Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddddds » \"usedddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,481 - 2,500 results of 2,784 for search '"\"((((\\"useds OR \"useddddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 2481

    Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning by Emad-Ul-Haq Qazi, Tanveer Zia, Muhammad Hamza Faheem, Khurram Shahzad, Muhammad Imran, Zeeshan Ahmed

    Published 2024-01-01
    “…The rapid evaluation of smart cities has revolutionized the research and development field to a very extensive level which presents challenges in handling massive amounts of data. However, the integration of IoT into various aspects of life has introduced various challenges related to the security and privacy of IoT systems. …”
    Get full text
    Article
  2. 2482

    A comprehensive survey on AI-enabled secure social industrial Internet of Things in the agri-food supply chain by Sajal Halder, Md Rafiqul Islam, Quazi Mamun, Arash Mahboubi, Patrick Walsh, Md Zahidul Islam

    Published 2025-08-01
    “…The findings indicate that AI-driven security solutions significantly enhance trust management, anomaly detection, and data privacy in SIIoT networks. The proposed taxonomy categorizes AI-enabled security mechanisms into five distinct areas, offering a structured reference for future research and practical implementations. …”
    Get full text
    Article
  3. 2483

    Advancing Healthcare: Intelligent Speech Technology for Transcription, Disease Diagnosis, and Interactive Control of Medical Equipment in Smart Hospitals by Ahmed Elhadad, Safwat Hamad, Noha Elfiky, Fulayjan Alanazi, Ahmed I. Taloba, Rasha M. Abd El-Aziz

    Published 2024-11-01
    “…The federated learning framework enabled collaborative model training across multiple hospital sites, preserving patient privacy by avoiding raw data exchange. This distributed approach allowed the model to learn from diverse, real-world data while ensuring compliance with strict data protection standards. …”
    Get full text
    Article
  4. 2484

    Developing an artificial intelligence-based progressive growing GAN for high-quality facial profile generation and evaluation through turing test and aesthetic analysis by Shahab Kavousinejad, Kazem Dalaie, Mohammad Behnaz, Soodeh Tahmasbi, Asghar Ebadifar, Hoori Mirmohammadsadeghi

    Published 2025-07-01
    “…This approach offers valuable applications in orthodontic education, treatment simulation, and data augmentation, particularly where patient privacy and dataset balance are critical. …”
    Get full text
    Article
  5. 2485

    Exploring Respectful Maternity Care and its determinants: a mixed methods cross-sectional study from a rural area in central India by Chullithala Athira, Anindo Majumdar, Roshan F. Sutar, Bharti Singh, Parvathy Thampy, Ashlesh Rupani, Deepti Dabar

    Published 2025-08-01
    “…Descriptive data is presented in frequency tables. Quantitative data were analyzed using logistic regression and qualitative data through thematic analysis. …”
    Get full text
    Article
  6. 2486
  7. 2487

    Exploring mHealth app utilization for diabetes self-management: survey insights from a northern district in Malaysia by Premaa Supramaniam, Ying-Shan Beh, Suria Junus, Philip Rajan Devesahayam

    Published 2024-12-01
    “…Users perceived the mHealth app as useful (97.5%), yet faced challenges over the app initiation, charges and data security. …”
    Get full text
    Article
  8. 2488

    A Blockchain-Based E-Participation Framework Utilizing Zero-Knowledge Proofs With Guaranteed Sampling and Differential Reward Mechanisms by Jungwon Seo, Juhui Lee, Yunjae Joo, Kangho Lee, Vijayan Sugumaran, Sooyong Park

    Published 2025-01-01
    “…Blockchain-based E-participation systems significantly enhance transparency, data integrity, and security compared to traditional E-participation methods. …”
    Get full text
    Article
  9. 2489

    Digital assistants for education and support of patients with endocrine disorders by Milić Marko Kimi, Sinanović Šćepan, Prodović Tanja, Subotić Slobodan, Kilibarda Tatjana

    Published 2025-01-01
    “…However, challenges such as data privacy concerns, trust in technology, and acce-ssibility issues remain barriers to broader adoption. …”
    Get full text
    Article
  10. 2490

    Iman di Era Digital: Praktik Konseling Pastoral Berbasis Teknologi Digital by Andreas Fredriko Simatupang, Gunawan Yuli Agung Suprabowo

    Published 2025-04-01
    “…However, there are also shortcomings such as a lack of mastery of digital technology among companions, data privacy and security issues, formal legitimacy from church authorities, as well as a potential reduction in the depth of interpersonal relationships. …”
    Get full text
    Article
  11. 2491

