Search alternatives:
usedddds » useddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 2,241 - 2,260 results of 2,784 for search '(((( usedddds OR usedddddds) OR usedddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.16s Refine Results
  1. 2241
  2. 2242

    Acceptability of digital vending machines to improve access to sexual and reproductive health in Brighton, UK: a qualitative analysis by Jaime H Vera, Richard Cooper, Syra Dhillon, John Mear, Gillian Louise Dean, Rhys D Wenlock

    Published 2024-04-01
    “…Stakeholders were staff on sites where the VM was placed. Data analysis took place on NVivo, using a thematic approach.Results 12 users completed the interview. 42% within the age 18–25 years with equal male and female identifying distributions. 33% were heterosexual, 25% homosexual and 33% bisexual. …”
    Get full text
    Article
  3. 2243

    AI-Driven Advancements in Orthodontics for Precision and Patient Outcomes by David B. Olawade, Navami Leena, Eghosasere Egbon, Jeniya Rai, Aysha P. E. K. Mohammed, Bankole I. Oladapo, Stergios Boussios

    Published 2025-04-01
    “…While AI offers tremendous potential, challenges remain in areas such as data privacy, algorithmic bias, and the cost of adopting AI technologies. …”
    Get full text
    Article
  4. 2244

    Arabic speaking women’s experience of postpartum contraceptive counselling in Sweden by Sofia Berglundh, Khadija Abunnaja, Sibylle Herzig van Wees, Elin C. Larsson, Helena Kilander

    Published 2025-07-01
    “…The FGDs were conducted in Arabic and translated to English. Data was analysed using reflexive thematic analysis. …”
    Get full text
    Article
  5. 2245

    Fighting Fire with Fire: Reclaiming Social Media to Promote Healthy Eating Behaviors among Children by Babu George, Martha Ravola

    Published 2024-09-01
    “…The paper emphasizes the importance of ethical considerations in implementing social media interventions for children, addressing privacy concerns, data security, and the need for age-appropriate, culturally sensitive content. …”
    Get full text
    Article
  6. 2246

    Enhancing technological sustainability in academia: leveraging ChatGPT for teaching, learning and evaluation by Labaran Isiaku, Abubakar Sadiq Muhammad, Hyelda Ibrahim Kefas, Fitzgerald Chidozie Ukaegbu

    Published 2024-12-01
    “…However, it also sheds light on the ethical issues and challenges associated with its use, including privacy and data protection, transparency and alignment with educational principles. …”
    Get full text
    Article
  7. 2247

    Exploring knowledge and attitudes toward electronic informed consent among clinical trial participants in China: a cross-sectional study by Ying Wu, Xing Liu, Xiaoying Ge, Xin Tan, Weiwei Yu, Xiaomin Wang

    Published 2025-05-01
    “…However, they also express concerns about data protection and privacy security in eIC. These findings provide a foundation for developing targeted strategies to enhance the adoption and acceptance of eIC among diverse populations.…”
    Get full text
    Article
  8. 2248

    A Web-Based Interface That Leverages Machine Learning to Assess an Individual’s Vulnerability to Brain Stroke by Divyansh Bhandari, Arnav Agarwal, R. Reena Roy, Rajaram Priyatharshini, Rodriguez Rivero Cristian

    Published 2025-01-01
    “…To bridge the gap between complex predictive models and end-users, we deploy this model in an intuitive web interface (built with Streamlit) that non-technical individuals and healthcare providers can easily use. This interface requires no specialized knowledge, preserves user privacy by avoiding any data storage, and provides clear explanations of results. …”
    Get full text
    Article
  9. 2249
  10. 2250

    Older adult stroke survivors’ needs and perspectives of a stroke app: a qualitative study by Wenjing Cao, Afang Li, Azidah Abdul Kadir, Juan Chen, Lanying Chen, Qing Li, Intan Idiana Hassan

    Published 2025-03-01
    “…Face-to-face semi-structured interviews were conducted between August and October 2024. Data were transcribed verbatim and analysed using Haase's adaptation of Colaizzi's phenomenological method. …”
    Get full text
    Article
  11. 2251

