Showing 881 - 900 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.23s Refine Results
  1. 881

    Adapting Classification Neural Network Architectures for Medical Image Segmentation Using Explainable AI by Arturs Nikulins, Edgars Edelmers, Kaspars Sudars, Inese Polaka

    Published 2025-02-01
    “…Despite their effectiveness, these networks face significant challenges, including the need for extensive annotated patient data, time-consuming manual segmentation processes and restricted data access due to privacy concerns. …”
    Get full text
    Article
  2. 882

    Depth-Based Intervention Detection in the Neonatal Intensive Care Unit Using Vision Transformers by Zein Hajj-Ali, Yasmina Souley Dosso, Kim Greenwood, JoAnn Harrold, James R. Green

    Published 2024-12-01
    “…An intervention detection method based solely on depth data was developed using a vision transformer (ViT) model utilizing real-world data from patients in the NICU. …”
    Get full text
    Article
  3. 883
  4. 884
  5. 885

    Securing and optimizing optical transmission in quantum wells using OAM and advanced modulation techniques by Muhammad Ahmad, Zhiping Wang, Ming Fang, Zhixiang Huang, Guoda Xie

    Published 2025-08-01
    “…However, current optical transmission methods encounter challenges in efficiently transmitting data due to limited OAM mode generation, reduced transmission privacy, and high atmospheric turbulence. …”
    Get full text
    Article
  6. 886

    A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash by Umar Mujahid, M. Najam-ul-Islam, Atif Raza Jafri, Qurat-ul-Ain, M. Ali Shami

    Published 2016-02-01
    “…Nonline of sight capability makes RFID systems much better choice than its contended systems (such as barcode, magnetic tape, etc.). Since the RFID uses wireless channel for communication with its associated devices, there should be some optimal encryption methods to secure the communicating data from adversaries. …”
    Get full text
    Article
  7. 887

    Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization by Mohamed Abd Elaziz, Mohamed Abd Elaziz, Mohamed Abd Elaziz, Ibrahim A. Fares, Abdelghani Dahou, Mansour Shrahili

    Published 2025-05-01
    “…The goal of the developed framework is to improve the detection of IDS without using centralized data to preserve privacy. Whereas it enhances the processing and detection capability of huge amounts of data generated from IoT devices. …”
    Get full text
    Article
  8. 888

    Decentralized federated learning using validation loss for model sharing in crop disease classification by Denis Mamba Kabala, Adel Hafiane, Laurent Bobelin, Raphaël Canals

    Published 2025-12-01
    “…Several AI methods have been employed for this purpose, but despite achieving good results, many challenges remain, such as protecting farmers’ data, using machine learning on edge devices, and employing collaborative learning. …”
    Get full text
    Article
  9. 889

    How to Write Effective Prompts for Screening Biomedical Literature Using Large Language Models by Maria Teresa Colangelo, Stefano Guizzardi, Marco Meleti, Elena Calciolari, Carlo Galli

    Published 2025-03-01
    “…Finally, we explore emerging trends, including multi-stage screening pipelines and fine-tuning, while noting ethical considerations related to data privacy and transparency. By applying systematic prompt engineering and rigorous evaluation, researchers can optimize LLM-based screening processes, allowing for faster and more comprehensive evidence synthesis across biomedical disciplines.…”
    Get full text
    Article
  10. 890
  11. 891

    Scientific Evidence for Clinical Text Summarization Using Large Language Models: Scoping Review by Lydie Bednarczyk, Daniel Reichenpfader, Christophe Gaudet-Blavignac, Amon Kenna Ette, Jamil Zaghir, Yuanyuan Zheng, Adel Bensahla, Mina Bjelogrlic, Christian Lovis

    Published 2025-05-01
    “…ResultsA total of 30 original studies were included in the analysis. All used observational retrospective designs, mainly using real patient data (n=28, 93%). …”
    Get full text
    Article
  12. 892

    Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator by David Khoury, Samir Haddad, Patrick Sondi, Gaby Abou Haidar, David Semaan, Jinane Sayah

    Published 2024-01-01
    “…Scalability, resource limitations, and privacy concerns are analyzed as IoT devices handle sensitive information, and the transparent and immutable nature of blockchain can raise data protection. …”
    Get full text
    Article
  13. 893

    Secure and Reversible Face De-Identification With Format-Preserving Encryption by Heehwan Kim, Sungjune Park, Daeseon Choi

    Published 2025-01-01
    “…In conclusion, the proposed method provides a robust privacy-preserving solution for facial data in digital environments, balancing security and utility while supporting lawful restoration.…”
    Get full text
    Article
  14. 894

    A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features by Fazeel Zafar, Talha Ahmed Khan, Salas Akbar, Muhammad Talha Ubaid, Sameena Javaid, Kushsairy Abdul Kadir

    Published 2025-01-01
    “…The system dissects video inputs into frames to extract features comprehensively by using Multi Test Convolutional Networks (MTCNN). …”
    Get full text
    Article
  15. 895

