Search alternatives:
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 2,461 - 2,480 results of 2,784 for search '(((( useddddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.16s Refine Results
  1. 2461

    Pharmacogenetic testing: current state of the issue by O. V. Kraidashenko, O. O. Kremzer, T. O. Samura

    Published 2024-11-01
    “…Despite its potential, the integration of pharmacogenetics into clinical practice faces challenges, including a lack of reliable clinical evidence, inadequate physician education, and the need for a comprehensive health IT infrastructure to support the use of genetic data. Ethical and legal issues, such as patient privacy and the risk of genetic discrimination, also present significant obstacles. …”
    Get full text
    Article
  2. 2462

    Exploring nurse and patient perspectives on WeChat-based prenatal education in Chinese public hospitals: a qualitative inquiry by Yushi He, Guangmei Fan, Guangrui Fan, Dandan Liu

    Published 2025-04-01
    “…Seventeen obstetric nurses and eight pregnant women participated in semi-structured interviews between March and August 2024. Data were analyzed using thematic analysis to identify commonalities and divergences between nurse-driven and patient-driven experiences. …”
    Get full text
    Article
  3. 2463

    Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3 by Merryana Lestari, Hindriyanto Dwi Purnomo, Irwan Sembiring

    Published 2021-10-01
    “…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
    Get full text
    Article
  4. 2464
  5. 2465

    Messenger-based assessment of empathic accuracy in couples’ smartphone communication by Philipp Steinebach, Miriam Stein, Knut Schnell

    Published 2025-02-01
    “…Methods Data from N = 102 participants (51 couples) was used to investigate how accurate judgments of partners’ affect map their partners’ actual affect. …”
    Get full text
    Article
  6. 2466

    Optimising resources allocation in implementing school counselling programme at schools in the Ohangwena region by Anna Niitembu Hako, Olaniyi Bojuwoye

    Published 2024-09-01
    “…In-depth semi-structured interviews and focus group discussions were used to gather data. Thematic results revealed that teacher-counsellors had no counselling rooms to conduct individual counselling, no separate budget for school counselling programme, and that file cabinets and display boards were only available in very few schools and were inadequate school-counsellor in schools. …”
    Get full text
    Article
  7. 2467

    Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing by Yuqi Xie, Ruwei Huang, Junbin Qiu

    Published 2025-04-01
    “…Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. …”
    Get full text
    Article
  8. 2468

    Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing by Yun-Yi Fan, Chit-Jie Chew, Jung-San Lee

    Published 2025-05-01
    “…Furthermore, the lack of transparency and credibility in intelligence sources has negatively impacted the quality and trustworthiness of shared data. To address these issues, authors aim to leverage blockchain technology, utilizing its decentralized and tamper-proof properties to ensure corporate privacy and the reliability of intelligence sources. …”
    Get full text
    Article
  9. 2469

    Leveraging Blockchain Technology for Secure 5G Offloading Processes by Cristina Regueiro, Santiago de Diego, Borja Urkizu

    Published 2025-04-01
    “…This paper proposes a Blockchain-based marketplace using Hyperledger Fabric to optimize resource allocation and enhance security. …”
    Get full text
    Article
  10. 2470

    Lightweight Authentication for Devices in Internet of Thing Environment: A Survey by Sameera Abbas Fadhel, Ahmed Sami Nori

    Published 2023-12-01
    “…The extremely large number of associated devices together through different protocols make it vulnerable to be threatened by several types of attacks, such as; Unauthorized Access and Authentication Attacks, Network Attacks, Data Privacy and Integrity Attacks, and Supply Chain Attacks. …”
    Get full text
    Article
  11. 2471

    Customer’s Satisfaction via Online Shopping Environment: The Case of China by GholamReza Zandi, Rezvan Torabi, Mohammad Amin Mohammad, Xu Yi Dan

