Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,121 - 2,140 results of 2,784 for search '"\"((((\\"useds OR \"usedddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.24s Refine Results
  1. 2121

    Exploring internal challenges and coping strategies in online English learning via Google Meet: A study of 7th grade students in Yogyakarta by Bambang Widi Pratolo, Liza Beliarita, Naif Daifullah Alsulami

    Published 2024-10-01
    “…Data were collected through interviews and documentation, with pseudonyms used to protect students' privacy. …”
    Get full text
    Article
  2. 2122

    Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis by Lana V Ivanitskaya, Dimitrios Zikos, Elina Erzikova

    Published 2025-06-01
    “…Researchers’ concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. …”
    Get full text
    Article
  3. 2123

    Mobile Apps and Wearable Devices for Cardiovascular Health: Narrative Review by Gauri Kumari Chauhan, Patrick Vavken, Christine Jacob

    Published 2025-04-01
    “…While 20% (4/20) of the included apps had clinical integration features such as clinician dashboards, only 10% (2/20) had the potential to effectively enhance clinician workflows. Privacy policies were present in 95% (19/20) of the apps, with 75% (15/20) adhering to General Data Protection Regulation (GDPR) regulations; 1 app had no data protection policy. …”
    Get full text
    Article
  4. 2124

    AI-Driven Framework for Secure and Efficient Load Management in Multi-Station EV Charging Networks by Md Sabbir Hossen, Md Tanjil Sarker, Marran Al Qwaid, Gobbi Ramasamy, Ngu Eng Eng

    Published 2025-07-01
    “…The framework uses federated learning (FL) to protect data privacy and make decisions in a decentralized way, which lowers the risks that come with centralizing data. …”
    Get full text
    Article
  5. 2125

    Healthcare professionals’ perspectives on artificial intelligence (AI)-based mobile applications (apps) for diabetes education and behavioural management by Phei-Ching Lim, Yung-Wey Chong, Qiu-Ting Chie, Hadzliana Zainal, Kok-Lim Alvin Yau, Soo-Huat Teoh

    Published 2025-03-01
    “…However, significant concerns were raised about accessibility for older adults, data privacy, and the apps’ ability to modify entrenched behaviours without human intervention. …”
    Get full text
    Article
  6. 2126

    Redefining Urban Traffic Dynamics With TCN-FL Driven Traffic Prediction and Control Strategies by K. M. Karthick Raghunath, C. Rohith Bhat, Venkatesan Vinoth Kumar, Velmurugan Athiyoor Kannan, T. R. Mahesh, K. Manikandan, N. Krishnamoorthy

    Published 2024-01-01
    “…The system guarantees data privacy and utilizes decentralized information analysis using Federated Learning. …”
    Get full text
    Article
  7. 2127

    A Meta-Reinforcement Learning-Based Poisoning Attack Framework Against Federated Learning by Wei Zhou, Donglai Zhang, Hongjie Wang, Jinliang Li, Mingjian Jiang

    Published 2025-01-01
    “…As a distributed machine learning paradigm, federated learning enables clients to collaboratively train a global model without sharing their raw data, thus preserving data privacy while still utilizing the data. …”
    Get full text
    Article
  8. 2128

    A mixed-method study to inform the design of a video observed therapy app to monitor individuals with TB in the Dominican Republic by Julio Arturo Canario-Guzmán, Ricardo Elias-Melgen, Eddys Rafael Mendoza, Luis Felipe Arias, Roberto Espinal, Jeannette Báez, Sarah Iribarren

    Published 2025-06-01
    “…Data integration was achieved by comparing convergent and divergent results.ResultsParticipants expressed a positive attitude towards using DAT to facilitate communication with health personnel to support treatment adherence. …”
    Get full text
    Article
  9. 2129

    Barriers to and enhancement of the utilization of digital mental health interventions in low-resource settings: Perceptions of young people in Uganda by Erisa Sabakaki Mwaka, Datsun Bazzeketa, Joy Mirembe, Reagan D. Emoru, Adelline Twimukye, Apollo Kivumbi

    Published 2025-02-01
    “…A thematic approach was used to interpret the results. Results Three themes were identified from the data including perceptions of using DMH services, the perceived barriers to utilization, and suggestions for enhancement of DMH for YP in low-resource settings. …”
    Get full text
    Article
  10. 2130

    Generative Artificial Intelligence Tools in Medical Research (GAMER): Protocol for a Scoping Review and Development of Reporting Guidelines by Xufei Luo, Yih Chung Tham, Mohammad Daher, Zhaoxiang Bian, Yaolong Chen, Janne Estill

