Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,381 - 1,400 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"usedddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 1381

    Using telemedicine to support care for people with type 2 diabetes mellitus: a qualitative analysis of patients’ perspectives by Jun Yang Lee, Carina Ka Yee Chan, Siew Siang Chua, Thomas Paraidathathu, Kenneth Kwing-Chin Lee, Christina San San Tan, Nazrila Nasir, Shaun Wen Huey Lee

    Published 2019-10-01
    “…Four themes emerged from the analysis: (1) generational difference; (2) independence and convenience, (3) sharing of health data and privacy and (4) concerns and challenges. …”
    Get full text
    Article
  2. 1382
  3. 1383

    Assessment of the Quality of Smartphone-Based Applications and Games for Teaching Medical Terminology Using the Mobile Application Rating Scale (MARS) by Seyyedeh Fatemeh Mousavi Baigi, Reyhaneh Norouzi Aval, Masoumeh Sarbaz, Khalil Kimiafar

    Published 2024-10-01
    “…The same checklist was used for data extraction. The quality of apps was measured using the Mobile App Rating Scale (MARS). …”
    Get full text
    Article
  4. 1384

    Women’s hospital birth experiences in Harar, eastern Ethiopia: a qualitative study using Roy’s Adaptation Model by Roseanne C Schuster, Nega Assefa, Maleda Tefera, Kedir Teji Roba, Letta Gedefa, Alex Brewis

    Published 2022-07-01
    “…Interviews were audio-recorded and transcribed on the spot and the interviews were analysed using a deductive content analysis approach. Data were analysed using the four components of Roy’s Adaptation Model (RAM) as a guiding framework of women’s experiences: physiological, self-concept, role and function, and interdependence.Results Various behaviours were identified: under physiological mode, common behaviours identified included labour pain, fatigue, surgical site pain and anaesthesia-related complication. …”
    Get full text
    Article
  5. 1385

    Bootstrapping BI-RADS classification using large language models and transformers in breast magnetic resonance imaging reports by Yuxin Liu, Xiang Zhang, Weiwei Cao, Wenju Cui, Tao Tan, Yuqin Peng, Jiayi Huang, Zhen Lei, Jun Shen, Jian Zheng

    Published 2025-04-01
    “…Specifically, missing category information (MCI) that is absent in the free-text reports is supplemented by assigning default values to the missing categories in the structured reports. To ensure data privacy, a locally deployed Qwen-Chat model is employed. …”
    Get full text
    Article
  6. 1386

    Management of the Chain of Custody of Digital Evidence Using Blockchain and Self-Sovereign Identities: A Systematic Literature Review by Leandro Loffi, Gerson Luiz Camillo, Cristiano Antonio De Souza, Carla Merkle Westphall, Carlos Becker Westphall

    Published 2025-01-01
    “…While state-of-the-art reviews identify various aspects, it is necessary to include the use of Self-Sovereign Identity (SSI) systems within the scope of research. …”
    Get full text
    Article
  7. 1387
  8. 1388

    Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning by Muhammad Dilshad, Madiha Haider Syed, Semeen Rehman

    Published 2025-01-01
    “…Detection methods currently face challenges due to the complex and enormous amounts of data inherent in IoV systems. This paper presents a new approach toward improving DDoS attack detection by using the Gini index in feature selection and Federated Learning during model training. …”
    Get full text
    Article
  9. 1389
  10. 1390

    ReACT_OCRS: An AI-Driven Anonymous Online Reporting System Using Synergized Reasoning and Acting in Language Models by Amir Aboubakr Shaker Mahmoud, Wesam Shishah, Nilay R. Mistry

    Published 2025-01-01
    “…Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response times. …”
    Get full text
    Article
  11. 1391
  12. 1392

    Enhancing unmanned aerial vehicle and smart grid communication security using a ConvLSTM model for intrusion detection by Raed Alharthi

