Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,421 - 1,440 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.15s Refine Results
  1. 1421
  2. 1422
  3. 1423
  4. 1424

    A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing by Abdullah Ayub Khan, Asif Ali Laghari, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Hamed Alsufyani, Sajid Ullah

    Published 2025-06-01
    “…This study presents a scalable, lightweight hybrid authentication system that integrates blockchain and edge computing within a Hyperledger Consortium network to address such real-time problems, particularly the use of Hyperledger Indy. For secure authentication, Hyperledger ensures a permissioned, decentralized, and impenetrable environment, while edge computing lowers latency by processing data closer to IoMT devices. …”
    Get full text
    Article
  5. 1425

    Artificial Intelligence (AI) in Neurofeedback Therapy Using Electroencephalography (EEG), Heart Rate Variability (HRV), and Galvanic Skin Response (GSR): A Review by Teddy Marcus Zakaria, Armein Zainal R. Langi, Muhamad Sophian Nazaruddin, Isa Anshori

    Published 2025-01-01
    “…Additionally, the general adoption of this technology is restricted by concerns regarding patient security and data privacy. The paper emphasizes the role of artificial intelligence in preprocessing data, feature extraction, and AI model analysis by integrating current research findings. …”
    Get full text
    Article
  6. 1426

    Securing IoT devices with zero day intrusion detection system using binary snake optimization and attention based bidirectional gated recurrent classifier by Ali Saeed Almuflih, Ilyos Abdullayev, Sergey Bakhvalov, Rustem Shichiyakh, Bibhuti Bhusan Dash, K. B. V. Brahma Rao, Kritika Bansal

    Published 2024-11-01
    “…Intrusion detection systems (IDS) are generally focused on exact attacks to defend the use of IoT. However, the attacks were unidentified, for IDS still signifies tasks and concerns about consumers’ data privacy and safety. …”
    Get full text
    Article
  7. 1427

    Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms by Manal Abdullah Alohali, Sultan Alahmari, Mohammed Aljebreen, Mashael M. Asiri, Achraf Ben Miled, Sami Saad Albouq, Othman Alrusaini, Ali Alqazzaz

    Published 2025-07-01
    “…As part of intellectual transportation, IoV is a hot topic for researchers because it faces numerous unresolved challenges, particularly regarding privacy and security. The development of recent malicious software with the expanding use of digital services has increased the likelihood of stealing data, corrupting data, or other cybercrimes by malware threats. …”
    Get full text
    Article
  8. 1428

    An intelligent assessment of factors affecting new generations in the era of the internet and new media using intuitionistic hesitant fuzzy sugeno-weber aggregation operators by Yuxin Li, Yao Liu, Dan Zhao

    Published 2025-07-01
    “…There are many benefits and drawbacks to using the Internet, including issues with human health, education and learning habits, communication and relationships, and privacy and security. …”
    Get full text
    Article
  9. 1429

    Reasons for maternal near-miss in Bahir Dar city administration, northwest Ethiopia: a qualitative interview approach using socio-ecological model by Yinager Workineh, Getu Degu Alene, Gedefaw Abeje Fekadu

    Published 2025-04-01
    “…Participants were purposively selected until information saturation was reached, after interviewing twenty-five individuals. Data were collected using open-ended interview guides, with audio recordings and field notes. …”
    Get full text
    Article
  10. 1430
  11. 1431

    SeCo2: Secure Cognitive Semantic Communication in 6G-IoT Networks Using Key-Policy Attribute-Based Encryption and Elliptic Curve Cryptography by G. Sugitha, R. Vasanthi, A. Solairaj, A. V. Kalpana

    Published 2025-06-01
    “…The framework incorporates a blockchain-based system to provide a secure and privacy-preserving data transmission mechanism. Data preprocessing is conducted using the IoT-Sense dataset, and then encryption is done through a hybrid combination of Key-Policy Attribute-Based Encryption (KP-ABE) and Elliptic Curve Cryptography (ECC). …”
    Get full text
    Article
  12. 1432
  13. 1433

    INVESTIGATE AND COMPARE GENDER-SPECIFIC DIFFERENCES IN COPING MECHANISMS AMONG PATIENTS DIAGNOSED WITH OBSESSIVE-COMPULSIVE DISORDER USING THE MEANING-CENTERED COPING SCALE SCORES. by AijazMohiud din Bhat, Nizamud din Dar, Abdul Majid Gania

    Published 2025-06-01
    “…Participants were recruited through consecutive sampling, and data were analyzed using descriptive and inferential statistics. …”
    Get full text
    Article
  14. 1434

    Challenges in accessing health care services for women and girls with disabilities using a humanitarian physical rehabilitation program in Lebanon: a mixed method study by Linda Abou-Abbas, Diana Sabbagh, Rodolfo Rossi, Lavanya Vijayasingham, Maria Rita Lteif, Haya Rawi, Rouba Mitri, Hala Al Sultan, Aicha Benyaich, Ahmad AL-MOSA, Claudia Truppa

    Published 2024-12-01
    “…Initially, a retrospective descriptive study analyzed data from the International Committee of the Red Cross (ICRC)-supported physical rehabilitation programme (PRP) database. …”
    Get full text
    Article
  15. 1435

    Strengthening research preparedness for crises: lessons from Norwegian government agencies in using randomized trials and quasi-experimental methods to evaluate public policy inter... by Unni Gopinathan, Ingeborg Elgersma, Therese Dalsbø, Mona Bjørbæk, Atle Fretheim

    Published 2025-01-01
    “…The surveyed agencies stressed the importance of legislation providing clear guidelines on when differential treatment can be justified and when informed consent requirements can be waived, as well as faster and clearer processes for managing privacy concerns related to data access. Crucially, greater political acceptance for systematically and gradually implementing reforms, including using randomization, could strengthen evidence-informed public policy, enhancing the scaling-up of effective interventions and deprioritizing ineffective ones.…”
    Get full text
    Article
  16. 1436
  17. 1437
  18. 1438

    Development of a large Danish single-centre retro- and prospective transgender cohort using a web-based platform: a study protocol of a transgender cohort study by Ulrik Schiøler Kesmodel, Allan Stensballe, Emma Elisabeth Skovby Petersen, Frederika Kiy, Michael Winterdahl, Jakob Dal, Maria Lucia Pop, Gry Kjaersdam Telléus, Astrid Ditte Højgaard

    Published 2025-06-01
    “…Medical records will provide information on demographics, mental health, physical health, and gender-affirming treatment details. Data will be managed using REDCap, ensuring compliance with GDPR and the National Data Protection Act.Ethics and dissemination While recognising the potential privacy risks associated with data collection, the study considers these outweighed by the benefits of advancing knowledge on gender diversity and the impacts of gender-affirming care. …”
    Get full text
    Article
  19. 1439

    Exploring perceived barriers and facilitators to using mobile phone technology for delivering HPV test results in malawi: a qualitative study with HPV-Screened women, healthcare pr... by John C. Chapola, Lameck Chinula, Wezzie Dunda, Agatha Bula, Bettie Kasonkanji, Jennifer H. Tang

    Published 2025-07-01
    “…We conducted a study to identify the perceived barriers and facilitators to using mobile phones for delivering HPV results, aiming to improve the retention of HPV-positive women in care. …”
    Get full text
    Article
  20. 1440