Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,041 - 2,060 results of 2,784 for search '"\"((((\\"useddds OR \"usedddddds) OR \"useddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.16s Refine Results
  1. 2041

    Emerging role of generative AI in renewable energy forecasting and system optimization by Erdiwansyah, Rizalman Mamat, Syafrizal, Mohd Fairusham Ghazali, Firdaus Basrawi, S.M. Rosdi

    Published 2025-12-01
    “…For sustainable implementation, future developments must address challenges in model explainability, data privacy, and scalability. These findings support the journal’s scope by highlighting AI-driven advancements for the reliable, efficient, and sustainable transformation of energy systems.…”
    Get full text
    Article
  2. 2042

    Exploring Therapists’ Approaches to Treating Eating Disorders to Inform User-Centric App Design: Web-Based Interview Study by Pamela Carien Thomas, Pippa Bark, Sarah Rowe

    Published 2025-05-01
    “…Barriers to recommendation include patient safety, data privacy, and a perception that they may not be effective. …”
    Get full text
    Article
  3. 2043

    AI in dermatology: a comprehensive review into skin cancer detection by Kavita Behara, Ernest Bhero, John Terhile Agee

    Published 2024-12-01
    “…However, several challenges remain, such as concerns over data privacy, complexities in integrating AI systems into existing workflows, and the need for large, high-quality datasets. …”
    Get full text
    Article
  4. 2044
  5. 2045

    Digital Health Interventions for Depression and Anxiety in Low- and Middle-Income Countries: Rapid Scoping Review by Leena W Chau, Raymond W Lam, Harry Minas, Kanna Hayashi, Vu Cong Nguyen, John O'Neil

    Published 2025-08-01
    “…Challenges pertained to the technological system, engagement issues, structural barriers, and concerns regarding privacy and confidentiality. Facilitators included widespread mobile phone use, built-in supervision and training features, and convenience. …”
    Get full text
    Article
  6. 2046

    Telehealth for the study of palliative care communication: opportunities, methodological challenges, and recommendations by Elise C. Tarbi, Susanna L. Schuler, Natalie Ambrose, Rebecca N. Hutchinson, Maija Reblin, Katharine L. Cheung

    Published 2025-03-01
    “…Conclusions Overall, our approach demonstrates possibilities for the use of telehealth to study palliative care communication and provides a “how-to” example for unique telehealth considerations from data collection through analysis. …”
    Get full text
    Article
  7. 2047

    Assessment of the Efficiency of a ChatGPT-Based Tool, MyGenAssist, in an Industry Pharmacovigilance Department for Case Documentation: Cross-Over Study by Alexandre Benaïche, Ingrid Billaut-Laden, Herivelo Randriamihaja, Jean-Philippe Bertocchio

    Published 2025-03-01
    “…Information provided within the template changes depending on the case: such data come from a table sent to the LLM. We then measured the time spent on each case for a period of 4 months (2 months before using the tool and 2 months after its implementation). …”
    Get full text
    Article
  8. 2048

    Comparison of Machine Learning Methods for Menstrual Cycle Analysis and Prediction by Mutiara Khairunisa, Desak Made Sidantya Amanda Putri, I Gusti Ngurah Lanang Wijayakusuma

    Published 2025-03-01
    “…The findings highlight the potential for improved accuracy in reproductive health tracking, with future research opportunities to incorporate additional variables such as hormonal history and lifestyle factors, as well as a focus on data privacy.…”
    Get full text
    Article
  9. 2049

    Application of Criminal Offenders Misuse of National Identification Numbers for Phone Card Registration in Makassar City by Sri Buyung, Marilang, Ashabul Kahfi

    Published 2024-03-01
    “…The findings indicate that despite the absence of specific laws on starter pack registration, Indonesian citizens are protected by constitutional, administrative, ITE (Information and Electronic Transactions), and personal data protection laws. However, obstacles exist in enforcing criminal offenses related to NIK misuse, including outlet registration by actors lacking buyer identities due to fierce competition and public preference for instant solutions without considering the consequences of using others' NIK for SIM card registration.…”
    Get full text
    Article
  10. 2050

    A Review of Asynchronous Byzantine Consensus Protocols by Zhenyan Ji, Xiao Zhang, Jianghao Hu, Yuan Lu, Jiqiang Liu

    Published 2024-12-01
    “…Blockchain technology can be used in the IoT to ensure the data privacy collected by sensors. …”
    Get full text
    Article
  11. 2051

    Consumption of boutique hotel experiences as revealed by electronic word-of-mouth by Carolina Fiuza Parolin, Ricardo Boeing

    Published 2019-07-01
    “…The research considered prior studies on experiential consumption, as well as publications focused on understanding postmodern individuals. Netnography was used to collect data on – and analyse – post-consumption behaviours boutique hotels. …”
    Get full text
    Article
  12. 2052

    A Comparative Analysis of Artificial Intelligence Regulatory Law in Asia, Europe, and America by Alfiani Francisca Romana Nanik, Santiago Faisal

