Showing 2,481 - 2,500 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.25s Refine Results
  1. 2481

    Blockchain-Based Incentive Mechanism for Electronic Medical Record Sharing Platform: An Evolutionary Game Approach by Dexin Zhu, Yuanbo Li, Zhiqiang Zhou, Zilong Zhao, Lingze Kong, Jianan Wu, Jian Zhao, Jun Zheng

    Published 2025-03-01
    “…This system considers the potential malicious behaviors of both users and research institutions, encouraging research institutions to protect users’ privacy, reduce users’ concerns, and guide users to actively contribute data. …”
    Get full text
    Article
  2. 2482

    A Biologically Inspired Trust Model for Open Multi-Agent Systems That Is Resilient to Rapid Performance Fluctuations by Zoi Lygizou, Dimitris Kalles

    Published 2025-05-01
    “…However, existing trust models face challenges such as agent mobility, which causes agents to lose accumulated trust when moving across networks; changing behaviors, where previously reliable agents may degrade over time; and the cold start problem, which hinders the evaluation of newly introduced agents due to a lack of prior data. To address these issues, we introduced a biologically inspired trust model in which trustees assess their own capabilities and store trust data locally. …”
    Get full text
    Article
  3. 2483

    Blockchain-Based, Dynamic Attribute-Based Access Control for Smart Home Energy Systems by Urooj Waheed, Sadiq Ali Khan, Muhammad Masud, Huma Jamshed, Touqeer Ahmed Jumani, Najeeb Ur Rehman Malik

    Published 2025-04-01
    “…The literature reveals numerous cases of cyberattacks on IoT-based energy infrastructures, primarily involving unauthorized access, data breaches, and device exploitation. Therefore, designing a robust ecosystem with secure and efficient access control (AC), while safeguarding user functionality and privacy, is essential. …”
    Get full text
    Article
  4. 2484

    Exclusive breastfeeding practices and factors affecting them in urban areas of Uttar Pradesh by Prakhar Sharma, Neha Bansal, Abha Kaul

    Published 2025-01-01
    “…Data analysis was performed using Statistical Package for Social Sciences, including descriptive statistics and the Chi-square test for categorical variables (P < 0.05). …”
    Get full text
    Article
  5. 2485

    Artificial intelligence knowledge, attitudes and application perspectives of undergraduate and specialty students of faculty of dentistry in Turkey: an online survey research by Cemile Yılmaz, Rahime Zeynep Erdem, Latife Altınok Uygun

    Published 2024-10-01
    “…Statistical analysis was performed using IBM SPSS version 26.0, with quantitative data presented as mean ± standard deviation and categorical data as frequency (percentage). …”
    Get full text
    Article
  6. 2486

    Benchmarking Accelerometer and CNN-Based Vision Systems for Sleep Posture Classification in Healthcare Applications by Minh Long Hoang, Guido Matrella, Dalila Giannetto, Paolo Craparo, Paolo Ciampolini

    Published 2025-06-01
    “…The results demonstrate that while image-based models are effective, accelerometer-based classification offers higher precision and robustness, particularly in real-time and privacy-sensitive scenarios. Further comparisons of the system characteristics, data size, and training time are also carried out to offer crucial insights for selecting the appropriate technology in clinical, in-home, or embedded healthcare monitoring applications.…”
    Get full text
    Article
  7. 2487

    A secured remote patient monitoring framework for IoMT ecosystems by Pronaya Bhattacharya, Anwesha Mukherjee, Bharat Bhushan, Shashi Kant Gupta, Thippa Reddy Gadekallu, Zhu Zhu

    Published 2025-07-01
    “…There is a need for real-time IoMT computing closer to the dew, with secured and privacy-enabled access to healthcare data. To address this, we propose the DeW-IoMT framework, which includes a dew layer in the roof-fog-cloud systems. …”
    Get full text
    Article
  8. 2488

    Machine Learning-Based Blockchain Technology for Secure V2X Communication: Open Challenges and Solutions by Yonas Teweldemedhin Gebrezgiher, Sekione Reward Jeremiah, Xianjun Deng, Jong Hyuk Park

    Published 2025-08-01
    “…However, as V2X communication becomes more widespread, it becomes a prime target for adversarial and persistent cyberattacks, posing significant threats to the security and privacy of CAVs. These challenges are compounded by the dynamic nature of vehicular networks and the stringent requirements for real-time data processing and decision-making. …”
    Get full text
    Article
  9. 2489

    Smart governance for smart cities and nations by Z.R.M. Abdullah Kaiser

    Published 2024-11-01
    “…Among these, stakeholders particularly emphasize the need for administrative reform, robust smart infrastructure, finance, uninterrupted electricity, strong data privacy and security, and effective big data management as crucial to the success of the country's vision. …”
    Get full text
    Article
  10. 2490

    Obstetric Caregivers’ Perspectives on Barriers and Perceived Impacts of Male Involvement in Antenatal Care and Labour in Ekiti State, Nigeria: A Qualitative Study by Adetunmise Olajide, Deborah Esan, Ilerioluwa Adeniyi, Carlos Ramos

