Showing 2,041 - 2,060 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"used) privacy data\\"))~\""', query time: 0.16s Refine Results
  1. 2041

    Emerging and Pioneering AI Technologies in Aesthetic Dermatology: Sketching a Path Toward Personalized, Predictive, and Proactive Care by Diala Haykal

    Published 2024-11-01
    “…Conclusions: While AI holds significant potential to enhance aesthetic dermatology, its responsible integration requires addressing these challenges through clinician training, ethical guidelines, and robust data security measures. Effective use of AI will depend on collaboration between technology developers, clinicians, and regulatory bodies. …”
    Get full text
    Article
  2. 2042

    Current limitations in technology-based cognitive assessment for severe mental illnesses: a focus on feasibility, reliability, and ecological validity by Edoardo Caporusso, Antonio Melillo, Andrea Perrottelli, Luigi Giuliani, Francesco Flavio Marzocchi, Pasquale Pezzella, Giulia Maria Giordano

    Published 2025-04-01
    “…EMA may capture real-world functioning by increasing the number of evaluations throughout the day, but its use might be hindered by high participant burden and missing data. …”
    Get full text
    Article
  3. 2043

    SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare by Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Hafida Saidi, Joel Herve Mboussam Emati, Leandros Maglaras

    Published 2024-12-01
    “…We leverage the blockchain-based Self-Sovereign Identity (SSI) model to handle client authentication and secure communication. Additionally, we use the Trimmed Mean method to aggregate data. This helps reduce the effect of unusual or malicious inputs when creating the overall model. …”
    Get full text
    Article
  4. 2044

    The application of artificial intelligence in insomnia, anxiety, and depression: A bibliometric analysis by Enshi Lu, Di Zhang, Mingguang Han, Shihua Wang, Liyun He

    Published 2025-03-01
    “…However, challenges around data privacy, ethical concerns, and the interpretability of AI models need to be addressed. …”
    Get full text
    Article
  5. 2045

    Congruent Learning for Self-Regulated Federated Learning in 6G by Jalil Taghia, Farnaz Moradi, Hannes Larsson, Xiaoyu Lan, Adam Orucu, Masoumeh Ebrahimi, Andreas Johnsson

    Published 2024-01-01
    “…Across four networking use cases on several tasks, reflecting different profiles of data heterogeneity and limited availability of data, it is shown that CFL greatly reduces overfitting and in nearly all cases improves the performance—a relative gain of about 21% averaged across all use cases.…”
    Get full text
    Article
  6. 2046

    Applications of UAV Technologies in Assessment of Transportation Infrastructure Systems by Ahmad Akib Uz Zaman, Ahmed Abdelaty, Mohamed S. Yamany

    Published 2025-06-01
    “…Respondents emphasize the need for longer flight times, better automation, and advanced data tools, underscoring growing adoption and highlighting the need to overcome technical, regulatory, and data privacy challenges for optimal UAV integration within transportation infrastructure systems management.…”
    Get full text
    Article
  7. 2047

    Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review by Jones Márcio Nambundo, Otávio de Souza Martins Gomes, Adler Diniz de Souza, Raphael Carlos Santos Machado

    Published 2025-03-01
    “…These gaps include design requirements, software and firmware updates, physical security, the use of big data to detect vulnerabilities, user data privacy, and inconsistencies in machine learning algorithms. …”
    Get full text
    Article
  8. 2048

    Making temporary homes by Marjolein Overtoom

    Published 2024-06-01
    “…The interviews were analysed with Interpretative Phenomenological Analysis, and the visual data (photos made by the interviewees and sometimes the researcher, and drawings made by the researcher) was used to place the content of the interviews in a physical context. …”
    Get full text
    Article
  9. 2049

    Enabling All In-Edge Deep Learning: A Literature Review by Praveen Joshi, Mohammed Hasanuzzaman, Chandra Thapa, Haithem Afli, Ted Scully

    Published 2023-01-01
    “…Moreover, most of the time central cloud servers are used for such computation, thus opening up other significant challenges, such as high latency, increased communication costs, and privacy concerns. …”
    Get full text
    Article
  10. 2050

    Federated Learning for Decentralized DDoS Attack Detection in IoT Networks by Yaser Alhasawi, Salem Alghamdi

    Published 2024-01-01
    “…Our approach prioritizes data privacy by processing data locally, thereby avoiding the need for central data collection, while enhancing detection efficiency. …”
    Get full text
    Article
  11. 2051

    Understanding customer loyalty in digital services: insights from food delivery in emerging markets by Bora Ly

