Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,401 - 2,420 results of 2,784 for search '"\"((((\\"usedddds OR \"useddddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 2401

    BSVA: blockchain-enabled secured vertical aggregation algorithm for transactions management in drug traceability framework by P. Bhuvaneshwari, Y. Harold Robinson, M. Bagya Lakshmi

    Published 2025-07-01
    “…The Certificate Authority is used to maintain a secure data-sharing process. The robust aggregation is used for the local models to process the chain code, ensuring the successful execution of the secured transaction. …”
    Get full text
    Article
  2. 2402

    Investigating the Applications and Challenges of Metaverse in Education: A Systematic Review by Asadollah Khadivi

    Published 2024-11-01
    “…The research findings indicate that remote learning, immersion learning, collaborative learning, personalized learning, flipped learning, student-centered learning, experiential learning, hybrid learning, mobile learning, simulated learning, skill-based learning and Borderless and question-based learning are the most common uses of metaverse in education. However, the metaverse is associated with technical, ethical and social challenges such as the nascent nature of the technology, high cost of equipment, weak support infrastructure, inaccessibility to everyone, violation of privacy, data and network security, lack of legal guidelines and regulations. …”
    Get full text
    Article
  3. 2403

    Messenger-based assessment of empathic accuracy in couples’ smartphone communication by Philipp Steinebach, Miriam Stein, Knut Schnell

    Published 2025-02-01
    “…Methods Data from N = 102 participants (51 couples) was used to investigate how accurate judgments of partners’ affect map their partners’ actual affect. …”
    Get full text
    Article
  4. 2404

    Optimising resources allocation in implementing school counselling programme at schools in the Ohangwena region by Anna Niitembu Hako, Olaniyi Bojuwoye

    Published 2024-09-01
    “…In-depth semi-structured interviews and focus group discussions were used to gather data. Thematic results revealed that teacher-counsellors had no counselling rooms to conduct individual counselling, no separate budget for school counselling programme, and that file cabinets and display boards were only available in very few schools and were inadequate school-counsellor in schools. …”
    Get full text
    Article
  5. 2405

    Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing by Yuqi Xie, Ruwei Huang, Junbin Qiu

    Published 2025-04-01
    “…Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. …”
    Get full text
    Article
  6. 2406

    Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing by Yun-Yi Fan, Chit-Jie Chew, Jung-San Lee

    Published 2025-05-01
    “…Furthermore, the lack of transparency and credibility in intelligence sources has negatively impacted the quality and trustworthiness of shared data. To address these issues, authors aim to leverage blockchain technology, utilizing its decentralized and tamper-proof properties to ensure corporate privacy and the reliability of intelligence sources. …”
    Get full text
    Article
  7. 2407

    Leveraging Blockchain Technology for Secure 5G Offloading Processes by Cristina Regueiro, Santiago de Diego, Borja Urkizu

    Published 2025-04-01
    “…This paper proposes a Blockchain-based marketplace using Hyperledger Fabric to optimize resource allocation and enhance security. …”
    Get full text
    Article
  8. 2408

    Lightweight Authentication for Devices in Internet of Thing Environment: A Survey by Sameera Abbas Fadhel, Ahmed Sami Nori

    Published 2023-12-01
    “…The extremely large number of associated devices together through different protocols make it vulnerable to be threatened by several types of attacks, such as; Unauthorized Access and Authentication Attacks, Network Attacks, Data Privacy and Integrity Attacks, and Supply Chain Attacks. …”
    Get full text
    Article
  9. 2409

    Customer’s Satisfaction via Online Shopping Environment: The Case of China by GholamReza Zandi, Rezvan Torabi, Mohammad Amin Mohammad, Xu Yi Dan

    Published 2021-07-01
    “…The philosophy of positivism was used to evaluate the online shopping behaviour in a Chinese context. …”
    Get full text
    Article
  10. 2410

    Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger by Assiya Akli, Khalid Chougdali 

    Published 2025-07-01
    “…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
    Get full text
    Article
  11. 2411

    Regulating AI in the Energy Sector: A Scoping Review of EU Laws, Challenges, and Global Perspectives by Bo Nørregaard Jørgensen, Zheng Grace Ma

