Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1081
How participation in deliberative engagement affects awareness of, and attitudes towards, genomics research and data sharing: evidence from rural Ghana
Published 2025-07-01“…Using a quasi-experimental one-group pretest-posttest design, 66 participants completed a baseline survey assessing awareness of genomic research and attitudes toward data sharing. …”
Get full text
Article -
1082
Is Anonymization Through Discretization Reliable? Modeling Latent Probability Distributions for Ordinal Data as a Solution to the Small Sample Size Problem
Published 2024-10-01“…The growing interest in data privacy and anonymization presents challenges, as traditional methods such as ordinal discretization often result in information loss by coarsening metric data. …”
Get full text
Article -
1083
Tanggung Jawab Perusahaan Terhadap Kebocoran Data Pribadi Dari Penggunaan Teknologi Robotic Process Automation (RPA) Menurut Hukum Positif di Indonesia
Published 2025-08-01“…This research uses a normative juridical research type. The data used in this research are secondary data consisting of primary legal materials and secondary legal materials. …”
Get full text
Article -
1084
Healthcare provision for displaced people in transit: Analyses of routinely collected data from INTERSOS clinics at the Ukrainian border with Moldova and Poland
Published 2025-01-01“…Results: This study used routinely collected data from 1756 patients. …”
Get full text
Article -
1085
FLPneXAINet: Federated deep learning and explainable AI for improved pneumonia prediction utilizing GAN-augmented chest X-ray data.
Published 2025-01-01“…Additionally, the need to protect patient privacy complicates the sharing of sensitive clinical data. …”
Get full text
Article -
1086
Harnessing Moderate-Sized Language Models for Reliable Patient Data Deidentification in Emergency Department Records: Algorithm Development, Validation, and Implementation Study
Published 2025-04-01“… Abstract BackgroundThe digitization of health care, facilitated by the adoption of electronic health records systems, has revolutionized data-driven medical research and patient care. While this digital transformation offers substantial benefits in health care efficiency and accessibility, it concurrently raises significant concerns over privacy and data security. …”
Get full text
Article -
1087
Exploring Current Practices and Challenges of HIPAA Compliance in Software Engineering: Scoping Review
Published 2024-01-01“…Healthcare systems and applications are increasingly used to improve patient care. However, these applications face data security, privacy, and regulatory compliance challenges. …”
Get full text
Article -
1088
Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration
Published 2024-11-01“…The mechanism uses the cuckoo filter technology to effectively reduce the computational complexity and ensures the authenticity and integrity of data transmission and use through data retrieval integrity verification. …”
Get full text
Article -
1089
Ethical Design of Data-Driven Decision Support Tools for Improving Cancer Care: Embedded Ethics Review of the 4D PICTURE Project
Published 2025-04-01“…There are myriad ethical issues to consider as the project will create data-driven prognostic models and develop conversation tools using artificial intelligence while including patient perspectives by setting up boards of experiential experts in 8 different countries. …”
Get full text
Article -
1090
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
1091
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
1092
FedCVG: a two-stage robust federated learning optimization algorithm
Published 2025-05-01“…Abstract Federated learning provides an effective solution to the data privacy issue in distributed machine learning. …”
Get full text
Article -
1093
Big Data Analytics for Mental Health Education: A New Framework for University-Level Evaluation under Linguistic Confidence Interval Neutrosophic Numbers
Published 2025-05-01“…Ten criteria—including accessibility, awareness, analytics integration, and data ethics—are used to evaluate a diverse set of intervention alternatives ranging from AI-based detection systems to immersive VR training. …”
Get full text
Article -
1094
Characterizing the neighborhood risk environment in multisite clinic-based cohort studies: A practical geocoding and data linkages protocol for protected health information.
Published 2022-01-01“…<h4>Background</h4>Maintaining patient privacy when geocoding and linking residential address information with neighborhood-level data can create challenges during research. …”
Get full text
Article -
1095
Automatic Traffic Data Collection under Varying Lighting and Temperature Conditions in Multimodal Environments: Thermal versus Visible Spectrum Video-Based Systems
Published 2017-01-01“…Vision-based monitoring systems using visible spectrum (regular) video cameras can complement or substitute conventional sensors and provide rich positional and classification data. …”
Get full text
Article -
1096
A Framework for Full Decentralization in Blockchain Interoperability
Published 2024-11-01Get full text
Article -
1097
ChatGPT and Artificial Intelligence in Hospital Level Research: Potential, Precautions, and Prospects
Published 2023-11-01“…Furthermore, the review discusses the ethical considerations that arise with AI use in health care, including data privacy, AI interpretability, and the risk of AI-induced disparities. …”
Get full text
Article -
1098
Private information in public spaces: Facial recognition in the times of smart urban governance
Published 2021-02-01“…Prior work: In order to accomplish so, this article analyzes this phenomenon from a capitalism surveillance framework perspective, in light of international data protection standards and with a primary focus on the analysis of the processing of citizens' data in the provision of public services Approach: The main approaches used are literature review and case studies. …”
Get full text
Article -
1099
Developing a data-informed care planning improvement intervention in long-term care in Nova Scotia: protocol for an advisory-led interpretive qualitative study
Published 2025-05-01“…This study aims to develop a data-informed care planning improvement intervention that uses routinely collected data to guide resident-centred care planning in LTC. …”
Get full text
Article -
1100
Opportunities, challenges, and interventions for agriculture 4.0 adoption
Published 2025-08-01“…Major obstacles include high initial investment costs, fragmented land holdings, diverse cropping systems, limited farmer awareness, lack of technical skills, inadequate digital literacy, complex AI algorithms, unreliable infrastructure, insufficient high-quality training data, poor internet connectivity, data privacy concerns, and a lack of supportive government policies. …”
Get full text
Article