Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
Showing 2,421 - 2,440 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"usedddddds OR \"usedddddds)) privacy data\\"))~\""', query time: 0.15s Refine Results
  1. 2421
  2. 2422

    Messenger-based assessment of empathic accuracy in couples’ smartphone communication by Philipp Steinebach, Miriam Stein, Knut Schnell

    Published 2025-02-01
    “…Methods Data from N = 102 participants (51 couples) was used to investigate how accurate judgments of partners’ affect map their partners’ actual affect. …”
    Get full text
    Article
  3. 2423

    Optimising resources allocation in implementing school counselling programme at schools in the Ohangwena region by Anna Niitembu Hako, Olaniyi Bojuwoye

    Published 2024-09-01
    “…In-depth semi-structured interviews and focus group discussions were used to gather data. Thematic results revealed that teacher-counsellors had no counselling rooms to conduct individual counselling, no separate budget for school counselling programme, and that file cabinets and display boards were only available in very few schools and were inadequate school-counsellor in schools. …”
    Get full text
    Article
  4. 2424

    Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing by Yuqi Xie, Ruwei Huang, Junbin Qiu

    Published 2025-04-01
    “…Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. …”
    Get full text
    Article
  5. 2425

    Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing by Yun-Yi Fan, Chit-Jie Chew, Jung-San Lee

    Published 2025-05-01
    “…Furthermore, the lack of transparency and credibility in intelligence sources has negatively impacted the quality and trustworthiness of shared data. To address these issues, authors aim to leverage blockchain technology, utilizing its decentralized and tamper-proof properties to ensure corporate privacy and the reliability of intelligence sources. …”
    Get full text
    Article
  6. 2426

    Leveraging Blockchain Technology for Secure 5G Offloading Processes by Cristina Regueiro, Santiago de Diego, Borja Urkizu

    Published 2025-04-01
    “…This paper proposes a Blockchain-based marketplace using Hyperledger Fabric to optimize resource allocation and enhance security. …”
    Get full text
    Article
  7. 2427

    Lightweight Authentication for Devices in Internet of Thing Environment: A Survey by Sameera Abbas Fadhel, Ahmed Sami Nori

    Published 2023-12-01
    “…The extremely large number of associated devices together through different protocols make it vulnerable to be threatened by several types of attacks, such as; Unauthorized Access and Authentication Attacks, Network Attacks, Data Privacy and Integrity Attacks, and Supply Chain Attacks. …”
    Get full text
    Article
  8. 2428

    Customer’s Satisfaction via Online Shopping Environment: The Case of China by GholamReza Zandi, Rezvan Torabi, Mohammad Amin Mohammad, Xu Yi Dan

    Published 2021-07-01
    “…The philosophy of positivism was used to evaluate the online shopping behaviour in a Chinese context. …”
    Get full text
    Article
  9. 2429

    Regulating AI in the Energy Sector: A Scoping Review of EU Laws, Challenges, and Global Perspectives by Bo Nørregaard Jørgensen, Zheng Grace Ma

    Published 2025-05-01
    “…Using the PRISMA-ScR methodology, this scoping review systematically analyzes how EU laws and regulations influence the development, adoption, and deployment of AI-driven digital solutions in energy generation, transmission, distribution, consumption, and markets. …”
    Get full text
    Article
  10. 2430

    Teenage Motherhood and its Effect on the Social Welfare of The Victims: A Case Study of Kabale Municipality. by Kwesiga, Siifa

    Published 2024
    “…Hence the study offers an in-depth analysis of the relative contribution of some socio¬demographic factors in explaining adolescent pregnancy in Kabale Municipality. Using primary data collected from different parts of the district, a sample of 30 female adolescents in the age range of 10-19 years was studied. …”
    Get full text
    Thesis
  11. 2431

    DualBranch-AMR: A Semi-Supervised AMR Method Based on Dual-Student Consistency Regularization with Dynamic Stability Evaluation by Jiankun Ma, Zhenxi Zhang, Linrun Zhang, Yu Li, Haoyue Tan, Xiaoran Shi, Feng Zhou

    Published 2025-07-01
    “…While deep learning has substantially improved the performance of Automatic Modulation Recognition (AMR), it heavily relies on large amounts of labeled data. Given the high annotation costs and privacy concerns, researching semi-supervised AMR methods that leverage readily available unlabeled data for training is of great significance. …”
    Get full text
    Article
  12. 2432

    Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County. by Ayebare, Esther Loy

    Published 2024
    “…The research utilized a cross-sectional design, incorporating both qualitative and quantitative approaches. Data were collected from 70 healthcare professionals in the selected sub-counties using questionnaires, interviews, and a thorough review of existing reports, policies, and other literature. …”
    Get full text
    Thesis
  13. 2433

    Leveraging deep neural network and language models for predicting long-term hospitalization risk in schizophrenia by Yihang Bao, Wanying Wang, Zhe Liu, Weidi Wang, Xue Zhao, Shunying Yu, Guan Ning Lin

    Published 2025-03-01
    “…In this study, we developed a deep learning model that integrates demographic, behavioral, and blood test data from admission to forecast extended hospital stays using a retrospective cohort. …”
    Get full text
    Article
  14. 2434

    Resilience in the Internet of Medical Things: A Review and Case Study by Vikas Tomer, Sachin Sharma, Mark Davis

    Published 2024-11-01
    “…Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. …”
    Get full text
    Article
  15. 2435

    Alternatives to continuous positive airway pressure treatment in sleep apnoeas and hypopnoeas syndrome related to myofunctional and postural reeducation therapy: protocol for a sys... by Montserrat Solera-Martínez, Blanca Notario-Pacheco, Rocio Palomo-Carrión, Marta Maria Guijarro-Herráiz, Natalia María Arias-Palencia, Lidia Lucas- de la Cruz, Beatriz Guijarro-Herráiz, Jose Luis García-Klepzig

    Published 2021-12-01
    “…Finally, several patient-related outcomes, namely sleep quality, quality of life and sleep Apnoeas and Hypoapnoeas Index, will be examined.Ethics and dissemination In this case, ethical approval is not necessary. The data used in the review will be exclusively obtained from published studies, implying there are no privacy concerns. …”
    Get full text
    Article
  16. 2436

    Information Technology in Nursing Practice: A Scoping Review of Assessment Tools for Evaluating Nurses’ Competencies by Cachata D, Costa M, Magalhães T, Lucas P, Gaspar F

    Published 2025-05-01
    “…This has driven the need to develop specific competencies and maintain a balance between ethical aspects, social and legal challenges related to privacy and data security, as well as the challenge of ensuring person-centered care practice. …”
    Get full text
    Article
  17. 2437

    DiReDi: Distillation and Reverse Distillation for AIoT Applications by Chen Sun, Qiang Tong, Wenshuang Yang, Wenqi Zhang

    Published 2024-01-01
    “…When the user needs to update the edge-AI model to better fit the actual scenario, two reverse distillation (RD) processes are employed to extract the knowledge – the difference between user preferences and the manufacturer's presumptions from the edge-AI model using the user's exclusive data. Only the extracted knowledge is reported back to the upper management cloud server to update the cloud AI model, thus protecting user privacy by not using any exclusive data. …”
    Get full text
    Article
  18. 2438

    Technology-enabled CONTACT tracing in care homes in the COVID-19 pandemic: the CONTACT non-randomised mixed-methods feasibility study by Carl A Thompson, Thomas A Willis, Amanda Farrin, Adam Gordon, Amrit Daffu-O’Reilly, Catherine Noakes, Kishwer Khaliq, Andrew Kemp, Tom Hall, Chris Bojke, Karen Spilsbury

    Published 2025-05-01
    “…Quantitative data were analysed using descriptive statistical methods, and qualitative data were thematically analysed using normalisation process theory. …”
    Get full text
    Article
  19. 2439

    CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity by Ogobuchi Daniel Okey, Demostenes Zegarra Rodriguez, Frederico Gadelha Guimaraes, Joao Henrique Kleinschmidt

    Published 2025-01-01
    “…Federated learning has recently gained significant attention as a method for building machine learning models due to its ability to preserve data privacy while delivering improved performance. …”
    Get full text
    Article
  20. 2440

    Emergency department care experiences among 2SLGBTQQIA+ patients: a mixed methods study by Sidonie Chard, Sawyer Karabelas-Pittman, Kel Martin, Elliot Chapple, David Messenger, Susan A. Bartels, Melanie Walker

    Published 2025-05-01
    “…Participants were recruited from the Kingston Health Sciences Centre’s ED, Urgent Care Centre, and at community-based organisations. Quantitative data were analysed using chi-squared tests, while qualitative data underwent thematic analysis. …”
    Get full text
    Article