Search alternatives:
useds » uses (Expand Search)
Showing 2,081 - 2,100 results of 2,784 for search '((((( useds OR usedds) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.28s Refine Results
  1. 2081

    New secure distributed secret sharing scheme of n product by Zhen-hua CHEN, Shun-dong LI, Bao-cang WANG, Ji-liang LI, Xin LIU

    Published 2014-11-01
    “…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
    Get full text
    Article
  2. 2082

    Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting by Bernhard Axmann, Sanket Pujar

    Published 2025-01-01
    “…Artificial Intelligence tools, using natural language processing and machine learning, streamline data extraction. - Despite their benefits, organizations face challenges in selecting the right Artificial Intelligence-driven Knowledge Management software due to a lack of standardized evaluation frameworks. …”
    Get full text
    Article
  3. 2083

    BSLISE directory: innovating global mapping and organization of LIS schools by Tiago Emmanuel Nunes Braga, Josir Cardoso Gomes, Nathaly Cristine Leite Rocha, Fatih Oguz, Chris Cunningham

    Published 2025-03-01
    “…Evolving from the MAP project, the BSLISE directory consolidates and adapts data into a new framework using open-source software. …”
    Get full text
    Article
  4. 2084

    Federated learning with integrated attention multiscale model for brain tumor segmentation by Sherly Alphonse, Fidal Mathew, K. Dhanush, V. Dinesh

    Published 2025-04-01
    “…However, traditional brain tumor segmentation techniques usually rely on centralized data storage and analysis, which might result in privacy issues and violations. …”
    Get full text
    Article
  5. 2085

    Mapping the landscape of machine learning in chronic disease management: A comprehensive bibliometric study by Shiying Shen, Wenhao Qi, Sixie Li, Jianwen Zeng, Xin Liu, Xiaohong Zhu, Chaoqun Dong, Bin Wang, Qian Xu, Shihua Cao

    Published 2025-07-01
    “…Conclusion ML is rapidly integrating into personalized medicine, real-time monitoring, and multimodal data fusion. However, challenges such as limited collaboration, weak model generalization, and data privacy persist. …”
    Get full text
    Article
  6. 2086

    Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China by Yifu Li, Nilo Jayoma Castulo, Xiaoyuan Xu, Xiaoyuan Xu

    Published 2025-02-01
    “…The findings revealed that students demonstrated moderate familiarity with AI tools, particularly ChatGPT and willingness to use them in coursework. Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
    Get full text
    Article
  7. 2087

    Users' Perceptions and Trust in AI in Direct-to-Consumer mHealth: Qualitative Interview Study by Katie Ryan, Justin Hogg, Max Kasun, Jane Paik Kim

    Published 2025-05-01
    “…Participants described attitudes toward the impact of AI-mHealth on users’ health and personal data (ie, influences on health awareness and management, value for mental vs physical health use cases, and the inevitability of data sharing), influences on their trust in AI-mHealth (ie, endorsements and guidance from health professionals or health or regulatory organizations, attitudes toward technology companies, and reasonable but not necessarily explainable output), and their preferences relating to the amount and type of information that is shared by AI-mHealth apps (ie, the types of data that are collected, future uses of user data, and the accessibility of information). …”
    Get full text
    Article
  8. 2088

    Encouraging gender-inclusive acceptance of multipurpose national-identity smart cards. by Yuen Yee Yen, P H P Yeow, Loo Wee Hong

    Published 2022-01-01
    “…The data was collected through five hundred questionnaires from Malaysia (the MNIS pioneer) and analyzed using structural equation modeling.…”
    Get full text
    Article
  9. 2089

    A systematic review of consumers’ and healthcare professionals’ trust in digital healthcare by Soraia de Camargo Catapan, Hannah Sazon, Sophie Zheng, Victor Gallegos-Rejas, Roshni Mendis, Pedro H. R. Santiago, Jaimon T. Kelly

    Published 2025-02-01
    “…Trust in digital healthcare is complex and, from a consumers’ perspective, can influence digital healthcare use, adoption, acceptance, and usefulness. Consumers’ trust can be affected by the degree of human interaction in automated interventions, perceived risks, privacy concerns, data accuracy, digital literacy, quality of the digital healthcare intervention, satisfaction, education, and income. …”
    Get full text
    Article
  10. 2090

