Showing 1,521 - 1,540 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.19s Refine Results
  1. 1521

    A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation by Changzhen Li, Zhigeng Jin, Fei Wang, Zheqi Zhang, Binbin Liu, Yutao Guo

    Published 2025-08-01
    “…ObjectiveThis study aims to develop a QR code–based security transmission algorithm using Avro and byte pair encoding (BPE). The algorithm supports the secure creation and transfer of out-of-hospital health records by enabling patients to scan QR codes via a dedicated mobile app, ensuring data security and user privacy. …”
    Get full text
    Article
  2. 1522

    A blockchain sharding scheme in edge computing by Jun WANG, Jianwei MA, Jinxi LUO

    Published 2023-12-01
    “…The low security and poor privacy of the data in edge computing restrict the development of edge computing.Block chains can provide security for data in edge computing using their own tamper resistance, while protecting privacy by use of traceability.But the bottleneck of blockchain's scalability has become a barrier to their application in the field of edge computing.To solve the problem that blockchain can not meet the needs of a large number of nodes to process data at the same time when applied to edge computing, a two-layer sharding scheme was presented, which meets the needs of edge computing scenarios.Geographic location-based partitioning of nodes was implemented using the improved K-means algorithm, and a local blockchain network consensus (LBNC) algorithm was designed based on the idea of delegated proof of stake (DPoS) and practical Byzantine fault tolerance (PBFT).Simulation results show that the proposed scheme has less delay and higher throughput than those of PBFT, and the total throughput increases with the number of shards.…”
    Get full text
    Article
  3. 1523

    Young people in social networks: scaling social interactions and practices of forming individual media environments (based on regional studies) by Dmitrii V. Zernov, Nadezhda V. Shalyutina

    Published 2024-06-01
    “…The obtained data allow to identify the main elements that shape the practices of media using: 1) the choice of digital space of interactions (according to the parameters of publicity-privacy) and the practice of individual combination of social networks and messengers; 2) the number of accounts used; 3) user control over the personal information posted in the profile. …”
    Get full text
    Article
  4. 1524

    Social media law and ethics / by Lipschultz, Jeremy Harris, 1958-

    Published 2022
    View in OPAC
    Book
  5. 1525

    Social media law and ethics / by Lipschultz, Jeremy Harris, 1958-

    Published 2022
    View in OPAC
    Book
  6. 1526

    Role of artificial intelligence in healthcare insurance: systematic literature review by Ahmed Ali Alkhelb, Salah Alshagrawi

    Published 2025-04-01
    “…Privacy presents a challenge in AI, especially because of the widespread use of large data sets and algorithms that could misuse consumer information.…”
    Get full text
    Article
  7. 1527

    What We Know About the Role of Large Language Models for Medical Synthetic Dataset Generation by Larissa Montenegro, Luis M. Gomes, José M. Machado

    Published 2025-05-01
    “…Synthetic medical text generation has emerged as a solution to data scarcity and privacy constraints in clinical NLP. …”
    Get full text
    Article
  8. 1528

    BFS: A blockchain-based financing scheme for logistics company in supply chain finance by Jia Fu, Bangcan Cao, Xiaoliang Wang, Pengjie Zeng, Wei Liang, Yuzhen Liu

    Published 2022-12-01
    “…On the other hand, the massive access to logistics companies’ business information can also lead to privacy leaks. At the same time, the transparency feature of blockchain is used to solve the financing dilemma of many industries in supply chain finance. …”
    Get full text
    Article
  9. 1529

    Ultra-Short-Term Distributed Photovoltaic Power Probabilistic Forecasting Method Based on Federated Learning and Joint Probability Distribution Modeling by Yubo Wang, Chao Huo, Fei Xu, Libin Zheng, Ling Hao

    Published 2025-01-01
    “…Existing methods regarding cluster information sharing tend to easily trigger issues of data privacy leakage during information sharing, or they suffer from insufficient information sharing while protecting data privacy, leading to suboptimal forecasting performance. …”
    Get full text
    Article
  10. 1530

    Investigating Awareness and Acceptance of Digital Phenotyping in Dhaka’s Korail Slum: Qualitative Study by Nadia Alam, Domenico Giacco, Bulbul Siddiqi, Swaran P Singh, Sagar Jilka