    Published 2025-05-01
    “…Using the PRISMA-ScR methodology, this scoping review systematically analyzes how EU laws and regulations influence the development, adoption, and deployment of AI-driven digital solutions in energy generation, transmission, distribution, consumption, and markets. …”
    Get full text
    Article
  12. 2412

    Teenage Motherhood and its Effect on the Social Welfare of The Victims: A Case Study of Kabale Municipality. by Kwesiga, Siifa

    Published 2024
    “…Hence the study offers an in-depth analysis of the relative contribution of some socio¬demographic factors in explaining adolescent pregnancy in Kabale Municipality. Using primary data collected from different parts of the district, a sample of 30 female adolescents in the age range of 10-19 years was studied. …”
    Get full text
    Thesis
  13. 2413

    Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3 by Merryana Lestari, Hindriyanto Dwi Purnomo, Irwan Sembiring

    Published 2021-10-01
    “…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
    Get full text
    Article
  14. 2414

    DualBranch-AMR: A Semi-Supervised AMR Method Based on Dual-Student Consistency Regularization with Dynamic Stability Evaluation by Jiankun Ma, Zhenxi Zhang, Linrun Zhang, Yu Li, Haoyue Tan, Xiaoran Shi, Feng Zhou

    Published 2025-07-01
    “…While deep learning has substantially improved the performance of Automatic Modulation Recognition (AMR), it heavily relies on large amounts of labeled data. Given the high annotation costs and privacy concerns, researching semi-supervised AMR methods that leverage readily available unlabeled data for training is of great significance. …”
    Get full text
    Article
  15. 2415

    Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County. by Ayebare, Esther Loy

    Published 2024
    “…These challenges included delays in data entry, limited resources for training, occasionally technical issues, infrastructure, and technological constraints, especially in remote areas, and concerns about data security and patient information privacy. …”
    Get full text
    Thesis
  16. 2416

    Leveraging deep neural network and language models for predicting long-term hospitalization risk in schizophrenia by Yihang Bao, Wanying Wang, Zhe Liu, Weidi Wang, Xue Zhao, Shunying Yu, Guan Ning Lin

    Published 2025-03-01
    “…In this study, we developed a deep learning model that integrates demographic, behavioral, and blood test data from admission to forecast extended hospital stays using a retrospective cohort. …”
    Get full text
    Article
  17. 2417

    Resilience in the Internet of Medical Things: A Review and Case Study by Vikas Tomer, Sachin Sharma, Mark Davis

    Published 2024-11-01
    “…Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. …”
    Get full text
    Article
  18. 2418

    DiReDi: Distillation and Reverse Distillation for AIoT Applications by Chen Sun, Qiang Tong, Wenshuang Yang, Wenqi Zhang

    Published 2024-01-01
    “…When the user needs to update the edge-AI model to better fit the actual scenario, two reverse distillation (RD) processes are employed to extract the knowledge – the difference between user preferences and the manufacturer's presumptions from the edge-AI model using the user's exclusive data. Only the extracted knowledge is reported back to the upper management cloud server to update the cloud AI model, thus protecting user privacy by not using any exclusive data. …”
    Get full text
    Article
  19. 2419

    Alternatives to continuous positive airway pressure treatment in sleep apnoeas and hypopnoeas syndrome related to myofunctional and postural reeducation therapy: protocol for a sys... by Montserrat Solera-Martínez, Blanca Notario-Pacheco, Rocio Palomo-Carrión, Marta Maria Guijarro-Herráiz, Natalia María Arias-Palencia, Lidia Lucas- de la Cruz, Beatriz Guijarro-Herráiz, Jose Luis García-Klepzig

    Published 2021-12-01
    “…Finally, several patient-related outcomes, namely sleep quality, quality of life and sleep Apnoeas and Hypoapnoeas Index, will be examined.Ethics and dissemination In this case, ethical approval is not necessary. The data used in the review will be exclusively obtained from published studies, implying there are no privacy concerns. …”
    Get full text
    Article
  20. 2420

    Information Technology in Nursing Practice: A Scoping Review of Assessment Tools for Evaluating Nurses’ Competencies by Cachata D, Costa M, Magalhães T, Lucas P, Gaspar F

    Published 2025-05-01
    “…This has driven the need to develop specific competencies and maintain a balance between ethical aspects, social and legal challenges related to privacy and data security, as well as the challenge of ensuring person-centered care practice. …”
    Get full text
    Article