Showing 2,421 - 2,440 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.16s Refine Results
  1. 2421

    A Review of Deep Learning Techniques for Leukemia Cancer Classification Based on Blood Smear Images by Rakhmonalieva Farangis Oybek Kizi, Tagne Poupi Theodore Armand, Hee-Cheol Kim

    Published 2025-02-01
    “…Despite these advancements, challenges such as dataset limitations, the lack of model interpretability, and ethical concerns regarding data privacy and bias remain critical barriers to widespread adoption. …”
    Get full text
    Article
  2. 2422

    Effects of Virtual Care on Patient and Provider Experience of the Clinical Encounter: Qualitative Hermeneutic Study by Graham McCaffrey, Erin Wilson, Lela V Zimmer, Anurag Singh, Steinunn Jonatansdottir, Peter Zimmer, David Snadden, Ian D Graham, Martha MacLeod

    Published 2024-11-01
    “…A total of 17 patients and 10 providers from various disciplines were interviewed by phone as part of a study on health care implementation in the context of a kidney care service in northern British Columbia, Canada. The interview data were analyzed using a hermeneutic approach, which emphasizes careful attention to reported experiences in relation to the relationships and contexts of care. …”
    Get full text
    Article
  3. 2423

    Examining Healthcare Practitioners’ Perceptions of Virtual Physicians, mHealth Applications, and Barriers to Adoption: Insights for Improving Patient Care and Digital Health... by Alzghaibi H

    Published 2025-04-01
    “…It further aims to provide recommendations for enhancing usability, accessibility, and integration within existing healthcare infrastructures.Methods: A cross-sectional study was conducted among 574 secondary healthcare practitioners (SHCPs), including physicians, nurses, and administrative staff, working in secondary healthcare centres across Saudi Arabia. Data were collected using a structured questionnaire assessing ten primary barriers to mHealth adoption, including technical, usability, training, integration, privacy, organisational, communication, financial, and productivity-related challenges. …”
    Get full text
    Article
  4. 2424

    Leveraging federated learning for DoS attack detection in IoT networks based on ensemble feature selection and deep learning models by Tasneem Qasem Al-Ghadi, Selvakumar Manickam, I. Dewa Made Widia, Eka Ratri Noor Wulandari, Shankar Karuppayah

    Published 2025-12-01
    “…However, IoT systems face numerous security threats, making data protection against cyberattacks essential. While deploying an Intrusion Detection System (IDS) in a centralized framework can lead to data leakage, Federated Learning (FL) offers a privacy-preserving alternative by training models locally and transmitting only the updated model weights to a central server for aggregation. …”
    Get full text
    Article
  5. 2425

    Predicting Student Dropout Through Text and Media Content Analysis of VKontakte Profiles by Sergei S. Gorshkov, Dmitry I. Ignatov, Anastasia Yu. Chernysheva

    Published 2025-01-01
    “…While this approach depends on publicly available VK data and may be limited by privacy settings, it still provides useful insights. …”
    Get full text
    Article
  6. 2426

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
    Get full text
    Article
  7. 2427

    Bitcoin Mining in Turkey as an Example of Speculative Entrepreneurship by Ali Osman Uymaz, Ali Rıza Esmen

    Published 2022-10-01
    “…The collected data thus was analyzed and coded thorough thematic analysis. …”
    Get full text
    Article
  8. 2428

    Exploration of the Efficiency of SLM-Enabled Platforms for Everyday Tasks by Volodymyr Rusinov, Nikita Basenko

    Published 2025-04-01
    “…With growing concerns around data privacy and the resource-intensiveness of large models, SLMs present a promising solution for research and applications requiring fast, cost-effective, and locally deployable models. …”
    Get full text
    Article
  9. 2429

    Emotional Factor Recognition and Teaching Strategy Adjustment in Cultural Teaching Supported by Artificial Intelligence by Yu Xiaochen

    Published 2025-01-01
    “…Emotion recognition technology collects students’ facial expressions, speech features, and physiological data, and uses deep learning algorithms to analyze students’ emotional states in real time, providing accurate feedback support for teaching. …”
    Get full text
    Article
  10. 2430

    EXPLORING BIBLIOSHINY FOR MAPPING ARTIFICIAL INTELLIGENCE RESEARCH IN EDUCATION by Hanifah Indah Rahmawati, Zenita Sabitri, Mutiara Nabila Azmi, Danny Meirawan

    Published 2025-05-01
    “… This study critically analyzes the development of artificial intelligence (AI) research in education using a bibliometric approach, leveraging data from 191 Scopus-indexed documents during the 2015-2024 period. …”
    Get full text
    Article
  11. 2431

