Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useddds » \"usedddds (Expand Search)
Showing 2,381 - 2,400 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"useddds OR \"useddds)) privacy data\\"))~\""', query time: 0.16s Refine Results
  1. 2381

    Predicting and Preventing School Dropout with Business Intelligence: Insights from a Systematic Review by Diana-Margarita Córdova-Esparza, Juan Terven, Julio-Alejandro Romero-González, Karen-Edith Córdova-Esparza, Rocio-Edith López-Martínez, Teresa García-Ramírez, Ricardo Chaparro-Sánchez

    Published 2025-04-01
    “…We collected literature from the Google Scholar and Scopus databases using a comprehensive search strategy, incorporating keywords such as “business intelligence”, “machine learning”, and “big data”. …”
    Get full text
    Article
  2. 2382

    On-Device System for Device Directed Speech Detection for Improving Human Computer Interaction by Abhishek Singh, Rituraj Kabra, Rahul Kumar, Manjunath Belgod Lokanath, Reetika Gupta, Sumit Kumar Shekhar

    Published 2021-01-01
    “…To solve this, we propose an On-Device solution that listens to the user continuously for <bold>only</bold> predefined period and classifies the utterance into device-directed or non-device-directed using a deep learning-based model. Since our solution is On-Device, the privacy of the user is maintained. …”
    Get full text
    Article
  3. 2383

    Deep Learning dengan Teknik Early Stopping untuk Mendeteksi Malware pada Perangkat IoT by Iwang Moeslem Andika Surya, Triawan Adi Cahyanto, Lutfi Ali Muharom

    Published 2025-02-01
    “…This approach utilizes machine learning techniques and intense learning to identify and mitigate cyber threats. The use of Convolutional Neural Network (CNN) in classifying the IoT-23 dataset with the SMOTE (Synthetic Minority Oversampling Technique) data balancing technique and the Early Stopping function shows high results. …”
    Get full text
    Article
  4. 2384

    Role of digital technology in epidemic control: a scoping review on COVID-19 and Ebola by Amanuel Adugna, Gossa Fetene Abebe, Desalegn Girma, Melsew Setegn Alie, Tewodros Yosef, Daniel Asmelash, Dorka Dessalegn

    Published 2025-01-01
    “…Five main themes emerged: digital epidemiological surveillance (using data visualisation tools and online sources for early disease detection), rapid case identification, community transmission prevention (via digital contact tracing and assessing interventions with mobility data), public education messages and clinical care. …”
    Get full text
    Article
  5. 2385

    Electroencephalography-Based Brain-Computer Interfaces in Rehabilitation: A Bibliometric Analysis (2013–2023) by Ana Sophia Angulo Medina, Maria Isabel Aguilar Bonilla, Ingrid Daniela Rodríguez Giraldo, John Fernando Montenegro Palacios, Danilo Andrés Cáceres Gutiérrez, Yamil Liscano

    Published 2024-11-01
    “…Ethical considerations, including data privacy, transparency, and equitable access to BCI technologies, must be prioritized to ensure the inclusive development and use of these technologies across diverse socioeconomic groups.…”
    Get full text
    Article
  6. 2386
  7. 2387

    Lived experiences of women with spontaneous abortion at a district hospital, South Africa by Marshall Lockett, Robert J. Mash

    Published 2024-04-01
    “…Atlas-ti (version 22) software assisted with data analysis using the framework method. Results: A total of nine participants were interviewed. …”
    Get full text
    Article
  8. 2388

    A hybrid approach to time series forecasting: Integrating ARIMA and prophet for improved accuracy by Sherly A, Mary Subaja Christo, Jesi V Elizabeth

    Published 2025-09-01
    “…With the increasing volume of data generated by IoT devices, performing analytics at the edge offers significant advantages in terms of latency, bandwidth consumption, and privacy. …”
    Get full text
    Article
  9. 2389

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The obtained raw data is pre-processed by using handling missing values and adaptive min-max normalization. …”
    Get full text
    Article
  10. 2390

    Decentralized multi-agent federated and reinforcement learning for smart water management and disaster response by H. Mancy, Naglaa E. Ghannam, Amr Abozeid, Ahmed I. Taloba

