Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
541
-
542
Impact of perceived privacy and security in the TAM model: The perceived trust as the mediated factors
Published 2024-11-01Get full text
Article -
543
Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study
Published 2025-04-01“…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
Get full text
Article -
544
Personal Information Sharing Behavior Using Social Media
Published 2025-06-01“…The three-factor (keywords, countries and sources) revealed that the researchers of top countries used mostly six keywords (self-disclosure, social media, privacy, Facebook, social networking sites, and social support) and they preferably published in two major sources. …”
Get full text
Article -
545
-
546
Application of novel security technique in cloud environment using attribute dependent authentication for health care
Published 2025-07-01“…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
Get full text
Article -
547
Mobile Phone Network Data in the COVID-19 era: A systematic review of applications, socioeconomic factors affecting compliance to non-pharmaceutical interventions, privacy implicat...
Published 2025-01-01“…<h4>Background</h4>The use of traditional mobility datasets, such as travel surveys and census data, has significantly impacted various disciplines, including transportation, urban sensing, criminology, and healthcare. …”
Get full text
Article -
548
Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring
Published 2024-12-01“…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
Get full text
Article -
549
Federated learning in food research
Published 2025-10-01“…The use of machine learning in food research is sometimes limited due to data sharing obstacles such as data ownership and privacy requirements. …”
Get full text
Article -
550
Federated meta learning: a review
Published 2023-03-01“…With the popularity of mobile devices, massive amounts of data are constantly produced.The data privacy policies are becoming more and more specified, the flow and use of data are strictly regulated.Federated learning can break data barriers and use client data for modeling.Because users have different habits, there are significant differences between different client data.How to solve the statistical challenge caused by the data imbalance becomes an important topic in federated learning research.Using the fast learning ability of meta learning, it becomes an important way to train different personalized models for different clients to solve the problem of data imbalance in federated learning.The definition and classification of federated learning, as well as the main problems of federated learning were introduced systematically based on the background of federated learning.The main problems included privacy protection, data heterogeneity and limited communication.The research work of federated metalearning in solving the heterogeneous data, the limited communication environment, and improving the robustness against malicious attacks were introduced systematically starting from the background of federated meta learning.Finally, the summary and prospect of federated meta learning were proposed.…”
Get full text
Article -
551
-
552
ETHICAL DIMENSIONS OF HUMAN RESOURCES AUDITING IN THE DIGITAL ERA
Published 2025-03-01Get full text
Article -
553
Federated learning with LSTM for intrusion detection in IoT-based wireless sensor networks: a multi-dataset analysis
Published 2025-03-01“…Using an FL approach, multiple IoT nodes collaboratively train a global LSTM model without exchanging raw data, thereby addressing privacy concerns and improving detection capabilities. …”
Get full text
Article -
554
Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System
Published 2025-06-01“…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
Get full text
Article -
555
FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer
Published 2024-01-01“…After aggregating the model parameters sent by clients, the server performs a second iterative training on the aggregated model using its own metadata, thereby reducing data heterogeneity and improving model performance. …”
Get full text
Article -
556
Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data
Published 2025-07-01“…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
Get full text
Article -
557
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing
Published 2018-05-01“…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
Get full text
Article -
558
Artificial intelligence in neuroimaging: Opportunities and ethical challenges
Published 2024-01-01“…Issues such as algorithmic bias, data privacy, and the interpretability of AI-driven insights must be addressed to ensure that these technologies are used responsibly and equitably. …”
Get full text
Article -
559
Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program.
Published 2025-01-01“…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
Get full text
Article -
560
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01“…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
Get full text
Article