Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
701
Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program.
Published 2025-01-01“…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
Get full text
Article -
702
Application of novel security technique in cloud environment using attribute dependent authentication for health care
Published 2025-07-01“…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
Get full text
Article -
703
AdaBoost algorithm based on target perturbation
Published 2023-02-01“…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
Get full text
Article -
704
Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification
Published 2024-12-01“…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
Get full text
Article -
705
Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method
Published 2024-11-01“…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
Get full text
Article -
706
Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia
Published 2022-12-01“…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
Get full text
Article -
707
Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study
Published 2025-07-01“…Based on the architecture, a privacy-preserving SL system was established, and we further validated the performance of the model in external verification sets and clinical use. …”
Get full text
Article -
708
Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning
Published 2025-01-01“…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
Get full text
Article -
709
-
710
-
711
Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR
Published 2025-12-01“…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
Get full text
Article -
712
Privacy Matters: Experiences of Rural and Remote Emergency Department Patients – A Mixed-Methods Research Conducted in Newfoundland and Labrador, Canada
Published 2025-02-01“…Methods: This study used a mixed-methods design, gathering quantitative and qualitative data using a telephone survey and semi-structured interviews. …”
Get full text
Article -
713
Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews
Published 2025-06-01“…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
Get full text
Article -
714
Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure
Published 2025-06-01“…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
Get full text
Article -
715
Lessons Learned From European Health Data Projects With Cancer Use Cases: Implementation of Health Standards and Internet of Things Semantic Interoperability
Published 2025-03-01“…These initiatives aim to enhance the analysis of heterogeneous health data while aligning with EHDS implementation, specifically for the EHDS for the secondary use of data (EHDS2). …”
Get full text
Article -
716
Automatisk Nummerpladegenkendelse (ANPG)
Published 2022-04-01“…The wider scope of personal data used in investigations increasingly threatens the right to privacy. …”
Get full text
Article -
717
Estimating rare disease prevalence and costs in the USA: a cohort study approach using the Healthcare Cost Institute claims data
Published 2024-04-01“…Building capabilities to use machine learning to accelerate the diagnosis of RDs would vastly improve with changes to healthcare data, such as standardising data input, linking databases, addressing privacy issues and assigning ICD-10 codes for all RDs, resulting in more robust data for RD analytics.…”
Get full text
Article -
718
Data Protection in Employment: Implications of the Personal Data Protection Act in Tanzania
Published 2025-07-01“…Innovations in technology, their varied uses, and the widespread use of social media have all advanced more quickly than in the past, both globally and in the workplace, where employee and customer data is constantly being collected and digitally documented. …”
Get full text
Article -
719
-
720
Concurrent prescriptions for opioids and benzodiazepines and risk of opioid overdose: protocol for a retrospective cohort study using linked administrative data
Published 2021-02-01“…Our aim was to assess the risk of opioid overdose associated with concurrent use of opioids and benzodiazepines relative to opioids alone.Methods and analysis A retrospective cohort study will be conducted using medical claims data from adult residents of Montréal, Canada. …”
Get full text
Article