Search alternatives:
useddds » usedddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
Showing 2,281 - 2,300 results of 2,784 for search '(((( useddds OR useddddddds) OR usedds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 2281

    Examining Healthcare Practitioners’ Perceptions of Virtual Physicians, mHealth Applications, and Barriers to Adoption: Insights for Improving Patient Care and Digital Health... by Alzghaibi H

    Published 2025-04-01
    “…It further aims to provide recommendations for enhancing usability, accessibility, and integration within existing healthcare infrastructures.Methods: A cross-sectional study was conducted among 574 secondary healthcare practitioners (SHCPs), including physicians, nurses, and administrative staff, working in secondary healthcare centres across Saudi Arabia. Data were collected using a structured questionnaire assessing ten primary barriers to mHealth adoption, including technical, usability, training, integration, privacy, organisational, communication, financial, and productivity-related challenges. …”
    Get full text
    Article
  2. 2282

    It's not just about pads! Adolescent reproductive health views in Kenya: A qualitative secondary analysis. by Sylvia Ayieko, Angela Nguku, Nancy Kidula

    Published 2023-01-01
    “…We conducted a secondary analysis of qualitative data from a sub-sample of adolescent girls in Kenya who participated in the What Women Want global campaign and analyzed interview data from key informants involved in the survey. …”
    Get full text
    Article
  3. 2283

    Porter Diamond Model and Internationalization of Fintechs by Nahidah Naser

    Published 2021-12-01
    “…However, due to the lack of transparency data gathering, supervisions and regulations of Fintechs, policies, privacy, cybercrimes, the impact of Fintechs on the financial market and economic stability are yet to be thoroughly examined and evaluated. …”
    Get full text
    Article
  4. 2284

    Interior design assistant algorithm based on indoor scene analysis by Lu Zhang

    Published 2025-12-01
    “…The proposed indoor scene analysis algorithm using color images as privileged information significantly improves the accuracy of indoor scene analysis and reduces reliance on manually annotated data. …”
    Get full text
    Article
  5. 2285

    SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation by Seyed Salar Sefati, Bahman Arasteh, Octavian Fratu, Simona Halunga

    Published 2025-07-01
    “…A similarity graph is built from the log data, allowing for effective anomaly detection using graph-based methods. …”
    Get full text
    Article
  6. 2286

    Enhancing insights in sexually transmitted infection mapping: Syphilis in Forsyth County, North Carolina, a case study. by Lani Fox, William C Miller, Dionne Gesink, Irene Doherty, Marc Serre

    Published 2024-10-01
    “…Results were assessed using latent rate theory cross validation. We show combining a moving window and a UMBME analysis with geomasked data effectively predicted the true or latent syphilis rate 5% to 26% more accurate than the traditional, geopolitical boundary method. …”
    Get full text
    Article
  7. 2287

    A review of machine learning and deep learning for Parkinson’s disease detection by Hajar Rabie, Moulay A. Akhloufi

    Published 2025-03-01
    “…However, challenges like the need for large and diverse datasets, data privacy concerns, and data quality in healthcare remain. …”
    Get full text
    Article
  8. 2288

    Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping by ZHENG Junhua, JIANG Hongwei, LIU Rong, LI Yixiu, LI Wen, WENG Jian

    Published 2024-12-01
    “…Finally, the potential application of the scheme in cross-departmental supervision scenarios of multi-industry and multi-source data sales data was explored, which helped the tax department to realize tax verification under the premise of protecting data privacy, and helped promote the digital transformation and healthy development of various industries.…”
    Get full text
    Article
  9. 2289

    Source-Free Domain Adaptation for Cross-Modality Abdominal Multi-Organ Segmentation Challenges by Xiyu Zhang, Xu Chen, Yang Wang, Dongliang Liu, Yifeng Hong

    Published 2025-05-01
    “…While unsupervised domain adaptation (UDA) has shown promise in addressing these issues by transferring knowledge from a different modality (source domain), its reliance on both source and target data during training presents a practical challenge in many clinical settings due to data privacy concerns. …”
    Get full text
    Article
  10. 2290

    SensorsConnect Framework: World-Wide Web for Internet of Things by Abdelrahman Elewah, Khalid Elgazzar

    Published 2024-01-01
    “…Unlike humans, IoT devices lack a unified framework like the WWW for collaboration and data sharing. This is primarily due to 1) separate infrastructure often required for IoT security and privacy and 2) challenges of limited connectivity, device heterogeneity, and evolving technology. …”
    Get full text
    Article
  11. 2291