    Adaptive Learning Algorithms for Low Dose Optimization in Coronary Arteries Angiography: A Comprehensive Review by Komal Tariq, Muhammad Adnan Munir, Hafiza Tooba Aftab, Amir Naveed, Ayesha Yousaf, Sajjad Ul Hassan

    Published 2024-06-01
    “…Results: The extracted data shows a comprehensive data on various techniques that are used for low dose CAA, advancements in image segmentation, noise reduction, and operator dose reduction highlight the potential of machine learning techniques. …”
    Get full text
    Article
  12. 2252

    Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications by Velliangiri A, Damle Madhavi, Abraham Peter Soosai Anandaraj, Satish Babu Jampani

    Published 2025-05-01
    “…To increase security, the model uses a hybrid encryption scheme that combines elliptic curve cryptography (ECC) with lightweight symmetric encryption, ensuring data confidentiality with minimal computational overhead. …”
    Get full text
    Article
  13. 2253

    Bi-Modal Multiperspective Percussive (BiMP) Dataset for Visual and Audio Human Fall Detection by Joe Dibble, Michael C. F. Bazzocchi

    Published 2025-01-01
    “…Typical fall detection systems classify a fall event using either inertial- or vision-based data. Aside from these two modes of input for fall detection, sparse human fall audio data is available. …”
    Get full text
    Article
  14. 2254

    Prescribing the Future: The Role of Artificial Intelligence in Pharmacy by Hesham Allam

    Published 2025-02-01
    “…This study delves into tools and methodologies enabling AI implementation, addressing ongoing challenges such as data privacy, algorithmic transparency, and ethical considerations while proposing actionable strategies to overcome these barriers. …”
    Get full text
    Article
  15. 2255

    Developments in Deep Learning Artificial Neural Network Techniques for Medical Image Analysis and Interpretation by Olamilekan Shobayo, Reza Saatchi

    Published 2025-04-01
    “…While deep learning has demonstrated significant potential in enhancing diagnostic accuracy across multiple medical imaging modalities—including MRI, CT, US, and X-ray—factors such as model trust, data privacy, and ethical considerations remain ongoing concerns. …”
    Get full text
    Article
  16. 2256

    Reducing Trade Document Processing Time Between Sri Lanka and its South Asian Neighbours by Applying Blockchain and Machine Learning Solutions by R. A. C. N. Rathnayake

    Published 2025-03-01
    “…This study investigates the potential of Blockchain (BC) and Machine Learning (ML) to reduce trade document processing time and improve trade efficiency. Using an explanatory sequence design, the research combines quantitative analysis of survey data with qualitative insights from case studies. …”
    Get full text
    Article
  17. 2257

    Deep multi-biometric fuzzy commitment scheme: fusion methods and performance by Valentina Fohr, Christian Rathgeb

    Published 2025-07-01
    “…Abstract Biometric cryptosystems enable privacy-preserving authentication using biometric data, such as fingerprints or iris scans. …”
    Get full text
    Article
  18. 2258

    Efficient Deep Learning-Based Cyber-Attack Detection for Internet of Medical Things Devices by Abigail Judith, G. Jaspher W. Kathrine, Salaja Silas, Andrew J

    Published 2023-12-01
    “…However, it comes with privacy issues that compromise the security of the data collected by medical sensors, making them vulnerable to potential cyber threats such as data modification, replay attacks, etc. …”
    Get full text
    Article
  19. 2259

    Overview of Modern Technologies for Acquiring and Analysing Acoustic Information Based on AI and IoT by Sabina Szymoniak, Łukasz Kuczyński

    Published 2025-06-01
    “…In recent years, using sound as a source of information in environmental monitoring systems has become increasingly important. …”
    Get full text
    Article
  20. 2260

    Research on intrusion detection method for edge networks based on federated reinforcement learning by DING Kai, HUANG Yidu, TAO Ming, XIE Renping

    Published 2024-12-01
    “…However, as public awareness of privacy grows, many datasets are no longer shared, leading to the emergence of data silos, which hinders the improvement of IoT security. …”
    Get full text
    Article