Showing 2,541 - 2,560 results of 2,784 for search '(((( usedddds OR useddddds) OR uses) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.25s Refine Results
  1. 2541
  2. 2542
  3. 2543

    Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples by Cheng Liu, Junrong Li, Xiheng Liu, Bo Li, Mengsu Hou, Wei Yu, Yujun Li, Wenjun Liu

    Published 2025-07-01
    “…As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on password data. In password guessing research, there is a conflict between the traditional models’ need for large training samples and the limitations on accessing password data imposed by privacy protection regulations. …”
    Get full text
    Article
  4. 2544

    Pre-class learning assessment on integrating artificial intelligence into evidence-based medicine curriculum by ZUHAER·Yisha, CHEN Xiaowei, CAO Wangnan, WU Shanshan, LIU Junchang, SUN Yumei, WU Tao, ZHAN Siyan, SUN Feng

    Published 2025-05-01
    “…Differences between master’s and doctoral students were analyzed using the Mann-Whitney U test.Results A total of 46 students participated in the survey (34 Masters and below, and 12 PhDs). …”
    Get full text
    Article
  5. 2545

    Exploring Perceived Barriers in the Assessment and Management of Female Sexual Dysfunction: An Integrated Qualitative and Quantitative Study among Trainee Residents by Yogender Kumar Malik, Adwitiya Ray, Sujata Sethi, Rajiv Gupta

    Published 2025-01-01
    “…A total of 92 trainee residents from related medical specialties of psychiatry, gynecology, dermatology, and urology, who provided informed consent, participated in the study. Data were collected using a validated questionnaire regarding perceived barriers related to residents’ knowledge and attitudes toward assessing FSD and a case vignette. …”
    Get full text
    Article
  6. 2546

    What is the Role of Medical Informatics in Digital Healthcare? by Mihai TĂRÂŢĂ

    Published 2025-05-01
    “…. • Cybersecurity & Privacy in Healthcare – Implementing robust security solutions (e.g., encryption, blockchain) to safeguard sensitive patient data and ensure compliance with regulations like HIPAA (USA), GDPR (EU), and local healthcare laws…”
    Get full text
    Article
  7. 2547

    Low Saturation Confidence Distribution-based Test-Time Adaptation for cross-domain remote sensing image classification by Yu Liang, Shilei Cao, Juepeng Zheng, Xiucheng Zhang, Jianxi Huang, Haohuan Fu

    Published 2025-05-01
    “…However, most UDA approaches require access to source data, which may be infeasible due to data privacy or transmission constraints. …”
    Get full text
    Article
  8. 2548

    BESPOKE study protocol: a multicentre, prospective observational study to evaluate the impact of circulating tumour DNA guided therapy on patients with colorectal cancer by Scott Kopetz, Axel Grothey, Shifra Krinshpun, Meenakshi Malhotra, Paul Billings, Angel Rodriguez, Alexey Aleshin, Sarah Sawyer, Michelle Munro, Pashtoon Murtaza Kasi, Jessica Guilford, Sascha Ellers, Jacob Wulff, Nicole Hook, Allyson Koyen Malashevich, Solomon Moshkevich

    Published 2021-09-01
    “…The secondary endpoints are MRD clearance rate (MRD+ to MRD−) during or after adjuvant chemotherapy, percentage of patients that undergo surgery for oligometastatic recurrence, survival of MRD-negative patients treated with adjuvant chemotherapy versus no adjuvant chemotherapy (active surveillance), overall survival, examine the number of stage I CRC that have recurrent disease detected postsurgery, and patient-reported outcomes.Ethics and dissemination This study has received ethical approval from the Advarra Institutional Review Board (IRB) protocol: Natera—20-041-NCP/3766.01, BESPOKE Study of ctDNA Guided Therapy in Colorectal Cancer (BESPOKE CRC) (Pro00041473) on 10 June 2021. Data protection and privacy regulations will be strictly observed in the capturing, forwarding, processing and storing of patients’ data. …”
    Get full text
    Article
  9. 2549