    Exploring the Frontier: Generative AI Applications in Online Consumer Behavior Analytics by Takuma Kimura

    Published 2025-03-01
    “…Furthermore, the paper discusses the challenges associated with generative AI, emphasizing the need to consider ethical issues, such as bias and data privacy. This comprehensive review contributes to a deeper understanding of generative AI’s role in OCBA, outlining its applications and functionalities from a technical perspective. …”
    Get full text
    Article
  12. 2292

    Federated learning-based non-intrusive load monitoring adaptive to real-world heterogeneities by Qingquan Luo, Chaofan Lan, Tao Yu, Minhang Liang, Wencong Xiao, Zhenning Pan

    Published 2025-05-01
    “…Recently, federated learning has enabled NILM to learn from decentralized meter data while preserving privacy. However, as real-world heterogeneities in electricity consumption data, local models, and AMI facilities cannot be eliminated in advance, federated learning-based NILM (FL-NILM) may underperform or even fail. …”
    Get full text
    Article
  13. 2293

    ADF-SL: An Adaptive and Fair Scheme for Smart Learning Task Distribution by Ahmed A. Al-Saedi, Veselka Boeva

    Published 2025-01-01
    “…However, training models within SL is affected by data heterogeneity and sensitivity, and often requires more computational resources than an individual data provider can afford. …”
    Get full text
    Article
  14. 2294

    Creating a Usable and Effective Digital Intervention to Support Men to Test for HIV and Link to Care in A Resource-Constrained Setting: Iterative Design Based on A Person-Based App... by Anya Zeitlin, Thulile Mathenjwa, Thembelihle Zuma, Sally Wyke, Philippa Matthews, Nuala McGrath, Janet Seeley, Maryam Shahmanesh, Ann Blandford

    Published 2025-04-01
    “…The PBA enabled us to establish both empirical data and theory to design the content of EPIC-HIV1, but it did not directly inform interaction design to make the app usable and effective for the intended users; HCI techniques tailored to the setting enabled us to refine the app to be easy for men with little familiarity with digital technologies to use within the constraints of the setting. …”
    Get full text
    Article
  15. 2295

    “People have options”: a qualitative study of experiences and influences of PrEP choice among women in South Africa by Siphokazi Dada, Faith Mary Musvipwa, Fatima Abegail Cholo, Melanie Pleaner, Alison Kutywayo, Vusile Butler, Catherine Elizabeth Martin, Saiqa Mullick

    Published 2025-07-01
    “…Participants valued learning about alternative PrEP methods and appreciated friendly healthcare providers who answered their questions. Privacy and emotional support were also crucial. However, negative experiences included the use of complex scientific jargon and insufficient information on PrEP's potential drawbacks. …”
    Get full text
    Article
  16. 2296
  17. 2297

    Choosing the Best Digital Health Literacy Measure for Research: Mixed Methods Study by Charlotte Brun Thorup, Mika Uitto, Kerryn Butler-Henderson, Sarah Wamala-Andersson, Merja Hoffrén-Mikkola, Diana Schack Thoft, Lisa Korsbakke Emtekær Hæsum, Gabriela Irrazabal, Laura Pruneda González, Katja Valkama

    Published 2025-04-01
    “…Ethical considerations in dHL, including privacy and data security, are important due to potential feelings of shame among those with low literacy levels.…”
    Get full text
    Article
  18. 2298

    Predicting Student Dropout Through Text and Media Content Analysis of VKontakte Profiles by Sergei S. Gorshkov, Dmitry I. Ignatov, Anastasia Yu. Chernysheva

    Published 2025-01-01
    “…While this approach depends on publicly available VK data and may be limited by privacy settings, it still provides useful insights. …”
    Get full text
    Article
  19. 2299

    TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache, Carlos T. Calafate

    Published 2025-07-01
    “…This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. …”
    Get full text
    Article
  20. 2300

    Advanced Applications of Artificial Intelligence in Pharmacovigilance: Current Trends and Future Perspectives by Yogesh S Ahire, Jayesh H Patil, Harshita N Chordiya, Rashmi A Deore, Vinod A Bairagi

    Published 2024-03-01
    “…The ethical and legal implications of patient privacy, data security, and regulatory compliance underscore the necessity of cautious artificial intelligence deployment in order to maintain public trust and protect patient rights. …”
    Get full text
    Article