns, and the use of EEG-supported devices.ResultsFindings reveal a complex landscape of trust and concern. …”
Get full text
Article -
767
A data management system for precision medicine.
Published 2025-01-01“…In the AIDPATH project, LogiqCare is used to process patient data, while LogiqScience is used for pseudonymous CAR-T cell production for cancer treatment. …”
Get full text
Article -
768
Medical data sharing and synthetic clinical data generation – maximizing biomedical resource utilization and minimizing participant re-identification risks
Published 2025-08-01“…This article introduces an end-to-end, titratable pipeline that generates privacy-preserving “digital twin” datasets from complex EHR and wearable-device records (Apple Watch data from 3029 participants) using DataSifter and Synthetic Data Vault (SDV) methods. …”
Get full text
Article -
769
Using big data analytics to improve HIV medical care utilisation in South Carolina: A study protocol
Published 2019-07-01“…The RFA is authorised to collect and merge data from these different sources and to ensure the privacy of all PLWH. …”
Get full text
Article -
770
Cybersecurity and Liability in a Big Data World
Published 2018-10-01“…We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use “contractual shields” and escape liability. …”
Get full text
Article -
771
Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing
Published 2023-03-01“…Secondly, the user's privacy may be adequately protected with a secure authentication paradigm that employs ABS to safeguard the user's private data. …”
Get full text
Article -
772
Data Protection in Pre-Tertiary Schools In Ghana
Published 2025-05-01“…The study also identifies a lack of coordination, formal guidance, inadequate consent procedures, and fragmented implementation strategies in data protection practices. Furthermore, the use of varied data protection mechanisms by different schools suggests a lack of standardised security protocols, which is likely to result in security gaps. …”
Get full text
Article -
773
-
774
Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption
Published 2025-06-01“…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
Get full text
Article -
775
Heterogeneous bioinformatic data encryption on portable devices
Published 2025-04-01“…Abstract With the popularity of mobile health monitoring and genome sequencing techniques, the scale of biomedical and genomic data grow rapidly, with their privacy receiving more and more concerns. …”
Get full text
Article -
776
Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study
Published 2025-04-01“…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
Get full text
Article -
777
Blockchain Technology for Secure Patient Data Sharing
Published 2025-05-01“… This paper presents a decentralized healthcare data management system that utilizes blockchain technology to address critical challenges in data security, patient privacy, and interoperability of electronic medical records (EMR). …”
Get full text
Article -
778
Social media in health care- - Ethically challenging - -Dangerous but attractive- -use with caution
Published 2023-09-01Get full text
Article -
779
An efficient secure predictive demand forecasting system using Ethereum virtual machine
Published 2024-12-01“…The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. …”
Get full text
Article -
780
The Venus score for the assessment of the quality and trustworthiness of biomedical datasets
Published 2025-01-01Get full text
Article