Showing 2,261 - 2,280 results of 2,784 for search '((((( useddds OR useddds) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.22s Refine Results
  1. 2261

    Evaluation of ERP softwares with fuzzy AHP integrated TODIM method by A. Çağrı Tolga

    Published 2018-10-01
    “…Furthermore,the company's data privacy policy has been incorporated into the solutionprocedure with the fuzzy logic, which takes into account these drawbacks.Besides, it has been ensured that the cost criterion is integrated in adetailed manner. …”
    Get full text
    Article
  2. 2262

    Patient and clinician perceptions of telehealth in musculoskeletal physiotherapy services - A systematic review of the evidence-base. by Anthony Smith, Sue Innes

    Published 2025-03-01
    “…Methodological quality was evaluated using the CASP, JBI and QuADS tools. Findings were evaluated via consensus and showed clear patient and clinician satisfaction with positive themes of reduced travel, reduced physical burden, flexibility/accessibility and negative themes of reduced physical contact, computer literacy and privacy infringements. …”
    Get full text
    Article
  3. 2263

    Leveraging Blockchain for Transparency: A Study on Organ Supply Chains and Transplant Processes by Rashmi Ranjan Panigrahi, Subhodeep Mukherjee, Zakir Hossen Shaikh, Naji Mansour Nomran

    Published 2025-01-01
    “…Structural equation modelling was used to test and validate the model. <i>Results</i>: The study’s findings indicate that social influence, trust, facilitating conditions, government support, performance expectancy, data security and privacy, and technology affinity positively impact blockchain adoption in organ transplants. …”
    Get full text
    Article
  4. 2264

    Asynchronous blockchain‐based federated learning for tokenized smart power contract of heterogeneous networked microgrid system by Desh Deepak Sharma

    Published 2024-12-01
    “…For simulation purposes, MATLAB and python programming have been used with real‐time data of microgrids.…”
    Get full text
    Article
  5. 2265

    A Survey on the Effectiveness of Existing Smart Home Cyber Attacks Detection Solution: A Broadband Service Providers&#x2019; Perspective by Md Mizanur Rahman, Faycal Bouhafs, Frank den Hartog

    Published 2025-01-01
    “…We also discuss future research directions, emphasising scalable and data-efficient methods to reduce storage requirements, costs, and privacy concerns, which will enable BSPs to manage millions of customer networks more effectively.…”
    Get full text
    Article
  6. 2266

    Considering the ethical aspects of artificial intelligence application from the consumer perspective by Jovanka Vukmirović, Lola Maričić, Selena Stanojevic, Aleksandra Vukmirović, Ivan Mandić

    Published 2025-01-01
    “…Artificial intelligence (AI) uses large datasets to "train" algorithms that make autonomous decisions, leading to significant changes across fields, including digital marketing and personalized advertising. …”
    Get full text
    Article
  7. 2267

    Doctrina: Blockchain 5.0 for Artificial Intelligence by Khikmatullo Tulkinbekov, Deok-Hwan Kim

    Published 2025-05-01
    “…Compared to the existing approaches, Doctrina allows sharing and using AI services in a fully distributed and privacy-preserved manner.…”
    Get full text
    Article
  8. 2268

    Current Status, Key Issues and Development Trends of DeFi by Wang Jianrui

    Published 2025-01-01
    “…Decentralized Finance (DeFi) has become a transformative force in the financial sector, using blockchain technology to create open, permissionless financial services. …”
    Get full text
    Article
  9. 2269

    Human-centred SME factories: the future of work in SMEs under industry 5.0 by Philani Nduna Zincume, Maria Maier

    Published 2025-06-01
    “…These include regional challenges like data privacy in Europe and skills deficits in South Africa. …”
    Get full text
    Article
  10. 2270

    Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital by Daniel, Nabimanya, Sembatya, Richard, Ambrose, Atuhaire, Phelix, Businge Mbabazi

    Published 2021
    “…The researcher interviewed fifty (50) Interviewees and data was analyzed using NVIVO version 11.The findings revealed that 88% of the total interviewees express the need for their information to be kept secret from untrusted parties while 12% of the total interviewees didn’t express the need for their information secrecy from untrusted parties. …”
    Get full text
    Article
  11. 2271
  12. 2272

