Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
Showing 2,401 - 2,420 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"useddddds OR \"useddddds)) privacy data\\"))~\""', query time: 0.18s Refine Results
  1. 2401

    Digital Empowerment in Social Work: Leveraging AI to Enhance Educational Access in Developing Nations by Zvinodashe Revesai, Benjamin Tungwa, Telson Anesu Chisosa, Vanessa Runyararo Meki

    Published 2024-12-01
    “…Data were analyzed using thematic analysis, examining cases and models where AI has expanded access to scholarly materials through automated translation services, enabled localized resources through virtual training simulations, and facilitated the incorporation of culturally aligned self-help tools such as AI chatbots and wellness applications. …”
    Get full text
    Article
  2. 2402

    Preparing future educators for AI-enhanced classrooms: Insights into AI literacy and integration by Lucas Kohnke, Di Zou, Amy Wanyu Ou, Michelle Mingyue Gu

    Published 2025-06-01
    “…We conducted semi-structured interviews with 15 pre-service teachers and used thematic analysis to interpret the data. Our findings revealed that these future educators recognised AI's potential to enhance personalised learning and increase classroom efficiency but worried about relying on AI too much and losing the human element in teaching. …”
    Get full text
    Article
  3. 2403

    Artificial intelligence in personalized rehabilitation: current applications and a SWOT analysis by Elpidio Attoh-Mensah, Arnaud Boujut, Arnaud Boujut, Mikaël Desmons, Anaick Perrochon

    Published 2025-07-01
    “…Additionally, threats such as data privacy breaches and security vulnerabilities emphasize the need for robust, balanced regulatory frameworks. …”
    Get full text
    Article
  4. 2404

    Designing digital conversational agents for youth with multiple mental health conditions: Insights on key features from a youth-engaged qualitative descriptive study by Jingyi Hou, Jamie Gibson, Thalia Phi, Brian Ritchie, Louise Gallagher, Gillian Strudwick, George Foussias, Darren B Courtney, Aristotle Voineskos, Stephanie Ameis, Kristin Cleverley, Lisa D Hawke

    Published 2025-03-01
    “…Results Four key themes were generated from the focus group data: (1) the importance of a customizable and flexible design for personalization; (2) confidentiality, privacy features and risk mitigation features; (3) the need for reliable, informative content that is user tested and validated; (4) a friendly and human-like interaction style. …”
    Get full text
    Article
  5. 2405

    Pain expression and intercultural identity: a comparison between English and Persian among EFL learners by Hakimeh Abedini

    Published 2025-05-01
    “…Persian was often used for its emotionally resonant and metaphor-rich expressions, reflecting the cultural and historical depth of the language. …”
    Get full text
    Article
  6. 2406

    De-identification of Emergency Medical Records in French: Survey and Comparison of State-of-the-Art Automated Systems by Loick Bourdois, Marta Avalos, Gabrielle Chenais, Frantz Thiessard, Philippe Revel, Cedric Gil-Jardine, Emmanuel Lagarde

    Published 2021-04-01
    “…For visits motivated by a traumatic event, information on the causes are stored in free-text clinical notes. To exploit these data, an automated de-identification system guaranteeing protection of privacy is required. …”
    Get full text
    Article
  7. 2407

    Teaching postsecondary students about the ethics of artificial intelligence: A scoping review protocol. by Calvin Hillis, Maushumi Bhattacharjee, Batool AlMousawi, Tarik Eltanahy, Sara Ono, Marcus Hui, Ba' Pham, Michelle Swab, Gordon V Cormack, Maura R Grossman, Ebrahim Bagheri, Zack Marshall

    Published 2025-01-01
    “…The field of AI carries inherent risks such as algorithmic biases, security vulnerabilities, and ethical concerns related to privacy and data protection. Despite these risks, AI holds significant promise for social good, with applications ranging from improved healthcare diagnostics to enhanced education strategies. …”
    Get full text
    Article
  8. 2408

    Blockchain-Based Incentive Mechanism for Electronic Medical Record Sharing Platform: An Evolutionary Game Approach by Dexin Zhu, Yuanbo Li, Zhiqiang Zhou, Zilong Zhao, Lingze Kong, Jianan Wu, Jian Zhao, Jun Zheng

    Published 2025-03-01
    “…This system considers the potential malicious behaviors of both users and research institutions, encouraging research institutions to protect users’ privacy, reduce users’ concerns, and guide users to actively contribute data. …”
    Get full text
    Article
  9. 2409

    A Biologically Inspired Trust Model for Open Multi-Agent Systems That Is Resilient to Rapid Performance Fluctuations by Zoi Lygizou, Dimitris Kalles

    Published 2025-05-01
    “…However, existing trust models face challenges such as agent mobility, which causes agents to lose accumulated trust when moving across networks; changing behaviors, where previously reliable agents may degrade over time; and the cold start problem, which hinders the evaluation of newly introduced agents due to a lack of prior data. To address these issues, we introduced a biologically inspired trust model in which trustees assess their own capabilities and store trust data locally. …”
    Get full text
    Article
  10. 2410

    The Role of Artificial Intelligence in Boosting Cybersecurity and Trusted Embedded Systems Performance: A Systematic Review on Current and Future Trends by Ahmed Oun, Kaden Wince, Xiangyi Cheng