    Published 2021-07-01
    “…The philosophy of positivism was used to evaluate the online shopping behaviour in a Chinese context. …”
    Get full text
    Article
  12. 2472

    Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger by Assiya Akli, Khalid Chougdali 

    Published 2025-07-01
    “…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
    Get full text
    Article
  13. 2473

    Regulating AI in the Energy Sector: A Scoping Review of EU Laws, Challenges, and Global Perspectives by Bo Nørregaard Jørgensen, Zheng Grace Ma

    Published 2025-05-01
    “…Using the PRISMA-ScR methodology, this scoping review systematically analyzes how EU laws and regulations influence the development, adoption, and deployment of AI-driven digital solutions in energy generation, transmission, distribution, consumption, and markets. …”
    Get full text
    Article
  14. 2474

    Teenage Motherhood and its Effect on the Social Welfare of The Victims: A Case Study of Kabale Municipality. by Kwesiga, Siifa

    Published 2024
    “…Hence the study offers an in-depth analysis of the relative contribution of some socio¬demographic factors in explaining adolescent pregnancy in Kabale Municipality. Using primary data collected from different parts of the district, a sample of 30 female adolescents in the age range of 10-19 years was studied. …”
    Get full text
    Thesis
  15. 2475

    DualBranch-AMR: A Semi-Supervised AMR Method Based on Dual-Student Consistency Regularization with Dynamic Stability Evaluation by Jiankun Ma, Zhenxi Zhang, Linrun Zhang, Yu Li, Haoyue Tan, Xiaoran Shi, Feng Zhou

    Published 2025-07-01
    “…While deep learning has substantially improved the performance of Automatic Modulation Recognition (AMR), it heavily relies on large amounts of labeled data. Given the high annotation costs and privacy concerns, researching semi-supervised AMR methods that leverage readily available unlabeled data for training is of great significance. …”
    Get full text
    Article
  16. 2476

    Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County. by Ayebare, Esther Loy

    Published 2024
    “…These challenges included delays in data entry, limited resources for training, occasionally technical issues, infrastructure, and technological constraints, especially in remote areas, and concerns about data security and patient information privacy. …”
    Get full text
    Thesis
  17. 2477

    Leveraging deep neural network and language models for predicting long-term hospitalization risk in schizophrenia by Yihang Bao, Wanying Wang, Zhe Liu, Weidi Wang, Xue Zhao, Shunying Yu, Guan Ning Lin

    Published 2025-03-01
    “…In this study, we developed a deep learning model that integrates demographic, behavioral, and blood test data from admission to forecast extended hospital stays using a retrospective cohort. …”
    Get full text
    Article
  18. 2478

    Resilience in the Internet of Medical Things: A Review and Case Study by Vikas Tomer, Sachin Sharma, Mark Davis

    Published 2024-11-01
    “…Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. …”
    Get full text
    Article
  19. 2479

    DiReDi: Distillation and Reverse Distillation for AIoT Applications by Chen Sun, Qiang Tong, Wenshuang Yang, Wenqi Zhang

    Published 2024-01-01
    “…When the user needs to update the edge-AI model to better fit the actual scenario, two reverse distillation (RD) processes are employed to extract the knowledge – the difference between user preferences and the manufacturer's presumptions from the edge-AI model using the user's exclusive data. Only the extracted knowledge is reported back to the upper management cloud server to update the cloud AI model, thus protecting user privacy by not using any exclusive data. …”
    Get full text
    Article
  20. 2480

    BERT ensemble based MBR framework for android malware detection by Faisal S. Alsubaei, Abdulwahab Ali Almazroi, Walid Said Atwa, Abdulaleem Ali Almazroi, Nasir Ayub, Noor Zaman Jhanjhi

    Published 2025-04-01
    “…By leveraging their strengths, the MBR model introduces significant innovation. By using ensemble methods on static data, the MBR framework not only provides a reliable malware detection solution but also presents a novel strategy. …”
    Get full text
    Article