Search alternatives:
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 2,641 - 2,660 results of 2,784 for search '(((( useddddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 2641

    Critical Smart Functions for Smart Living Based on User Perspectives by Benjamin Botchway, Frank Ato Ghansah, David John Edwards, Ebenezer Kumi-Amoah, Joshua Amo-Larbi

    Published 2025-08-01
    “…Twenty-six critical smart functions for smart living were revealed, with the top three including the ability to protect personal data and information privacy, provide real-time safety and security, and the ability to be responsive to users’ needs. …”
    Get full text
    Article
  2. 2642

    Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network by Yuecheng WANG, Youwen ZHU, Zhiqiang ZHANG

    Published 2025-01-01
    “…However, the network communication environment is open and insecure, necessitating the use of a symmetric key to encrypt and decrypt data during the data exchange process. …”
    Get full text
    Article
  3. 2643

    The Application of Digital Intelligence Technology in the Management of Non-Hospitalized Patients with Rare Diseases by YAO Yiyang, GAO Yi, GUO Yixuan, QIN Zhuoyue, ZHANG Yaofang, JING Jiaqi, XIE Jing, GUO Jian, ZHANG Shuyang

    Published 2025-01-01
    “…Methods We designed the search strategy and used the words " rare diseases"" patient management"" non-hospitalized management"" community management"" digital intelligence"" big data"" telemedicine" as MESH terms or free words. …”
    Get full text
    Article
  4. 2644

    AI in Medical Questionnaires: Innovations, Diagnosis, and Implications by Xuexing Luo, Yiyuan Li, Jing Xu, Zhong Zheng, Fangtian Ying, Guanghui Huang

    Published 2025-06-01
    “…Future research should pay more attention to model interpretability, system compatibility, validation standardization, and ethical governance to effectively address key challenges such as data privacy, clinical integration, and transparency.…”
    Get full text
    Article
  5. 2645

    Opportunities, challenges, and requirements for Artificial Intelligence (AI) implementation in Primary Health Care (PHC): a systematic review by Farzaneh Yousefi, Reza Dehnavieh, Maude Laberge, Marie-Pierre Gagnon, Mohammad Mehdi Ghaemi, Mohsen Nadali, Najmeh Azizi

    Published 2025-06-01
    “…However, the most challenges emerged within the stewardship and resource generation functions, with key concerns related to data security and privacy, technical performance issues, and limitations in data accessibility. …”
    Get full text
    Article
  6. 2646

    Effect of transcranial magnetic stimulation on perioperative neurocognitive dysfunction: study protocol for a systematic review and meta-analysis of randomised controlled trials by Ying Yang, Yongming Tian, Yulan Luo, Jiarong Zeng

    Published 2025-06-01
    “…Meta-analysis will be conducted using STATA V.15.1 statistical software. The data synthesis process will incorporate standardised methodologies, including heterogeneity testing, sensitivity analysis and assessment of publication bias.Ethics and dissemination This study will not involve the collection of biometric information or medical privacy data throughout the research process, thus complying with the exemption criteria outlined in the ‘Measures for Ethical Review of Biomedical Research Involving Human Subjects.’ …”
    Get full text
    Article
  7. 2647
  8. 2648

    Perceptions of academic staff and students of senior high school in implementing game-based exercises in physical education classes—a research protocol for a qualitative descriptiv... by Donald Manlapaz, Jose Avelino Vergara, Keisha Marie Bea Alpuerto, Iszaac Khalil Señora De Los Santos, Michaela Urian Enriquez, Zamantha Zamora Manicio, Joshua Emmanuel Ferrera Mendres, Casey Gwyn Salvaleon Tolosa, Zachary Gabriel Dee Vilela, Zeraia Ezra Gabriel Alonzo Zabat

