Showing 2,401 - 2,420 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \\"used) privacy data\\"))~\""', query time: 0.23s Refine Results
  1. 2401

    Integrating artificial intelligence in drug discovery and early drug development: a transformative approach by Alberto Ocana, Atanasio Pandiella, Cristian Privat, Iván Bravo, Miguel Luengo-Oroz, Eitan Amir, Balazs Gyorffy

    Published 2025-03-01
    “…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
    Get full text
    Article
  2. 2402

    Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring by Mauro Rodriguez-Marin, Luis Gustavo Orozco-Alatorre

    Published 2025-02-01
    “…Unlike complex machine learning models, it offers parsimony in transparency, efficiency, and reproducibility, making it ideal for clinical settings where explainable, data-driven decisions are essential. Methods: A logistic regression model was developed using R to analyze biometric and demographic data from a cross-sectional dataset, including real-world data from public institucions. …”
    Get full text
    Article
  3. 2403

    Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach by Jian Yang, Shaoxian Zhu, Zhongyi Wen, Qiang Li

    Published 2025-07-01
    “…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
    Get full text
    Article
  4. 2404

    The State of Artificial Intelligence and its Prospects in Pakistan's Medical Sector by Rohail Akhtar Habib, Yumna Sattar Khan

    Published 2024-12-01
    “…The rising integration of AI in Pakistani medicine necessitates the evolution of regulatory frameworks to guarantee patient safety, data privacy, and ethical application of AI technologies. …”
    Get full text
    Article
  5. 2405

    Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective by Karin Brodén, Jonas Andersson, Agnieszka Kitkowska, Awais Ahmad, Peter Mozelius

    Published 2025-06-01
    “…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
    Get full text
    Article
  6. 2406

    A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023 by Shalini Kumari, Chander Prabha, Asif Karim, Md. Mehedi Hassan, Sami Azam

    Published 2024-01-01
    “…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
    Get full text
    Article
  7. 2407

    The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs): by Mugisha, Justin, Francis Adyanga, Akena, Ocan, Johnson

    Published 2025
    “…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
    Get full text
    Article
  8. 2408

    The Analysis of the Effective Factors on Urban Blight in District 3, Region 12, Tehran City by Hossein Mansourian, Ahmad Pour Ahmad, Hasan Ashouri

    Published 2019-09-01
    “…Materials and Methods This study is mostly based on the initial data resulted from surveying the households using a researcher-made questionnaire; however, the tools of the interview, observation, and the results obtained from the public censuses of population and housing are also used to achieve the required data and information. …”
    Get full text
    Article
  9. 2409

    Identification of Factors Affecting the Selection of Women's Gyms by Abbas Naghizadeh-Baghi, Masoud Imanzadeh, Mitra Lalfam, Farzad Nobakht Sareban, Majid Javid

    Published 2021-06-01
    “…The data were analyzed by SPSS26 software using Exploratory Factor Analysis test.Results: The results showed that 44 final characteristics affecting the selection of the gym were factorized into 8 factors by factor analysis and these factors explain 67% of the total variance.Conclusion:   Factors influencing the selection of women's gymnasiums in order of priority include Physical Evidence, process, Place, price, product, People, Promotion and Privacy.…”
    Get full text
    Article
  10. 2410

    Revolutionizing Sports: The Role of Wearable Technology and AI in Training and Performance Analysis by Stanisław Dudek, Weronika Koziak, Michalina Makieła, Aleksandra Bętkowska, Agata Kornacka, Wojciech Dudek, Kamila Szostak, Rafał Tomaka, Anna Byra

    Published 2025-03-01
    “…Additionally, AI-driven wearables raise concerns over data security, ethical handling, and equitable access, as high costs limit their use in amateur sports. …”
    Get full text
    Article
  11. 2411

    Evaluating new technologies and organizational structures by Ofira Schwartz, Michele Hayslett

    Published 2024-12-01
    “…Co-authors Knut Wenig and Xiaoyao Han are examining the findability of data deposited in data repositories that are using DDI metadata standards. …”
    Get full text
    Article
  12. 2412

    Pre-class learning assessment on integrating artificial intelligence into evidence-based medicine curriculum by ZUHAER·Yisha, CHEN Xiaowei, CAO Wangnan, WU Shanshan, LIU Junchang, SUN Yumei, WU Tao, ZHAN Siyan, SUN Feng

    Published 2025-05-01
    “…Differences between master’s and doctoral students were analyzed using the Mann-Whitney U test.Results A total of 46 students participated in the survey (34 Masters and below, and 12 PhDs). …”
    Get full text
    Article
  13. 2413

    Exploring Perceived Barriers in the Assessment and Management of Female Sexual Dysfunction: An Integrated Qualitative and Quantitative Study among Trainee Residents by Yogender Kumar Malik, Adwitiya Ray, Sujata Sethi, Rajiv Gupta

    Published 2025-01-01
    “…A total of 92 trainee residents from related medical specialties of psychiatry, gynecology, dermatology, and urology, who provided informed consent, participated in the study. Data were collected using a validated questionnaire regarding perceived barriers related to residents’ knowledge and attitudes toward assessing FSD and a case vignette. …”
    Get full text
    Article
  14. 2414

    Preferences and Willingness to Pay for Health App Assessments Among Health Care Stakeholders: Discrete Choice Experiment by Anna-Lena Frey, Simon Leigh, Carla Toro, Carme Pratdepàdua Bufill, Charles McCay, Tatjana Prenđa Trupec, Giuseppe D'Avenio, Menno Kok, Antanas Montvila, Philipp Goedecker, Petra Hoogendoorn

    Published 2025-05-01
    “… BackgroundThe adoption of high-quality health apps has been slow, despite the myriad benefits associated with their use. This is partly due to concerns regarding the effectiveness, safety, and data privacy of such apps. …”
    Get full text
    Article
  15. 2415

    Analisa Sentimen Financial Technology Peer To Peer Lending Pada Aplikasi Koinworks by Rousyati Rousyati, Windu Gata, Dany Pratmanto, Nia Kusuma Wardhani

    Published 2022-12-01
    “…Reviews contained in the Google Play comments column can be used as a data source that can be shared with data mining. …”
    Get full text
    Article
  16. 2416
  17. 2417

    Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection by Rafael Abreu, Emanuel Simão, Carlos Serôdio, Frederico Branco, António Valente

    Published 2024-11-01
    “…Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. …”
    Get full text
    Article
  18. 2418

    Advancing Hematopoietic Stem Cell Transplantation Typing: Harnessing Hyperledger Fabric’s Blockchain Architecture by Meng Wu, Feng Xu, Geetha Subramaniam, Zeyu Li, Liyun Chen, Wenjuan Zhu

    Published 2024-01-01
    “…This innovative approach optimizes user experience, maintains data integrity, and ensures privacy. Future integration with existing databases could enable secure data sharing among healthcare institutions, allowing rapid verification of data ownership and unified authentication. …”
    Get full text
    Article
  19. 2419
  20. 2420

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article