    Published 2025-07-01
    “…Grounded in the Commitment-Trust Theory and the SERVQUAL model, this study examines how these factors collectively influence consumer behavior in an emerging market. Data were collected via survey questionnaires from 324 Cambodian respondents and analyzed using partial least squares–structural equation modeling (PLS–SEM). …”
    Get full text
    Article
  12. 2052

    Mental Health Apps Available in App Stores for Indian Users: Protocol for a Systematic Review by Seema Mehrotra, Ravikesh Tripathi, Pramita Sengupta, Abhishek Karishiddimath, Angelina Francis, Pratiksha Sharma, Paulomi Sudhir, Srikanth TK, Girish N Rao, Rajesh Sagar

    Published 2025-04-01
    “…Additionally, the apps will be reviewed for quality using the Mobile Application Rating Scale. The data analysis and synthesis strategy will incorporate descriptive statistics based on quality evaluation using the Mobile Application Rating Scale and examining the content of the apps for generating descriptive information. …”
    Get full text
    Article
  13. 2053

    Comparing remote and in-person interpretation experiences for clinicians and Spanish-speaking patients with limited English proficiency: a mixed methods study by Hector P Rodriguez, Timothy T Brown, Jacob Chen, Xiaoyu Cai, Alondra Ruiz, Paola Hernandez Fernandez

    Published 2025-05-01
    “…In regression analyses of patient experience survey data, no evidence of an association between the interpreter method used and patient-reported experiences of clinician communication or interpreter support was found. …”
    Get full text
    Article
  14. 2054

    Assessing user preferences and competitive strategies of Gojek and Grab in ASEAN’s ride-hailing market by Pandu Kurniawan, Didi Achjari

    Published 2024-12-01
    “…This study aims to determine the criteria, sub-criteria, and alternatives influencing users in choosing ride-hailing and map Gojek and Grab’s grand strategy to compete in the ASEAN market, especially in Indonesia, Thailand, Vietnam, and Singapore. This research uses a questionnaire to collect data, with 377 Gojek and Grab users as participants. …”
    Get full text
    Article
  15. 2055

    Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks by Daemin Shin, Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You

    Published 2017-01-01
    “…The proposed protocol includes steps for secure RO and handover management, where mutual authentication, key exchange, perfect forward secrecy, and privacy are supported. The correctness of the proposed protocol is formally analyzed using BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). …”
    Get full text
    Article
  16. 2056

    A mixed-method study to inform the design of a video observed therapy app to monitor individuals with TB in the Dominican Republic by Julio Arturo Canario-Guzmán, Ricardo Elias-Melgen, Eddys Rafael Mendoza, Luis Felipe Arias, Roberto Espinal, Jeannette Báez, Sarah Iribarren

    Published 2025-06-01
    “…Data integration was achieved by comparing convergent and divergent results.ResultsParticipants expressed a positive attitude towards using DAT to facilitate communication with health personnel to support treatment adherence. …”
    Get full text
    Article
  17. 2057

    Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection by Peng Luo, Rangjia Cai, Yuanbo Guo

    Published 2025-01-01
    “…The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity theft, and potential legal liabilities. …”
    Get full text
    Article
  18. 2058

    eHealth Technology: What Do We Know and What do We Need to Learn by Ramzi A. Haraty, Ola A Sukkarieh

    Published 2021-06-01
    “…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
    Get full text
    Article
  19. 2059

    GLOBE Observer: A Case Study in Advancing Earth System Knowledge with AI-Powered Citizen Science by Peder V. Nelson, Russanne Low, Holli Kohl, David Overoye, Di Yang, Xiao Huang, Sriram Chellappan, Farhat Binte Azam, Ryan M. Carney, Monika Falk, Joan Garriga, Larisa Schelkin, Rebecca Boger, Theresa Schwerin

    Published 2024-12-01
    “…GLOBE citizen science data has been used to develop automated data classification routines that enable information discovery of mosquito larvae and land cover labels. …”
    Get full text
    Article
  20. 2060

    Federated Learning for Predicting Major Postoperative Complications by Yuanfang Ren, PhD, Yonggi Park, PhD, Benjamin Shickel, PhD, Ziyuan Guan, MS, Ayush Patel, Yingbo Ma, PhD, Zhenhong Hu, PhD, Jeremy A. Balch, MD, Tyler J. Loftus, MD, PhD, Parisa Rashidi, PhD, Tezcan Ozrazgat-Baslanti, PhD, Azra Bihorac, MD, MS

    Published 2025-06-01
    “…To develop a robust model to accurately predict the risk of postoperative complications using clinical data from multiple institutions while ensuring data privacy. …”
    Get full text
    Article