Showing 1,941 - 1,960 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"used) privacy data\\"))~\""', query time: 0.14s Refine Results
  1. 1941

    Who are MaaS avoiders, wanderers or enthusiasts and what drives their intentions to adopt MaaS? by Zuoxian Gan, Wentao Li

    Published 2025-12-01
    “…This study integrates the Unified Theory of Technology Acceptance and Use (UTAUT) and Status Quo Bias (SQB) theories and draws on survey data covering nine dimensions: performance expectancy, effort expectancy, social influence, individual innovation, transition costs, sunk costs, inertia and resistance to use. …”
    Get full text
    Article
  2. 1942

    Arduino – Based Electronic Voting Machine by Marwa Adeeb Al-jawaherry

    Published 2019-01-01
    “…During the construction of any electronic voting system, several aspects must consider, the most important is the privacy of voters and the accuracy of the voting process in addition to maintaining the security of data, this research provides a safe and reliable voting system. …”
    Get full text
    Article
  3. 1943

    Measuring large-scale social networks with high resolution. by Arkadiusz Stopczynski, Vedran Sekara, Piotr Sapiezynski, Andrea Cuttone, Mette My Madsen, Jakob Eg Larsen, Sune Lehmann

    Published 2014-01-01
    “…Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1000 individuals, using state-of-the-art smartphones as social sensors. …”
    Get full text
    Article
  4. 1944

    Artificial intelligence in early warning systems for infectious disease surveillance: a systematic review by Ismael Villanueva-Miranda, Guanghua Xiao, Guanghua Xiao, Yang Xie, Yang Xie

    Published 2025-06-01
    “…After screening 600 records and removing duplicates and non-relevant articles, the search yielded 67 relevant studies for review.ResultsKey findings reveal the prevalent use of machine learning (ML), deep learning (DL), and natural language processing (NLP), which often integrate diverse data sources (e.g., epidemiological, web, climate, wastewater). …”
    Get full text
    Article
  5. 1945

    A Fully Distributed Power Flow Algorithm with Exponentially Fast Convergence by Changzheng GAO, Bo YAN, Jiarui WANG, Xuefei CHANG, Yue SUN

    Published 2019-10-01
    “…In order to meet the data privacy requirements for interconnected power system power flow calculations, a fully distributed power flow algorithm is proposed. …”
    Get full text
    Article
  6. 1946

    Federated Learning Enhanced MLP–LSTM Modeling in an Integrated Deep Learning Pipeline for Stock Market Prediction by Jayaraman Kumarappan, Elakkiya Rajasekar, Subramaniyaswamy Vairavasundaram, Ketan Kotecha, Ambarish Kulkarni

    Published 2024-10-01
    “…A global model is created and updated through repeated training and totaling of parameters while preserving privacy of the data going to each node. In the performance evaluation, quantitative measures like Root-Mean-Square Error (RMSE), and accuracy are seven used. …”
    Get full text
    Article
  7. 1947

    Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care by Kou-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Chieh Wang

    Published 2013-12-01
    “…Although RFID-based procedure is more efficient than traditional process, patient's information may be attacked (or stolen) during the data transmission period. This will cause inappropriate medication use and medical errors. …”
    Get full text
    Article
  8. 1948

    Social media integration in marketing education: A way forward to improve engagement and learning outcomes by Hesham Fazel, Amer Sayaf

    Published 2025-03-01
    “…The findings indicate that social media significantly increased student engagement and knowledge retention. Perceived ease of use, institutional support, and effectiveness in meeting instructional objectives were most significant to adoption. …”
    Get full text
    Article
  9. 1949

    Application of blockchain in urban rail traffic edge computing network by Gaochang XIE, Hua LU, Qinqin TANG, Han ZHU, Chenghao LIANG, Wen WEN, Renchao XIE

    Published 2021-10-01
    “…Multi-access edge computing (MEC) can provide high-quality service capabilities for computing-intensive services and delay-sensitive services in urban rail traffic.However, many edge facilities in rail traffic edge computing network are exposed to an open environment, and their privacy protection and transmission security are facing great challenges.Blockchain has functional characteristics such as distributed ledger, consensus mechanism, smart contract, and decentralized application.Therefore, the use of blockchain can build a systematic security protection mechanism for the distributed rail traffic edge computing network to ensure network security and data security and realize high-quality urban rail traffic services.Firstly, the basic concept of the blockchain and the urban rail traffic edge computing network architecture were introduced.Then, the structure and application content of the rail traffic edge computing network security protection mechanism integrated with the blockchain was discussed in detail.Finally, the open research issues and challenges of the security protection mechanism were analyzed.…”
    Get full text
    Article
  10. 1950