    Enhancing heart disease classification with M2MASC and CNN-BiLSTM integration for improved accuracy by Vivek Pandey, Umesh Kumar Lilhore, Ranjan Walia, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Sultan Algarni

    Published 2024-10-01
    “…Blockchain integration ensures stored health data’s security, transparency, and immutability, addresses privacy concerns, and promotes trust in the predictive system. …”
    Get full text
    Article
  12. 2492

    Implementing community-based interventions for the management of chronic conditions in low- and middle-income countries: A scoping review of qualitative evidence. by Syreen Hassan, Nancy Kagwanja, Brahima Diallo, Robinson Oyando, Pablo Perel, Anthony Etyang, Benjamin Tsofa, Ellen Nolte, IHCoR-Africa Collaborators

    Published 2025-01-01
    “…Eligible studies were those with a qualitative design that explored implementation challenges and facilitators of community-based interventions. Data were thematically analysed and interpreted using the Socio-Ecological Model (SEM) to capture multi-level influences on implementation. …”
    Get full text
    Article
  13. 2493

    HELA-CMM: capability maturity model for adoption of learning analytics in higher education by Diana Šimić, Nina Begičević Ređep, Sabina Rako, Nikola Kadoić, Wim Van Petegem, Bart Rienties, Nati Cabrera Lanzo, Michael Eichhorn, Lourdes Guàrdia, Sandra Kučina Softić, Alexander Tillmann

    Published 2025-04-01
    “…The proposed maturity model comprises 28 capabilities grouped into eight categories: (1) Teaching / Learning / Assessment, (2) Data Management and Analytics, (3) Ethics, Privacy, Legal Issues, (4) People Competences, (5) Management / Leadership, (6) Culture, (7) Infrastructure, and (8) Quality Assurance. …”
    Get full text
    Article
  14. 2494

    A Deep Learning-Based Ensemble Framework for Robust Android Malware Detection by Sainag Nethala, Pronoy Chopra, Khaja Kamaluddin, Shahid Alam, Soltan Alharbi, Mohammad Alsaffar

    Published 2025-01-01
    “…The exponential growth of Android applications has resulted in a surge of malware threats, posing severe risks to user privacy and data security. To address these challenges, this study introduces a novel malware detection approach utilizing an ensemble of Convolutional Neural Networks (CNNs) for enhanced classification accuracy. …”
    Get full text
    Article
  15. 2495

    Towards trustworthy AI-driven leukemia diagnosis: A hybrid Hierarchical Federated Learning and explainable AI framework by Khadija Pervez, Syed Irfan Sohail, Faiza Parwez, Muhammad Abdullah Zia

    Published 2025-01-01
    “…Hierarchical federated learning reduced communication costs by 15% while maintaining data privacy. The integration of explainable artificial intelligence improved the transparency of model decisions, with a high area under the ROC curve (AUC) of 0.98 for the classification of leukemia cells. …”
    Get full text
    Article
  16. 2496
  17. 2497

    Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications by Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan

    Published 2021-01-01
    “…Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality. …”
    Get full text
    Article
  18. 2498

    Artificial intelligence in the tourism business: a systematic review by Alexandra Lorena López-Naranjo, Mariana Isabel Puente-Riofrio, Verónica Adriana Carrasco-Salazar, Juan Diego Erazo-Rodríguez, Pamela Alexandra Buñay-Guisñan

    Published 2025-07-01
    “…The aim of this re-search is to explore the application of AI in the tourism industry, identifying the main AI technologies used in the business, the specific areas or processes, their benefits, and challenges. …”
    Get full text
    Article
  19. 2499

    The level of male involvement and associated factors in the prevention of mother-to-child transmission of HIV in Lusaka, Zambia by Sheila Mukuni Mutondo, Joseph Lupenga, Chris Mweemba, Oliver Mweemba

    Published 2025-12-01
    “…A 10—item male partner involvement scale was used in the survey, and focus group discussions with both men and women and key informants were used to collect qualitative data. …”
    Get full text
    Article
  20. 2500

    Research Progress in Artificial Intelligence for Central Serous Chorioretinopathy: A Systematic Review by Ping Zhang, Qing Zhang, Xinya Hu, Wei Chi, Weihua Yang

    Published 2025-07-01
    “…Incorporating federated learning for privacy-preserving data sharing and prioritizing explainability will be essential to overcoming barriers to physician adoption and improving trust in AI-driven clinical decision-making. …”
    Get full text
    Article