Showing 2,381 - 2,400 results of 2,784 for search '"\"((((\\"usedddds OR \"useddddddddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.22s Refine Results
  1. 2381

    The State of Artificial Intelligence and its Prospects in Pakistan's Medical Sector by Rohail Akhtar Habib, Yumna Sattar Khan

    Published 2024-12-01
    “…The rising integration of AI in Pakistani medicine necessitates the evolution of regulatory frameworks to guarantee patient safety, data privacy, and ethical application of AI technologies. …”
    Get full text
    Article
  2. 2382

    Revolutionizing Sports: The Role of Wearable Technology and AI in Training and Performance Analysis by Stanisław Dudek, Weronika Koziak, Michalina Makieła, Aleksandra Bętkowska, Agata Kornacka, Wojciech Dudek, Kamila Szostak, Rafał Tomaka, Anna Byra

    Published 2025-03-01
    “…Additionally, AI-driven wearables raise concerns over data security, ethical handling, and equitable access, as high costs limit their use in amateur sports. …”
    Get full text
    Article
  3. 2383

    Human-Centered Design of an mHealth Tool for Optimizing HIV Index Testing in Wartime Ukraine: Formative Research Case Study by Nancy Puttkammer, Elizabeth Dunbar, Myroslava Germanovych, Mariia Rosol, Matthew Golden, Anna Hubashova, Vladyslav Fedorchenko, Larisa Hetman, Liudmyla Legkostup, Jan Flowers, Olena Nesterova

    Published 2025-01-01
    “…CASI-Plus provides client-facing information on APS methods and uses a standardized, self-guided questionnaire with nonjudgmental language for clients to list partners who would benefit from HIV testing. …”
    Get full text
    Article
  4. 2384
  5. 2385

    Analisa Sentimen Financial Technology Peer To Peer Lending Pada Aplikasi Koinworks by Rousyati Rousyati, Windu Gata, Dany Pratmanto, Nia Kusuma Wardhani

    Published 2022-12-01
    “…Reviews contained in the Google Play comments column can be used as a data source that can be shared with data mining. …”
    Get full text
    Article
  6. 2386

    Evaluating new technologies and organizational structures by Ofira Schwartz, Michele Hayslett

    Published 2024-12-01
    “…Co-authors Knut Wenig and Xiaoyao Han are examining the findability of data deposited in data repositories that are using DDI metadata standards. …”
    Get full text
    Article
  7. 2387

    Identification of Factors Affecting the Selection of Women's Gyms by Abbas Naghizadeh-Baghi, Masoud Imanzadeh, Mitra Lalfam, Farzad Nobakht Sareban, Majid Javid

    Published 2021-06-01
    “…The data were analyzed by SPSS26 software using Exploratory Factor Analysis test.Results: The results showed that 44 final characteristics affecting the selection of the gym were factorized into 8 factors by factor analysis and these factors explain 67% of the total variance.Conclusion:   Factors influencing the selection of women's gymnasiums in order of priority include Physical Evidence, process, Place, price, product, People, Promotion and Privacy.…”
    Get full text
    Article
  8. 2388

    Advancing Hematopoietic Stem Cell Transplantation Typing: Harnessing Hyperledger Fabric’s Blockchain Architecture by Meng Wu, Feng Xu, Geetha Subramaniam, Zeyu Li, Liyun Chen, Wenjuan Zhu

    Published 2024-01-01
    “…This innovative approach optimizes user experience, maintains data integrity, and ensures privacy. Future integration with existing databases could enable secure data sharing among healthcare institutions, allowing rapid verification of data ownership and unified authentication. …”
    Get full text
    Article
  9. 2389

    Strengthening health information systems and inherent statistical outputs for improved malaria control and interventions in western Kenya by Taliyah Griffin, Felix Pabon-Rodriguez, Felix Pabon-Rodriguez, George Ayodo, Yan Zhuang

