Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,821 - 1,840 results of 2,784 for search '"\"((((\\"usedddds OR \"useddddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.16s Refine Results
  1. 1821

    Advancing Remote Monitoring for Patients With Alzheimer Disease and Related Dementias: Systematic Review by Mohmmad Arif Shaik, Fahim Islam Anik, Md. Mehedi Hasan, Sumit Chakravarty, Mary Dioise Ramos, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Nazmus Sakib

    Published 2025-05-01
    “…The studies revealed a strong focus on various remote monitoring methods for capturing behavioral, physiological, and environmental data yet showed a gap in evaluating these methods for patient and caregiver needs, privacy, and usability. …”
    Get full text
    Article
  2. 1822

    Measuring large-scale social networks with high resolution. by Arkadiusz Stopczynski, Vedran Sekara, Piotr Sapiezynski, Andrea Cuttone, Mette My Madsen, Jakob Eg Larsen, Sune Lehmann

    Published 2014-01-01
    “…Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1000 individuals, using state-of-the-art smartphones as social sensors. …”
    Get full text
    Article
  3. 1823

    A scoping review of digital health technologies in multimorbidity management: mechanisms, outcomes, challenges, and strategies by Aklilu Endalamaw, Anteneh Zewdie, Eskinder Wolka, Yibeltal Assefa

    Published 2025-03-01
    “…PubMed, Scopus, Web of Science, EMBASE, and Google Scholar were used to search articles. Data extraction focused on study characteristics, types of health technologies, mechanisms, outcomes, challenges, and facilitators. …”
    Get full text
    Article
  4. 1824

    Bridging Technology and Justice: The Role of AI in Law Enforcement through Pancasila’s Ideals by Wijayanti Annisa Tunjung, Anggraeni Dita Septia, Dewi Dyah Adriantini Sintha, Hakim Hary Abdul, Kurniaty Yulia, Basri, Setiawati Diana

    Published 2025-01-01
    “…The findings reveal that while AI has the potential to enhance the effectiveness of law enforcement, it also carries significant risks, such as violating individual privacy. This study recommends incorporating Pancasila values into AI system design by ensuring diversity in the data used, increasing transparency, and establishing clear ethical guidelines and regulations. …”
    Get full text
    Article
  5. 1825

    A Novel Federated Learning Framework for Sustainable and Efficient Breast Cancer Classification System (FL-L<sub>2</sub>CNN-BCDet) by Nesma Abd El-Mawla, Mohamed A. Berbar, Nawal A. El-Fishawy, Mohamed A. El-Rashidy

    Published 2024-01-01
    “…The proposed DL architecture employs attention mechanisms, convolutional layers, and LSTMs to extract and analyze features and uses techniques to prevent overfitting and manage imbalanced data. …”
    Get full text
    Article
  6. 1826

    The Role of Artificial Intelligence in the Diagnosis and Management of Rheumatoid Arthritis by Adriana Liliana Vlad, Corina Popazu, Alina-Maria Lescai, Doina Carina Voinescu, Alexia Anastasia Ștefania Baltă

    Published 2025-04-01
    “…Although less frequently mentioned, data privacy concerns remained relevant for a subset of respondents. …”
    Get full text
    Article
  7. 1827

    Internet of Medical Things Integrating IoT with Healthcare for Remote Monitoring and Diagnosis by R Suganya, P Sasikala, Lavanya Chinthamalla, Rashid Syed Zahidur, Tiwari Mohit, G Vijayakumari

    Published 2025-01-01
    “…By leveraging edge computing, AI, and blockchain-based security, the framework improves data privacy, reduces latency, and increases energy efficiency. …”
    Get full text
    Article
  8. 1828

    Exploring IoT integration challenges: Causal relationships and strategic implications for business models by Parveen Siwach, Disha Gulia, Dhiraj Kumar Yadav, Mohit Malik, Vijay Kumar Gahlawat

    Published 2025-12-01
    “…Thirteen crucial components were analysed, influencing interoperability challenges, data security and privacy issues, standardized issues, high initial investment, scaling obstacles, and adverse environmental effects. …”
    Get full text
    Article
  9. 1829

    A Structured and Methodological Review on Multi-View Human Activity Recognition for Ambient Assisted Living by Fahmid Al Farid, Ahsanul Bari, Abu Saleh Musa Miah, Sarina Mansor, Jia Uddin, S. Prabha Kumaresan

    Published 2025-06-01
    “…Key challenges such as data remediation, privacy, and generalization are discussed, alongside potential solutions such as sensor fusion and advanced learning strategies. …”
    Get full text
    Article
  10. 1830

    Perceptions and Needs of Stakeholders Regarding MyPal Project’s Electronic Patient-Reported Outcome App: Cross-Sectional Qualitative Focus Group Study by Dimitrios Kyrou, Panos Bonotis, Christine Kakalou, Maria Vasilopoulou, Lydia Scarfò, Marcel Meyerheim, Annette Sander, Tomáš Arpáš, Eleni Kazantzaki, Christos Maramis, Christina Karamanidou