    Published 2025-04-01
    “…Twelve obstetric caregivers (six doctors and six midwives) were purposivelyselected based on their experience in ANC and labour care. Data were collected through two focusgroup discussions using a semi-structured interview guide. …”
    Get full text
    Article
  11. 2491

    Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing by Yuqi Xie, Ruwei Huang, Junbin Qiu

    Published 2025-04-01
    “…Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. …”
    Get full text
    Article
  12. 2492

    Leveraging Blockchain Technology for Secure 5G Offloading Processes by Cristina Regueiro, Santiago de Diego, Borja Urkizu

    Published 2025-04-01
    “…This paper proposes a Blockchain-based marketplace using Hyperledger Fabric to optimize resource allocation and enhance security. …”
    Get full text
    Article
  13. 2493

    Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger by Assiya Akli, Khalid Chougdali 

    Published 2025-07-01
    “…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
    Get full text
    Article
  14. 2494

    Regulating AI in the Energy Sector: A Scoping Review of EU Laws, Challenges, and Global Perspectives by Bo Nørregaard Jørgensen, Zheng Grace Ma

    Published 2025-05-01
    “…Using the PRISMA-ScR methodology, this scoping review systematically analyzes how EU laws and regulations influence the development, adoption, and deployment of AI-driven digital solutions in energy generation, transmission, distribution, consumption, and markets. …”
    Get full text
    Article
  15. 2495

    Teenage Motherhood and its Effect on the Social Welfare of The Victims: A Case Study of Kabale Municipality. by Kwesiga, Siifa

    Published 2024
    “…Hence the study offers an in-depth analysis of the relative contribution of some socio¬demographic factors in explaining adolescent pregnancy in Kabale Municipality. Using primary data collected from different parts of the district, a sample of 30 female adolescents in the age range of 10-19 years was studied. …”
    Get full text
    Thesis
  16. 2496

    Acceptability of self-sampling and self-testing for infections: a rapid systematic review on public users’ views by Aleksandra J. Borek, Caity Roleston, Runa Lazzarino, Mineli Cooray, Gail Hayward, Nia Roberts, Edward Blandford, Tom Fowler, Sarah Tonkin-Crine

    Published 2025-02-01
    “…Abstract Background Self-sampling and self-testing have been increasingly used for sexually transmitted infections (STIs) and quickly became widespread during the COVID-19 pandemic. …”
    Get full text
    Article
  17. 2497

    DualBranch-AMR: A Semi-Supervised AMR Method Based on Dual-Student Consistency Regularization with Dynamic Stability Evaluation by Jiankun Ma, Zhenxi Zhang, Linrun Zhang, Yu Li, Haoyue Tan, Xiaoran Shi, Feng Zhou

    Published 2025-07-01
    “…While deep learning has substantially improved the performance of Automatic Modulation Recognition (AMR), it heavily relies on large amounts of labeled data. Given the high annotation costs and privacy concerns, researching semi-supervised AMR methods that leverage readily available unlabeled data for training is of great significance. …”
    Get full text
    Article
  18. 2498

    Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County. by Ayebare, Esther Loy

    Published 2024
    “…The research utilized a cross-sectional design, incorporating both qualitative and quantitative approaches. Data were collected from 70 healthcare professionals in the selected sub-counties using questionnaires, interviews, and a thorough review of existing reports, policies, and other literature. …”
    Get full text
    Thesis
  19. 2499

    Leveraging deep neural network and language models for predicting long-term hospitalization risk in schizophrenia by Yihang Bao, Wanying Wang, Zhe Liu, Weidi Wang, Xue Zhao, Shunying Yu, Guan Ning Lin

    Published 2025-03-01
    “…In this study, we developed a deep learning model that integrates demographic, behavioral, and blood test data from admission to forecast extended hospital stays using a retrospective cohort. …”
    Get full text
    Article
  20. 2500

    Perceptions of academic staff and students of senior high school in implementing game-based exercises in physical education classes—a research protocol for a qualitative descriptiv... by Donald Manlapaz, Jose Avelino Vergara, Keisha Marie Bea Alpuerto, Iszaac Khalil Señora De Los Santos, Michaela Urian Enriquez, Zamantha Zamora Manicio, Joshua Emmanuel Ferrera Mendres, Casey Gwyn Salvaleon Tolosa, Zachary Gabriel Dee Vilela, Zeraia Ezra Gabriel Alonzo Zabat

    Published 2023-12-01
    “…Once done, they will undergo FGDs conducted through Google Meet. Data will be coded and analysed via thematic analysis using manual coding and NVivo V.12 software to summarise central themes and perceptions.Ethics and dissemination This study will abide by the Nuremberg Code, Declaration of Helsinki, Belmont Report, Data Privacy Act of 2012 and National Ethical Guidelines (for health-related research) of 2017. …”
    Get full text
    Article