Search alternatives:
usedddddds » useddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
Showing 2,581 - 2,600 results of 2,784 for search '(((( usedddddds OR usedddddds) OR useddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.17s Refine Results
  1. 2581

    Contrastive Self-Supervised Learning for Sensor-Based Human Activity Recognition: A Review by Hui Chen, Charles Gouin-Vallerand, Kevin Bouchard, Sebastien Gaboury, Melanie Couture, Nathalie Bier, Sylvain Giroux

    Published 2024-01-01
    “…Next, we comprehensively review data augmentation methods for sensor data and commonly used benchmark datasets for activity recognition. …”
    Get full text
    Article
  2. 2582

    HealthPass: a contactless check-in and adaptive access control system for lowering cluster infection risk in public health crisis by Guofeng Luo, Yufei Wang, Linghong Hong, Xin He, Jiaru Wang, Qu Shen, Cheng Wang, Longbiao Chen

    Published 2024-12-01
    “…IntroductionEnsuring effective measures against the spread of the virus is paramount for educational institutions and workplaces as they resume operations amidst the ongoing public health crisis. A touchless and privacy-conscious check-in procedure for visitor assessment is critical to safeguarding venues against potential virus transmission.MethodsIn our study, we developed an interaction-free entry system featuring anonymous visitors who voluntarily provide data. …”
    Get full text
    Article
  3. 2583

    Comparing nurses’ and patients’ perceptions of dignity in burn care: a cross-sectional study by Davood Zarei, Zahra Khademian, Azita Jaberi, Abdolkhalegh Keshavarzi

    Published 2025-03-01
    “…Methods This cross-sectional study was conducted on 110 nurse-patient dyads at Amir-Al-Moemenin Burn Hospital, Shiraz, Iran between August 2023 to February 2024. Data were collected using patient dignity questionnaire and analyzed using SPSS software version 23.0, utilizing descriptive tests, Mann-Whitney, Kruskal-Wallis, Wilcoxon, and Spearman’s correlation coefficient. …”
    Get full text
    Article
  4. 2584
  5. 2585

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  6. 2586

    The Experience of Intimacy and Sexuality in Persons with Mental Illness: A Metasynthesis by Reshma Antony, Manjula Munivenkatappa, Geetha Desai

    Published 2025-01-01
    “…ATLAS.ti software was used to code the primary and secondary data to generate 83 descriptive themes and 17 composite themes, which were further synthesised to create seven interpretive themes. …”
    Get full text
    Article
  7. 2587

    Assessing user preferences and competitive strategies of Gojek and Grab in ASEAN’s ride-hailing market by Pandu Kurniawan, Didi Achjari

    Published 2024-12-01
    “…This study aims to determine the criteria, sub-criteria, and alternatives influencing users in choosing ride-hailing and map Gojek and Grab’s grand strategy to compete in the ASEAN market, especially in Indonesia, Thailand, Vietnam, and Singapore. This research uses a questionnaire to collect data, with 377 Gojek and Grab users as participants. …”
    Get full text
    Article
  8. 2588

    Green banking practices and customer satisfaction-way to green sustainability by Ajaz Akbar Mir, Aijaz Ahmad Bhat, Ahmad Samed Al-Adwan, Summaira Farooq, Dima Jamali, Irshad Ahmad Malik

    Published 2025-04-01
    “…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
    Get full text
    Article
  9. 2589

    Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA by Abdullah Sevin, Abdu Ahmed Osman Mohammed

    Published 2024-12-01
    “…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
    Get full text
    Article
  10. 2590

    Internet of Things in Medicine: a Bibliometric Review by Meysam Alavi, Motahareh Dehghan

    Published 2024-07-01
    “…Data visualization was conducted using VOSviewer software. …”
    Get full text
    Article
  11. 2591

    Bridging Cities and Citizens with Generative AI: Public Readiness and Trust in Urban Planning by Adnan Alshahrani

    Published 2025-07-01
    “…This study explores whether Saudi residents are ready to engage with AI-driven tools in urban planning, how they prefer to interact with them, and what ethical concerns may arise. Using a quantitative, survey-based approach, the study collected data from 232 Saudi residents using non-probability stratified sampling. …”
    Get full text
    Article
  12. 2592

    ChatGPT’s Integration in GCC Higher Education: Bibliometric Analysis of Trends by Tosin Ekundayo , Zafarullah Khan , Shahid Ali Chaudhry

    Published 2024-10-01
    “…Key findings include the positive impact of ChatGPT on personalized learning and student engagement, as well as the growing focus on ethical concerns such as data privacy and bias. The study also identified strong interdisciplinary connections, with AI research in education intersecting with fields such as computer science, linguistics, and cognitive science. …”
    Get full text
    Article
  13. 2593
  14. 2594

    A comprehensive systematic review of intrusion detection systems: emerging techniques, challenges, and future research directions by Arjun Kumar Bose Arnob, Rajarshi Roy Chowdhury, Nusrat Alam Chaiti, Sudipta Saha, Ajoy Roy

    Published 2025-05-01
    “…Blockchain and quantum computing technologies are explored to improve data privacy, resilience, and scalability in decentralized and resource-constrained environments. …”
    Get full text
    Article
  15. 2595

    Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks by Daemin Shin, Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You

    Published 2017-01-01
    “…The proposed protocol includes steps for secure RO and handover management, where mutual authentication, key exchange, perfect forward secrecy, and privacy are supported. The correctness of the proposed protocol is formally analyzed using BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). …”
    Get full text
    Article
  16. 2596

    Enhancing IoT Security in 5G Networks by Reem Alzhrani, Mohammed Alliheedi

    Published 2024-12-01
    “…As a result, a robust network infrastructure is required to handle the massive volumes of data collected and transmitted to these devices. …”
    Get full text
    Article
  17. 2597

    How Gender-Sensitive Disaster Management is Addressed in the Turkish Parliament: A Qualitative Study from Feminist Bioethics Perspective by Fatma Gulsum Onal, Bahar Marangoz

    Published 2025-07-01
    “…The data were systematically retrieved using the keywords “earthquake,” “disaster,” “gender,” “women,” and “health.” …”
    Get full text
    Article
  18. 2598

    Reinforcement Learning With Deep Features: A Dynamic Approach for Intrusion Detection in IoT Networks by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…As IoT devices continue to advance, securing interconnected systems against malicious attacks is essential to ensure data privacy, system integrity, and user safety. …”
    Get full text
    Article
  19. 2599

    Unveiling practical insights of eHealth implementation in Europe: a grey literature review on legal, ethical, financial, and technological (LEFT) considerations by B. E. Bente, N. Beerlage-de Jong, R. M. Verdaasdonk, J. E. W. C. van Gemert-Pijnen

    Published 2025-08-01
    “…Legal barriers include navigating complex regulatory frameworks, interpreting regulations, and concerns about data privacy. Facilitators focus on centralized governance and Europe's role in the global data market. …”
    Get full text
    Article
  20. 2600

    Exploring the role of digital technology for feedback exchange in clinical training: a scoping review by Veena S. Singaram, Rayishnee Pillay, Esther L. Mbobnda Kapche

    Published 2024-12-01
    “…The incorporation of virtual reality and artificial intelligence presents promising opportunities for personalized, real-time feedback, but requires vigilant governance to ensure data integrity and privacy. Scoping review protocol https://doi.org/10.1186/s13643-022-02151-8…”
    Get full text
    Article