Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 701 - 720 results of 2,784 for search '"\"((((\\"useds OR \"usedddddds) OR \"usedddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 701

    Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program. by Khumbo Shumba, Jacob Bor, Cornelius Nattey, Dickman Gareta, Evelyn Lauren, William Macleod, Matthew P Fox, Adrian Puren, Koleka Mlisana, Dorina Onoya

    Published 2025-01-01
    “…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
    Get full text
    Article
  2. 702

    Application of novel security technique in cloud environment using attribute dependent authentication for health care by D. Deena Rose, C. Agees Kumar

    Published 2025-07-01
    “…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
    Get full text
    Article
  3. 703

    AdaBoost algorithm based on target perturbation by Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG

    Published 2023-02-01
    “…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
    Get full text
    Article
  4. 704

    Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification by Mbarek Marwan, Abdelkarim Ait Temghart, Said Ouhmi, Mohamed Lazaar

    Published 2024-12-01
    “…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
    Get full text
    Article
  5. 705

    Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method by Shumin Han, Yue Li, Derong Shen, Chuang Wang

    Published 2024-11-01
    “…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
    Get full text
    Article
  6. 706

    Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia by Betül Önay Doğan, Nihal Kocabay Şener, Selçuk Kıran, Hasrina Mustafa

    Published 2022-12-01
    “…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
    Get full text
    Article
  7. 707

    Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study by Yi Xie, Yi Xie, Xinmeng Wang, Huiwen Yang, Huiwen Yang, Jiayao Zhang, Honglin Wang, Zineng Yan, Jiaming Yang, Zhiyuan Yan, Zhiwei Hao, Pengran Liu, Yijie Kuang, Zhewei Ye, Zhewei Ye

    Published 2025-07-01
    “…Based on the architecture, a privacy-preserving SL system was established, and we further validated the performance of the model in external verification sets and clinical use. …”
    Get full text
    Article
  8. 708

    Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning by Yu-Hsiu Lin, Yung-Yao Chen, Shih-Hao Wei

    Published 2025-01-01
    “…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
    Get full text
    Article
  9. 709
  10. 710
  11. 711

    Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR by Oliver M. Tuazon, Bart Custers, Gerrit-Jan Zwenne

    Published 2025-12-01
    “…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
    Get full text
    Article
  12. 712
  13. 713

    Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews by Sabrina Fesl, Caroline Lang, Jochen Schmitt, Stefanie Brückner, Stephen Gilbert, Stefanie Deckert, Madlen Scheibe

    Published 2025-06-01
    “…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
    Get full text
    Article
  14. 714

    Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure by Alex Dhima, Soumya Choudhary, Keris Myrick, John Torous

    Published 2025-06-01
    “…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
    Get full text
    Article
  15. 715
  16. 716

    Automatisk Nummerpladegenkendelse (ANPG) by Tanja Kammersgaard Christensen

    Published 2022-04-01
    “…The wider scope of personal data used in investigations increasingly threatens the right to privacy. …”
    Get full text
    Article
  17. 717

    Estimating rare disease prevalence and costs in the USA: a cohort study approach using the Healthcare Cost Institute claims data by Keith A Crandall, Christine M Cutillo, Ainslie Tisdale, Mahdi Baghbanzadeh, Reva L Stidd, Manpreet S Khural, Laurie J Hartman, Jeff Greenberg, Kevin B Zhang, Ali Rahnavard

    Published 2024-04-01
    “…Building capabilities to use machine learning to accelerate the diagnosis of RDs would vastly improve with changes to healthcare data, such as standardising data input, linking databases, addressing privacy issues and assigning ICD-10 codes for all RDs, resulting in more robust data for RD analytics.…”
    Get full text
    Article
  18. 718

    Data Protection in Employment: Implications of the Personal Data Protection Act in Tanzania by Mark Malekela, Aliko Simon

    Published 2025-07-01
    “…Innovations in technology, their varied uses, and the widespread use of social media have all advanced more quickly than in the past, both globally and in the workplace, where employee and customer data is constantly being collected and digitally documented. …”
    Get full text
    Article
  19. 719
  20. 720

    Concurrent prescriptions for opioids and benzodiazepines and risk of opioid overdose: protocol for a retrospective cohort study using linked administrative data by Kristian B Filion, Robyn Tamblyn, David L Buckeridge, Erin Y Liu

    Published 2021-02-01
    “…Our aim was to assess the risk of opioid overdose associated with concurrent use of opioids and benzodiazepines relative to opioids alone.Methods and analysis A retrospective cohort study will be conducted using medical claims data from adult residents of Montréal, Canada. …”
    Get full text
    Article