Showing 2,461 - 2,480 results of 2,784 for search '(((( useddds OR useddddddds) OR used) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.17s Refine Results
  1. 2461

    Predicting and Preventing School Dropout with Business Intelligence: Insights from a Systematic Review by Diana-Margarita Córdova-Esparza, Juan Terven, Julio-Alejandro Romero-González, Karen-Edith Córdova-Esparza, Rocio-Edith López-Martínez, Teresa García-Ramírez, Ricardo Chaparro-Sánchez

    Published 2025-04-01
    “…We collected literature from the Google Scholar and Scopus databases using a comprehensive search strategy, incorporating keywords such as “business intelligence”, “machine learning”, and “big data”. …”
    Get full text
    Article
  2. 2462

    Deep Learning dengan Teknik Early Stopping untuk Mendeteksi Malware pada Perangkat IoT by Iwang Moeslem Andika Surya, Triawan Adi Cahyanto, Lutfi Ali Muharom

    Published 2025-02-01
    “…This approach utilizes machine learning techniques and intense learning to identify and mitigate cyber threats. The use of Convolutional Neural Network (CNN) in classifying the IoT-23 dataset with the SMOTE (Synthetic Minority Oversampling Technique) data balancing technique and the Early Stopping function shows high results. …”
    Get full text
    Article
  3. 2463

    Blockchain driven medical image encryption employing chaotic tent map in cloud computing by Usman Shahid, Shamsa Kanwal, Mahwish Bano, Saba Inam, Manal Elzain Mohamed Abdalla, Zaffar Ahmed Shaikh

    Published 2025-02-01
    “…To sum up, the BCTMES effectively addresses a number of prevalent risks to picture security and offers a complete solution that may be implemented in cloud-based settings where data integrity and privacy are crucial. This work suggests a promising path for further investigation and practical uses in secure image transmission.…”
    Get full text
    Article
  4. 2464

    Personal, environmental and behavioral predictors associated with online fraud victimization among adults. by Vimala Balakrishnan, Umayma Ahhmed, Faris Basheer

    Published 2025-01-01
    “…A self-reporting questionnaire was developed based on the PEB framework and used to collect data targeting Malaysian adults. …”
    Get full text
    Article
  5. 2465

    Adoption of Electronic Records Management System in Managing Patients Records at Kabale Regional Referral Hospital. by Musiimenta, Lucky

    Published 2024
    “…The study targeted a population of 100 Participants and a sample of 80 Participants using the Morgan and Krejen table. The study used an interview guide and observation methods to collect data from Participants who were patients, hospital administration, and records personnel. …”
    Get full text
    Thesis
  6. 2466

    A hybrid approach to time series forecasting: Integrating ARIMA and prophet for improved accuracy by Sherly A, Mary Subaja Christo, Jesi V Elizabeth

    Published 2025-09-01
    “…With the increasing volume of data generated by IoT devices, performing analytics at the edge offers significant advantages in terms of latency, bandwidth consumption, and privacy. …”
    Get full text
    Article
  7. 2467

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The obtained raw data is pre-processed by using handling missing values and adaptive min-max normalization. …”
    Get full text
    Article
  8. 2468

    Relationship between breast feeding and motor development in children: protocol for a systematic review and meta-analysis by Vicente Martínez-Vizcaíno, Diana P Pozuelo-Carrascosa, Celia Álvarez-Bueno, Monserrat Hernández Luengo, Carlos Berlanga-Macías

    Published 2019-09-01
    “…Subgroup analyses will be carried out based on the characteristics of motor skill development and the population included.Ethics and dissemination Ethical approval is not required because the data used will be obtained from published studies, and there will be no concerns about privacy. …”
    Get full text
    Article
  9. 2469

    LITERATURE REVIEW ON THE DOUBLE-EDGED SWORD OF AI IN MENTAL HEALTH: A DEEP DIVE INTO CHATGPT'S CAPABILITIES AND LIMITATIONS by Paul Arjanto, Feibry Feronika Wiwenly Senduk

    Published 2024-04-01
    “…Key ethical concerns include data privacy and accountability. Conclusion: The study recommends a balanced approach, suggesting ChatGPT as an adjunct rather than a replacement for conventional mental health services. …”
    Get full text
    Article
  10. 2470

    Electronic health record in military healthcare systems: A systematic review. by Amir Torab-Miandoab, Mahdi Basiri, Arasb Dabbagh-Moghaddam, Leila Gholamhosseini

    Published 2025-01-01
    “…<h4>Introduction</h4>The immediate access to detailed patient data is vital for effective medical care in military and emergency scenarios, enhancing diagnosis, treatment, and monitoring of military personnel. …”
    Get full text
    Article
  11. 2471

