Showing 2,541 - 2,560 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.21s Refine Results
  1. 2541

    Robust hierarchical federated learning with dual-layer filtering mechanism by Chaoyi Yang, Wei Liang, Yuxiang Chen, Jiahong Xiao, Dacheng He, Tianxiong Liu, Jin Wang, Amr Tolba

    Published 2025-03-01
    “…Hierarchical federated learning (HFL) is an effective “cloud-edge-device” distributed model training framework that protects data privacy. During HFL training, poisoning attacks on local data and transmitted models can affect the accuracy of the global model. …”
    Get full text
    Article
  2. 2542

    Distributed Ledger Technology Based Integrated Healthcare Solution for Bangladesh by Md. Ariful Islam, Md. Antonin Islam, Md. Amzad Hossain Jacky, Md. Al-Amin, Md. Saef Ullah Miah, Md. Muhidul Islam Khan, Md. Iqbal Hossain

    Published 2023-01-01
    “…This application collects health data from each user in a systematic manner, which is useful for research institutes and healthcare-related organizations. …”
    Get full text
    Article
  3. 2543

    Generative AI/LLMs for Plain Language Medical Information for Patients, Caregivers and General Public: Opportunities, Risks and Ethics by Pal A, Wangmo T, Bharadia T, Ahmed-Richards M, Bhanderi MB, Kachhadiya R, Allemann SS, Elger BS

    Published 2025-07-01
    “…There are ethical concerns that overreliance/unsupervised reliance on gAI/LLMs could lead to the “humanizing” of these models and pose a risk to patient health equity, inclusiveness and data privacy. For these technologies to be truly transformative, they must become more transparent, have appropriate governance and monitoring, and incorporate feedback from healthcare professionals (HCPs), patients, and other experts. …”
    Get full text
    Article
  4. 2544

    Blockchain driven medical image encryption employing chaotic tent map in cloud computing by Usman Shahid, Shamsa Kanwal, Mahwish Bano, Saba Inam, Manal Elzain Mohamed Abdalla, Zaffar Ahmed Shaikh

    Published 2025-02-01
    “…To sum up, the BCTMES effectively addresses a number of prevalent risks to picture security and offers a complete solution that may be implemented in cloud-based settings where data integrity and privacy are crucial. This work suggests a promising path for further investigation and practical uses in secure image transmission.…”
    Get full text
    Article
  5. 2545

    A hybrid approach to time series forecasting: Integrating ARIMA and prophet for improved accuracy by Sherly A, Mary Subaja Christo, Jesi V Elizabeth

    Published 2025-09-01
    “…With the increasing volume of data generated by IoT devices, performing analytics at the edge offers significant advantages in terms of latency, bandwidth consumption, and privacy. …”
    Get full text
    Article
  6. 2546

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The obtained raw data is pre-processed by using handling missing values and adaptive min-max normalization. …”
    Get full text
    Article
  7. 2547

    Investigating the Applications and Challenges of Metaverse in Education: A Systematic Review by Asadollah Khadivi

    Published 2024-11-01
    “…The research findings indicate that remote learning, immersion learning, collaborative learning, personalized learning, flipped learning, student-centered learning, experiential learning, hybrid learning, mobile learning, simulated learning, skill-based learning and Borderless and question-based learning are the most common uses of metaverse in education. However, the metaverse is associated with technical, ethical and social challenges such as the nascent nature of the technology, high cost of equipment, weak support infrastructure, inaccessibility to everyone, violation of privacy, data and network security, lack of legal guidelines and regulations. …”
    Get full text
    Article
  8. 2548

    Deep Learning–Based Precision Cropping of Eye Regions in Strabismus Photographs: Algorithm Development and Validation Study for Workflow Optimization by Dawen Wu, Yanfei Li, Zeyi Yang, Teng Yin, Xiaohang Chen, Jingyu Liu, Wenyi Shang, Bin Xie, Guoyuan Yang, Haixian Zhang, Longqian Liu

    Published 2025-07-01
    “…ObjectiveThis study aimed to address these challenges using an advanced preprocessing algorithm to enhance the accuracy, efficiency, and standardization of eye region cropping for clinical workflows and AI data preprocessing. …”
    Get full text
    Article
  9. 2549

    Predicting and Preventing School Dropout with Business Intelligence: Insights from a Systematic Review by Diana-Margarita Córdova-Esparza, Juan Terven, Julio-Alejandro Romero-González, Karen-Edith Córdova-Esparza, Rocio-Edith López-Martínez, Teresa García-Ramírez, Ricardo Chaparro-Sánchez

    Published 2025-04-01
    “…We collected literature from the Google Scholar and Scopus databases using a comprehensive search strategy, incorporating keywords such as “business intelligence”, “machine learning”, and “big data”. …”
    Get full text
    Article
  10. 2550