    Published 2023-12-01
    “…Once done, they will undergo FGDs conducted through Google Meet. Data will be coded and analysed via thematic analysis using manual coding and NVivo V.12 software to summarise central themes and perceptions.Ethics and dissemination This study will abide by the Nuremberg Code, Declaration of Helsinki, Belmont Report, Data Privacy Act of 2012 and National Ethical Guidelines (for health-related research) of 2017. …”
    Get full text
    Article
  9. 2649

    Effectiveness and safety of acupuncture therapy for inflammatory bowel disease: a protocol of systematic review and meta-analysis by Fan-rong Liang, Ning Sun, Rui-Rui Sun, Yuan-Fang Zhou, Shi-Rui Cheng, Xiao-Dong Deng, Xiang-Yin Ye, Zheng-Jie Li, Gui-Xing Xu, Yu-Zhu Qu, Liu-Yang Huang

    Published 2021-08-01
    “…The primary outcome was symptoms alleviation after acupuncture treatment or even in the follow-up.Ethics and dissemination Ethical approval will not be needed because data of this review are not involved in patient’s information and privacy. …”
    Get full text
    Article
  10. 2650

    Developing a Behavioral Phenotyping Layer for Artificial Intelligence–Driven Predictive Analytics in a Digital Resiliency Course: Protocol for a Randomized Controlled Trial by Trevor van Mierlo, Rachel Fournier, Siu Kit Yeung, Sofiia Lahutina

    Published 2025-08-01
    “…Ethical safeguards include institutional review board approval, informed consent, and strict data privacy standards. ResultsThis protocol was designed in January 2025. α and β testing of the intervention are scheduled to begin in July 2025, with a soft launch anticipated in August 2025. …”
    Get full text
    Article
  11. 2651

    Study protocol for a Prospective Observational study of Safety Threats and Adverse events in Trauma (PrO-STAT): a pilot study at a level-1 trauma centre in Canada by Melissa McGowan, Charles Keown-Stoneman, Brodie Nolan, Teodor Grantcharov, Eliane M Shore, Anisa Nazir

    Published 2025-01-01
    “…All consecutive trauma team activations over 12 months will be included, with data collected using audio-visual recordings and physiological monitoring. …”
    Get full text
    Article
  12. 2652

    Barriers and facilitators of transition of adolescents living with HIV into adult care in under-resourced settings of Southern Ethiopia: a qualitative study by Mulugeta Shegaze Shimbre, Belay Boda Bodicha, Abakundana Nsenga Ariston Gabriel, Lubna Ghazal, Kedi Jiao, Wei Ma

    Published 2024-10-01
    “…Purposive sampling was used to gather data through in-depth interviews (IDIs) and focus group discussions (FDGs) involving ALWHs and their parents. …”
    Get full text
    Article
  13. 2653

    From lab to field with machine learning – Bridging the gap for movement analysis in real-world environments: A commentary by Carlo Dindorf, Fabian Horst, Djordje Slijepčević, Bernhard Dumphart, Jonas Dully, Matthias Zeppelzauer, Brian Horsak, Michael Fröhlich

    Published 2024-09-01
    “…Event detection (c) in time series data is the annotation of certain events that are used to extract useful and vital information or to remove unwanted and unnecessary data for further analysis. …”
    Get full text
    Article
  14. 2654

    Leveraging federated learning for DoS attack detection in IoT networks based on ensemble feature selection and deep learning models by Tasneem Qasem Al-Ghadi, Selvakumar Manickam, I. Dewa Made Widia, Eka Ratri Noor Wulandari, Shankar Karuppayah

    Published 2025-12-01
    “…However, IoT systems face numerous security threats, making data protection against cyberattacks essential. While deploying an Intrusion Detection System (IDS) in a centralized framework can lead to data leakage, Federated Learning (FL) offers a privacy-preserving alternative by training models locally and transmitting only the updated model weights to a central server for aggregation. …”
    Get full text
    Article
  15. 2655

