Search alternatives:
\\"useds » \\"uses (Expand Search)
Showing 2,361 - 2,380 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR \"used) privacy data\\"))~\""', query time: 0.17s Refine Results
  1. 2361

    Opportunities and challenges of social media for oral health literacy improvement: a qualitative investigation based on Iranian dentists’ perspectives by Hossein Ghalavand, Sirous Panahi, Mohsen Nouri

    Published 2025-05-01
    “…Methods In the current qualitative investigation, a semi-structured interview was conducted with 24 dentists utilizing a purposive snowball sampling method. The analysis of the data was performed using thematic analysis in the MAXQDA 10 software. …”
    Get full text
    Article
  2. 2362

    Engaging Stakeholders in the Development of a National Digital Mental Health Strategy: Reflexive Thematic Analysis by Sarah Kennedy, Robyn Fitzgerald, Ruth Melia

    Published 2025-06-01
    “…Invited stakeholders included experts in DMH research, clinical practice, and mental health advocacy and policy, together with those with lived experience of accessing mental health services. Qualitative data were analyzed using a reflexive thematic analysis approach. …”
    Get full text
    Article
  3. 2363

    The Impact of Artificial Intelligence (AI) on Students’ Academic Development by Aniella Mihaela Vieriu, Gabriel Petrea

    Published 2025-03-01
    “…Quantitative data were analyzed using frequency and percentage calculations, while qualitative responses were subjected to thematic analysis, incorporating both vertical (individual responses) and horizontal (cross-dataset) approaches to ensure comprehensive theme identification. …”
    Get full text
    Article
  4. 2364

    An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs by T. Sudhakar, R. Praveen, V. Natarajan

    Published 2025-03-01
    “…Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. …”
    Get full text
    Article
  5. 2365

    Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns by Shunfang Hu, Yuanyuan Zhang, Yanru Guo, Yanru Chen, Liangyin Chen

    Published 2025-02-01
    “…IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. …”
    Get full text
    Article
  6. 2366

    Transforming higher education with robotic process automation: enhancing efficiency, innovation, and student-centered learning by Vivek Bhardwaj, Mukesh Kumar

    Published 2025-05-01
    “…Inclusion criteria focused on studies published between 2020 and 2024 that addressed RPA applications in education. Data analysis was conducted using thematic synthesis to identify key trends across the selected studies.…”
    Get full text
    Article
  7. 2367

    A Netnographic Analysis of ChatGPT Usage in Technology Forums in The Context of Society 5.0 by Serdar Pirtini, Songül Bilgili Sülük

    Published 2025-04-01
    “…However, users also expressed notable concerns about issues such as data security, privacy, and ethical considerations, underlining the dual nature of its societal impact. …”
    Get full text
    Article
  8. 2368

    ChatGPT in orthodontics: limitations and possibilities by Lima Nara Grazieli Martins, Costa Lavínia, Santos Patrícia Bittencourt

    Published 2024-07-01
    “…ChatGPT sometimes produces nonsensical responses and poses privacy risks associated with patient data. Generated medical advice might not therefore match professional expertise. …”
    Get full text
    Article
  9. 2369

    Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications by Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan

    Published 2021-01-01
    “…Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality. …”
    Get full text
    Article
  10. 2370

    The Application of Artificial Intelligence in Medical Diagnostics: Implications for Sports Medicine by Michał Bolek, Dominika Musialska, Aleksandra Kędzia, Bartosz Jagieła, Monika Fidyk, Magda Minkiewicz, Maciej Dyda

    Published 2025-05-01
    “…However, their integration into healthcare raises critical ethical concerns related to data privacy, algorithmic bias, and transparency. …”
    Get full text
    Article
  11. 2371

    FedDyH: A Multi-Policy with GA Optimization Framework for Dynamic Heterogeneous Federated Learning by Xuhua Zhao, Yongming Zheng, Jiaxiang Wan, Yehong Li, Donglin Zhu, Zhenyu Xu, Huijuan Lu

    Published 2025-03-01
    “…Federated learning (FL) is a distributed learning technique that ensures data privacy and has shown significant potential in cross-institutional image analysis. …”
    Get full text
    Article
  12. 2372

    Trusted execution environments for quantum computers by Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer, Jakub Szefer

    Published 2025-06-01
    “…Without dedicated security protections, quantum circuits submitted to cloud-based quantum computer providers could be accessed by the cloud provider, or malicious insiders working in the cloud provider's data centers. Furthermore, data embedded in these circuits can similarly be accessed as it is encoded using quantum gates inside the circuit. …”
    Get full text
    Article
  13. 2373

    Integrating artificial intelligence in drug discovery and early drug development: a transformative approach by Alberto Ocana, Atanasio Pandiella, Cristian Privat, Iván Bravo, Miguel Luengo-Oroz, Eitan Amir, Balazs Gyorffy

    Published 2025-03-01
    “…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
    Get full text
    Article
  14. 2374

    Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring by Mauro Rodriguez-Marin, Luis Gustavo Orozco-Alatorre

    Published 2025-02-01
    “…Unlike complex machine learning models, it offers parsimony in transparency, efficiency, and reproducibility, making it ideal for clinical settings where explainable, data-driven decisions are essential. Methods: A logistic regression model was developed using R to analyze biometric and demographic data from a cross-sectional dataset, including real-world data from public institucions. …”
    Get full text
    Article
  15. 2375

    Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach by Jian Yang, Shaoxian Zhu, Zhongyi Wen, Qiang Li

    Published 2025-07-01
    “…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
    Get full text
    Article
  16. 2376

    Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications by MD. Abdur Rahman, M. Shamim Hossain, George Loukas, Elham Hassanain, Syed Sadiqur Rahman, Mohammed F. Alhamid, Mohsen Guizani

    Published 2018-01-01
    “…For security, the framework uses blockchain–Tor-based distributed transactions to preserve the therapeutic data privacy, ownership, generation, storage, and sharing. …”
    Get full text
    Article
  17. 2377

    The State of Artificial Intelligence and its Prospects in Pakistan's Medical Sector by Rohail Akhtar Habib, Yumna Sattar Khan

    Published 2024-12-01
    “…The rising integration of AI in Pakistani medicine necessitates the evolution of regulatory frameworks to guarantee patient safety, data privacy, and ethical application of AI technologies. …”
    Get full text
    Article
  18. 2378

    Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective by Karin Brodén, Jonas Andersson, Agnieszka Kitkowska, Awais Ahmad, Peter Mozelius

    Published 2025-06-01
    “…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
    Get full text
    Article
  19. 2379

    A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023 by Shalini Kumari, Chander Prabha, Asif Karim, Md. Mehedi Hassan, Sami Azam

    Published 2024-01-01
    “…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
    Get full text
    Article
  20. 2380

    Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions by Tehseen Mazhar, Sunawar khan, Tariq Shahzad, Muhammad Amir khan, Mamoon M. Saeed, Joseph Bamidele Awotunde, Habib Hamam

    Published 2025-01-01
    “…Abstract This article discusses Blockchain and Generative AI in healthcare, including their uses, difficulties, and solutions. Blockchain technology improves EHR security, privacy, and interoperability, while smart contracts streamline supply chain management and administrative procedures. …”
    Get full text
    Article