    Perceptions of academic staff and students of senior high school in implementing game-based exercises in physical education classes—a research protocol for a qualitative descriptiv... by Donald Manlapaz, Jose Avelino Vergara, Keisha Marie Bea Alpuerto, Iszaac Khalil Señora De Los Santos, Michaela Urian Enriquez, Zamantha Zamora Manicio, Joshua Emmanuel Ferrera Mendres, Casey Gwyn Salvaleon Tolosa, Zachary Gabriel Dee Vilela, Zeraia Ezra Gabriel Alonzo Zabat

    Published 2023-12-01
    “…Once done, they will undergo FGDs conducted through Google Meet. Data will be coded and analysed via thematic analysis using manual coding and NVivo V.12 software to summarise central themes and perceptions.Ethics and dissemination This study will abide by the Nuremberg Code, Declaration of Helsinki, Belmont Report, Data Privacy Act of 2012 and National Ethical Guidelines (for health-related research) of 2017. …”
    Get full text
    Article
  12. 2432

    SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation by Seyed Salar Sefati, Bahman Arasteh, Octavian Fratu, Simona Halunga

    Published 2025-07-01
    “…A similarity graph is built from the log data, allowing for effective anomaly detection using graph-based methods. …”
    Get full text
    Article
  13. 2433

    Enhancing insights in sexually transmitted infection mapping: Syphilis in Forsyth County, North Carolina, a case study. by Lani Fox, William C Miller, Dionne Gesink, Irene Doherty, Marc Serre

    Published 2024-10-01
    “…Results were assessed using latent rate theory cross validation. We show combining a moving window and a UMBME analysis with geomasked data effectively predicted the true or latent syphilis rate 5% to 26% more accurate than the traditional, geopolitical boundary method. …”
    Get full text
    Article
  14. 2434
  15. 2435

    Choosing the Best Digital Health Literacy Measure for Research: Mixed Methods Study by Charlotte Brun Thorup, Mika Uitto, Kerryn Butler-Henderson, Sarah Wamala-Andersson, Merja Hoffrén-Mikkola, Diana Schack Thoft, Lisa Korsbakke Emtekær Hæsum, Gabriela Irrazabal, Laura Pruneda González, Katja Valkama

    Published 2025-04-01
    “…Ethical considerations in dHL, including privacy and data security, are important due to potential feelings of shame among those with low literacy levels.…”
    Get full text
    Article
  16. 2436

    Barriers and facilitators of transition of adolescents living with HIV into adult care in under-resourced settings of Southern Ethiopia: a qualitative study by Mulugeta Shegaze Shimbre, Belay Boda Bodicha, Abakundana Nsenga Ariston Gabriel, Lubna Ghazal, Kedi Jiao, Wei Ma

    Published 2024-10-01
    “…Purposive sampling was used to gather data through in-depth interviews (IDIs) and focus group discussions (FDGs) involving ALWHs and their parents. …”
    Get full text
    Article
  17. 2437

    Creating a Usable and Effective Digital Intervention to Support Men to Test for HIV and Link to Care in A Resource-Constrained Setting: Iterative Design Based on A Person-Based App... by Anya Zeitlin, Thulile Mathenjwa, Thembelihle Zuma, Sally Wyke, Philippa Matthews, Nuala McGrath, Janet Seeley, Maryam Shahmanesh, Ann Blandford

    Published 2025-04-01
    “…The PBA enabled us to establish both empirical data and theory to design the content of EPIC-HIV1, but it did not directly inform interaction design to make the app usable and effective for the intended users; HCI techniques tailored to the setting enabled us to refine the app to be easy for men with little familiarity with digital technologies to use within the constraints of the setting. …”
    Get full text
    Article
  18. 2438

    “People have options”: a qualitative study of experiences and influences of PrEP choice among women in South Africa by Siphokazi Dada, Faith Mary Musvipwa, Fatima Abegail Cholo, Melanie Pleaner, Alison Kutywayo, Vusile Butler, Catherine Elizabeth Martin, Saiqa Mullick

    Published 2025-07-01
    “…Participants valued learning about alternative PrEP methods and appreciated friendly healthcare providers who answered their questions. Privacy and emotional support were also crucial. However, negative experiences included the use of complex scientific jargon and insufficient information on PrEP's potential drawbacks. …”
    Get full text
    Article
  19. 2439
  20. 2440

    Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping by ZHENG Junhua, JIANG Hongwei, LIU Rong, LI Yixiu, LI Wen, WENG Jian

    Published 2024-12-01
    “…Finally, the potential application of the scheme in cross-departmental supervision scenarios of multi-industry and multi-source data sales data was explored, which helped the tax department to realize tax verification under the premise of protecting data privacy, and helped promote the digital transformation and healthy development of various industries.…”
    Get full text
    Article