Showing 2,281 - 2,300 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.17s Refine Results
  1. 2281

    ChatGPT’s Integration in GCC Higher Education: Bibliometric Analysis of Trends by Tosin Ekundayo , Zafarullah Khan , Shahid Ali Chaudhry

    Published 2024-10-01
    “…Key findings include the positive impact of ChatGPT on personalized learning and student engagement, as well as the growing focus on ethical concerns such as data privacy and bias. The study also identified strong interdisciplinary connections, with AI research in education intersecting with fields such as computer science, linguistics, and cognitive science. …”
    Get full text
    Article
  2. 2282

    Exploring mHealth app utilization for diabetes self-management: survey insights from a northern district in Malaysia by Premaa Supramaniam, Ying-Shan Beh, Suria Junus, Philip Rajan Devesahayam

    Published 2024-12-01
    “…Users perceived the mHealth app as useful (97.5%), yet faced challenges over the app initiation, charges and data security. …”
    Get full text
    Article
  3. 2283

    Information Technology in Nursing Practice: A Scoping Review of Assessment Tools for Evaluating Nurses’ Competencies by Cachata D, Costa M, Magalhães T, Lucas P, Gaspar F

    Published 2025-05-01
    “…This has driven the need to develop specific competencies and maintain a balance between ethical aspects, social and legal challenges related to privacy and data security, as well as the challenge of ensuring person-centered care practice. …”
    Get full text
    Article
  4. 2284

    SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation by Seyed Salar Sefati, Bahman Arasteh, Octavian Fratu, Simona Halunga

    Published 2025-07-01
    “…A similarity graph is built from the log data, allowing for effective anomaly detection using graph-based methods. …”
    Get full text
    Article
  5. 2285

    Enhancing insights in sexually transmitted infection mapping: Syphilis in Forsyth County, North Carolina, a case study. by Lani Fox, William C Miller, Dionne Gesink, Irene Doherty, Marc Serre

    Published 2024-10-01
    “…Results were assessed using latent rate theory cross validation. We show combining a moving window and a UMBME analysis with geomasked data effectively predicted the true or latent syphilis rate 5% to 26% more accurate than the traditional, geopolitical boundary method. …”
    Get full text
    Article
  6. 2286

    CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity by Ogobuchi Daniel Okey, Demostenes Zegarra Rodriguez, Frederico Gadelha Guimaraes, Joao Henrique Kleinschmidt

    Published 2025-01-01
    “…Federated learning has recently gained significant attention as a method for building machine learning models due to its ability to preserve data privacy while delivering improved performance. …”
    Get full text
    Article
  7. 2287
  8. 2288

    Navigating digital frontiers in UAE healthcare: A qualitative exploration of healthcare professionals' and patients' experiences with AI and telemedicine. by Azza Alkaabi, Deena Elsori

    Published 2025-04-01
    “…The results highlight the need to address such limitations, adequately train healthcare professionals, and enhance data privacy. The study also lays a foundation for further research into contextual challenges hindering the effective adoption and implementation of AI and telemedicine in different healthcare settings in order to develop a generic, context-specific framework that will guide the adoption of such emerging technologies in the global healthcare industry.…”
    Get full text
    Article
  9. 2289

    Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping by ZHENG Junhua, JIANG Hongwei, LIU Rong, LI Yixiu, LI Wen, WENG Jian

    Published 2024-12-01
    “…Finally, the potential application of the scheme in cross-departmental supervision scenarios of multi-industry and multi-source data sales data was explored, which helped the tax department to realize tax verification under the premise of protecting data privacy, and helped promote the digital transformation and healthy development of various industries.…”
    Get full text
    Article
  10. 2290

    Source-Free Domain Adaptation for Cross-Modality Abdominal Multi-Organ Segmentation Challenges by Xiyu Zhang, Xu Chen, Yang Wang, Dongliang Liu, Yifeng Hong

    Published 2025-05-01
    “…While unsupervised domain adaptation (UDA) has shown promise in addressing these issues by transferring knowledge from a different modality (source domain), its reliance on both source and target data during training presents a practical challenge in many clinical settings due to data privacy concerns. …”
    Get full text
    Article
  11. 2291

    SensorsConnect Framework: World-Wide Web for Internet of Things by Abdelrahman Elewah, Khalid Elgazzar