    Comprehensive synthesis of mHealth interventions in psychiatry: insights from systematic, scoping, narrative reviews and content analysis by Zaakira Shahul Hameed Mahreen, Noor Azziah Zainuldin, Melvyn Weibin Zhang

    Published 2024-10-01
    “…Conclusion: Despite positive outcomes, challenges such as data privacy, user engagement and healthcare integration persist. …”
    Get full text
    Article
  11. 1951

    Co-similar malware infection patterns as a predictor of future risk. by Amir Yavneh, Roy Lothan, Dan Yamin

    Published 2021-01-01
    “…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
    Get full text
    Article
  12. 1952

    Advancing Remote Monitoring for Patients With Alzheimer Disease and Related Dementias: Systematic Review by Mohmmad Arif Shaik, Fahim Islam Anik, Md. Mehedi Hasan, Sumit Chakravarty, Mary Dioise Ramos, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Nazmus Sakib

    Published 2025-05-01
    “…The studies revealed a strong focus on various remote monitoring methods for capturing behavioral, physiological, and environmental data yet showed a gap in evaluating these methods for patient and caregiver needs, privacy, and usability. …”
    Get full text
    Article
  13. 1953

    Barriers to and enhancement of the utilization of digital mental health interventions in low-resource settings: Perceptions of young people in Uganda by Erisa Sabakaki Mwaka, Datsun Bazzeketa, Joy Mirembe, Reagan D. Emoru, Adelline Twimukye, Apollo Kivumbi

    Published 2025-02-01
    “…A thematic approach was used to interpret the results. Results Three themes were identified from the data including perceptions of using DMH services, the perceived barriers to utilization, and suggestions for enhancement of DMH for YP in low-resource settings. …”
    Get full text
    Article
  14. 1954

    The Transformative Impact of Artificial Intelligence in Healthcare: Innovations, applications, and future prospects by Shen Ruoyu

    Published 2024-01-01
    “…At the same time, the application of AI in healthcare poses a number of challenges, such as data privacy, algorithmic bias, and ethics. This study also explores the role of AI in global health, the need for policies and regulations, and the long-term impact of AI on future healthcare systems. …”
    Get full text
    Article
  15. 1955

    Investigating the Key Trends in Applying Artificial Intelligence to Health Technologies: A Scoping Review. by Tawil Samah, Merhi Samar

    Published 2025-01-01
    “…<h4>Background</h4>The use of Artificial Intelligence (AI) is exponentially rising in the healthcare sector. …”
    Get full text
    Article
  16. 1956

    Factors leading to the adoption of blockchain technology in financial reporting by Shaiku Shahida Saheb, Venkata Krishna Reddy Chinnapareddy, Divya Devalla, Sirisha Charugulla, Naga Bhavani Chakka, Kunchakara Raja Sekhar

    Published 2025-08-01
    “…This research analyzed accounting professionals’ awareness of information and communication technologies (ICT), data security, data privacy, and training among accounting professionals. …”
    Get full text
    Article
  17. 1957

    Internet of Medical Things Integrating IoT with Healthcare for Remote Monitoring and Diagnosis by R Suganya, P Sasikala, Lavanya Chinthamalla, Rashid Syed Zahidur, Tiwari Mohit, G Vijayakumari

    Published 2025-01-01
    “…By leveraging edge computing, AI, and blockchain-based security, the framework improves data privacy, reduces latency, and increases energy efficiency. …”
    Get full text
    Article
  18. 1958

    Exploring IoT integration challenges: Causal relationships and strategic implications for business models by Parveen Siwach, Disha Gulia, Dhiraj Kumar Yadav, Mohit Malik, Vijay Kumar Gahlawat

    Published 2025-12-01
    “…Thirteen crucial components were analysed, influencing interoperability challenges, data security and privacy issues, standardized issues, high initial investment, scaling obstacles, and adverse environmental effects. …”
    Get full text
    Article
  19. 1959

    A Structured and Methodological Review on Multi-View Human Activity Recognition for Ambient Assisted Living by Fahmid Al Farid, Ahsanul Bari, Abu Saleh Musa Miah, Sarina Mansor, Jia Uddin, S. Prabha Kumaresan

    Published 2025-06-01
    “…Key challenges such as data remediation, privacy, and generalization are discussed, alongside potential solutions such as sensor fusion and advanced learning strategies. …”
    Get full text
    Article
  20. 1960

    Quantitative and qualitative analysis of balcony usage and its impact on the landscape of the neighborhood by Fatemeh Foghani, azadeh shahcheraghi, Zahra Sadat Saeideh zarabadi

    Published 2024-07-01
    “…This research is of qualitative-interpretive type, research strategy, case study and data collection was done by field method. In this research, 20 medium-rise residential buildings built in the 90s, consisting of 100 balconies, were selected in the Darya neighborhood of District 2, Tehran. how they were used by users was analyzed. …”
    Get full text
    Article