Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
701
Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System
Published 2025-06-01“…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
Get full text
Article -
702
FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer
Published 2024-01-01“…As an emerging distributed machine learning technology, federated learning has gained widespread attention due to its critical privacy protection mechanism. However, it also faces challenges such as high communication costs and heterogeneous client data.In order to address the above issues. …”
Get full text
Article -
703
Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data
Published 2025-07-01“…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
Get full text
Article -
704
Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program.
Published 2025-01-01“…Exact and caliper matching were validated using barcodes (available for 34% of records in TIER.Net) as a "gold standard". …”
Get full text
Article -
705
Application of novel security technique in cloud environment using attribute dependent authentication for health care
Published 2025-07-01“…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
Get full text
Article -
706
AdaBoost algorithm based on target perturbation
Published 2023-02-01“…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
Get full text
Article -
707
Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification
Published 2024-12-01“…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
Get full text
Article -
708
Ethical and legal considerations governing use of health data for quality improvement and performance management: a scoping review of the perspectives of health professionals and a...
Published 2025-04-01“…Health administrators additionally emphasised the importance of good governance and data stewardship to improving professional engagement with performance data, but privacy remains a key barrier.Conclusions The growing interest in using health data for quality improvement and performance management requires health services to address barriers to utilisation of performance data. …”
Get full text
Article -
709
Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method
Published 2024-11-01“…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
Get full text
Article -
710
Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia
Published 2022-12-01“…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
Get full text
Article -
711
Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users
Published 2025-08-01“…Wilcoxon signed-rank tests were used to analyze user comfort in sharing data, comparing noninternet- versus internet-based sharing methods and fully versus partially anonymized data. …”
Get full text
Article -
712
Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study
Published 2025-07-01“…BackgroundWhile artificial intelligence (AI) has revolutionized medical diagnostics, conventional centralized AI models for medical image analysis raise critical concerns regarding data privacy and security. Swarm learning (SL), a decentralized machine learning framework, addresses these limitations by enabling collaborative model training through secure parameter aggregation while preserving data locality. …”
Get full text
Article -
713
Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR
Published 2025-12-01“…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
Get full text
Article -
714
-
715
Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning
Published 2025-01-01“…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
Get full text
Article -
716
-
717
Privacy Matters: Experiences of Rural and Remote Emergency Department Patients – A Mixed-Methods Research Conducted in Newfoundland and Labrador, Canada
Published 2025-02-01“…Methods: This study used a mixed-methods design, gathering quantitative and qualitative data using a telephone survey and semi-structured interviews. …”
Get full text
Article -
718
Ethical Considerations in Emotion Recognition Research
Published 2025-05-01“…The framework introduces structural safeguards which include data minimization, adaptive consent mechanisms, and transparent model logic as a more complete solution than privacy or fairness approaches. …”
Get full text
Article -
719
Data Protection in Employment: Implications of the Personal Data Protection Act in Tanzania
Published 2025-07-01“…Innovations in technology, their varied uses, and the widespread use of social media have all advanced more quickly than in the past, both globally and in the workplace, where employee and customer data is constantly being collected and digitally documented. …”
Get full text
Article -
720
Automatisk Nummerpladegenkendelse (ANPG)
Published 2022-04-01“…The wider scope of personal data used in investigations increasingly threatens the right to privacy. …”
Get full text
Article