Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,261 - 2,280 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"usedddddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.18s Refine Results
  1. 2261

    The Application of Artificial Intelligence in Medical Diagnostics: Implications for Sports Medicine by Michał Bolek, Dominika Musialska, Aleksandra Kędzia, Bartosz Jagieła, Monika Fidyk, Magda Minkiewicz, Maciej Dyda

    Published 2025-05-01
    “…However, their integration into healthcare raises critical ethical concerns related to data privacy, algorithmic bias, and transparency. …”
    Get full text
    Article
  2. 2262

    Engaging Stakeholders in the Development of a National Digital Mental Health Strategy: Reflexive Thematic Analysis by Sarah Kennedy, Robyn Fitzgerald, Ruth Melia

    Published 2025-06-01
    “…Invited stakeholders included experts in DMH research, clinical practice, and mental health advocacy and policy, together with those with lived experience of accessing mental health services. Qualitative data were analyzed using a reflexive thematic analysis approach. …”
    Get full text
    Article
  3. 2263

    A qualitative study on the unmet sexual needs of older women by Farzaneh Saadatmand, Mitra Savabi-Esfahani, Zahra Heidari, Marjan Beigi

    Published 2025-05-01
    “…Data were analyzed using the Graneheim and Lundman approach. …”
    Get full text
    Article
  4. 2264

    Federated learning based reference evapotranspiration estimation for distributed crop fields. by Muhammad Tausif, Muhammad Waseem Iqbal, Rab Nawaz Bashir, Bayan AlGhofaily, Alex Elyassih, Amjad Rehman Khan

    Published 2025-01-01
    “…The study intends to propose ETo estimation of multiple locations with distinct weather conditions using a federated learning approach. Traditional centralized approaches require aggregating all data in one place, which can be problematic due to privacy concerns and data transfer limitations. …”
    Get full text
    Article
  5. 2265

    Development of the ethical behavior scale in nursing by Şükriye Şahin, Şule Alpar

    Published 2024-11-01
    “…Qualitative data was obtained through in-depth interviews. Quantitative data were collected using the Ethical Behavior Scale in Nursing (EBSN). …”
    Get full text
    Article
  6. 2266

    Propagation routing for hybrid bandwidth allocation with reinforcement learning in VANET infrastructure analysis by G. Michael, A. Selvakumar, Ramesh Sundar, S. Manikandan, R. Gnanajeyaraman, U. Arul

    Published 2025-07-01
    “…The data are sent using reinforcement Q-learning techniques in conjunction with propagation routeing. …”
    Get full text
    Article
  7. 2267

    Trusted execution environments for quantum computers by Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer, Jakub Szefer

    Published 2025-06-01
    “…The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both. …”
    Get full text
    Article
  8. 2268

    Integrating artificial intelligence in drug discovery and early drug development: a transformative approach by Alberto Ocana, Atanasio Pandiella, Cristian Privat, Iván Bravo, Miguel Luengo-Oroz, Eitan Amir, Balazs Gyorffy

    Published 2025-03-01
    “…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
    Get full text
    Article
  9. 2269

    Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring by Mauro Rodriguez-Marin, Luis Gustavo Orozco-Alatorre

    Published 2025-02-01
    “…Despite these advancements, challenges remain regarding data quality, clinical integration, and privacy concerns. …”
    Get full text
    Article
  10. 2270

    Federated Online Learning for adaptive load forecasting across decentralized nodes by Mohamed Ahmed T.A. Elgalhud, Mohammad Navid Fekri, Syed Mir, Katarina Grolinger

    Published 2025-08-01
    “…The main drawbacks are twofold: (1) data sharing and transfer results in privacy and security risks, and (2) static models miss opportunities to learn from new data. …”
    Get full text
    Article
  11. 2271

    Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach by Jian Yang, Shaoxian Zhu, Zhongyi Wen, Qiang Li

    Published 2025-07-01
    “…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
    Get full text
    Article
  12. 2272

    Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications by MD. Abdur Rahman, M. Shamim Hossain, George Loukas, Elham Hassanain, Syed Sadiqur Rahman, Mohammed F. Alhamid, Mohsen Guizani

    Published 2018-01-01
    “…For security, the framework uses blockchain–Tor-based distributed transactions to preserve the therapeutic data privacy, ownership, generation, storage, and sharing. …”
    Get full text
    Article
  13. 2273

    Federated learning with integrated attention multiscale model for brain tumor segmentation by Sherly Alphonse, Fidal Mathew, K. Dhanush, V. Dinesh

    Published 2025-04-01
    “…However, traditional brain tumor segmentation techniques usually rely on centralized data storage and analysis, which might result in privacy issues and violations. …”
    Get full text
    Article
  14. 2274

    The Impact of Artificial Intelligence (AI) on Students’ Academic Development by Aniella Mihaela Vieriu, Gabriel Petrea

    Published 2025-03-01
    “…However, challenges such as over-reliance on AI, diminished critical thinking skills, data privacy risks, and academic dishonesty were also identified. …”
    Get full text
    Article
  15. 2275

    Application progress of artificial intelligence in managing thyroid disease by Qing Lu, Yu Wu, Jing Chang, Li Zhang, Qing Lv, Hui Sun

    Published 2025-06-01
    “…Despite the broad prospects of AI applications, challenges related to data privacy, model interpretability, and clinical applicability remain. …”
    Get full text
    Article
  16. 2276

    An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs by T. Sudhakar, R. Praveen, V. Natarajan

    Published 2025-03-01
    “…Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. …”
    Get full text
    Article
  17. 2277

    Mapping the landscape of machine learning in chronic disease management: A comprehensive bibliometric study by Shiying Shen, Wenhao Qi, Sixie Li, Jianwen Zeng, Xin Liu, Xiaohong Zhu, Chaoqun Dong, Bin Wang, Qian Xu, Shihua Cao

    Published 2025-07-01
    “…Conclusion ML is rapidly integrating into personalized medicine, real-time monitoring, and multimodal data fusion. However, challenges such as limited collaboration, weak model generalization, and data privacy persist. …”
    Get full text
    Article
  18. 2278

    Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns by Shunfang Hu, Yuanyuan Zhang, Yanru Guo, Yanru Chen, Liangyin Chen

    Published 2025-02-01
    “…IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. …”
    Get full text
    Article
  19. 2279

    Machine learning for post-diploma educational and career guidance: a scoping review in AI-driven decision support systems by Flavio Manganello, Elisa Rasca, Alberto Villa, Andrea Maddalena, Giannangelo Boccuzzi

    Published 2025-05-01
    “…This scoping review maps the application of ML in post-diploma guidance by examining the types of models used, data sources, reported outcomes, and ethical considerations related to fairness, privacy, and transparency. …”
    Get full text
    Article
  20. 2280

    Feasibility and acceptability of a contextualized brief psychological intervention for people with bipolar disorder in rural Ethiopia by Mekdes Demissie, Charlotte Hanlon, Lauren C. Ng, Rosie Mayston, Abebaw Fekadu

    Published 2025-07-01
    “…We conducted a mixed-method evaluation, including in-depth qualitative interviews, fidelity ratings of a random selection of 25% of the audio recorded intervention sessions, and self-reported change in symptom severity. We used thematic analysis for qualitative data and descriptive analysis for quantitative data. …”
    Get full text
    Article