    Global Health care Professionals’ Perceptions of Large Language Model Use In Practice: Cross-Sectional Survey Study by Ecem Ozkan, Aysun Tekin, Mahmut Can Ozkan, Daniel Cabrera, Alexander Niven, Yue Dong

    Published 2025-05-01
    “…The majority of our participants found ChatGPT to be useful; however, there are concerns about patient privacy, data security, and its legal and ethical issues as well as the accuracy of its information. …”
    Get full text
    Article
  16. 896

    Ethical guidelines for journalistic use of GenAI. The main trends in the international debate and progress in self-regulation in Spain by Rosana Sanahuja-Sanahuja, Pablo López-Rabadán

    Published 2025-03-01
    “…To deal with this situation, academics and the journalistic sector have been publishing different professional guidelines and codes in an attempt to guide the ethical use of this technology. Based on the systematic review of three sets of academic guidelines and 18 important professional publications, and including data from more than 60 countries, this study establishes a double objective: to identify the main trends determining the international ethical debate; and to examine the degree of correspondence between these trends and the first self-regulation initiatives launched by the Spanish media. …”
    Get full text
    Article
  17. 897

    Knowledge, Attitudes, and Perceptions of Chronic Patients in Saudi Arabia Regarding the Use of Artificial Intelligence to Improve Medication Adherence by Alsanosi SM, Aldajani AQ, Gheliwi HA, Alotibi MM, Bokhari GS, Almatrafi OA, Alqawlaq AK, Abujamai JZ, Shaikhomer M, Alhindi YZ, Alshanberi AM

    Published 2025-06-01
    “…Safaa M Alsanosi,1 Asayel Q Aldajani,2 Hasnaa A Gheliwi,2 Manar M Alotibi,2 Ghadi S Bokhari,2 Orjuwan A Almatrafi,2 Abdulelah K Alqawlaq,3 Jakleen Z Abujamai,3 Mohammed Shaikhomer,4 Yosra Z Alhindi,1 Asim M Alshanberi3 1Department of Pharmacology and Toxicology, Faculty of Medicine, Umm Al Qura University, Makkah, Saudi Arabia; 2Faculty of Medicine, Umm Al-Qura University, Makkah, Saudi Arabia; 3General Medicine Program, Batterjee Medical College, Jeddah, Saudi Arabia; 4Department of Internal Medicine, Faculty of Medicine, King Abdulaziz University, Jeddah, Saudi ArabiaCorrespondence: Safaa M Alsanosi, Department of Pharmacology and Toxicology, Faculty of Medicine, Umm Al Qura University, Makkah, Saudi Arabia, Email smsanosi@uqu.edu.saBackground: Artificial intelligence (AI) is advancing healthcare globally and in Saudi Arabia, enhancing patient care, diagnostics, and administrative efficiency, despite challenges such as data privacy and regulation. This study explores knowledge, attitudes, and perceptions (KAP) regarding AI in medication adherence among chronic patients in Makkah region, Saudi Arabia.Methods: A cross-sectional study was conducted among patients with chronic diseases in the Makkah region, Saudi Arabia, from 1 July to 31 December 2024. …”
    Get full text
    Article
  18. 898

    Prevalence of adolescent dual tobacco use and its associated factors: findings from a cross-sectional study by Mohd Firdaus Razali, Mohd Ruhaizie Riyadzi, Hamizatul Akmal Abd Hamid, Khaw Wan-Fei, Ummi Nadiah Yusoff

    Published 2025-07-01
    “…Objective To determine the prevalence and its associated factors of dual tobacco use among Malaysian adolescents in developing effective public health strategies.Design Cross-sectional study.Setting This study analysed data from the National Health and Morbidity Survey (NHMS) 2022: Adolescent Health Survey (AHS), a nationwide cross-sectional survey conducted among secondary school students across Malaysia.Participants This cross-sectional study used data from the NHMS 2022: AHS, which included a representative national sample of Malaysian adolescents between the ages of 13 and 17. …”
    Get full text
    Article
  19. 899

    Health Care Professionals’ Use of Digital Technology in the Secondary Prevention of Cardiovascular Disease in Austria: Online Survey Study by Luisa Lunz, Sabine Würth, Stefan Tino Kulnik

    Published 2025-06-01
    “…Quantitative survey data were analyzed using descriptive statistics, group comparison tests, and association statistics. …”
    Get full text
    Article
  20. 900

    CPS-IIoT-P2Attention: Explainable Privacy-Preserving With Scaled Dot-Product Attention in Cyber-Physical System-Industrial IoT Network by Yakub Kayode Saheed, Joshua Ebere Chukwuere

    Published 2025-01-01
    “…The findings revealed that the scaled dot product attention mechanism dramatically boosts model performance, while Pearson correlation and agglomerative clustering safeguard data privacy in CPS-IIoT, surpassing the performance of existing state-of-the-art (SOTA) models. …”
    Get full text
    Article