Suggested Topics within your search.
Suggested Topics within your search.
-
1361
Exploring Current Practices and Challenges of HIPAA Compliance in Software Engineering: Scoping Review
Published 2024-01-01“…Healthcare systems and applications are increasingly used to improve patient care. However, these applications face data security, privacy, and regulatory compliance challenges. …”
Get full text
Article -
1362
Harnessing Moderate-Sized Language Models for Reliable Patient Data Deidentification in Emergency Department Records: Algorithm Development, Validation, and Implementation Study
Published 2025-04-01“… Abstract BackgroundThe digitization of health care, facilitated by the adoption of electronic health records systems, has revolutionized data-driven medical research and patient care. While this digital transformation offers substantial benefits in health care efficiency and accessibility, it concurrently raises significant concerns over privacy and data security. …”
Get full text
Article -
1363
FLPneXAINet: Federated deep learning and explainable AI for improved pneumonia prediction utilizing GAN-augmented chest X-ray data.
Published 2025-01-01“…Additionally, the need to protect patient privacy complicates the sharing of sensitive clinical data. …”
Get full text
Article -
1364
Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration
Published 2024-11-01“…The mechanism uses the cuckoo filter technology to effectively reduce the computational complexity and ensures the authenticity and integrity of data transmission and use through data retrieval integrity verification. …”
Get full text
Article -
1365
Ethical Design of Data-Driven Decision Support Tools for Improving Cancer Care: Embedded Ethics Review of the 4D PICTURE Project
Published 2025-04-01“…There are myriad ethical issues to consider as the project will create data-driven prognostic models and develop conversation tools using artificial intelligence while including patient perspectives by setting up boards of experiential experts in 8 different countries. …”
Get full text
Article -
1366
Big Data Analytics for Mental Health Education: A New Framework for University-Level Evaluation under Linguistic Confidence Interval Neutrosophic Numbers
Published 2025-05-01“…Ten criteria—including accessibility, awareness, analytics integration, and data ethics—are used to evaluate a diverse set of intervention alternatives ranging from AI-based detection systems to immersive VR training. …”
Get full text
Article -
1367
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
1368
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
1369
Characterizing the neighborhood risk environment in multisite clinic-based cohort studies: A practical geocoding and data linkages protocol for protected health information.
Published 2022-01-01“…<h4>Background</h4>Maintaining patient privacy when geocoding and linking residential address information with neighborhood-level data can create challenges during research. …”
Get full text
Article -
1370
FedCVG: a two-stage robust federated learning optimization algorithm
Published 2025-05-01“…Abstract Federated learning provides an effective solution to the data privacy issue in distributed machine learning. …”
Get full text
Article -
1371
Automatic Traffic Data Collection under Varying Lighting and Temperature Conditions in Multimodal Environments: Thermal versus Visible Spectrum Video-Based Systems
Published 2017-01-01“…Vision-based monitoring systems using visible spectrum (regular) video cameras can complement or substitute conventional sensors and provide rich positional and classification data. …”
Get full text
Article -
1372
A Framework for Full Decentralization in Blockchain Interoperability
Published 2024-11-01Get full text
Article -
1373
Private information in public spaces: Facial recognition in the times of smart urban governance
Published 2021-02-01“…Prior work: In order to accomplish so, this article analyzes this phenomenon from a capitalism surveillance framework perspective, in light of international data protection standards and with a primary focus on the analysis of the processing of citizens' data in the provision of public services Approach: The main approaches used are literature review and case studies. …”
Get full text
Article -
1374
Integration of smart sensors and IOT in precision agriculture: trends, challenges and future prospectives
Published 2025-05-01“…Precision agriculture presents a viable solution by optimizing resource use, enhancing efficiency, and fostering sustainable practices through data-driven decision-making supported by advanced sensors and Internet of Things (IoT) technologies. …”
Get full text
Article -
1375
Developing a data-informed care planning improvement intervention in long-term care in Nova Scotia: protocol for an advisory-led interpretive qualitative study
Published 2025-05-01“…This study aims to develop a data-informed care planning improvement intervention that uses routinely collected data to guide resident-centred care planning in LTC. …”
Get full text
Article -
1376
ChatGPT and Artificial Intelligence in Hospital Level Research: Potential, Precautions, and Prospects
Published 2023-11-01“…Furthermore, the review discusses the ethical considerations that arise with AI use in health care, including data privacy, AI interpretability, and the risk of AI-induced disparities. …”
Get full text
Article -
1377
Opportunities, challenges, and interventions for agriculture 4.0 adoption
Published 2025-08-01“…Major obstacles include high initial investment costs, fragmented land holdings, diverse cropping systems, limited farmer awareness, lack of technical skills, inadequate digital literacy, complex AI algorithms, unreliable infrastructure, insufficient high-quality training data, poor internet connectivity, data privacy concerns, and a lack of supportive government policies. …”
Get full text
Article -
1378
Application of artificial intelligence in triage in emergencies and disasters: a systematic review
Published 2024-11-01“…Implementing intelligent triage systems faced challenges such as trust issues, training needs, equipment shortages, and data privacy concerns. Conclusion Developing assessment systems using artificial intelligence enables timely treatment and better resuscitation services for people injured in disasters. …”
Get full text
Article -
1379
Local large language model‐assisted literature mining for on‐surface reactions
Published 2025-03-01“…Herein, we introduce a method for extracting scientific data from unstructured texts using a local LLM, exemplifying its applications to scientific literatures on the topic of on‐surface reactions. …”
Get full text
Article -
1380
Blockchain-enabled cross-border insurance: from legal issues, solution design, to implementation
Published 2024-05-01“…However, when it comes to cross-border insurance service, current solutions fall short in effectively navigating the legal and compliance complexities inherent in cross-border insurance service delivery. When transmitting data across borders, it is essential to adhere to the legal requirements of cross-border laws and regulations, especially considering the variations in regional data protection and privacy legislation. …”
Get full text
Article