Search alternatives:
usedddds » useddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
Showing 2,501 - 2,520 results of 2,784 for search '(((( usedddds OR usedddddds) OR useddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 2501

    Establishing a Collaborative Genomic Repository for Adult Burn Survivors: A Burn Model System Feasibility Study by Stephen Sibbett, Jamie Oh, Gretchen Carrougher, Lara Muffley, Nathaniel Ashford, Maiya Pacleb, Samuel Mandell, Jeffrey Schneider, Steven Wolf, Barclay Stewart, Nicole S. Gibran

    Published 2024-11-01
    “…We set out two primary objectives, namely (1) to develop standard operating procedures for genetic sample collection and storage, DNA isolation, and data integration into an existing multicenter database; and (2) to demonstrate the feasibility of correlating genetic variation to functional outcomes in a pilot study, using the catechol-O-methyltransferase (COMT) gene. …”
    Get full text
    Article
  2. 2502

    Availability and utilization of sexual and reproductive health services among adolescents of Godawari Municipality, Nepal: A cross-sectional study. by Laxmi Gautam, Aastha Maharjan, Harikrishna Bhattarai, Sujan Gautam

    Published 2025-01-01
    “…Only 13.22% of them had ever used ASRH services, and the reasons for not using services were the lack of realization of the need for services (60.39%), while 14.55% of them felt that privacy was not maintained at all. …”
    Get full text
    Article
  3. 2503

    Empowering Healthcare: TinyML for Precise Lung Disease Classification by Youssef Abadade, Nabil Benamar, Miloud Bagaa, Habiba Chaoui

    Published 2024-10-01
    “…Recently, there has been growing interest in the automated analysis of lung sounds using Deep Learning (DL). Nevertheless, the execution of large DL models in the cloud often leads to latency, dependency on internet connectivity, and potential privacy issues due to the transmission of sensitive health data. …”
    Get full text
    Article
  4. 2504

    Apical extrusion of debris with different rotary and reciprocating single-file endodontic instrumentation systems: a systematic review and meta-analysis protocol by Muhammad Zubair Ahmad, Durre Sadaf, Marcy McCall MacBain, Ahmed Nabil Mohamed

    Published 2020-09-01
    “…We will measure the statistical heterogeneity by applying the Cochrane Q test and quantify using the I2 statistic. Existence of covariates and any potential heterogeneity will be explored through prespecified subgroup and sensitivity analyses.Ethics and dissemination Approval from an ethical research committee is not required because it will be done using data that have been already published and have no concerns related to the privacy of patients. …”
    Get full text
    Article
  5. 2505

    Barriers and facilitators to oral pre-exposure prophylaxis uptake among adolescents girls and young women at elevated risk of HIV acquisition in Lilongwe, Malawi: A qualitative stu... by Simon C Nicholas, Maureen Matewere, Agatha Bula, Mercy Tsidya, Mina C Hosseinipour, Mitch Matoga, Alinane Linda Nyondo Mipando

    Published 2025-01-01
    “…The data were digitally recorded, managed using NVivo software and analysed using a thematic approach guided by the Consolidated Framework for Implementation Research (CFIR). …”
    Get full text
    Article
  6. 2506

    A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture by Rui Lu, Lei Shi, Yinlong Liu, Zhongkai Dang

    Published 2025-05-01
    “…This study designs a progressive solution by (1) building a crowdsourced data collection network, using mobile terminals equipped with GPS technology to automatically collect device signal features, replacing inefficient manual drive tests; (2) developing a progressive signal update algorithm that integrates real-time crowdsourced data and historical signals to optimize the signal fingerprint database in dynamic environments; (3) establishing an edge service architecture to offload signal matching and trajectory estimation tasks to MEC nodes, using lightweight computing engines to reduce the load on the core network. …”
    Get full text
    Article
  7. 2507

    Retracted: An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks by Pratima Upadhyay, Venkatadri Marriboina, Shiv Kumar, Sunil Kumar, Mohd Asif Shah

    Published 2022-01-01
    “…Also, the safety messages are modified or discarded by the attacker or any other node and it may lead to the loss of privacy, integrity, confidentiality, and authentication of the data.So to enhance the security of VANETs, it is very much essential to invent a secure communication protocol, to protect the infrastructure of the network and the confidentiality of the data. …”
    Get full text
    Article
  8. 2508

    Advancing the Sensitivity Frontier in digital contact tracing: Comparative analysis of proposed methods toward maximized utility by Junko Ami, Yanbo Pang, Hiroshi Masui, Takashi Okumura, Yoshihide Sekimoto

    Published 2025-01-01
    “…During the COVID-19 pandemic, many countries adopted Digital Contact Tracing (DCT) technology to control infections. However, the widely-used Bluetooth Low Energy (BLE)-based DCT requires both the infected individual and the contact to have the application activated to detect exposure. …”
    Get full text
    Article
  9. 2509

    Potential of Internet of Medical Things (IoMT) applications in building a smart healthcare system: A systematic review by Ruby Dwivedi, Divya Mehrotra, Shaleen Chandra