    Home Occupant Archetypes by Marco Antonio ORTIZ SANCHEZ

    Published 2019-11-01
    “…Parallelly, in-depth and semi-structured interviews were conducted, which are techniques used to gather qualitative behavioural data from the home occupants. …”
    Get full text
    Article
  12. 2472

    Investigating the Applications and Challenges of Metaverse in Education: A Systematic Review by Asadollah Khadivi

    Published 2024-11-01
    “…The research findings indicate that remote learning, immersion learning, collaborative learning, personalized learning, flipped learning, student-centered learning, experiential learning, hybrid learning, mobile learning, simulated learning, skill-based learning and Borderless and question-based learning are the most common uses of metaverse in education. However, the metaverse is associated with technical, ethical and social challenges such as the nascent nature of the technology, high cost of equipment, weak support infrastructure, inaccessibility to everyone, violation of privacy, data and network security, lack of legal guidelines and regulations. …”
    Get full text
    Article
  13. 2473
  14. 2474

    Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings by Colm Dowling, Hadi Larijani, Mike Mannion, Matt Marais, Simon Black

    Published 2024-09-01
    “…In line with these challenges, we propose a novel low-data solution to mitigate the impact of multipath reflections and other sources of noise in mmWave sensing. …”
    Get full text
    Article
  15. 2475

    Descriptive Phenomenology from Instances of Dishonesty in Psychotherapy by Psychotherapists by Hossein Alipour, Mahdi Akbari

    Published 2024-11-01
    “…A total of 16 psychotherapists constituted the sample for this research, and data were collected using a five-axis semi-structured interview protocol focused on psychotherapy dishonesty. …”
    Get full text
    Article
  16. 2476

    Optimized summary-statistic-based single-cell eQTL meta-analysis by Maryna Korshevniuk, Harm-Jan Westra, Roy Oelen, Monique G. P. van der Wijst, Lude Franke, Marc Jan Bonder, sc-eQTLGen Consortium

    Published 2025-08-01
    “…These are however, complicated by privacy constraints due to sharing of genotype data and the measurement and technical variety across different scRNA-seq datasets as a result of differences in mRNA capture efficiency, experimental protocols, and sequencing strategies. …”
    Get full text
    Article
  17. 2477

    Digital Empowerment in Social Work: Leveraging AI to Enhance Educational Access in Developing Nations by Zvinodashe Revesai, Benjamin Tungwa, Telson Anesu Chisosa, Vanessa Runyararo Meki

    Published 2024-12-01
    “…Data were analyzed using thematic analysis, examining cases and models where AI has expanded access to scholarly materials through automated translation services, enabled localized resources through virtual training simulations, and facilitated the incorporation of culturally aligned self-help tools such as AI chatbots and wellness applications. …”
    Get full text
    Article
  18. 2478

    The Influence of Fintech on the National Security System: Law, Economic Potential and Digital Defense Strategy by Ngasiman Djoyonegoro, Muhammad Noor Harisudin, Hariyanto Hariyanto

    Published 2025-06-01
    “…Governments need to implement stringent regulations to safeguard Fintech user data and privacy and closely supervise Fintech operations to mitigate the risks of financial technology misuse. …”
    Get full text
    Article
  19. 2479

    Designing digital conversational agents for youth with multiple mental health conditions: Insights on key features from a youth-engaged qualitative descriptive study by Jingyi Hou, Jamie Gibson, Thalia Phi, Brian Ritchie, Louise Gallagher, Gillian Strudwick, George Foussias, Darren B Courtney, Aristotle Voineskos, Stephanie Ameis, Kristin Cleverley, Lisa D Hawke

    Published 2025-03-01
    “…Results Four key themes were generated from the focus group data: (1) the importance of a customizable and flexible design for personalization; (2) confidentiality, privacy features and risk mitigation features; (3) the need for reliable, informative content that is user tested and validated; (4) a friendly and human-like interaction style. …”
    Get full text
    Article
  20. 2480

    De-identification of Emergency Medical Records in French: Survey and Comparison of State-of-the-Art Automated Systems by Loick Bourdois, Marta Avalos, Gabrielle Chenais, Frantz Thiessard, Philippe Revel, Cedric Gil-Jardine, Emmanuel Lagarde

    Published 2021-04-01
    “…For visits motivated by a traumatic event, information on the causes are stored in free-text clinical notes. To exploit these data, an automated de-identification system guaranteeing protection of privacy is required. …”
    Get full text
    Article