    Published 2025-06-01
    “…Methods such as spatiotemporal models using climate and case data can improve outbreak predictions, while machine learning techniques can optimize insecticide-treated bed net distributions by pinpointing high-risk households. …”
    Get full text
    Article
  10. 2390

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…However, these digital data contain patients’ privacy and may be restricted to authorized users. …”
    Get full text
    Article
  11. 2391

    Pre-class learning assessment on integrating artificial intelligence into evidence-based medicine curriculum by ZUHAER·Yisha, CHEN Xiaowei, CAO Wangnan, WU Shanshan, LIU Junchang, SUN Yumei, WU Tao, ZHAN Siyan, SUN Feng

    Published 2025-05-01
    “…Differences between master’s and doctoral students were analyzed using the Mann-Whitney U test.Results A total of 46 students participated in the survey (34 Masters and below, and 12 PhDs). …”
    Get full text
    Article
  12. 2392

    Exploring Perceived Barriers in the Assessment and Management of Female Sexual Dysfunction: An Integrated Qualitative and Quantitative Study among Trainee Residents by Yogender Kumar Malik, Adwitiya Ray, Sujata Sethi, Rajiv Gupta

    Published 2025-01-01
    “…A total of 92 trainee residents from related medical specialties of psychiatry, gynecology, dermatology, and urology, who provided informed consent, participated in the study. Data were collected using a validated questionnaire regarding perceived barriers related to residents’ knowledge and attitudes toward assessing FSD and a case vignette. …”
    Get full text
    Article
  13. 2393

    Navigating the Ethical Terrain of AI-Generated Text Tools: A Review by Yasir Abdelgadir Mohamed, Abdul Hakim H. M. Mohamed, Akbar Khanan, Mohamed Bashir, Mousab A. E. Adiel, Muawia A. Elsadig

    Published 2024-01-01
    “…Utilitarianism, which seeks to maximize happiness for everyone; deontology, which places an emphasis on right and wrong; and Virtue Ethics, which analyzes the moral nature of deeds and actors, are all included in this framework. In this article, we use this approach to investigate AI ethics from a variety of angles, including privacy, prejudice, and social implications, as well as concerns of justice and fairness. …”
    Get full text
    Article
  14. 2394
  15. 2395

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  16. 2396

    Green banking practices and customer satisfaction-way to green sustainability by Ajaz Akbar Mir, Aijaz Ahmad Bhat, Ahmad Samed Al-Adwan, Summaira Farooq, Dima Jamali, Irshad Ahmad Malik

    Published 2025-04-01
    “…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
    Get full text
    Article
  17. 2397

    Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA by Abdullah Sevin, Abdu Ahmed Osman Mohammed

    Published 2024-12-01
    “…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
    Get full text
    Article
  18. 2398

    Enhancing IoT Security in 5G Networks by Reem Alzhrani, Mohammed Alliheedi

    Published 2024-12-01
    “…We constructed the 5G network infrastructure using OMNeT++ with the INET and Simu5G frameworks. …”
    Get full text
    Article
  19. 2399

    Preferences and Willingness to Pay for Health App Assessments Among Health Care Stakeholders: Discrete Choice Experiment by Anna-Lena Frey, Simon Leigh, Carla Toro, Carme Pratdepàdua Bufill, Charles McCay, Tatjana Prenđa Trupec, Giuseppe D'Avenio, Menno Kok, Antanas Montvila, Philipp Goedecker, Petra Hoogendoorn

    Published 2025-05-01
    “… BackgroundThe adoption of high-quality health apps has been slow, despite the myriad benefits associated with their use. This is partly due to concerns regarding the effectiveness, safety, and data privacy of such apps. …”
    Get full text
    Article
  20. 2400

    Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection by Rafael Abreu, Emanuel Simão, Carlos Serôdio, Frederico Branco, António Valente

    Published 2024-11-01
    “…Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. …”
    Get full text
    Article