Showing 1,901 - 1,920 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.20s Refine Results
  1. 1901

    Adaptive Learning Algorithms for Low Dose Optimization in Coronary Arteries Angiography: A Comprehensive Review by Komal Tariq, Muhammad Adnan Munir, Hafiza Tooba Aftab, Amir Naveed, Ayesha Yousaf, Sajjad Ul Hassan

    Published 2024-06-01
    “…Results: The extracted data shows a comprehensive data on various techniques that are used for low dose CAA, advancements in image segmentation, noise reduction, and operator dose reduction highlight the potential of machine learning techniques. …”
    Get full text
    Article
  2. 1902

    GLOBE Observer: A Case Study in Advancing Earth System Knowledge with AI-Powered Citizen Science by Peder V. Nelson, Russanne Low, Holli Kohl, David Overoye, Di Yang, Xiao Huang, Sriram Chellappan, Farhat Binte Azam, Ryan M. Carney, Monika Falk, Joan Garriga, Larisa Schelkin, Rebecca Boger, Theresa Schwerin

    Published 2024-12-01
    “…GLOBE citizen science data has been used to develop automated data classification routines that enable information discovery of mosquito larvae and land cover labels. …”
    Get full text
    Article
  3. 1903

    Artificial intelligence in early warning systems for infectious disease surveillance: a systematic review by Ismael Villanueva-Miranda, Guanghua Xiao, Guanghua Xiao, Yang Xie, Yang Xie

    Published 2025-06-01
    “…After screening 600 records and removing duplicates and non-relevant articles, the search yielded 67 relevant studies for review.ResultsKey findings reveal the prevalent use of machine learning (ML), deep learning (DL), and natural language processing (NLP), which often integrate diverse data sources (e.g., epidemiological, web, climate, wastewater). …”
    Get full text
    Article
  4. 1904

    Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings by Rosario G. Garroppo, Pietro Giuseppe Giardina, Giada Landi, Marco Ruta

    Published 2025-04-01
    “…Collaborative training across multiple cooperative smart buildings enables model development without direct data sharing, ensuring privacy by design. Furthermore, the design of the proposed method considers three key principles: sustainability, adaptability, and trustworthiness. …”
    Get full text
    Article
  5. 1905

    An investigation into the acceptance of intelligent care systems: an extended technology acceptance model (TAM) by Zhe Wang, Yuhui Wang, Yu Zeng, Jiayu Su, Zhirong Li

    Published 2025-05-01
    “…Moreover, higher privacy security requirements correlate with lower perceptions of the system’s usefulness. …”
    Get full text
    Article
  6. 1906

    Developing an Ontology to Enhance Semantic Interoperability in IoT Environment by Maria Cornejo-Lupa, Ana Aguilera, Irvin Dongo

    Published 2025-05-01
    “…This study proposes the development of an enhanced ontology that integrates different ontologies in the IoT domain, including key aspects such as interoperability, security, privacy, energy efficiency, and ethics. A formal methodology for ontology design and construction was used in four phases: ontology requirements, design, construction, and evaluation. …”
    Get full text
    Article
  7. 1907

    When and Why Adults Abandon Lifestyle Behavior and Mental Health Mobile Apps: Scoping Review by Patrick G Kidman, Rachel G Curtis, Amanda Watson, Carol A Maher

    Published 2024-12-01
    “…ObjectiveWe explored the abandonment of apps used for managing physical activity, diet, alcohol, smoking, and mental health in free-living conditions, examining the duration of app use before abandonment and the underlying reasons. …”
    Get full text
    Article
  8. 1908

    SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare by Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Hafida Saidi, Joel Herve Mboussam Emati, Leandros Maglaras

    Published 2024-12-01
    “…We leverage the blockchain-based Self-Sovereign Identity (SSI) model to handle client authentication and secure communication. Additionally, we use the Trimmed Mean method to aggregate data. This helps reduce the effect of unusual or malicious inputs when creating the overall model. …”
    Get full text
    Article
  9. 1909

    IoT-enabled real-time health monitoring system for adolescent physical rehabilitation by Jie Yang, Juanjuan Hu, Wenrui Chen

    Published 2025-05-01
    “…To evaluate the system’s performance, experiments were conducted to assess motion pattern recognition accuracy, response time, real-time analysis capabilities, and system stability and capacity. The methods we use and the data we collect are from public datasets, do not involve privacy protection for adolescents, and have been approved by the institutional ethics committee. …”
    Get full text
    Article
  10. 1910

    Navigating the digital transformation: industry 4.0's role in modern healthcare by Phonchai Thongwichian

    Published 2024-07-01
    “…Key findings include the prevalent use of data analytics and AI in enhancing patient care and operational efficiencies, and the emerging challenges related to data privacy and ethical considerations. …”
    Get full text
    Article
  11. 1911

