Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\"useds » \"usedds (Expand Search)
\\"useds » \\"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\"useds » \"usedds (Expand Search)
\\"useds » \\"usedds (Expand Search)
-
2121
Exploring internal challenges and coping strategies in online English learning via Google Meet: A study of 7th grade students in Yogyakarta
Published 2024-10-01“…Data were collected through interviews and documentation, with pseudonyms used to protect students' privacy. …”
Get full text
Article -
2122
Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis
Published 2025-06-01“…Researchers’ concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. …”
Get full text
Article -
2123
Mobile Apps and Wearable Devices for Cardiovascular Health: Narrative Review
Published 2025-04-01“…While 20% (4/20) of the included apps had clinical integration features such as clinician dashboards, only 10% (2/20) had the potential to effectively enhance clinician workflows. Privacy policies were present in 95% (19/20) of the apps, with 75% (15/20) adhering to General Data Protection Regulation (GDPR) regulations; 1 app had no data protection policy. …”
Get full text
Article -
2124
AI-Driven Framework for Secure and Efficient Load Management in Multi-Station EV Charging Networks
Published 2025-07-01“…The framework uses federated learning (FL) to protect data privacy and make decisions in a decentralized way, which lowers the risks that come with centralizing data. …”
Get full text
Article -
2125
Healthcare professionals’ perspectives on artificial intelligence (AI)-based mobile applications (apps) for diabetes education and behavioural management
Published 2025-03-01“…However, significant concerns were raised about accessibility for older adults, data privacy, and the apps’ ability to modify entrenched behaviours without human intervention. …”
Get full text
Article -
2126
Redefining Urban Traffic Dynamics With TCN-FL Driven Traffic Prediction and Control Strategies
Published 2024-01-01“…The system guarantees data privacy and utilizes decentralized information analysis using Federated Learning. …”
Get full text
Article -
2127
A Meta-Reinforcement Learning-Based Poisoning Attack Framework Against Federated Learning
Published 2025-01-01“…As a distributed machine learning paradigm, federated learning enables clients to collaboratively train a global model without sharing their raw data, thus preserving data privacy while still utilizing the data. …”
Get full text
Article -
2128
A mixed-method study to inform the design of a video observed therapy app to monitor individuals with TB in the Dominican Republic
Published 2025-06-01“…Data integration was achieved by comparing convergent and divergent results.ResultsParticipants expressed a positive attitude towards using DAT to facilitate communication with health personnel to support treatment adherence. …”
Get full text
Article -
2129
Barriers to and enhancement of the utilization of digital mental health interventions in low-resource settings: Perceptions of young people in Uganda
Published 2025-02-01“…A thematic approach was used to interpret the results. Results Three themes were identified from the data including perceptions of using DMH services, the perceived barriers to utilization, and suggestions for enhancement of DMH for YP in low-resource settings. …”
Get full text
Article -
2130
Generative Artificial Intelligence Tools in Medical Research (GAMER): Protocol for a Scoping Review and Development of Reporting Guidelines
Published 2025-08-01“…However, the increasing use of GenAI tools in medical research presents challenges, including ethical concerns, data privacy issues, and the potential for generating false content. …”
Get full text
Article -
2131
Barriers to access to care in the implementation of telemedicine in public hospitals in Southern Ethiopia: A phenomenological qualitative study.
Published 2025-01-01“…The data analysis was conducted using OpenCode 4.02 software, and a content thematic analysis was executed following Colaizzi's 7-step method.…”
Get full text
Article -
2132
Human centered design of AI-powered Digital Therapeutics for stress prevention: Perspectives from multi-stakeholders' workshops about the SHIVA solution
Published 2024-12-01“…Results: Stakeholders perceived AI-based data processing as beneficial for personalized treatment in a secure, privacy-preserving environment. …”
Get full text
Article -
2133
Analyzing the trend of government support for cloud computing usage in e-government architecture
Published 2025-02-01“…Overall, challenges persist, spanning from concerns regarding data safekeeping and privacy, but it also signifies a strategic transition towards harnessing digital technologies to provide more agile, citizen-focused public services.…”
Get full text
Article -
2134
Quantitative and qualitative analysis of balcony usage and its impact on the landscape of the neighborhood
Published 2024-07-01“…This research is of qualitative-interpretive type, research strategy, case study and data collection was done by field method. In this research, 20 medium-rise residential buildings built in the 90s, consisting of 100 balconies, were selected in the Darya neighborhood of District 2, Tehran. how they were used by users was analyzed. …”
Get full text
Article -
2135
Adaptive Learning Algorithms for Low Dose Optimization in Coronary Arteries Angiography: A Comprehensive Review
Published 2024-06-01“…Results: The extracted data shows a comprehensive data on various techniques that are used for low dose CAA, advancements in image segmentation, noise reduction, and operator dose reduction highlight the potential of machine learning techniques. …”
Get full text
Article -
2136
Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications
Published 2025-05-01“…To increase security, the model uses a hybrid encryption scheme that combines elliptic curve cryptography (ECC) with lightweight symmetric encryption, ensuring data confidentiality with minimal computational overhead. …”
Get full text
Article -
2137
Bi-Modal Multiperspective Percussive (BiMP) Dataset for Visual and Audio Human Fall Detection
Published 2025-01-01“…Typical fall detection systems classify a fall event using either inertial- or vision-based data. Aside from these two modes of input for fall detection, sparse human fall audio data is available. …”
Get full text
Article -
2138
Deep multi-biometric fuzzy commitment scheme: fusion methods and performance
Published 2025-07-01“…Abstract Biometric cryptosystems enable privacy-preserving authentication using biometric data, such as fingerprints or iris scans. …”
Get full text
Article -
2139
Role of Artificial Intelligence in Dentistry
Published 2025-06-01“…Dental professionals require specialized training, many regions lack access to advanced AI technology, and patient data privacy raises ethical concerns. While AI holds great potential, it should complement human expertise rather than replace it. …”
Get full text
Article -
2140
Covid-19 and Technological Disruption in Health Care Delivery in England
Published 2023-11-01“…There is also an increased privacy risk when health data is digitalised. There are thus significant governance and infrastructure issues in the delivery of health care via digital devices, which this paper will explore. …”
Get full text
Article