    From Technical Prerequisites to Improved Care: Distributed Edge AI for Tomographic Imaging by Bilgehan Akdemir, Hafiz Faheem Shahid, Mikael A. K. Brix, Juho Laakkola, Johirul Islam, Tanesh Kumar, Jarmo Reponen, Miika T. Nieminen, Erkki Harjula

    Published 2025-01-01
    “…However, transferring data to the cloud for processing strains communication links, introduces high communication latency, and raises privacy and security concerns. …”
    Get full text
    Article
  11. 2091

    تحليل العلاقة بين مؤشر الحرية الاقتصادية والنمو الاقتصادي (دراسة في بلدان عربية مختارة) by حسن كريم حمزة

    Published 2018-03-01
    “…Abstract     The Index of Economic Freedom, one of the most important economic indicators, which affect the size and quality of economic growth,     So the many institutions and organizations in the drafting of a set of standards, that will provide a lot of information and data for workers on economic policies to take advantage of them Including the Index of Economic Freedom, which consists of ten a fundamental elements of the branches off of which (42) is variable, and was to study the relationship between economic freedom and chosen variable and economic growth of the three Arab countries (Egypt - United Arab Emirates - Iraq) After identify the theoretical Framework variables and the index data analysis and identification, has been used statistical program (Evievs) to analyze and assess the impact of economic freedom variables on the dependent variable rate of economic growth, then use the built-in data analysis (Pooling data) in those countries giving dummy variables a role in determining the international privacy in the analysis, Was chosen stability of variables and  cointegration to make sure a significant parameters of the model, and it turned out after the analysis to correspond estimate for the study the UAE with the economic theory that explains there a direct correlation between economic freedom cursor and the rate of GDP growth model equation while non-existent relationship in Egypt and Iraq. …”
    Get full text
    Article
  12. 2092

    A Qualitative Study of HIV Testing Experiences and HIV Self-Testing Perspectives among Men in Northern Nigeria by Zubairu Iliyasu, Zikrillahi A. Haladu, Bilkisu Z. Iliyasu, Aminatu A. Kwaku, Nafisa S. Nass, Taiwo G. Amole, Hadiza M. Abdullahi, Amina U. Abdullahi, Fatimah I. Tsiga-Ahmed, Auwal Abdullahi, Humayra A. Bashir, Hamisu M. Salihu, Muktar H. Aliyu

    Published 2024-01-01
    “…Thematic analysis was employed to analyze the data, yielding key themes related to prior test experiences, knowledge of self-testing, and perceived ease of use, in addition to motivation for self-testing and concerns about reliability and counseling support. …”
    Get full text
    Article
  13. 2093

    Sybil Attack Detection Based on Signal Clustering in Vehicular Networks by Halit Bugra Tulay, Can Emre Koksal

    Published 2024-01-01
    “…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
    Get full text
    Article
  14. 2094

    Identifying latent mobility as a service preference segments among college students by Willy Kriswardhana, Domokos Esztergár-Kiss

    Published 2025-04-01
    “…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
    Get full text
    Article
  15. 2095

    Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks by Dheyaa Marjan Hussein Almuntifeky, Basim K. J. Al-shammari

    Published 2024-08-01
    “…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
    Get full text
    Article
  16. 2096

    Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors by Emel Ay, Menekşe Nazlı Aker

    Published 2025-03-01
    “…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
    Get full text
    Article
  17. 2097

    Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications by Juan E. Tapia, Maximilian Russo, Christoph Busch

    Published 2025-01-01
    “…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
    Get full text
    Article
  18. 2098

    The Impact of Digital Technologies on the Development of Payment Services by A. Y. Chentsov

    Published 2020-10-01
    “…The problems and ways of protecting user identification, data privacy and money safety when using electronic payment services are investigated. …”
    Get full text
    Article
  19. 2099

    Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review by Y Greeshma Vani, Suma B. Chalapathy, Pallavi Pandey, Shailendra K. Sahu, A Ramesh, Jayashree Sajjanar

    Published 2024-12-01
    “…However, issues such as data privacy, dental professional job displacement, and the necessity for thorough validation and regulation to ensure safety and efficacy remain significant concerns.…”
    Get full text
    Article
  20. 2100

    Digital health tools in juvenile idiopathic arthritis: a systematic literature review by Jordi Anton, María Montoro, Estíbaliz Loza, Teresa Otón, Susan Ramirez, Diego Benavent

    Published 2025-05-01
    “…Tool development and validation processes were poorly or not at all described, and data regarding regulatory compliance, security, or privacy were scarce. …”
    Get full text
    Article