    Assessment of the attitude and fears of the physicians of Pakistan regarding artificial intelligence: a cross-sectional survey in 2024 by Abdur Rehman Khalid, Farooq Ahmad, Smak Ahmed, Muhammad Ahrar Bin Naeem, Noor ul Ain, Hassan Mehmood, Aasma Sajawal, Muhammad Umar, Aiman Atta, Hassaan Amin, Shahid Mahmood

    Published 2025-08-01
    “…Subject and methods A nation-wide cross-sectional study was conducted using an online questionnaire, based on standardized General Attitude Towards Artificial Intelligence Scale (GAAIS) and self-devised questions, aimed at collecting data about demographic details, attitude and fears of the physicians regarding AI. …”
    Get full text
    Article
  10. 2550
  11. 2551

    Contrastive Self-Supervised Learning for Sensor-Based Human Activity Recognition: A Review by Hui Chen, Charles Gouin-Vallerand, Kevin Bouchard, Sebastien Gaboury, Melanie Couture, Nathalie Bier, Sylvain Giroux

    Published 2024-01-01
    “…Next, we comprehensively review data augmentation methods for sensor data and commonly used benchmark datasets for activity recognition. …”
    Get full text
    Article
  12. 2552

    HealthPass: a contactless check-in and adaptive access control system for lowering cluster infection risk in public health crisis by Guofeng Luo, Yufei Wang, Linghong Hong, Xin He, Jiaru Wang, Qu Shen, Cheng Wang, Longbiao Chen

    Published 2024-12-01
    “…IntroductionEnsuring effective measures against the spread of the virus is paramount for educational institutions and workplaces as they resume operations amidst the ongoing public health crisis. A touchless and privacy-conscious check-in procedure for visitor assessment is critical to safeguarding venues against potential virus transmission.MethodsIn our study, we developed an interaction-free entry system featuring anonymous visitors who voluntarily provide data. …”
    Get full text
    Article
  13. 2553

    Comparing nurses’ and patients’ perceptions of dignity in burn care: a cross-sectional study by Davood Zarei, Zahra Khademian, Azita Jaberi, Abdolkhalegh Keshavarzi

    Published 2025-03-01
    “…Methods This cross-sectional study was conducted on 110 nurse-patient dyads at Amir-Al-Moemenin Burn Hospital, Shiraz, Iran between August 2023 to February 2024. Data were collected using patient dignity questionnaire and analyzed using SPSS software version 23.0, utilizing descriptive tests, Mann-Whitney, Kruskal-Wallis, Wilcoxon, and Spearman’s correlation coefficient. …”
    Get full text
    Article
  14. 2554
  15. 2555

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  16. 2556

    The Experience of Intimacy and Sexuality in Persons with Mental Illness: A Metasynthesis by Reshma Antony, Manjula Munivenkatappa, Geetha Desai

    Published 2025-01-01
    “…ATLAS.ti software was used to code the primary and secondary data to generate 83 descriptive themes and 17 composite themes, which were further synthesised to create seven interpretive themes. …”
    Get full text
    Article
  17. 2557

    Green banking practices and customer satisfaction-way to green sustainability by Ajaz Akbar Mir, Aijaz Ahmad Bhat, Ahmad Samed Al-Adwan, Summaira Farooq, Dima Jamali, Irshad Ahmad Malik

    Published 2025-04-01
    “…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
    Get full text
    Article
  18. 2558

    Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA by Abdullah Sevin, Abdu Ahmed Osman Mohammed

    Published 2024-12-01
    “…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
    Get full text
    Article
  19. 2559

    Internet of Things in Medicine: a Bibliometric Review by Meysam Alavi, Motahareh Dehghan

    Published 2024-07-01
    “…Data visualization was conducted using VOSviewer software. …”
    Get full text
    Article
  20. 2560

    Bridging Cities and Citizens with Generative AI: Public Readiness and Trust in Urban Planning by Adnan Alshahrani

    Published 2025-07-01
    “…This study explores whether Saudi residents are ready to engage with AI-driven tools in urban planning, how they prefer to interact with them, and what ethical concerns may arise. Using a quantitative, survey-based approach, the study collected data from 232 Saudi residents using non-probability stratified sampling. …”
    Get full text
    Article