    Published 2024-01-01
    “…The primary considerations in formulating these regulations include ethical principles, data privacy, algorithmic bias, transparency, explainability, and international collaboration. …”
    Get full text
    Article
  13. 2053

    Updatable Multi-User Dynamic Searchable Encryption Scheme with Bidirectional Verification by Zihao Ling, Bimei Wang

    Published 2025-06-01
    “…The scheme enables secure dynamic data sharing in multi-user scenarios by constructing an index structure using homomorphic message authentication codes and bitmaps. …”
    Get full text
    Article
  14. 2054

    IOT based wearable sensor system architecture for classifying human activity by V. Mahalakshmi, Pramod Kumar, Manisha Bhende, Ismail Keshta, Swatiben Yashvantbhai Rathod, Janjhyam Venkata Naga Ramesh

    Published 2025-06-01
    “…The proposed system follows a structured workflow: (i) channel state information (CSI) is extracted from ESP32 modules, (ii) data preprocessing is performed using Hampel and Gaussian filters for noise and outlier removal, (iii) dimensionality reduction is achieved through Principal Component Analysis (PCA) and Discrete Wavelet Transform (DWT), and (iv) activity classification is conducted using Dynamic Time Warping (DTW) and the K-Nearest Neighbors (KNN) algorithm. …”
    Get full text
    Article
  15. 2055

    A Self-Sovereign Identity-Based Authentication and Reputation Protocol for IoV Applications by Victor Emanuel Farias da Costa Borges, Alvaro Sobrinho, Danilo F. S. Santos, Angelo Perkusich

    Published 2025-01-01
    “…Key innovations include a lightweight proof of reputation mechanism based on multi-party computation, enabling vehicles to collaboratively assess trustworthiness using recent spatiotemporal data without compromising privacy. …”
    Get full text
    Article
  16. 2056

    Clinician and patient perceptions around implementing remote blood pressure monitoring for hypertensive disorders of pregnancy: A survey-based study by Theepika Rajkumar, Sharon Hu, Annemarie Hennessy, Angela Makris

    Published 2025-07-01
    “…Conclusion Though socioeconomic status, ethnicity and language influenced perceptions towards RBPM; overall, Australian pregnant women and clinicians are broadly receptive to its use in antenatal care. Successful implementation of RPBM requires careful evaluation of design and workflow to accommodate for patient diversity, ease of use, compliance, privacy and clinical utility to optimise the user experience.…”
    Get full text
    Article
  17. 2057

    An investigation into the acceptance of intelligent care systems: an extended technology acceptance model (TAM) by Zhe Wang, Yuhui Wang, Yu Zeng, Jiayu Su, Zhirong Li

    Published 2025-05-01
    “…Moreover, higher privacy security requirements correlate with lower perceptions of the system’s usefulness. …”
    Get full text
    Article
  18. 2058

    Predictors of Women’s Satisfaction with Hospital-Based Intrapartum Care in Asmara Public Hospitals, Eritrea by Meron Mehari Kifle, Filmon Abraham Ghirmai, Soliana Amanuel Berhe, Winta Sium Tesfay, Yodit Teklemariam Weldegebriel, Zebib Tesfamariam Gebrehiwet

    Published 2017-01-01
    “…The key predictors of satisfaction with intrapartum care were provision of clean bed and beddings (AOR = 18.87, 2.33–15.75), privacy during examinations (AOR = 10.22, 4.86–21.48), using understandable language (AOR = 8.72, 3.57–21.27), showing how to summon for help (AOR = 8.16, 4.30–15.48), showing baby immediately after birth (AOR = 8.14, 2.87–23.07), control of the delivery room (AOR = 6.86, 2.65–17.75), receiving back massage (AOR = 6.43, 3.23–12.81), toilet access and cleanliness (AOR = 6.09, 3.25–11.42), availability of chairs for relatives (AOR = 5.96, 3.14–11.30), allowing parents to stay during labour (AOR = 3.52, 1.299–9.56), and request for permission before any procedure (AOR = 2.39, 1.28–4.46). …”
    Get full text
    Article
  19. 2059

    Patient-Centric Approach to Personalized Electronic Medical Records via QR Code in Japan by Yoshihiko Izumida, Takashi Omura, Masahiro Fujiwara, Shoko Nukaya, Akio Yoneyama, Sow Boubacar, Shinichiro Yabe, Rika Noguchi, Shima Nakayama, Wataru Muraoka, Yuki Okuno, Sho Miyashita, Yurika Ishihara, Yuto Moriwaki, Ryoji Otani, Junichiro Adachi, Kenichiro Tanabe, Yoshihisa Yamano, Yasushi Takai, Masaru Honjo

    Published 2024-12-01
    “… Government policies in the United States and the European Union promote standardization and value creation in the use of FAIR (findability, accessibility, interoperability, and reusability) data, which can enhance trust in digital health systems and is crucial for their success. …”
    Get full text
    Article
  20. 2060

    Integrating Machine Learning and IoT for Effective Plant Disease Management by Bhoi Manjulata, Dubey Ahilya

    Published 2025-01-01
    “…Further, the framework is structured for privacy of data and security using strong encryption and secure access protocols. …”
    Get full text
    Article