    Published 2025-08-01
    “…However, the increasing use of GenAI tools in medical research presents challenges, including ethical concerns, data privacy issues, and the potential for generating false content. …”
    Get full text
    Article
  11. 2131

    Barriers to access to care in the implementation of telemedicine in public hospitals in Southern Ethiopia: A phenomenological qualitative study. by Getachew Nigussie Bolado, Bizuayehu Atinafu Ataro, Christian Kebede Gadabo, Tamirat Ersino Kebamo, Worku Mimanu Minuta, Abenezer Duta Wolde

    Published 2025-01-01
    “…The data analysis was conducted using OpenCode 4.02 software, and a content thematic analysis was executed following Colaizzi's 7-step method.…”
    Get full text
    Article
  12. 2132

    Human centered design of AI-powered Digital Therapeutics for stress prevention: Perspectives from multi-stakeholders' workshops about the SHIVA solution by Marco Bolpagni, Susanna Pardini, Silvia Gabrielli

    Published 2024-12-01
    “…Results: Stakeholders perceived AI-based data processing as beneficial for personalized treatment in a secure, privacy-preserving environment. …”
    Get full text
    Article
  13. 2133

    Analyzing the trend of government support for cloud computing usage in e-government architecture by Muhammad Younus, Eko Priyo Purnomo, Achmad Nurmandi, Dyah Mutiarin, Halimah Abdul Manaf, Fathiya Mumtaz, Tiara Khairunnisa

    Published 2025-02-01
    “…Overall, challenges persist, spanning from concerns regarding data safekeeping and privacy, but it also signifies a strategic transition towards harnessing digital technologies to provide more agile, citizen-focused public services.…”
    Get full text
    Article
  14. 2134

    Quantitative and qualitative analysis of balcony usage and its impact on the landscape of the neighborhood by Fatemeh Foghani, azadeh shahcheraghi, Zahra Sadat Saeideh zarabadi

    Published 2024-07-01
    “…This research is of qualitative-interpretive type, research strategy, case study and data collection was done by field method. In this research, 20 medium-rise residential buildings built in the 90s, consisting of 100 balconies, were selected in the Darya neighborhood of District 2, Tehran. how they were used by users was analyzed. …”
    Get full text
    Article
  15. 2135

    Adaptive Learning Algorithms for Low Dose Optimization in Coronary Arteries Angiography: A Comprehensive Review by Komal Tariq, Muhammad Adnan Munir, Hafiza Tooba Aftab, Amir Naveed, Ayesha Yousaf, Sajjad Ul Hassan

    Published 2024-06-01
    “…Results: The extracted data shows a comprehensive data on various techniques that are used for low dose CAA, advancements in image segmentation, noise reduction, and operator dose reduction highlight the potential of machine learning techniques. …”
    Get full text
    Article
  16. 2136

    Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications by Velliangiri A, Damle Madhavi, Abraham Peter Soosai Anandaraj, Satish Babu Jampani

    Published 2025-05-01
    “…To increase security, the model uses a hybrid encryption scheme that combines elliptic curve cryptography (ECC) with lightweight symmetric encryption, ensuring data confidentiality with minimal computational overhead. …”
    Get full text
    Article
  17. 2137

    Bi-Modal Multiperspective Percussive (BiMP) Dataset for Visual and Audio Human Fall Detection by Joe Dibble, Michael C. F. Bazzocchi

    Published 2025-01-01
    “…Typical fall detection systems classify a fall event using either inertial- or vision-based data. Aside from these two modes of input for fall detection, sparse human fall audio data is available. …”
    Get full text
    Article
  18. 2138

    Deep multi-biometric fuzzy commitment scheme: fusion methods and performance by Valentina Fohr, Christian Rathgeb

    Published 2025-07-01
    “…Abstract Biometric cryptosystems enable privacy-preserving authentication using biometric data, such as fingerprints or iris scans. …”
    Get full text
    Article
  19. 2139

    Role of Artificial Intelligence in Dentistry by V. Hysenaj-Cakolli, B. Kolgeci, V. Hysenaj-Hoxha, D. Kolgeci

    Published 2025-06-01
    “…Dental professionals require specialized training, many regions lack access to advanced AI technology, and patient data privacy raises ethical concerns. While AI holds great potential, it should complement human expertise rather than replace it. …”
    Get full text
    Article
  20. 2140

    Covid-19 and Technological Disruption in Health Care Delivery in England by Louise Dalingwater

    Published 2023-11-01
    “…There is also an increased privacy risk when health data is digitalised. There are thus significant governance and infrastructure issues in the delivery of health care via digital devices, which this paper will explore. …”
    Get full text
    Article