    Development of Energy Demand Profile Based on Non-Historical and Non-Energy Variables: A Headquarters’ Offices Case Study by Juliana Cruz, Isabel Lasierra, Yassine Rqiq, Víctor Ballestín

    Published 2025-01-01
    “…Under the Positive Energy Districts framework, cities authorities must be informed of the energy demand of districts to design tailor-made policies and strategies to promote the deployment of energy efficiency, sharing and transition actions. However, the diverse data sources and long procedures to collect data because of privacy permissions may result in a slow-down of the development of these roadmaps. …”
    Get full text
    Article
  12. 1912

    Development of a remote therapeutic monitoring platform: applications for movement disorders by Sreetharan Thankathuraipandian, Walter Greenleaf, Anahita Kyani, Tucker Tomlinson, Binesh Balasingh, Erika Ross, Yagna Pathak

    Published 2024-12-01
    “…Through an investigational remote monitoring application (RM app) integrating patient-reported outcomes (PROs) and objective data using wearables, we aimed to develop an accessible, data-driven digital tool to monitor patient symptoms and deliver low-burden and easy-to-access DBS therapy. …”
    Get full text
    Article
  13. 1913

    ADVANCE AND DEVELOPMENT OF CHAOTIC OPTICAL COMMUNICATIONS: A REVIEW by Mohamed Khudhair Al-Gburi, Ibrahim A. Murdas

    Published 2025-07-01
    “…Chaotic optical communication is a hopeful technique for improving the privacy and security of communications networks. It uses synchronized chaotic emitters and receiver lasers for encoding and decoding the data at the hardware level. …”
    Get full text
    Article
  14. 1914

    MedBlockSure: Blockchain‐based insurance system by Charu Krishna, Divya Kumar, Dharmender Singh Kushwaha

    Published 2024-12-01
    “…The conceptual view of the proposed system using sequence and use case diagrams and data management framework and smart claim processing system is demonstrated.…”
    Get full text
    Article
  15. 1915

    When AI Joins the scope: Canadian endoscopists’ perceptions of NodeAI versus conventional methods for identifying lymph node malignancies in EBUS imaging. by Ria Datta

    Published 2025-07-01
    “…The baseline and endline surveys measured shifts in opinions regarding NodeAI's usability in diagnostic accuracy, procedure time, and ease of use. Qualitative insights were gathered through open-ended questions during the focus group to explore clinicians' views on AI's potential role, while quantitative data was captured using scales/ratings. …”
    Get full text
    Article
  16. 1916

    Evaluation and performance comparison of a model for adoption of biometrics in online banking by Norah AlJanahi, Mostafa Abd-El-Barr, Kalim Qureshi

    Published 2021-04-01
    “…A total of 500 invitations were sent and 302 valid responses were received. The data was analysed using SPSS software tool, version 22. …”
    Get full text
    Article
  17. 1917

    Spiking Residual ShuffleNet-Based Intrusion Detection in IoT Environment by Sneha Leela Jacob, H. Parveen Sultana

    Published 2025-01-01
    “…The input data is normalized using Z-score normalization (ZN). …”
    Get full text
    Article
  18. 1918

    Any Bluetooth device can be hacked. Know how? by Prathibha Muraleedhara, Mary Subaja Christo, Jaya J, Yuvasini  D

    Published 2024-01-01
    “…Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain.…”
    Get full text
    Article
  19. 1919

    Work process of community health workers in the context of digital health: a non-participant observation study by Romário Correia dos Santos, Lenira Ferreira Ribeiro, Cláudia Fell Amado, Lívia Milena Barbosa de Deus e Méllo, Liliana Santos

    Published 2025-08-01
    “…The results point to advantages for the work of the CHW, such as expanding access to health and communication between the team and users, agility in data collection and qualification of care; Disadvantages also emerged in the scenario of using digital technologies, such as delays in replacing damaged instruments, loss of workers’ privacy and precarious working conditions. …”
    Get full text
    Article
  20. 1920

    A scoping review of the governance of federated learning in healthcare by Rebekah Eden, Ignatius Chukwudi, Chris Bain, Sebastiano Barbieri, Leonie Callaway, Susan de Jersey, Yasmeen George, Alain-Dominique Gorse, Michael Lawley, Peter Marendy, Steven M. McPhail, Anthony Nguyen, Mahnaz Samadbeik, Clair Sullivan

    Published 2025-07-01
    “…Abstract In healthcare, federated learning (FL) is emerging as a methodology to enable the analysis of large and disparate datasets while allowing custodians to retain sovereignty. While FL minimises data-sharing challenges, concerns surrounding ethics, privacy, maleficent use, and harm remain. …”
    Get full text
    Article