Search alternatives:
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 2,361 - 2,380 results of 2,784 for search '(((( useddddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.16s Refine Results
  1. 2361

    Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective by Karin Brodén, Jonas Andersson, Agnieszka Kitkowska, Awais Ahmad, Peter Mozelius

    Published 2025-06-01
    “…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
    Get full text
    Article
  2. 2362

    A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023 by Shalini Kumari, Chander Prabha, Asif Karim, Md. Mehedi Hassan, Sami Azam

    Published 2024-01-01
    “…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
    Get full text
    Article
  3. 2363

    Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions by Tehseen Mazhar, Sunawar khan, Tariq Shahzad, Muhammad Amir khan, Mamoon M. Saeed, Joseph Bamidele Awotunde, Habib Hamam

    Published 2025-01-01
    “…Abstract This article discusses Blockchain and Generative AI in healthcare, including their uses, difficulties, and solutions. Blockchain technology improves EHR security, privacy, and interoperability, while smart contracts streamline supply chain management and administrative procedures. …”
    Get full text
    Article
  4. 2364

    The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs): by Mugisha, Justin, Francis Adyanga, Akena, Ocan, Johnson

    Published 2025
    “…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
    Get full text
    Article
  5. 2365

    Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection by Rafael Abreu, Emanuel Simão, Carlos Serôdio, Frederico Branco, António Valente

    Published 2024-11-01
    “…Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. …”
    Get full text
    Article
  6. 2366
  7. 2367

    BESPOKE study protocol: a multicentre, prospective observational study to evaluate the impact of circulating tumour DNA guided therapy on patients with colorectal cancer by Scott Kopetz, Axel Grothey, Shifra Krinshpun, Meenakshi Malhotra, Paul Billings, Angel Rodriguez, Alexey Aleshin, Sarah Sawyer, Michelle Munro, Pashtoon Murtaza Kasi, Jessica Guilford, Sascha Ellers, Jacob Wulff, Nicole Hook, Allyson Koyen Malashevich, Solomon Moshkevich

    Published 2021-09-01
    “…The secondary endpoints are MRD clearance rate (MRD+ to MRD−) during or after adjuvant chemotherapy, percentage of patients that undergo surgery for oligometastatic recurrence, survival of MRD-negative patients treated with adjuvant chemotherapy versus no adjuvant chemotherapy (active surveillance), overall survival, examine the number of stage I CRC that have recurrent disease detected postsurgery, and patient-reported outcomes.Ethics and dissemination This study has received ethical approval from the Advarra Institutional Review Board (IRB) protocol: Natera—20-041-NCP/3766.01, BESPOKE Study of ctDNA Guided Therapy in Colorectal Cancer (BESPOKE CRC) (Pro00041473) on 10 June 2021. Data protection and privacy regulations will be strictly observed in the capturing, forwarding, processing and storing of patients’ data. …”
    Get full text
    Article
  8. 2368

    Wireless Body Area Network (WBAN) based Health Care Monitoring: A Comprehensive Review by Qaisar Ayyub

    Published 2023-12-01
    “…Using multiple WBAN techniques, we aim to identify which techniques are giving better results in data transmission, storing, and maintaining patient data privacy and also identify the best performance using multiple techniques based on the two most important parameters such as ‘throughput’, and ‘delay’. …”
    Get full text
    Article
  9. 2369
  10. 2370

    Advancing Hematopoietic Stem Cell Transplantation Typing: Harnessing Hyperledger Fabric’s Blockchain Architecture by Meng Wu, Feng Xu, Geetha Subramaniam, Zeyu Li, Liyun Chen, Wenjuan Zhu

    Published 2024-01-01
    “…This innovative approach optimizes user experience, maintains data integrity, and ensures privacy. Future integration with existing databases could enable secure data sharing among healthcare institutions, allowing rapid verification of data ownership and unified authentication. …”
    Get full text
    Article
  11. 2371

    Strengthening health information systems and inherent statistical outputs for improved malaria control and interventions in western Kenya by Taliyah Griffin, Felix Pabon-Rodriguez, Felix Pabon-Rodriguez, George Ayodo, Yan Zhuang