    Published 2024-12-01
    “…The emergence of small-drone technology has revolutionized the way we use drones. Small drones leverage the Internet of Things (IoT) to deliver location-based navigation services, making them versatile tools for various applications. …”
    Get full text
    Article
  13. 1393

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services by charu awasthi, Satya Prakash, Prashant Kumar Mishra

    Published 2024-12-01
    “…Here the fog nodes gather the information from the medical sensor devices and the data is validated using smart contracts in the blockchain network. …”
    Get full text
    Article
  14. 1394

    Determinants of behavioral intentions and their impact on student performance in the use of AI technology in higher education in Indonesia: A SEM-PLS analysis based on TPB, UTAUT,... by Muhammad Nurtanto, Septiari Nawanksari, Valiant Lukad Perdana Sutrisno, Husni Syahrudin, Nur Kholifah, Didik Rohmantoro, Iga Setia Utami, Farid Mutohhari, Mustofa Abi Hamid

    Published 2025-01-01
    “…The findings reveal that Attitude toward Behavior and Technology Anxiety significantly influence Student Performance through mediating variables such as Performance Expectancy, Facilitating Conditions, and Behavioral Intention to Use. Notably, perceived risk negatively affects behavioral intention and academic outcomes, suggesting high student awareness of data privacy, technological dependency, and accuracy uncertainty. …”
    Get full text
    Article
  15. 1395

    Non-Contact Fall Detection System Using 4D Imaging Radar for Elderly Safety Based on a CNN Model by Sejong Ahn, Museong Choi, Jongjin Lee, Jinseok Kim, Sungtaek Chung

    Published 2025-05-01
    “…A CNN model classifies postures into standing, sitting, and lying, while changes in the speed and position distinguish falling actions from lying-down actions. The Point Cloud data were normalized and organized using zero padding and k-means clustering to improve the learning efficiency. …”
    Get full text
    Article
  16. 1396

    Using malware for software-defined networking–based smart home security management through a taint checking approach by Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Wen-Hui Lin, Hsiao-Chung Lin, Wun-Jie Chao

    Published 2016-08-01
    “…Accordingly, this article proposes a taint propagation analysis model incorporating a weighted spanning tree analysis scheme for tracking data with taint marking using several taint checking tools with an open software-defined networking architecture for solving the dynamic taint propagation analysis problem. …”
    Get full text
    Article
  17. 1397

    Using AI chatbots (e.g., CHATGPT) in seeking health-related information online: The case of a common ailment by Pouyan Esmaeilzadeh, Mahed Maddah, Tala Mirzaei

    Published 2025-03-01
    “…Using structural equation modeling on survey data collected from 231 respondents in the US, our study examines the hypotheses linking hedonic and utilitarian values, user satisfaction, willingness to reuse conversational AI, and intentions to take recommended actions. …”
    Get full text
    Article
  18. 1398
  19. 1399

    Grouping Digital Health Apps Based on Their Quality and User Ratings Using K-Medoids Clustering: Cross-Sectional Study by Maciej Marek Zych, Raymond Bond, Maurice Mulvenna, Lu Bai, Jorge Martinez-Carracedo, Simon Leigh

    Published 2025-07-01
    “…With over 350,000 digital health apps available on the app stores today, those apps need to be of sufficient quality to be safe to use. Discovering the typology of digital health apps regarding professional and clinical assurance (PCA), user experience (UX), data privacy (DP), and user ratings may help in determining the areas where digital health apps can improve. …”
    Get full text
    Article
  20. 1400

    Barriers and facilitators to seeking psychological support among healthcare professionals: a qualitative study using the Theoretical Domains Framework by Sha Liu, Yinhuan Hu, Holger Pfaff, Xiaoyun Lei, Zhen Qi, Xiandong Feng

    Published 2025-03-01
    “…Data were analyzed using framework analysis and relevant domains were identified according to the frequency of participants’ belief statements. …”
    Get full text
    Article