Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"usedds » \"useddds (Expand Search)
-
541
-
542
Impact of perceived privacy and security in the TAM model: The perceived trust as the mediated factors
Published 2024-11-01Get full text
Article -
543
Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study
Published 2025-04-01“…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
Get full text
Article -
544
Personal Information Sharing Behavior Using Social Media
Published 2025-06-01“…This study explores personal information sharing behavior publication patterns and trends on social media from 2007-2024 with an aim to highlight the annual growth of personal information sharing behavior (PISB) on social media platforms, key patterns in the PISB literature in terms of frequently cited authors, countries, institutions, sources, highly cited papers, collaboration and authorship patterns, thematic evolution, keyword and key factor analysis (such as countries, sources, and keywords). We used Scopus database for data extraction, and 1020 pertinent records were chosen. …”
Get full text
Article -
545
-
546
Application of novel security technique in cloud environment using attribute dependent authentication for health care
Published 2025-07-01“…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
Get full text
Article -
547
Mobile Phone Network Data in the COVID-19 era: A systematic review of applications, socioeconomic factors affecting compliance to non-pharmaceutical interventions, privacy implicat...
Published 2025-01-01“…<h4>Background</h4>The use of traditional mobility datasets, such as travel surveys and census data, has significantly impacted various disciplines, including transportation, urban sensing, criminology, and healthcare. …”
Get full text
Article -
548
Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring
Published 2024-12-01“…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
Get full text
Article -
549
Federated learning in food research
Published 2025-10-01“…The use of machine learning in food research is sometimes limited due to data sharing obstacles such as data ownership and privacy requirements. …”
Get full text
Article -
550
Federated meta learning: a review
Published 2023-03-01“…With the popularity of mobile devices, massive amounts of data are constantly produced.The data privacy policies are becoming more and more specified, the flow and use of data are strictly regulated.Federated learning can break data barriers and use client data for modeling.Because users have different habits, there are significant differences between different client data.How to solve the statistical challenge caused by the data imbalance becomes an important topic in federated learning research.Using the fast learning ability of meta learning, it becomes an important way to train different personalized models for different clients to solve the problem of data imbalance in federated learning.The definition and classification of federated learning, as well as the main problems of federated learning were introduced systematically based on the background of federated learning.The main problems included privacy protection, data heterogeneity and limited communication.The research work of federated metalearning in solving the heterogeneous data, the limited communication environment, and improving the robustness against malicious attacks were introduced systematically starting from the background of federated meta learning.Finally, the summary and prospect of federated meta learning were proposed.…”
Get full text
Article -
551
-
552
ETHICAL DIMENSIONS OF HUMAN RESOURCES AUDITING IN THE DIGITAL ERA
Published 2025-03-01Get full text
Article -
553
Federated learning with LSTM for intrusion detection in IoT-based wireless sensor networks: a multi-dataset analysis
Published 2025-03-01“…Using an FL approach, multiple IoT nodes collaboratively train a global LSTM model without exchanging raw data, thereby addressing privacy concerns and improving detection capabilities. …”
Get full text
Article -
554
Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System
Published 2025-06-01“…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
Get full text
Article -
555
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01“…It then uses blockchain technology for recording unalterable data of identity and access management while Zero-Knowledge Proofs (ZKP) ensures authentication and verification without revealing sensitive information. …”
Get full text
Article -
556
FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer
Published 2024-01-01“…After aggregating the model parameters sent by clients, the server performs a second iterative training on the aggregated model using its own metadata, thereby reducing data heterogeneity and improving model performance. …”
Get full text
Article -
557
Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data
Published 2025-07-01“…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
Get full text
Article -
558
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing
Published 2018-05-01“…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
Get full text
Article -
559
Artificial intelligence in neuroimaging: Opportunities and ethical challenges
Published 2024-01-01“…Issues such as algorithmic bias, data privacy, and the interpretability of AI-driven insights must be addressed to ensure that these technologies are used responsibly and equitably. …”
Get full text
Article -
560
Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program.
Published 2025-01-01“…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
Get full text
Article