    Published 2022-03-01
    “…However mass adoption seems challenging due to factors like privacy and security of data, management of large amount of data, scalability and upgradation etc. …”
    Get full text
    Article
  10. 2510

    A blockchain technology for improving financial flows in humanitarian supply chains: benefits and challenges by Saurav Negi

    Published 2025-04-01
    “…Key challenges identified include scalability issues, high cost and resource requirements, lack of network reliability, data privacy, supply chain integration, knowledge and training gaps, regulatory frameworks and ethical considerations. …”
    Get full text
    Article
  11. 2511

    A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks by M. Saritha, Saidireddy Malgireddy

    Published 2025-07-01
    “…The major components of the proposed model: (1) Data-Collection and Pre-processing (2) Feature Extraction using MSV-GRU (3) FKA-DLN model for the better classification. …”
    Get full text
    Article
  12. 2512

    Enhancing Incentive Schemes in Edge Computing through Hierarchical Reinforcement Learning by Gowtham R, Vatsala Anand, Yadati Vijaya Suresh, Kasetty Lakshmi Narasimha, R. Anil Kumar, V. Saraswathi

    Published 2025-04-01
    “… Edge learning is a distributed approach for training machine learning models using data from edge devices. It preserves privacy by avoiding direct data sharing. …”
    Get full text
    Article
  13. 2513

    Multimodal dataset for sensor fusion in fall detection by Carla Taramasco, Miguel Pineiro, Pablo Ormeño-Arriagada, Diego Robles, David Araya

    Published 2025-04-01
    “…This dataset was compiled from simulations of ten different fall types by ten participants, ensuring a wide array of scenarios. Data were collected using four types of sensors: a mobile phone equipped with a single-channel, three-dimensional accelerometer; a far infrared (FIR) thermal camera; an $8×8$ LIDAR; and a 60–64 GHz radar. …”
    Get full text
    Article
  14. 2514

    Client Selection for Generalization in Accelerated Federated Learning: A Multi-Armed Bandit Approach by Dan Ben Ami, Kobi Cohen, Qing Zhao

    Published 2025-01-01
    “…Federated learning (FL) is an emerging machine learning (ML) paradigm used to train models across multiple nodes (i.e., clients) holding local data sets, without explicitly exchanging the data. …”
    Get full text
    Article
  15. 2515

    The Effect of Viral Promotional Advergames on the Behavioral Reactions by Mostafa Heidari Haratemeh

    Published 2024-09-01
    “…This research used data from pre-measure and post-measure assessments within a real viral marketing campaign. …”
    Get full text
    Article
  16. 2516

    Exploring the barriers and facilities migrants face in accessing COVID-19 vaccines in Malaysia: A qualitative study. by Tharani Loganathan, Amirah Zafirah Zaini, Hazreen Abdul Majid

    Published 2025-01-01
    “…Digital appointment systems excluded many migrants due to language and literacy barriers, data privacy concerns, and the need for identity documents. …”
    Get full text
    Article
  17. 2517

    Barriers and facilitators of the electronic medical record adoption among healthcare providers in Addis Ababa, Ethiopia by Tadesse Alemu Bekele, Lemma Derseh Gezie, Herman Willems, Jonathan Metzger, Biruhtesfa Abere, Blen Seyoum, Loko Abraham, Naod Wendrad, Selamawit Meressa, Bethel Desta, Tariku Nigatu Bogale

    Published 2024-12-01
    “…Methods A descriptive-phenomenological approach was used. Data were collected from one hospital and three health centers from 5–13 June, 2023, that implemented the EMR. …”
    Get full text
    Article
  18. 2518

    Digital technologies for the Sustainable Development Goals by Dharmendra Hariyani, Poonam Hariyani, Sanjeev Mishra

    Published 2025-07-01
    “…This study is motivated by the growing significance of DTs in addressing sustainability challenges and their critical contribution to achieving the SDGs while identifying barriers to their adoption. Using a systematic review, this review examines the contributions of various DTs, i.e., AI, IoT, blockchain, cloud computing, big data analytics, remote sensing, and GIS in addressing SDGs. …”
    Get full text
    Article
  19. 2519

    Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning by Emad-Ul-Haq Qazi, Tanveer Zia, Muhammad Hamza Faheem, Khurram Shahzad, Muhammad Imran, Zeeshan Ahmed

    Published 2024-01-01
    “…The rapid evaluation of smart cities has revolutionized the research and development field to a very extensive level which presents challenges in handling massive amounts of data. However, the integration of IoT into various aspects of life has introduced various challenges related to the security and privacy of IoT systems. …”
    Get full text
    Article
  20. 2520

    A comprehensive survey on AI-enabled secure social industrial Internet of Things in the agri-food supply chain by Sajal Halder, Md Rafiqul Islam, Quazi Mamun, Arash Mahboubi, Patrick Walsh, Md Zahidul Islam

    Published 2025-08-01
    “…The findings indicate that AI-driven security solutions significantly enhance trust management, anomaly detection, and data privacy in SIIoT networks. The proposed taxonomy categorizes AI-enabled security mechanisms into five distinct areas, offering a structured reference for future research and practical implementations. …”
    Get full text
    Article