    Factors Associated with Caregiver Burden in Families of Patients with Palliative and Chronic Illness: A Cross-Sectional Study by Haroen H, Juniarti N, Sari CWM, Prista Sari S, Arovah NI, Pardosi JF, Wibowo DA

    Published 2025-07-01
    “…Data were analyzed using the Rasch model and bivariate tests.Results: A high burden was reported by 50.7% of caregivers, while 39.4% and 9.9% experienced moderate and low burden, respectively. …”
    Get full text
    Article
  16. 2656

    Qualitative study exploring reintegration of clinical trial participants with HIV to public health services in Johannesburg, South Africa by Samanta Tresha Lalla-Edward, Kelechi Elizabeth Oladimeji, Sibongiseni Thandazani Nxumalo, Bernice Harris, Lizeka Napoles

    Published 2024-11-01
    “…Because transferring PLHIV back to PHCs post-clinical trials may result in decreased access to specialised care or resources that were available during the trial, this study explored insights into challenges faced during reintegration from clinical trial settings into PHCs and antiretroviral therapy (ART) adherence post-clinical trials.Design This cross-sectional study was conducted using a qualitative research approach. Participants were recruited using purposive sampling.Setting The study was conducted at the Ezintsha Research Centre in Johannesburg, South Africa, between November 2022 and February 2023.Participants The study population consisted of PLHIV who had participated in two clinical trials (DORA and ADVANCE) at the Ezintsha Research Centre in Johannesburg, South Africa.Methods Using a semistructured guide, 12 in-depth interviews were conducted with PLHIV until data saturation was reached. …”
    Get full text
    Article
  17. 2657

    Are the mothers admitted for childbirth in a tertiary care hospital satisfied with the health care services? A mixed methods study from Mangaluru, Karnataka state, India by S. Vineetha, Mubeena Haleema, Abhay S. Nirgude

    Published 2024-11-01
    “…Methods and material: It is a sequential explanatory mixed method study conducted in the Obstetrics and Gynaecology department in a tertiary college hospital among 291 pregnant women admitted for childbirth. Quantitative data obtained using expert validated questionnaire was entered in an Excel sheet and analyzed using IBM SPSS Version 23. …”
    Get full text
    Article
  18. 2658

    Heuristic Usability Evaluation of Web-Based COVID-19 Management Dashboard by Somayyeh Zakerabasali, Farnaz Salehian

    Published 2024-07-01
    “…Background and Aim: Today, information dashboards are the main tools for understanding and extracting knowledge from large data sets and can be used in various forms by healthcare providers. …”
    Get full text
    Article
  19. 2659

    Joint Distributed Computation Offloading and Radio Resource Slicing Based on Reinforcement Learning in Vehicular Networks by Khaled A. Alaghbari, Heng-Siong Lim, Charilaos C. Zarakovitis, N. M. Abdul Latiff, Sharifah Hafizah Syed Ariffin, Su Fong Chien

    Published 2025-01-01
    “…Computation offloading in Internet of Vehicles (IoV) networks is a promising technology for transferring computation-intensive and latency-sensitive tasks to mobile-edge computing (MEC) or cloud servers. Privacy is an important concern in vehicular networks, as centralized system can compromise it by sharing raw data from MEC servers with cloud servers. …”
    Get full text
    Article
  20. 2660

    Prenatal screening educational interventions for U.S. pregnant women: a scoping review by Yasmine Zerrouki, Sara Burgoa, Goodness Okwaraji, Jennifer Mendonca, Vama Jhumkhawala, Sophie Kelly, Esin Bulut, Shaima Arshad, Elisheva Knopf, Tiffany Follin, Panagiota Kitsantas, Maria C. Mejia, Lea Sacca

    Published 2025-05-01
    “…The five steps according to Arksey and O’Malley York and for the Joanna Briggs Institute (JBI) recommendations for data extraction, analysis, and presentation of results were also used in this review. …”
    Get full text
    Article