    Published 2025-07-01
    “…IoT devices are adopted for sensing and data acquisition, adaptive learning for decision-making, and optimization of energy use among the agents in the system through metaheuristic algorithms. …”
    Get full text
    Article
  11. 2391

    LITERATURE REVIEW ON THE DOUBLE-EDGED SWORD OF AI IN MENTAL HEALTH: A DEEP DIVE INTO CHATGPT'S CAPABILITIES AND LIMITATIONS by Paul Arjanto, Feibry Feronika Wiwenly Senduk

    Published 2024-04-01
    “…Key ethical concerns include data privacy and accountability. Conclusion: The study recommends a balanced approach, suggesting ChatGPT as an adjunct rather than a replacement for conventional mental health services. …”
    Get full text
    Article
  12. 2392

    Electronic health record in military healthcare systems: A systematic review. by Amir Torab-Miandoab, Mahdi Basiri, Arasb Dabbagh-Moghaddam, Leila Gholamhosseini

    Published 2025-01-01
    “…Current literature on EHR use in military healthcare is lacking and disjointed. …”
    Get full text
    Article
  13. 2393

    Revolutionizing e-health: the transformative role of AI-powered hybrid chatbots in healthcare solutions by Jack Ng Kok Wah

    Published 2025-02-01
    “…After screening 116 studies, 29 met the criteria for inclusion. Data was extracted using a structured template, capturing study objectives, methodologies, findings, and challenges. …”
    Get full text
    Article
  14. 2394

    BSVA: blockchain-enabled secured vertical aggregation algorithm for transactions management in drug traceability framework by P. Bhuvaneshwari, Y. Harold Robinson, M. Bagya Lakshmi

    Published 2025-07-01
    “…The Certificate Authority is used to maintain a secure data-sharing process. The robust aggregation is used for the local models to process the chain code, ensuring the successful execution of the secured transaction. …”
    Get full text
    Article
  15. 2395

    Nurturing Sustainability in Toddlerhood: Investigating Preschool Teachers’ Views and Daily Practices in a Swedish Preschool by Deniz Kahriman-Pamuk, Ingrid Pramling Samuelsson

    Published 2024-11-01
    “…Methods: We employed a case study approach, incorporating observations, interviews, and document analysis for data collection. Qualitative techniques were used for data analysis. …”
    Get full text
    Article
  16. 2396

    Artificial intelligence optimizes the standardized diagnosis and treatment of chronic sinusitis by Yang-Yang Liu, Shao-Peng Jiang, Ying-Bin Wang

    Published 2025-03-01
    “…There may also be data privacy issues involved. Therefore, more research and improvements are needed to realise the full potential of AI in the diagnosis and treatment of CRS.ConclusionOur findings inform the clinical diagnosis and treatment of CRS and the development of AI-assisted clinical diagnosis and treatment systems. …”
    Get full text
    Article
  17. 2397
  18. 2398

    Level of satisfaction and associated factors among patients attending outpatient departments of south Wollo health facilities, Ethiopia. by Wolde Melese Ayele, Abdurahman Ewunetu, Muluken Genetu Chanie

    Published 2022-01-01
    “…A multistage sampling technique was used to select participants. Data were collected an interviewer-administered structured validated questionnaire. …”
    Get full text
    Article
  19. 2399

    Descriptive Phenomenology from Instances of Dishonesty in Psychotherapy by Psychotherapists by Hossein Alipour, Mahdi Akbari

    Published 2024-11-01
    “…A total of 16 psychotherapists constituted the sample for this research, and data were collected using a five-axis semi-structured interview protocol focused on psychotherapy dishonesty. …”
    Get full text
    Article
  20. 2400

    Optimized summary-statistic-based single-cell eQTL meta-analysis by Maryna Korshevniuk, Harm-Jan Westra, Roy Oelen, Monique G. P. van der Wijst, Lude Franke, Marc Jan Bonder, sc-eQTLGen Consortium

    Published 2025-08-01
    “…These are however, complicated by privacy constraints due to sharing of genotype data and the measurement and technical variety across different scRNA-seq datasets as a result of differences in mRNA capture efficiency, experimental protocols, and sequencing strategies. …”
    Get full text
    Article