    Published 2025-01-01
    “…The key findings of our review indicate that AI significantly enhances security measures by enabling capabilities such as detection, classification, feature selection, data privacy preservation, model combination, data generation, output interpretation, optimization, and adaptation. …”
    Get full text
    Article
  11. 2411

    Blockchain-Based, Dynamic Attribute-Based Access Control for Smart Home Energy Systems by Urooj Waheed, Sadiq Ali Khan, Muhammad Masud, Huma Jamshed, Touqeer Ahmed Jumani, Najeeb Ur Rehman Malik

    Published 2025-04-01
    “…The literature reveals numerous cases of cyberattacks on IoT-based energy infrastructures, primarily involving unauthorized access, data breaches, and device exploitation. Therefore, designing a robust ecosystem with secure and efficient access control (AC), while safeguarding user functionality and privacy, is essential. …”
    Get full text
    Article
  12. 2412

    Exclusive breastfeeding practices and factors affecting them in urban areas of Uttar Pradesh by Prakhar Sharma, Neha Bansal, Abha Kaul

    Published 2025-01-01
    “…Data analysis was performed using Statistical Package for Social Sciences, including descriptive statistics and the Chi-square test for categorical variables (P < 0.05). …”
    Get full text
    Article
  13. 2413

    Empowerment in structures. Practical-ethical considerations of the preconditions for technology-assisted dementia care in Germany based on an expert-interview study by Johannes Welsch, Silke Schicktanz

    Published 2025-01-01
    “…Thematic content analysis was used to analyze the data.FindingsThe experts’ assessments of the current preconditions for TADC in Germany were starkly ambivalent. …”
    Get full text
    Article
  14. 2414

    Artificial intelligence knowledge, attitudes and application perspectives of undergraduate and specialty students of faculty of dentistry in Turkey: an online survey research by Cemile Yılmaz, Rahime Zeynep Erdem, Latife Altınok Uygun

    Published 2024-10-01
    “…Statistical analysis was performed using IBM SPSS version 26.0, with quantitative data presented as mean ± standard deviation and categorical data as frequency (percentage). …”
    Get full text
    Article
  15. 2415

    Benchmarking Accelerometer and CNN-Based Vision Systems for Sleep Posture Classification in Healthcare Applications by Minh Long Hoang, Guido Matrella, Dalila Giannetto, Paolo Craparo, Paolo Ciampolini

    Published 2025-06-01
    “…The results demonstrate that while image-based models are effective, accelerometer-based classification offers higher precision and robustness, particularly in real-time and privacy-sensitive scenarios. Further comparisons of the system characteristics, data size, and training time are also carried out to offer crucial insights for selecting the appropriate technology in clinical, in-home, or embedded healthcare monitoring applications.…”
    Get full text
    Article
  16. 2416

    A secured remote patient monitoring framework for IoMT ecosystems by Pronaya Bhattacharya, Anwesha Mukherjee, Bharat Bhushan, Shashi Kant Gupta, Thippa Reddy Gadekallu, Zhu Zhu

    Published 2025-07-01
    “…There is a need for real-time IoMT computing closer to the dew, with secured and privacy-enabled access to healthcare data. To address this, we propose the DeW-IoMT framework, which includes a dew layer in the roof-fog-cloud systems. …”
    Get full text
    Article
  17. 2417

    A review of machine learning and internet-of-things on the water quality assessment: Methods, applications and future trends by Gangani Dharmarathne, A.M.S.R. Abekoon, Madhusha Bogahawaththa, Janaka Alawatugoda, D.P.P. Meddage

    Published 2025-06-01
    “…While IoT significantly improves real-time contamination detection, persistent challenges remain in sensor fouling, data continuity, data privacy, network reliability, and cybersecurity. …”
    Get full text
    Article
  18. 2418

    Machine Learning-Based Blockchain Technology for Secure V2X Communication: Open Challenges and Solutions by Yonas Teweldemedhin Gebrezgiher, Sekione Reward Jeremiah, Xianjun Deng, Jong Hyuk Park

    Published 2025-08-01
    “…However, as V2X communication becomes more widespread, it becomes a prime target for adversarial and persistent cyberattacks, posing significant threats to the security and privacy of CAVs. These challenges are compounded by the dynamic nature of vehicular networks and the stringent requirements for real-time data processing and decision-making. …”
    Get full text
    Article
  19. 2419

    Obstetric Caregivers’ Perspectives on Barriers and Perceived Impacts of Male Involvement in Antenatal Care and Labour in Ekiti State, Nigeria: A Qualitative Study by Adetunmise Olajide, Deborah Esan, Ilerioluwa Adeniyi, Carlos Ramos

    Published 2025-04-01
    “…Twelve obstetric caregivers (six doctors and six midwives) were purposivelyselected based on their experience in ANC and labour care. Data were collected through two focusgroup discussions using a semi-structured interview guide. …”
    Get full text
    Article
  20. 2420

    Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3 by Merryana Lestari, Hindriyanto Dwi Purnomo, Irwan Sembiring

    Published 2021-10-01
    “…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
    Get full text
    Article