Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
-
1201
Prevalence of adolescent dual tobacco use and its associated factors: findings from a cross-sectional study
Published 2025-07-01“…Objective To determine the prevalence and its associated factors of dual tobacco use among Malaysian adolescents in developing effective public health strategies.Design Cross-sectional study.Setting This study analysed data from the National Health and Morbidity Survey (NHMS) 2022: Adolescent Health Survey (AHS), a nationwide cross-sectional survey conducted among secondary school students across Malaysia.Participants This cross-sectional study used data from the NHMS 2022: AHS, which included a representative national sample of Malaysian adolescents between the ages of 13 and 17. …”
Get full text
Article -
1202
SMS spam detection using BERT and multi-graph convolutional networks
Published 2025-01-01Get full text
Article -
1203
Health Care Professionals’ Use of Digital Technology in the Secondary Prevention of Cardiovascular Disease in Austria: Online Survey Study
Published 2025-06-01“…Quantitative survey data were analyzed using descriptive statistics, group comparison tests, and association statistics. …”
Get full text
Article -
1204
A content review of COVID-19-related apps used in Vietnam
Published 2025-02-01“…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
Get full text
Article -
1205
Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization
Published 2025-05-01“…The goal of the developed framework is to improve the detection of IDS without using centralized data to preserve privacy. Whereas it enhances the processing and detection capability of huge amounts of data generated from IoT devices. …”
Get full text
Article -
1206
Some ethical and technological challenges of smart cities
Published 2025-12-01“…The moral dilemma and important ethical questions resulting from the use of big data to scrutinise and profile individuals and communities, compromising their privacy and anonymity without their knowledge or consent, cannot be underestimated and appears beyond the control of prevailing data protection protocols.…”
Get full text
Article -
1207
Integrating multi-modal learning analytics dashboard in K-12 education: insights for enhancing orchestration and teacher decision-making
Published 2025-08-01“…Further research should investigate students’ responses more closely and further develop strategies for the responsible, explainable, and unbiased use of student affective data in real classrooms.…”
Get full text
Article -
1208
Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing
Published 2024-09-01“…Cloud computing security and data protection are becoming increasingly critical as its use increases. …”
Get full text
Article -
1209
-
1210
Building occupancy estimation using single channel CW radar and deep learning
Published 2025-04-01“…Unlike previous studies that rely on WiFi or PIR-based sensors, this approach provides a robust alternative without privacy concerns. The time-frequency scalograms generated from radar echoes were used to train deep-learning models, including DarkNet19, MobileNetV2, and ResNet18. …”
Get full text
Article -
1211
Blockchain framework with IoT device using federated learning for sustainable healthcare systems
Published 2025-07-01“…The proposed method achieves data privacy and security by 98.73%, intrusion detection efficiency by 97.16%, disease detection accuracy by 96.425, proactive healthcare management by 98.37%, and interoperability by 96.74%.…”
Get full text
Article -
1212
Unobtrusive stress detection using wearables: application and challenges in a university setting
Published 2025-08-01“…Advances in sensing accuracy and utility design in wearables might make this feasible; however, real-world adoption faces challenges, as users often fail to wear or use these devices consistently and correctly. Additionally, institutional monitoring raises privacy concerns.MethodsIn this study, we analyze real-world data from a cohort of 103 Japanese university students to identify periods of cyclical stress while ensuring individual privacy through aggregation. …”
Get full text
Article -
1213
Cancelable finger vein authentication using multidimensional scaling based on deep learning
Published 2025-06-01Get full text
Article -
1214
Comparative effectiveness of maintenance doses of opioid agonist treatment among individuals with opioid use disorder: a target trial emulation protocol using a population-based ob...
Published 2025-08-01“…All data are deidentified, securely stored and accessed in accordance with provincial privacy regulations. …”
Get full text
Article -
1215
Algorithmic fandom: how generative AI is reshaping sports marketing, fan engagement, and the integrity of sport
Published 2025-05-01“…The integration of AI in gambling platforms and the commercialisation of fan data raise significant concerns around privacy, consent, and long-term wellbeing. …”
Get full text
Article -
1216
FOCC: A Synthetically Balanced Federated One-Class-Classification for Cyber Threat Intelligence in Software Defined Networking
Published 2025-01-01“…Federated Learning offers a promising approach for building Cyber Threat Intelligence (CTI) by utilizing cross-domain data in Software Defined Networking (SDN) while addressing privacy concerns. …”
Get full text
Article -
1217
Equipment Fault Diagnosis Method Based on High-efficient Communication Federated Learning
Published 2025-04-01“…Federated learning achieves joint training modeling of fault data from various factories while protecting privacy. …”
Get full text
Article -
1218
New discrete memristive hyperchaotic map: modeling, dynamic analysis, and application in image encryption
Published 2025-06-01“…With the rapid development of information technology, the demand for ensuring data security and privacy protection has become increasingly urgent. …”
Get full text
Article -
1219
Using social presence theory to predict online consumer engagement in the emerging markets
Published 2023-08-01Get full text
Article -
1220
Heartbeat detection and personal authentication using a 60 GHz Doppler sensor
Published 2025-08-01“…Unlike fingerprint and facial recognition systems, they offer authentication without physical contact or privacy concerns. This study focuses on non-contact seismocardiography using microwave Doppler sensors and aims to apply this technology for biometric authentication.MethodWe proposed a method for authenticating and identifying heartbeat signals through supervised learning using a conditional variational autoencoder (CVAE). …”
Get full text
Article