Showing 2,541 - 2,560 results of 2,784 for search '((((( usedds OR usedds) OR usedds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.19s Refine Results
  1. 2541

    An evaluation of menstrual health apps’ functionality, inclusiveness, and health education information by Emma Bucher, Callie Sharkey, Abby Henderson, Briette Basaran, Sarah Meyer, Chen X. Chen

    Published 2025-05-01
    “…Methods In this descriptive study, two reviewers independently searched, screened, and evaluated each app using a standardized tool. Three terms (i.e., “period pain,” “period app,” and “menstrual cramp”) were used to search the Apple App Store. …”
    Get full text
    Article
  2. 2542

    Barriers and facilitators to oral pre-exposure prophylaxis uptake among adolescents girls and young women at elevated risk of HIV acquisition in Lilongwe, Malawi: A qualitative stu... by Simon C Nicholas, Maureen Matewere, Agatha Bula, Mercy Tsidya, Mina C Hosseinipour, Mitch Matoga, Alinane Linda Nyondo Mipando

    Published 2025-01-01
    “…The data were digitally recorded, managed using NVivo software and analysed using a thematic approach guided by the Consolidated Framework for Implementation Research (CFIR). …”
    Get full text
    Article
  3. 2543
  4. 2544

    AI-Driven Advancements in Orthodontics for Precision and Patient Outcomes by David B. Olawade, Navami Leena, Eghosasere Egbon, Jeniya Rai, Aysha P. E. K. Mohammed, Bankole I. Oladapo, Stergios Boussios

    Published 2025-04-01
    “…While AI offers tremendous potential, challenges remain in areas such as data privacy, algorithmic bias, and the cost of adopting AI technologies. …”
    Get full text
    Article
  5. 2545

    Survey Influencing Factors on Prenatal Care in mothers referring to health care ‎centers in Rasht city in ‎‏2008‏ by fataneh bakhshi, nasrin mokhtari, shahin jefruodi, jila shekani, moohamad abasi, zahra atrkarruoshan

    Published 2009-10-01
    “…‎ Conclusion: In existence of prenatal care in health centers, almost half of women do not use these ‎care provided. Among barriers to utilization of care were not knowing the manner and number of ‎prenatal care, compliance with the women's privacy in time of providing care and providers manner ‎of communication in health centers. …”
    Get full text
    Article
  6. 2546

    Fighting Fire with Fire: Reclaiming Social Media to Promote Healthy Eating Behaviors among Children by Babu George, Martha Ravola

    Published 2024-09-01
    “…The paper emphasizes the importance of ethical considerations in implementing social media interventions for children, addressing privacy concerns, data security, and the need for age-appropriate, culturally sensitive content. …”
    Get full text
    Article
  7. 2547

    A Web-Based Interface That Leverages Machine Learning to Assess an Individual’s Vulnerability to Brain Stroke by Divyansh Bhandari, Arnav Agarwal, R. Reena Roy, Rajaram Priyatharshini, Rodriguez Rivero Cristian

    Published 2025-01-01
    “…To bridge the gap between complex predictive models and end-users, we deploy this model in an intuitive web interface (built with Streamlit) that non-technical individuals and healthcare providers can easily use. This interface requires no specialized knowledge, preserves user privacy by avoiding any data storage, and provides clear explanations of results. …”
    Get full text
    Article
  8. 2548

    A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture by Rui Lu, Lei Shi, Yinlong Liu, Zhongkai Dang

    Published 2025-05-01
    “…This study designs a progressive solution by (1) building a crowdsourced data collection network, using mobile terminals equipped with GPS technology to automatically collect device signal features, replacing inefficient manual drive tests; (2) developing a progressive signal update algorithm that integrates real-time crowdsourced data and historical signals to optimize the signal fingerprint database in dynamic environments; (3) establishing an edge service architecture to offload signal matching and trajectory estimation tasks to MEC nodes, using lightweight computing engines to reduce the load on the core network. …”
    Get full text
    Article
  9. 2549

    Retracted: An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks by Pratima Upadhyay, Venkatadri Marriboina, Shiv Kumar, Sunil Kumar, Mohd Asif Shah

    Published 2022-01-01
    “…Also, the safety messages are modified or discarded by the attacker or any other node and it may lead to the loss of privacy, integrity, confidentiality, and authentication of the data.So to enhance the security of VANETs, it is very much essential to invent a secure communication protocol, to protect the infrastructure of the network and the confidentiality of the data. …”
    Get full text
    Article
  10. 2550

    Potential of Internet of Medical Things (IoMT) applications in building a smart healthcare system: A systematic review by Ruby Dwivedi, Divya Mehrotra, Shaleen Chandra

    Published 2022-03-01
    “…However mass adoption seems challenging due to factors like privacy and security of data, management of large amount of data, scalability and upgradation etc. …”
    Get full text
    Article
  11. 2551

    A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks by M. Saritha, Saidireddy Malgireddy

