Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"useddds » \"usedddds (Expand Search)
Showing 2,501 - 2,520 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"useds OR \"useddds)) privacy data\\"))~\""', query time: 0.21s Refine Results
  1. 2501

    Digital assistants for education and support of patients with endocrine disorders by Milić Marko Kimi, Sinanović Šćepan, Prodović Tanja, Subotić Slobodan, Kilibarda Tatjana

    Published 2025-01-01
    “…However, challenges such as data privacy concerns, trust in technology, and acce-ssibility issues remain barriers to broader adoption. …”
    Get full text
    Article
  2. 2502

    Enhancing heart disease classification with M2MASC and CNN-BiLSTM integration for improved accuracy by Vivek Pandey, Umesh Kumar Lilhore, Ranjan Walia, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Sultan Algarni

    Published 2024-10-01
    “…Blockchain integration ensures stored health data’s security, transparency, and immutability, addresses privacy concerns, and promotes trust in the predictive system. …”
    Get full text
    Article
  3. 2503

    Implementing community-based interventions for the management of chronic conditions in low- and middle-income countries: A scoping review of qualitative evidence. by Syreen Hassan, Nancy Kagwanja, Brahima Diallo, Robinson Oyando, Pablo Perel, Anthony Etyang, Benjamin Tsofa, Ellen Nolte, IHCoR-Africa Collaborators

    Published 2025-01-01
    “…Eligible studies were those with a qualitative design that explored implementation challenges and facilitators of community-based interventions. Data were thematically analysed and interpreted using the Socio-Ecological Model (SEM) to capture multi-level influences on implementation. …”
    Get full text
    Article
  4. 2504

    HELA-CMM: capability maturity model for adoption of learning analytics in higher education by Diana Šimić, Nina Begičević Ređep, Sabina Rako, Nikola Kadoić, Wim Van Petegem, Bart Rienties, Nati Cabrera Lanzo, Michael Eichhorn, Lourdes Guàrdia, Sandra Kučina Softić, Alexander Tillmann

    Published 2025-04-01
    “…The proposed maturity model comprises 28 capabilities grouped into eight categories: (1) Teaching / Learning / Assessment, (2) Data Management and Analytics, (3) Ethics, Privacy, Legal Issues, (4) People Competences, (5) Management / Leadership, (6) Culture, (7) Infrastructure, and (8) Quality Assurance. …”
    Get full text
    Article
  5. 2505

    A Deep Learning-Based Ensemble Framework for Robust Android Malware Detection by Sainag Nethala, Pronoy Chopra, Khaja Kamaluddin, Shahid Alam, Soltan Alharbi, Mohammad Alsaffar

    Published 2025-01-01
    “…The exponential growth of Android applications has resulted in a surge of malware threats, posing severe risks to user privacy and data security. To address these challenges, this study introduces a novel malware detection approach utilizing an ensemble of Convolutional Neural Networks (CNNs) for enhanced classification accuracy. …”
    Get full text
    Article
  6. 2506
  7. 2507

    Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications by Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan

    Published 2021-01-01
    “…Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality. …”
    Get full text
    Article
  8. 2508

    Artificial intelligence in the tourism business: a systematic review by Alexandra Lorena López-Naranjo, Mariana Isabel Puente-Riofrio, Verónica Adriana Carrasco-Salazar, Juan Diego Erazo-Rodríguez, Pamela Alexandra Buñay-Guisñan

    Published 2025-07-01
    “…The aim of this re-search is to explore the application of AI in the tourism industry, identifying the main AI technologies used in the business, the specific areas or processes, their benefits, and challenges. …”
    Get full text
    Article
  9. 2509

    The level of male involvement and associated factors in the prevention of mother-to-child transmission of HIV in Lusaka, Zambia by Sheila Mukuni Mutondo, Joseph Lupenga, Chris Mweemba, Oliver Mweemba

    Published 2025-12-01
    “…A 10—item male partner involvement scale was used in the survey, and focus group discussions with both men and women and key informants were used to collect qualitative data. …”
    Get full text
    Article
  10. 2510

    Research Progress in Artificial Intelligence for Central Serous Chorioretinopathy: A Systematic Review by Ping Zhang, Qing Zhang, Xinya Hu, Wei Chi, Weihua Yang