    Birth companion satisfaction for the usage of Maathru Samman Pants while attending labor of their pregnant women as an initiative of respectful maternity care: A mixed method study by B Venkatashiva Reddy, Pulla Sirisha, Madhur Verma, Priti Gupta, Rakesh Kakkar, Star Pala, Wansalan Karu Shullai

    Published 2025-06-01
    “…The present study was conducted to study birth companion satisfaction, acceptability, and demand for using Maathru Samman Pants (MSP) while attending labor of pregnant women in tertiary care health facilities. …”
    Get full text
    Article
  11. 2551

    Workflow for Conflict and Reinforcement Identification Based on STPA and STRIDE by Andrei Carniel, Juliana de Melo Bezerra, Celso Massaki Hirata

    Published 2025-01-01
    “…First, requirements identification is generally made using methods of specific concern, e.g. safety, cybersecurity, data privacy, and business, and it does not consider concerns jointly. …”
    Get full text
    Article
  12. 2552

    Exploring nurse and patient perspectives on WeChat-based prenatal education in Chinese public hospitals: a qualitative inquiry by Yushi He, Guangmei Fan, Guangrui Fan, Dandan Liu

    Published 2025-04-01
    “…Seventeen obstetric nurses and eight pregnant women participated in semi-structured interviews between March and August 2024. Data were analyzed using thematic analysis to identify commonalities and divergences between nurse-driven and patient-driven experiences. …”
    Get full text
    Article
  13. 2553
  14. 2554

    Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings by Colm Dowling, Hadi Larijani, Mike Mannion, Matt Marais, Simon Black

    Published 2024-09-01
    “…Our solution uses an unscented Kalman filter for target tracking over time and analyses features of movement to determine whether targets are human or not. …”
    Get full text
    Article
  15. 2555

    Descriptive Phenomenology from Instances of Dishonesty in Psychotherapy by Psychotherapists by Hossein Alipour, Mahdi Akbari

    Published 2024-11-01
    “…A total of 16 psychotherapists constituted the sample for this research, and data were collected using a five-axis semi-structured interview protocol focused on psychotherapy dishonesty. …”
    Get full text
    Article
  16. 2556

    Optimized summary-statistic-based single-cell eQTL meta-analysis by Maryna Korshevniuk, Harm-Jan Westra, Roy Oelen, Monique G. P. van der Wijst, Lude Franke, Marc Jan Bonder, sc-eQTLGen Consortium

    Published 2025-08-01
    “…These are however, complicated by privacy constraints due to sharing of genotype data and the measurement and technical variety across different scRNA-seq datasets as a result of differences in mRNA capture efficiency, experimental protocols, and sequencing strategies. …”
    Get full text
    Article
  17. 2557

    Digital Empowerment in Social Work: Leveraging AI to Enhance Educational Access in Developing Nations by Zvinodashe Revesai, Benjamin Tungwa, Telson Anesu Chisosa, Vanessa Runyararo Meki

    Published 2024-12-01
    “…Data were analyzed using thematic analysis, examining cases and models where AI has expanded access to scholarly materials through automated translation services, enabled localized resources through virtual training simulations, and facilitated the incorporation of culturally aligned self-help tools such as AI chatbots and wellness applications. …”
    Get full text
    Article
  18. 2558

    The Influence of Fintech on the National Security System: Law, Economic Potential and Digital Defense Strategy by Ngasiman Djoyonegoro, Muhammad Noor Harisudin, Hariyanto Hariyanto

    Published 2025-06-01
    “…Governments need to implement stringent regulations to safeguard Fintech user data and privacy and closely supervise Fintech operations to mitigate the risks of financial technology misuse. …”
    Get full text
    Article
  19. 2559

    Designing digital conversational agents for youth with multiple mental health conditions: Insights on key features from a youth-engaged qualitative descriptive study by Jingyi Hou, Jamie Gibson, Thalia Phi, Brian Ritchie, Louise Gallagher, Gillian Strudwick, George Foussias, Darren B Courtney, Aristotle Voineskos, Stephanie Ameis, Kristin Cleverley, Lisa D Hawke

    Published 2025-03-01
    “…Results Four key themes were generated from the focus group data: (1) the importance of a customizable and flexible design for personalization; (2) confidentiality, privacy features and risk mitigation features; (3) the need for reliable, informative content that is user tested and validated; (4) a friendly and human-like interaction style. …”
    Get full text
    Article
  20. 2560

    De-identification of Emergency Medical Records in French: Survey and Comparison of State-of-the-Art Automated Systems by Loick Bourdois, Marta Avalos, Gabrielle Chenais, Frantz Thiessard, Philippe Revel, Cedric Gil-Jardine, Emmanuel Lagarde

    Published 2021-04-01
    “…For visits motivated by a traumatic event, information on the causes are stored in free-text clinical notes. To exploit these data, an automated de-identification system guaranteeing protection of privacy is required. …”
    Get full text
    Article