Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,221 - 1,240 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 1221

    THE POSSIBILITY OF USING ELECTRONIC MEDICAL RECORDS FOR CLINICAL OBSERVATION by R. D. Kurbanov, R. Kh. Trigulova

    Published 2021-05-01
    “…Of course, there are problems and obstacles to expanding the use of EMC, and one of the solutions to these obstacles is to address issues of semantic compatibility, privacy, and security. …”
    Get full text
    Article
  2. 1222

    FFM: Flood Forecasting Model Using Federated Learning by Muhammad Shoaib Farooq, Rabia Tehseen, Junaid Nasir Qureshi, Uzma Omer, Rimsha Yaqoob, Hafiz Abdullah Tanweer, Zabihullah Atal

    Published 2023-01-01
    “…Federated Learning is the most advanced technique of machine learning (ML) that guarantees data privacy, ensures data availability, promises data security, and handles network latency trials inherent in prediction of floods by prohibiting data to be transferred over the network for model training. …”
    Get full text
    Article
  3. 1223

    Trends and pattern of contraceptive use among women attending a family planning clinic at a tertiary health facility in Ibadan, Nigeria by A. O. Atoyebi, S. O. Olaoye, M. A. Okunlola, M. E. Palamuleni, A. S. Adebowale

    Published 2025-06-01
    “…Data were analysed using a logistic regression model (α0.05), and thematic analysis was used for the qualitative part of the study. …”
    Get full text
    Article
  4. 1224

    Understanding user acceptance of mobility-as-a-service in Jakarta Metropolitan Area (JMA): Influencing factors and behavioural insights by Yos Sunitiyoso, Prawira Fajarindra Belgiawan, Muhamad Rizki, Valid Hasyimi

    Published 2025-07-01
    “…Driven by theoretical constructs of the technology acceptance model, a set of motivational factors and choice scenarios, a behavioural model is conceptualised to explore individuals’ willingness to adopt MaaS in the JMA. Using data from 1,005 respondents collected in a survey, structural equation modelling (SEM), cluster analysis and choice modelling were conducted. …”
    Get full text
    Article
  5. 1225
  6. 1226
  7. 1227

    The impact of artificial intelligence on behavioral intentions to use mobile banking in the post-COVID-19 era by Johannes Schrank, Johannes Schrank

    Published 2025-08-01
    “…Data has been collected from 412 respondents in Thailand, and structural equation modeling has been employed for the data analysis.ResultsThe findings reveal significant positive effects of performance expectancy, effort expectancy, social influence, facilitating conditions, trust, perceived privacy, perceived intelligence and anthropomorphism of AI on users’ behavioral intentions to use mobile banking. …”
    Get full text
    Article
  8. 1228

    PRE-SERVICE TEACHERS' PERCEPTIONS OF THE USE OF GENAI AND TRADITIONAL GRAMMAR-CHECKING TOOLS FOR ENGLISH WRITING by Tiara Putri, Rahmah Fithriani

    Published 2025-07-01
    “…Ethical concerns, particularly regarding data privacy and originality, are also identified. …”
    Get full text
    Article
  9. 1229

    Federated knee injury diagnosis using few shot learning by Chirag Goel, Anita X, Jani Anbarasi L

    Published 2025-07-01
    “…While deep learning approaches have shown promise in identifying knee injuries from MRI scans, they often require large amounts of labeled data, which can be both scarce and privacy-sensitive.MethodsThis paper analyses a hybrid methodology that integrates few-shot learning with federated learning for the diagnosis of knee injuries using MRI scans. …”
    Get full text
    Article
  10. 1230

    AI, machine learning and deep learning in cyber risk management by Ishrag Hamid, M. M. Hafizur Rahman

    Published 2025-05-01
    “…However, challenges persist in ensuring the accuracy of information, understanding the functionality of models, and protecting individuals’ data. Ethical use of personal information and safeguarding privacy remain critical, with researchers needing to prioritize accuracy, transparency in AI models, and fairness in decision-making. …”
    Get full text
    Article
  11. 1231

    Examining inclusivity: the use of AI and diverse populations in health and social care: a systematic review by John Gabriel O. Marko, Ciprian Daniel Neagu, P. B. Anand

    Published 2025-02-01
    “…A holistic approach must be used to address disparities, enforce effective regulations, safeguard privacy, promote inclusion and equity, and emphasize rigorous validation.…”
    Get full text
    Article
  12. 1232

    Investigating High School Students’ Attitudes Toward the Use of AI in Education: Evidence from Cambodia by Sarin Sok, Kimkong Heng, Mengkorn Pum

    Published 2025-07-01
    “…Utilizing evidence from an online survey with 315 students (female = 62.50%), the study showed that Cambodian high school students expressed generally favorable attitudes toward utilizing AI-powered tools in education, particularly pertaining to the use of AI to aid in completing school work. However, the study identified key concerns about data privacy and security issues, the risk of becoming over-dependent on AI, and limited originality about students’ work. …”
    Get full text
    Article
  13. 1233

    Ethical Challenges of Using the Internet of Behavior in the Medical and Healthcare Practice by Zahra Sadeqi-Arani, Esmaeil Mazroui Nasrabadi

    Published 2024-11-01
    “…These include concerns about privacy, data security, transparency, behavioral manipulation, equity in access, and the psychological and social consequences of continuous monitoring. …”
    Get full text
    Article
  14. 1234

    User Needs of Online Tutoring Applications Using House of Quality by Qurrata Aini, Eko Ruddy Cahyadi, Faqih Udin

    Published 2025-01-01
    “…Methodology: The study employs the House of Quality method and was conducted in the Jabodetabek area from 2021 to 2022. Data collection methods included voluntary and purposive sampling, using questionnaires distributed via Google Forms, as well as interviews and focus group discussions. …”
    Get full text
    Article
  15. 1235
  16. 1236
  17. 1237

    The use of modern e-health services including telemedicine and telepharmacy for remote patient care in Saudi Arabia by Farah K. Alhomoud

    Published 2025-01-01
    “…Participants reported perceived risks regarding privacy and data protection, and clinical risks associated with using e-health tools. …”
    Get full text
    Article
  18. 1238
  19. 1239

    Entropy-Based Human Activity Measure Using FMCW Radar by Hak-Hoon Lee, Hyun-Chool Shin

    Published 2025-07-01
    “…Existing activity measurement methods, such as gas analyzers, activity trackers, and camera-based systems, have limitations in accuracy, convenience, and privacy. To address these issues, this study proposes an improved activity estimation algorithm using a 60 GHz Frequency-Modulated Continuous-Wave (FMCW) radar. …”
    Get full text
    Article
  20. 1240

    Using the Language of elite athletes to predict their personality and on court transgressions by Maor Daniel Levitin, Itamar Zan Ger, Ze’ev Sovik, Ariel Taieb, Lyle Ungar, Michael Gilead

    Published 2025-05-01
    “…These findings show that personality can predict individual choices and behaviors in specific contexts; furthermore, by assessing the degree to which our digital footprint can be used to derive actionable predictions of behavior, the current findings could inform discussions concerning regulations of data privacy.…”
    Get full text
    Article