    Published 2024-01-01
    “…A motivating scenario illustrates its potential impact in real-life situations, such as finding a drive-thru coffee shop or crossing a country border. Using real-time road status and service occupancy data, SensorsConnect enhances Google Maps service recommendations, not only minimizing customer wait times but also distributing workload more evenly across service points. …”
    Get full text
    Article
  12. 2292

    The Application of Digital Intelligence Technology in the Management of Non-Hospitalized Patients with Rare Diseases by YAO Yiyang, GAO Yi, GUO Yixuan, QIN Zhuoyue, ZHANG Yaofang, JING Jiaqi, XIE Jing, GUO Jian, ZHANG Shuyang

    Published 2025-01-01
    “…Methods We designed the search strategy and used the words " rare diseases"" patient management"" non-hospitalized management"" community management"" digital intelligence"" big data"" telemedicine" as MESH terms or free words. …”
    Get full text
    Article
  13. 2293

    Predicting Student Dropout Through Text and Media Content Analysis of VKontakte Profiles by Sergei S. Gorshkov, Dmitry I. Ignatov, Anastasia Yu. Chernysheva

    Published 2025-01-01
    “…While this approach depends on publicly available VK data and may be limited by privacy settings, it still provides useful insights. …”
    Get full text
    Article
  14. 2294

    MAGMA-MICK: A state-of-the-art digital platform facilitating the programmatic implementation of whole genome sequencing for TB care and prevention by Prof Annelies Van Rie, Fulvio Vigilante, Dr. Walter Sanseverino, Prof Annelies Van Rie

    Published 2025-03-01
    “…Methods: We MICK, a state-of-the-art secure digital platform, for the use of NGS to guide the care and prevention of (DR)-TB. …”
    Get full text
    Article
  15. 2295

    Technology-enabled CONTACT tracing in care homes in the COVID-19 pandemic: the CONTACT non-randomised mixed-methods feasibility study by Carl A Thompson, Thomas A Willis, Amanda Farrin, Adam Gordon, Amrit Daffu-O’Reilly, Catherine Noakes, Kishwer Khaliq, Andrew Kemp, Tom Hall, Chris Bojke, Karen Spilsbury

    Published 2025-05-01
    “…Quantitative data were analysed using descriptive statistical methods, and qualitative data were thematically analysed using normalisation process theory. …”
    Get full text
    Article
  16. 2296

    TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache, Carlos T. Calafate

    Published 2025-07-01
    “…This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. …”
    Get full text
    Article
  17. 2297

    Advanced Applications of Artificial Intelligence in Pharmacovigilance: Current Trends and Future Perspectives by Yogesh S Ahire, Jayesh H Patil, Harshita N Chordiya, Rashmi A Deore, Vinod A Bairagi

    Published 2024-03-01
    “…The ethical and legal implications of patient privacy, data security, and regulatory compliance underscore the necessity of cautious artificial intelligence deployment in order to maintain public trust and protect patient rights. …”
    Get full text
    Article
  18. 2298

    Artificial Intelligence in Bronchopulmonary Dysplasia: A Review of the Literature by Tony Jha, Sana Suhail, Janet Northcote, Alvaro G. Moreira

    Published 2025-03-01
    “…Addressing ethical considerations, such as data privacy and demographic representation, as well as other practical considerations will be essential to ensure the proper implementation of AI clinical tools. …”
    Get full text
    Article
  19. 2299

    Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks by Muzun Althunayyan, Amir Javed, Omer Rana, Theodoros Spyridopoulos

    Published 2024-12-01
    “…To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL). …”
    Get full text
    Article
  20. 2300

    A systematic review of serious games as tools for STEM education by Talia Tene, Diego Fabián Vique López, Paulina Elizabeth Valverde Aguirre, Nilo Israel Cabezas Oviedo, Cristian Vacacela Gomez, Stefano Bellucci

    Published 2025-02-01
    “…Policymakers are encouraged to support these efforts by providing financial resources and promoting frameworks for ethical, data-secure use of serious games in education. Future research should focus on establishing a globally recognized framework for serious games in STEM, conducting longitudinal studies to evaluate long-term impacts, and exploring diverse educational contexts to ensure inclusive and effective integration.…”
    Get full text
    Article