Suggested Topics within your search.
Suggested Topics within your search.
-
1521
A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation
Published 2025-08-01“…ObjectiveThis study aims to develop a QR code–based security transmission algorithm using Avro and byte pair encoding (BPE). The algorithm supports the secure creation and transfer of out-of-hospital health records by enabling patients to scan QR codes via a dedicated mobile app, ensuring data security and user privacy. …”
Get full text
Article -
1522
A blockchain sharding scheme in edge computing
Published 2023-12-01“…The low security and poor privacy of the data in edge computing restrict the development of edge computing.Block chains can provide security for data in edge computing using their own tamper resistance, while protecting privacy by use of traceability.But the bottleneck of blockchain's scalability has become a barrier to their application in the field of edge computing.To solve the problem that blockchain can not meet the needs of a large number of nodes to process data at the same time when applied to edge computing, a two-layer sharding scheme was presented, which meets the needs of edge computing scenarios.Geographic location-based partitioning of nodes was implemented using the improved K-means algorithm, and a local blockchain network consensus (LBNC) algorithm was designed based on the idea of delegated proof of stake (DPoS) and practical Byzantine fault tolerance (PBFT).Simulation results show that the proposed scheme has less delay and higher throughput than those of PBFT, and the total throughput increases with the number of shards.…”
Get full text
Article -
1523
Young people in social networks: scaling social interactions and practices of forming individual media environments (based on regional studies)
Published 2024-06-01“…The obtained data allow to identify the main elements that shape the practices of media using: 1) the choice of digital space of interactions (according to the parameters of publicity-privacy) and the practice of individual combination of social networks and messengers; 2) the number of accounts used; 3) user control over the personal information posted in the profile. …”
Get full text
Article -
1524
-
1525
-
1526
Role of artificial intelligence in healthcare insurance: systematic literature review
Published 2025-04-01“…Privacy presents a challenge in AI, especially because of the widespread use of large data sets and algorithms that could misuse consumer information.…”
Get full text
Article -
1527
What We Know About the Role of Large Language Models for Medical Synthetic Dataset Generation
Published 2025-05-01“…Synthetic medical text generation has emerged as a solution to data scarcity and privacy constraints in clinical NLP. …”
Get full text
Article -
1528
BFS: A blockchain-based financing scheme for logistics company in supply chain finance
Published 2022-12-01“…On the other hand, the massive access to logistics companies’ business information can also lead to privacy leaks. At the same time, the transparency feature of blockchain is used to solve the financing dilemma of many industries in supply chain finance. …”
Get full text
Article -
1529
Ultra-Short-Term Distributed Photovoltaic Power Probabilistic Forecasting Method Based on Federated Learning and Joint Probability Distribution Modeling
Published 2025-01-01“…Existing methods regarding cluster information sharing tend to easily trigger issues of data privacy leakage during information sharing, or they suffer from insufficient information sharing while protecting data privacy, leading to suboptimal forecasting performance. …”
Get full text
Article -
1530
Investigating Awareness and Acceptance of Digital Phenotyping in Dhaka’s Korail Slum: Qualitative Study
Published 2025-06-01“… Abstract BackgroundDigital phenotyping (DP), the process of using data from digital devices, such as smartphones and wearable technology to understand and monitor people’s behavior, health, and daily activities, has shown significant promise in mental health care within high-income countries. …”
Get full text
Article -
1531
A systematic review on artificial intelligence approaches for smart health devices
Published 2024-10-01“…We aim to provide a comprehensive overview of the AI methodologies used, the neural network architectures adopted, and the algorithms employed, as well as examine the privacy and security issues related to the management of health data collected by wearable IoT devices. …”
Get full text
Article -
1532
Solutions of diagnosis of security issues and attacks for storage in cloud computing
Published 2018-08-01“… Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use of cloud computing is an additional source of security risk due to third-party outsourcing, as makes maintaining the privacy, availability and security of data is very difficult. …”
Get full text
Article -
1533
Research on electronic medical record access control based on blockchain
Published 2019-11-01“…First, the appropriate access control strategy is adopted to solve the leakage problem of the user’s medical privacy information during the access process. Then, the information entropy technology is used to quantify the medical data, so that the medical data can be effectively and maximally utilized. …”
Get full text
Article -
1534
Federated and ensemble learning framework with optimized feature selection for heart disease detection
Published 2025-03-01“…To improve classification performance while protecting data privacy, this study investigated a combined method that uses ensemble learning, feature selection, and federated learning (FL). …”
Get full text
Article -
1535
The role of artificial intelligence in education among college instructors: Palestine Technical University Kadoorie as a case study
Published 2025-05-01“…A phenomenological approach as well was conducted to gather information for the qualitative data. Semi-structured interviews with 17 participants were performed with college instructors who use AI in their teaching. …”
Get full text
Article -
1536
πFL: Private, atomic, incentive mechanism for federated learning based on blockchain
Published 2025-06-01“…Federated learning (FL) is predicated on the provision of high-quality data by multiple clients, which is then used to train global models. …”
Get full text
Article -
1537
Insights from the Incheon Airport Case in South Korea: balancing public safety and individual rights with global scalability analysis
Published 2025-07-01“…In pursuit of a comprehensive data governance framework for FRT, we are emphasizing the need to establish a more specific and operable data governance structure, strengthen the Privacy by Design principle, and balance security imperatives with individual rights as key alternatives. …”
Get full text
Article -
1538
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
Get full text
Article -
1539
Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis
Published 2024-12-01“…As a result, five critical challenges have been identified regarding the use of blockchain in healthcare including data privacy/security, scalability, governance, interoperability and standards, and cost.…”
Get full text
Article -
1540
Machine Learning Methods in Customer Segmentation and Recommendation Systems
Published 2025-01-01“…As access to all kinds of data becomes more and more available, the need for people to efficiently classify and extract useful data is urgent, especially for businesses. …”
Get full text
Article