    Published 2025-06-01
    “… Abstract BackgroundDigital phenotyping (DP), the process of using data from digital devices, such as smartphones and wearable technology to understand and monitor people’s behavior, health, and daily activities, has shown significant promise in mental health care within high-income countries. …”
    Get full text
    Article
  11. 1531

    A systematic review on artificial intelligence approaches for smart health devices by Lerina Aversano, Martina Iammarino, Ilaria Mancino, Debora Montano

    Published 2024-10-01
    “…We aim to provide a comprehensive overview of the AI methodologies used, the neural network architectures adopted, and the algorithms employed, as well as examine the privacy and security issues related to the management of health data collected by wearable IoT devices. …”
    Get full text
    Article
  12. 1532

    Solutions of diagnosis of security issues and attacks for storage in cloud computing by Ahmed Ibrahim Turki, Qasim Mohammed Hussein

    Published 2018-08-01
    “… Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use of cloud computing is an additional source of security risk due to third-party outsourcing, as makes maintaining the privacy, availability and security of data is very difficult. …”
    Get full text
    Article
  13. 1533

    Research on electronic medical record access control based on blockchain by Yongbin Zhao, Meng Cui, Lijuan Zheng, Rui Zhang, Lili Meng, Dong Gao, Yu Zhang

    Published 2019-11-01
    “…First, the appropriate access control strategy is adopted to solve the leakage problem of the user’s medical privacy information during the access process. Then, the information entropy technology is used to quantify the medical data, so that the medical data can be effectively and maximally utilized. …”
    Get full text
    Article
  14. 1534

    Federated and ensemble learning framework with optimized feature selection for heart disease detection by Olfa Hrizi, Karim Gasmi, Abdulrahman Alyami, Adel Alkhalil, Ibrahim Alrashdi, Ali Alqazzaz, Lassaad Ben Ammar, Manel Mrabet, Alameen E.M. Abdalrahman, Samia Yahyaoui

    Published 2025-03-01
    “…To improve classification performance while protecting data privacy, this study investigated a combined method that uses ensemble learning, feature selection, and federated learning (FL). …”
    Get full text
    Article
  15. 1535

    The role of artificial intelligence in education among college instructors: Palestine Technical University Kadoorie as a case study by Reham Salhab

    Published 2025-05-01
    “…A phenomenological approach as well was conducted to gather information for the qualitative data. Semi-structured interviews with 17 participants were performed with college instructors who use AI in their teaching. …”
    Get full text
    Article
  16. 1536

    πFL: Private, atomic, incentive mechanism for federated learning based on blockchain by Kejia Chen, Jiawen Zhang, Xuanming Liu, Zunlei Feng, Xiaohu Yang

    Published 2025-06-01
    “…Federated learning (FL) is predicated on the provision of high-quality data by multiple clients, which is then used to train global models. …”
    Get full text
    Article
  17. 1537

    Insights from the Incheon Airport Case in South Korea: balancing public safety and individual rights with global scalability analysis by Haesung Lee, Eunsoo Kim, Do Hyun Park

    Published 2025-07-01
    “…In pursuit of a comprehensive data governance framework for FRT, we are emphasizing the need to establish a more specific and operable data governance structure, strengthen the Privacy by Design principle, and balance security imperatives with individual rights as key alternatives. …”
    Get full text
    Article
  18. 1538

    Electronic invoice public verification scheme based on SM2 coalition signature algorithm by Yurong LUO, Jin CAO, Hui LI, Xingwen ZHAO, Chao SHANG

    Published 2022-04-01
    “…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
    Get full text
    Article
  19. 1539

    Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis by Mohammad Mehraeen, Laya Mahmoudi

    Published 2024-12-01
    “…As a result, five critical challenges have been identified regarding the use of blockchain in healthcare including data privacy/security, scalability, governance, interoperability and standards, and cost.…”
    Get full text
    Article
  20. 1540

    Machine Learning Methods in Customer Segmentation and Recommendation Systems by Guo Yiran

    Published 2025-01-01
    “…As access to all kinds of data becomes more and more available, the need for people to efficiently classify and extract useful data is urgent, especially for businesses. …”
    Get full text
    Article