Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
1241
Edge-FLGuard: A Federated Learning Framework for Real-Time Anomaly Detection in 5G-Enabled IoT Ecosystems
Published 2025-06-01“…The rapid convergence of 5G networks and Internet of Things (IoT) technologies has unlocked unprecedented connectivity and responsiveness across smart environments—but has also amplified cybersecurity risks due to device heterogeneity, data privacy concerns, and distributed attack surfaces. …”
Get full text
Article -
1242
Cybersecurity Anomaly Detection: AI and Ethereum Blockchain for a Secure and Tamperproof IoHT Data Management
Published 2024-01-01“…Since medical Information Technology (IT) is evolving and data privacy is a major concern with sensors generally, in healthcare IoT. …”
Get full text
Article -
1243
Navigating challenges/opportunities in developing smart agricultural extension platforms: Multi-media data mining techniques
Published 2025-09-01“…Addressing data privacy issues involves adhering to open-access principles and enforcing strict data encryption and anonymization standards. …”
Get full text
Article -
1244
Ethical implications related to processing of personal data and artificial intelligence in humanitarian crises: a scoping review
Published 2025-04-01“…Abstract Background Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. …”
Get full text
Article -
1245
Challenges and strategies in building a foundational digital health data integration ecosystem: a systematic review and thematic synthesis
Published 2025-06-01“…A thematic synthesis approach was used to categorize findings into three primary themes: interoperability, PCC, and genomic data integration.ResultsA total of 161 studies were included. …”
Get full text
Article -
1246
Establishing a Personal Data Protection Agency for E-Commerce in Indonesia: Legal Framework and Implementation Challenges
Published 2024-12-01“…The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
Get full text
Article -
1247
Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing
Published 2025-04-01“…Besides, a Modified Digest hashing algorithm is also used with M-AES for feeding the encrypted text and hash into data blocks. …”
Get full text
Article -
1248
Putting health facilities on the map: a renewed call to create geolocated, comprehensive, updated, openly licensed dataset of health facilities in sub-Saharan African countries
Published 2025-04-01“…Consequently, multiple national and subnational parallel efforts attempt to construct HFDBs, resulting in duplication and lack of governmental input, use, and validation. Main body In this paper, we advocate for a harmonized SSA-wide HFDB. …”
Get full text
Article -
1249
Integrating human biomonitoring exposure data into a primary care morbidity database: a feasibility study
Published 2025-01-01“…Several human biomonitoring (HBM) studies were initiated, gathering cross-sectional exposure data from more than 10,000 participants. The linkage of these HBM data with primary care health registries might be a useful new tool in environmental health analysis. …”
Get full text
Article -
1250
Open Power System Datasets and Open Simulation Engines: A Survey Toward Machine Learning Applications
Published 2025-01-01“…In comparison, power grid datasets face three major challenges: (i) real-world data is often restricted by regulatory constraints, privacy reasons, or security concerns, making it difficult to obtain and work with; (ii) synthetic datasets, which are created to address these limitations, often have incomplete information and are released using specialized tools, making them inaccessible to the broader community; and, (iii) input-output datasets are difficult to generate through simulation for non-experts because open-source simulators are not known outside the power system community. …”
Get full text
Article -
1251
Artificial Intelligence Use in Daily and Professional Life among Pediatric Surgeons in India: A Roadmap for Adoption Based on Online Survey Results
Published 2025-05-01“…Addressing barriers such as ethical concerns, data privacy, and cost could catalyze AI’s potential to revolutionize pediatric surgical care. …”
Get full text
Article -
1252
Assessment of the Quality of Smartphone-Based Applications and Games for Teaching Medical Terminology Using the Mobile Application Rating Scale (MARS)
Published 2024-10-01“…The same checklist was used for data extraction. The quality of apps was measured using the Mobile App Rating Scale (MARS). …”
Get full text
Article -
1253
Self-Supervised Learning Powered by Synthetic Data From Diffusion Models: Application to X-Ray Images
Published 2025-01-01“…Synthetic data offers a compelling solution to the challenges associated with acquiring high-quality medical data, which is often constrained by privacy concerns and limited accessibility. …”
Get full text
Article -
1254
Synthetic data trained open-source language models are feasible alternatives to proprietary models for radiology reporting
Published 2025-07-01“…Abstract The study assessed the feasibility of using synthetic data to fine-tune various open-source LLMs for free text to structured data conversation in radiology, comparing their performance with GPT models. …”
Get full text
Article -
1255
-
1256
An Examination of Human Rights Related to the Protection of Debtor Customer Data and Information Through Bank Secrecy Rules
Published 2025-03-01“… This research aims to examine and analyse how the protection of debtor customer data and information in the perspective of human rights. …”
Get full text
Article -
1257
Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction
Published 2025-01-01“…With the development of cloud computing, reversible data hiding in encrypted images (RDH-EI) technology has gained significant attention in ensuring data security and privacy protection. …”
Get full text
Article -
1258
Algorithmic systems: the consent is in the detail?
Published 2020-03-01“…While these applications are progressively gaining momentum, established data protection and privacy rules have struggled to incorporate the particularities of data-intensive information societies. …”
Get full text
Article -
1259
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
Published 2025-07-01“…By preserving patient data privacy at the edge, FedGCL enhances system resilience without sacrificing model performance. …”
Get full text
Article -
1260
Quantitative and Spatially Explicit Clustering of Urban Grocery Shoppers in Montreal: Integrating Loyalty Data with Synthetic Population
Published 2025-04-01“…While integrating loyalty data with synthetic populations mitigates privacy concerns, challenges remain regarding data sparsity and demographic inconsistencies. …”
Get full text
Article