    A Review of Deep Learning Techniques for Leukemia Cancer Classification Based on Blood Smear Images by Rakhmonalieva Farangis Oybek Kizi, Tagne Poupi Theodore Armand, Hee-Cheol Kim

    Published 2025-02-01
    “…Despite these advancements, challenges such as dataset limitations, the lack of model interpretability, and ethical concerns regarding data privacy and bias remain critical barriers to widespread adoption. …”
    Get full text
    Article
  13. 2273

    Community PrEP delivery for adolescent girls and young women: insights from the DREAMS PrEP Choice Study in Johannesburg, South Africa by Nicolette Prea Naidoo, Nqaba Mthimkulu, Ngcwalisa Jama, Glory Chidumwa, Brison Chabalala, Tafadza Mhakakora, Lauren Parmley, Saiqa Mullick

    Published 2025-04-01
    “…Quantitative data are presented descriptively whilst qualitative data were analyzed using content and thematic analyses.ResultsBetween October 2023 and April 2024, 657 participants were enrolled and offered PrEP choice. …”
    Get full text
    Article
  14. 2274

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). …”
    Get full text
    Article
  15. 2275

    Bitcoin Mining in Turkey as an Example of Speculative Entrepreneurship by Ali Osman Uymaz, Ali Rıza Esmen

    Published 2022-10-01
    “…The collected data thus was analyzed and coded thorough thematic analysis. …”
    Get full text
    Article
  16. 2276

    Exploration of the Efficiency of SLM-Enabled Platforms for Everyday Tasks by Volodymyr Rusinov, Nikita Basenko

    Published 2025-04-01
    “…With growing concerns around data privacy and the resource-intensiveness of large models, SLMs present a promising solution for research and applications requiring fast, cost-effective, and locally deployable models. …”
    Get full text
    Article
  17. 2277

    Emotional Factor Recognition and Teaching Strategy Adjustment in Cultural Teaching Supported by Artificial Intelligence by Yu Xiaochen

    Published 2025-01-01
    “…Emotion recognition technology collects students’ facial expressions, speech features, and physiological data, and uses deep learning algorithms to analyze students’ emotional states in real time, providing accurate feedback support for teaching. …”
    Get full text
    Article
  18. 2278

    EXPLORING BIBLIOSHINY FOR MAPPING ARTIFICIAL INTELLIGENCE RESEARCH IN EDUCATION by Hanifah Indah Rahmawati, Zenita Sabitri, Mutiara Nabila Azmi, Danny Meirawan

    Published 2025-05-01
    “… This study critically analyzes the development of artificial intelligence (AI) research in education using a bibliometric approach, leveraging data from 191 Scopus-indexed documents during the 2015-2024 period. …”
    Get full text
    Article
  19. 2279

    Examining Healthcare Practitioners&rsquo; Perceptions of Virtual Physicians, mHealth Applications, and Barriers to Adoption: Insights for Improving Patient Care and Digital Health... by Alzghaibi H

    Published 2025-04-01
    “…It further aims to provide recommendations for enhancing usability, accessibility, and integration within existing healthcare infrastructures.Methods: A cross-sectional study was conducted among 574 secondary healthcare practitioners (SHCPs), including physicians, nurses, and administrative staff, working in secondary healthcare centres across Saudi Arabia. Data were collected using a structured questionnaire assessing ten primary barriers to mHealth adoption, including technical, usability, training, integration, privacy, organisational, communication, financial, and productivity-related challenges. …”
    Get full text
    Article
  20. 2280

    The Experience of Intimacy and Sexuality in Persons with Mental Illness: A Metasynthesis by Reshma Antony, Manjula Munivenkatappa, Geetha Desai

    Published 2025-01-01
    “…ATLAS.ti software was used to code the primary and secondary data to generate 83 descriptive themes and 17 composite themes, which were further synthesised to create seven interpretive themes. …”
    Get full text
    Article