Search alternatives:
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
Showing 701 - 720 results of 2,784 for search '(((( usedddds OR useddddds) OR useddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.21s Refine Results
  1. 701

    Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System by Pape Latyr Faye

    Published 2025-06-01
    “…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
    Get full text
    Article
  2. 702

    FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer by Dongyan Wang, Limin Chen, Xiaotong Lu, Yidi Wang, Yue Shen, Jingjing Xu

    Published 2024-01-01
    “…As an emerging distributed machine learning technology, federated learning has gained widespread attention due to its critical privacy protection mechanism. However, it also faces challenges such as high communication costs and heterogeneous client data.In order to address the above issues. …”
    Get full text
    Article
  3. 703

    Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data by Hendra Lijaya, Patricia Ho, Handri Santoso

    Published 2025-07-01
    “…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
    Get full text
    Article
  4. 704

    Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program. by Khumbo Shumba, Jacob Bor, Cornelius Nattey, Dickman Gareta, Evelyn Lauren, William Macleod, Matthew P Fox, Adrian Puren, Koleka Mlisana, Dorina Onoya

    Published 2025-01-01
    “…Exact and caliper matching were validated using barcodes (available for 34% of records in TIER.Net) as a "gold standard". …”
    Get full text
    Article
  5. 705

    Application of novel security technique in cloud environment using attribute dependent authentication for health care by D. Deena Rose, C. Agees Kumar

    Published 2025-07-01
    “…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
    Get full text
    Article
  6. 706

    AdaBoost algorithm based on target perturbation by Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG

    Published 2023-02-01
    “…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
    Get full text
    Article
  7. 707

    Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification by Mbarek Marwan, Abdelkarim Ait Temghart, Said Ouhmi, Mohamed Lazaar

    Published 2024-12-01
    “…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
    Get full text
    Article
  8. 708

    Ethical and legal considerations governing use of health data for quality improvement and performance management: a scoping review of the perspectives of health professionals and a... by Tim Shaw, Kevin Leow, Ian Kerridge, Cameron Stewart, Anna Janssen, Kavisha Shah

    Published 2025-04-01
    “…Health administrators additionally emphasised the importance of good governance and data stewardship to improving professional engagement with performance data, but privacy remains a key barrier.Conclusions The growing interest in using health data for quality improvement and performance management requires health services to address barriers to utilisation of performance data. …”
    Get full text
    Article
  9. 709

    Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method by Shumin Han, Yue Li, Derong Shen, Chuang Wang

    Published 2024-11-01
    “…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
    Get full text
    Article
  10. 710

    Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia by Betül Önay Doğan, Nihal Kocabay Şener, Selçuk Kıran, Hasrina Mustafa

    Published 2022-12-01
    “…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
    Get full text
    Article
  11. 711

    Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users by Anthony James Goodings, Kayode Philip Fadahunsi, Derjung M Tarn, Jennifer Lutomski, Allison Chhor, Frances Shiely, Patrick Henn, John O'Donoghue

    Published 2025-08-01
    “…Wilcoxon signed-rank tests were used to analyze user comfort in sharing data, comparing noninternet- versus internet-based sharing methods and fully versus partially anonymized data. …”
    Get full text
    Article
  12. 712

    Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study by Yi Xie, Yi Xie, Xinmeng Wang, Huiwen Yang, Huiwen Yang, Jiayao Zhang, Honglin Wang, Zineng Yan, Jiaming Yang, Zhiyuan Yan, Zhiwei Hao, Pengran Liu, Yijie Kuang, Zhewei Ye, Zhewei Ye

    Published 2025-07-01
    “…BackgroundWhile artificial intelligence (AI) has revolutionized medical diagnostics, conventional centralized AI models for medical image analysis raise critical concerns regarding data privacy and security. Swarm learning (SL), a decentralized machine learning framework, addresses these limitations by enabling collaborative model training through secure parameter aggregation while preserving data locality. …”
    Get full text
    Article
  13. 713

    Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR by Oliver M. Tuazon, Bart Custers, Gerrit-Jan Zwenne

    Published 2025-12-01
    “…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
    Get full text
    Article
  14. 714
  15. 715

    Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning by Yu-Hsiu Lin, Yung-Yao Chen, Shih-Hao Wei

    Published 2025-01-01
    “…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
    Get full text
    Article
  16. 716
  17. 717
  18. 718

    Ethical Considerations in Emotion Recognition Research by Darlene Barker, Mukesh Kumar Reddy Tippireddy, Ali Farhan, Bilal Ahmed

    Published 2025-05-01
    “…The framework introduces structural safeguards which include data minimization, adaptive consent mechanisms, and transparent model logic as a more complete solution than privacy or fairness approaches. …”
    Get full text
    Article
  19. 719

    Data Protection in Employment: Implications of the Personal Data Protection Act in Tanzania by Mark Malekela, Aliko Simon

    Published 2025-07-01
    “…Innovations in technology, their varied uses, and the widespread use of social media have all advanced more quickly than in the past, both globally and in the workplace, where employee and customer data is constantly being collected and digitally documented. …”
    Get full text
    Article
  20. 720

    Automatisk Nummerpladegenkendelse (ANPG) by Tanja Kammersgaard Christensen

    Published 2022-04-01
    “…The wider scope of personal data used in investigations increasingly threatens the right to privacy. …”
    Get full text
    Article