    Published 2025-06-01
    “…Methods such as spatiotemporal models using climate and case data can improve outbreak predictions, while machine learning techniques can optimize insecticide-treated bed net distributions by pinpointing high-risk households. …”
    Get full text
    Article
  12. 2372

    Mitochondrial disease registries worldwide: A scoping review. by Ammanie Abdul-Fatah, Leila Esmaeilisaraji, Crisel Mae Juan, Martin Holcik

    Published 2022-01-01
    “…These include establishing registry objectives, respecting patients and their roles in the registry, adopting international data standards, data evaluations, and considerations to privacy legislation, among others. …”
    Get full text
    Article
  13. 2373

    “Invisible wounds of childbirth”; women’s experiences of obstetric violence: a phenomenological qualitative study by Esra Özer, Döndü Sevimli Güler

    Published 2025-08-01
    “…The interview data were transcribed and then subjected to qualitative content analysis in accordance with Standards for Qualitative Research Reporting (SRQR) using Graneheim and Lundman’s content analysis method. …”
    Get full text
    Article
  14. 2374

    A NLP analysis of digital demand for healthcare jobs in China by Yirui Chen, Xinrui Zhan, Wencan Yang, Xueying Yan, Yuxin Du, Tieniu Zhao

    Published 2025-04-01
    “…Compliance and data privacy skills were also highly demanded, reflecting the healthcare sector’s commitment to regulatory adherence and data security. …”
    Get full text
    Article
  15. 2375

    The Effect of AI (Artificial Intelligence) in Education on Student Motivation: A Systematic Literature Review by Badarudin, Lalu Parhanuddin, Ahmad Tohri, Muhammad Suhardi

    Published 2024-04-01
    “…However, challenges such as limited technological access, resistance to change, and concerns regarding data privacy and ethics remain critical barriers. …”
    Get full text
    Article
  16. 2376

    A Systematic Survey of Distributed Decision Support Systems in Healthcare by Basem Almadani, Hunain Kaisar, Irfan Rashid Thoker, Farouq Aliyu

    Published 2025-02-01
    “…Finally, it discusses open issues as future research directions in the field of DDSSs in the healthcare sector, including data structure standardization, alert fatigue for healthcare workers using DDSSs, and the lack of adherence of emerging technologies like blockchain to medical regulations.…”
    Get full text
    Article
  17. 2377

    ROBOTISATION AND SERVICE AUTOMATION IN THE TOURISM AND HOSPITALITY SECTOR: A META-STUDY (1993-2024) by Dušan MANDIĆ, Miroslav KNEŽEVIĆ, Dušan BOROVČANIN, Aleksandra VUJKO

    Published 2024-09-01
    “…Analyses 310 publications published in the last 32 years processed using Google Scholar search engine. The data sets used for the observations consist primarily of key research works, predominantly appearing in peer-reviewed international journals. …”
    Get full text
    Article
  18. 2378

    Artificial intelligence assistance in English for communication competence of english for specific purposes by Muchamad Muchibbuddin Waly, Aniqotul Milla Zakiyyah

    Published 2024-12-01
    “…A sequential explanatory mixed-methods design collected data from thirty-one undergraduate students using a Likert-scale questionnaire followed by semi-structured interviews to provide more detailed insights. …”
    Get full text
    Article
  19. 2379

    A Survey on Hybrid-CNN and LLMs for Intrusion Detection Systems: Recent IoT Datasets by Saida Elouardi, Anas Motii, Mohammed Jouhari, Abdoul Nasser Hassane Amadou, Mustapha Hedabou

    Published 2024-01-01
    “…Various IDS methodologies, including those using Machine Learning (ML), Deep Learning (DL) and Large Language Models (LLMs), are employed to identify intrusions within the data; however, improvements to the detection systems are still needed. …”
    Get full text
    Article
  20. 2380

    Society 5.0: Shaping the future of e-commerce by Arturs Bernovskis, Deniss Sceulovs, Agnis Stibe

    Published 2024-12-01
    “…While acknowledging the limitations of relying solely on secondary literature, the paper underscores the need for future research to include empirical studies and address challenges like data privacy, the digital divide, and evolving regulatory frameworks within the e-commerce landscape.…”
    Get full text
    Article