    Published 2025-07-01
    “…The major components of the proposed model: (1) Data-Collection and Pre-processing (2) Feature Extraction using MSV-GRU (3) FKA-DLN model for the better classification. …”
    Get full text
    Article
  12. 2552

    Enhancing Incentive Schemes in Edge Computing through Hierarchical Reinforcement Learning by Gowtham R, Vatsala Anand, Yadati Vijaya Suresh, Kasetty Lakshmi Narasimha, R. Anil Kumar, V. Saraswathi

    Published 2025-04-01
    “… Edge learning is a distributed approach for training machine learning models using data from edge devices. It preserves privacy by avoiding direct data sharing. …”
    Get full text
    Article
  13. 2553

    Multimodal dataset for sensor fusion in fall detection by Carla Taramasco, Miguel Pineiro, Pablo Ormeño-Arriagada, Diego Robles, David Araya

    Published 2025-04-01
    “…This dataset was compiled from simulations of ten different fall types by ten participants, ensuring a wide array of scenarios. Data were collected using four types of sensors: a mobile phone equipped with a single-channel, three-dimensional accelerometer; a far infrared (FIR) thermal camera; an $8×8$ LIDAR; and a 60–64 GHz radar. …”
    Get full text
    Article
  14. 2554

    Exploring the barriers and facilities migrants face in accessing COVID-19 vaccines in Malaysia: A qualitative study. by Tharani Loganathan, Amirah Zafirah Zaini, Hazreen Abdul Majid

    Published 2025-01-01
    “…Digital appointment systems excluded many migrants due to language and literacy barriers, data privacy concerns, and the need for identity documents. …”
    Get full text
    Article
  15. 2555

    Digital technologies for the Sustainable Development Goals by Dharmendra Hariyani, Poonam Hariyani, Sanjeev Mishra

    Published 2025-07-01
    “…This study is motivated by the growing significance of DTs in addressing sustainability challenges and their critical contribution to achieving the SDGs while identifying barriers to their adoption. Using a systematic review, this review examines the contributions of various DTs, i.e., AI, IoT, blockchain, cloud computing, big data analytics, remote sensing, and GIS in addressing SDGs. …”
    Get full text
    Article
  16. 2556

    A comprehensive survey on AI-enabled secure social industrial Internet of Things in the agri-food supply chain by Sajal Halder, Md Rafiqul Islam, Quazi Mamun, Arash Mahboubi, Patrick Walsh, Md Zahidul Islam

    Published 2025-08-01
    “…The findings indicate that AI-driven security solutions significantly enhance trust management, anomaly detection, and data privacy in SIIoT networks. The proposed taxonomy categorizes AI-enabled security mechanisms into five distinct areas, offering a structured reference for future research and practical implementations. …”
    Get full text
    Article
  17. 2557

    Advancing Healthcare: Intelligent Speech Technology for Transcription, Disease Diagnosis, and Interactive Control of Medical Equipment in Smart Hospitals by Ahmed Elhadad, Safwat Hamad, Noha Elfiky, Fulayjan Alanazi, Ahmed I. Taloba, Rasha M. Abd El-Aziz

    Published 2024-11-01
    “…The federated learning framework enabled collaborative model training across multiple hospital sites, preserving patient privacy by avoiding raw data exchange. This distributed approach allowed the model to learn from diverse, real-world data while ensuring compliance with strict data protection standards. …”
    Get full text
    Article
  18. 2558

    Developing an artificial intelligence-based progressive growing GAN for high-quality facial profile generation and evaluation through turing test and aesthetic analysis by Shahab Kavousinejad, Kazem Dalaie, Mohammad Behnaz, Soodeh Tahmasbi, Asghar Ebadifar, Hoori Mirmohammadsadeghi

    Published 2025-07-01
    “…This approach offers valuable applications in orthodontic education, treatment simulation, and data augmentation, particularly where patient privacy and dataset balance are critical. …”
    Get full text
    Article
  19. 2559

    From lab to field with machine learning – Bridging the gap for movement analysis in real-world environments: A commentary by Carlo Dindorf, Fabian Horst, Djordje Slijepčević, Bernhard Dumphart, Jonas Dully, Matthias Zeppelzauer, Brian Horsak, Michael Fröhlich

    Published 2024-09-01
    “…Event detection (c) in time series data is the annotation of certain events that are used to extract useful and vital information or to remove unwanted and unnecessary data for further analysis. …”
    Get full text
    Article
  20. 2560

    Exploring Respectful Maternity Care and its determinants: a mixed methods cross-sectional study from a rural area in central India by Chullithala Athira, Anindo Majumdar, Roshan F. Sutar, Bharti Singh, Parvathy Thampy, Ashlesh Rupani, Deepti Dabar

    Published 2025-08-01
    “…Descriptive data is presented in frequency tables. Quantitative data were analyzed using logistic regression and qualitative data through thematic analysis. …”
    Get full text
    Article