    Published 2025-08-01
    “…Questions emerged about how and when HCPs would review and respond to patient-reported data. In the third theme, applicability for use in health care, participants emphasized the importance of the system’s ease of use, particularly for older patients and young children. …”
    Get full text
    Article
  11. 1831

    Human Behavior Analysis: A Comprehensive Survey on Techniques, Applications, Challenges, and Future Directions by Siham Essahraui, Ismail Lamaakal, Yassine Maleh, Khalid El Makkaoui, Mouncef Filali Bouami, Ibrahim Ouahbi, Ahmed A. Abd El-Latif, May Almousa, Joel J. P. C. Rodrigues

    Published 2025-01-01
    “…The survey also delves into data sources and methodologies used in HBA, such as sensor data, social media data, physiological signals, and multimodal analysis. …”
    Get full text
    Article
  12. 1832

    Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care by Kou-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Chieh Wang

    Published 2013-12-01
    “…Although RFID-based procedure is more efficient than traditional process, patient's information may be attacked (or stolen) during the data transmission period. This will cause inappropriate medication use and medical errors. …”
    Get full text
    Article
  13. 1833

    Social media integration in marketing education: A way forward to improve engagement and learning outcomes by Hesham Fazel, Amer Sayaf

    Published 2025-03-01
    “…The findings indicate that social media significantly increased student engagement and knowledge retention. Perceived ease of use, institutional support, and effectiveness in meeting instructional objectives were most significant to adoption. …”
    Get full text
    Article
  14. 1834

    Application of blockchain in urban rail traffic edge computing network by Gaochang XIE, Hua LU, Qinqin TANG, Han ZHU, Chenghao LIANG, Wen WEN, Renchao XIE

    Published 2021-10-01
    “…Multi-access edge computing (MEC) can provide high-quality service capabilities for computing-intensive services and delay-sensitive services in urban rail traffic.However, many edge facilities in rail traffic edge computing network are exposed to an open environment, and their privacy protection and transmission security are facing great challenges.Blockchain has functional characteristics such as distributed ledger, consensus mechanism, smart contract, and decentralized application.Therefore, the use of blockchain can build a systematic security protection mechanism for the distributed rail traffic edge computing network to ensure network security and data security and realize high-quality urban rail traffic services.Firstly, the basic concept of the blockchain and the urban rail traffic edge computing network architecture were introduced.Then, the structure and application content of the rail traffic edge computing network security protection mechanism integrated with the blockchain was discussed in detail.Finally, the open research issues and challenges of the security protection mechanism were analyzed.…”
    Get full text
    Article
  15. 1835

    Comprehensive synthesis of mHealth interventions in psychiatry: insights from systematic, scoping, narrative reviews and content analysis by Zaakira Shahul Hameed Mahreen, Noor Azziah Zainuldin, Melvyn Weibin Zhang

    Published 2024-10-01
    “…Conclusion: Despite positive outcomes, challenges such as data privacy, user engagement and healthcare integration persist. …”
    Get full text
    Article
  16. 1836

    Arduino – Based Electronic Voting Machine by Marwa Adeeb Al-jawaherry

    Published 2019-01-01
    “…During the construction of any electronic voting system, several aspects must consider, the most important is the privacy of voters and the accuracy of the voting process in addition to maintaining the security of data, this research provides a safe and reliable voting system. …”
    Get full text
    Article
  17. 1837

    PERCEPTIONS AND EXPERIENCES OF M-HEALTH TECHNOLOGIES AND SOCIAL MEDIA: A QUALITATIVE STUDY IN PATIENTS WITH SCHIZOPHRENIA by Pasquale Caponnetto, Maria Salvina Signorelli, Jennifer Tiralongo, Alessandro Rodolico, Carmen Concerto, Antonino Petralia, Lucio Inguscio

    Published 2023-12-01
    “…The qualitative methodology used consists of an individual structured interview and the data were subjected to thematic analysis. …”
    Get full text
    Article
  18. 1838

    Co-similar malware infection patterns as a predictor of future risk. by Amir Yavneh, Roy Lothan, Dan Yamin

    Published 2021-01-01
    “…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
    Get full text
    Article
  19. 1839

    INNOVATION OF THE EDUCATION PROCESS TOWARDS IMPLEMENTING AI TOOLS by Petra Mikulcová, Kristína Medeková, Drahoslav Lančarič, Radovan Savov

    Published 2024-12-01
    “…Our paper examines students' perceptions of AI and maps how they utilize AI tools, highlighting their role in meeting the challenges of today's educational and professional life. By analysing data collected through a structured questionnaire, we identified key themes, including the usefulness, ease of use, attitudes, and concerns surrounding AI. …”
    Article
  20. 1840

    Development of a remote therapeutic monitoring platform: applications for movement disorders by Sreetharan Thankathuraipandian, Walter Greenleaf, Anahita Kyani, Tucker Tomlinson, Binesh Balasingh, Erika Ross, Yagna Pathak

    Published 2024-12-01
    “…Through an investigational remote monitoring application (RM app) integrating patient-reported outcomes (PROs) and objective data using wearables, we aimed to develop an accessible, data-driven digital tool to monitor patient symptoms and deliver low-burden and easy-to-access DBS therapy. …”
    Get full text
    Article