    Published 2025-07-01
    “…Incorporating federated learning for privacy-preserving data sharing and prioritizing explainability will be essential to overcoming barriers to physician adoption and improving trust in AI-driven clinical decision-making. …”
    Get full text
    Article
  11. 2511

    Diagnostic Applications of AI in Sports: A Comprehensive Review of Injury Risk Prediction Methods by Carmina Liana Musat, Claudiu Mereuta, Aurel Nechita, Dana Tutunaru, Andreea Elena Voipan, Daniel Voipan, Elena Mereuta, Tudor Vladimir Gurau, Gabriela Gurău, Luiza Camelia Nechita

    Published 2024-11-01
    “…This review also addresses critical issues such as data quality, ethical concerns, privacy, and the need for transparency in AI applications. …”
    Get full text
    Article
  12. 2512

    Reinforcement learning based route optimization model to enhance energy efficiency in internet of vehicles by Quadeer Hussain, Ahmad Shukri Mohd Noor, Muhammad Mukhtar Qureshi, Jianqiang Li, Atta-ur Rahman, Aghiad Bakry, Tariq Mahmood, Amjad Rehman

    Published 2025-01-01
    “…However, some issues remain, like data protection, privacy, compatibility with other protocols and systems, and the availability of stable and continuous connections. …”
    Get full text
    Article
  13. 2513
  14. 2514

    New Image Crypto-Compression Scheme Based on Ecc and Chaos Theory for High-Speed and Reliable Transmission of Medical Images in the IOMT by Kinani Khadija El, Amounas Fatima, Bendaoud Salma, Azrour Mourade, Badiy Mohamed

    Published 2024-12-01
    “…Ensuring the security and privacy of medical data is crucial when integrating with smart and intelligent sensor devices within the hospital environment. …”
    Get full text
    Article
  15. 2515

    Insights from platelet donors in tertiary care hospitals by Swapna Yalamanchili, Vijayashree Raghavan, Femela Muniraj, V. Mythily

    Published 2025-04-01
    “…Statistical Analysis: Data were analyzed using descriptive statistics and percentage analysis with SPSS version 23. …”
    Get full text
    Article
  16. 2516

    Biometrically-independent fuzzy signatures: signing with biometrics without embedding them by Saki Otsuki, Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana, Hiroto Tamiya, Kenji Yasunaga

    Published 2025-06-01
    “…However, FS faces two significant privacy concerns. First, using biometric information as the signing key restricts users’ ability to manage multiple distinct keys for different applications. …”
    Get full text
    Article
  17. 2517

    Large Language Model and Traditional Machine Learning Scoring of Evolutionary Explanations: Benefits and Drawbacks by Yunlong Pan, Ross H. Nehm

    Published 2025-05-01
    “…Few studies have compared Large Language Models (LLMs) to traditional Machine Learning (ML)-based automated scoring methods in terms of accuracy, ethics, and economics. Using a corpus of 1000 expert-scored and interview-validated scientific explanations derived from the ACORNS instrument, this study employed three LLMs and the ML-based scoring engine, EvoGrader. …”
    Get full text
    Article
  18. 2518

    Exploring the potential of GenAI for personalised English teaching: Learners' experiences and perceptions by Lucas Kohnke, Di Zou, Fan Su

    Published 2025-06-01
    “…Our results underscore the need for professional development for educators and the establishment of guidelines to address academic integrity and data privacy.…”
    Get full text
    Article
  19. 2519

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  20. 2520

    Comparison of medical history documentation efficiency and quality based on GPT-4o: a study on the comparison between residents and artificial intelligence by Xiaojing Lu, Xinqi Gao, Xinyi Wang, Zhenye Gong, Jie Cheng, Weiguo Hu, Shaun Wu, Rong Wang, Xiaoyang Li

    Published 2025-05-01
    “…Medical history quality was evaluated by two attending physicians with over 10 years of clinical experience using ten case content criteria. Data were analyzed using paired t-tests and Wilcoxon signed-rank tests, with Kappa coefficients used to assess scoring consistency. …”
    Get full text
    Article