Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 2,121 - 2,140 results of 2,784 for search '(((( useddds OR usedddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.16s Refine Results
  1. 2121

    Digital Transformation in Higher Education: Enhancing Support Services Through Mobile Apps by Anusuyah Subbarao, Nasreen Khan, Aysa Siddika, Muhammad A. Fathullah, Mohd A. Sanwani, Fia F. Adam, Debrina V. Ferezagia, Melisa B. Altamira

    Published 2025-06-01
    “…In contrast, other elements such as ease of use, competence, accessibility, and data privacy were not deemed significant concerns by the students. …”
    Get full text
    Article
  2. 2122

    Enhancing medical image classification via federated learning and pre-trained model by Parvathaneni Naga Srinivasu, G. Jaya Lakshmi, Sujatha Canavoy Narahari, Jana Shafi, Jaeyoung Choi, Muhammad Fazal Ijaz

    Published 2024-09-01
    “…Federated learning (FL) offers a promising method for collaborative training on distributed data held by various entities, ensuring the privacy of patient information. …”
    Get full text
    Article
  3. 2123

    FedDyH: A Multi-Policy with GA Optimization Framework for Dynamic Heterogeneous Federated Learning by Xuhua Zhao, Yongming Zheng, Jiaxiang Wan, Yehong Li, Donglin Zhu, Zhenyu Xu, Huijuan Lu

    Published 2025-03-01
    “…Federated learning (FL) is a distributed learning technique that ensures data privacy and has shown significant potential in cross-institutional image analysis. …”
    Get full text
    Article
  4. 2124

    The Application of Artificial Intelligence in Medical Diagnostics: Implications for Sports Medicine by Michał Bolek, Dominika Musialska, Aleksandra Kędzia, Bartosz Jagieła, Monika Fidyk, Magda Minkiewicz, Maciej Dyda

    Published 2025-05-01
    “…However, their integration into healthcare raises critical ethical concerns related to data privacy, algorithmic bias, and transparency. …”
    Get full text
    Article
  5. 2125

    Engaging Stakeholders in the Development of a National Digital Mental Health Strategy: Reflexive Thematic Analysis by Sarah Kennedy, Robyn Fitzgerald, Ruth Melia

    Published 2025-06-01
    “…Invited stakeholders included experts in DMH research, clinical practice, and mental health advocacy and policy, together with those with lived experience of accessing mental health services. Qualitative data were analyzed using a reflexive thematic analysis approach. …”
    Get full text
    Article
  6. 2126

    HIV Self-Testing among Men Who Have Sex with Men (MSM) in the UK: A Qualitative Study of Barriers and Facilitators, Intervention Preferences and Perceived Impacts. by T Charles Witzel, Alison J Rodger, Fiona M Burns, Tim Rhodes, Peter Weatherburn

    Published 2016-01-01
    “…Evidence to inform the design of an HIVST intervention in the UK is scarce with very little European data on this topic. This study aims to understand values and preferences for HIVST interventions targeting MSM in the UK. …”
    Get full text
    Article
  7. 2127

    Auxiliary Teaching and Student Evaluation Methods Based on Facial Expression Recognition in Medical Education by Xueling Zhu, Roben A Juanatas

    Published 2025-05-01
    “…This method consists of 4 key steps. In data collection, multiangle high-definition cameras record students’ facial expressions to ensure data comprehensiveness and accuracy. …”
    Get full text
    Article
  8. 2128

    Unsupervised intrusion detection model based on temporal convolutional network by LIAO Jinju, DING Jiawei, FENG Guanghui

    Published 2025-01-01
    “…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. In addition, UDMT can adopt different privacy layer modes, and the configuration was flexible to meet the requirements of different detection rates and detection delays. …”
    Get full text
    Article
  9. 2129

    The nature of online civil dispute resolution in modern India by Irina A. Gronic

    Published 2024-12-01
    “…Some believe that the introduction of information technology in the activities of the courts creates high risks for the security and privacy of data and the lack of digital literacy will contribute to this, while others believe that the future belongs to virtual courts and online dispute resolution.…”
    Get full text
    Article
  10. 2130

    Automotive Cybersecurity: A Survey on Frameworks, Standards, and Testing and Monitoring Technologies by Claudiu Vasile Kifor, Aurelian Popescu

    Published 2024-09-01
    “…To sustain and enhance the performance, quality, and reliability of vehicle systems, software engineers face significant challenges, including in diverse communication channels, software integration, complex testing, compatibility, core reusability, safety and reliability assurance, data privacy, and software security. Addressing cybersecurity risks presents a substantial challenge in finding practical solutions to these issues. …”
    Get full text
    Article
  11. 2131

    Decision-making model in digital commerce: electronic trust-based purchasing intention through online food delivery applications (OFDAs) by Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Laszlo Barna Iantovics, Maryam Manzoor, Muhammad Ali Raza, Zoia Khan

    Published 2024-09-01
    “…Design/methodology/approach – Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. …”
    Get full text
    Article
  12. 2132

    Encrypted traffic identification scheme based on sliding window and randomness features by LIU Jiachi, KUANG Boyu, SU Mang, XU Yaqian, FU Anmin

    Published 2024-08-01
    “…Specifically, the scheme involved sampling the payloads of data packets in sessions using a sliding window mechanism to obtain data block sequences that reflect the information patterns of the original traffic. …”
    Get full text
    Article
  13. 2133

    New forgery attack on the authenticated cipher SCREAM and iSCREAM by Yu-dan TIAN, Yong-zhuang WEI

    Published 2016-01-01
    “…Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. …”
    Get full text
    Article
  14. 2134

    Toward Secure and Transparent Global Authentication: A Blockchain-Based System Integrating Biometrics and Subscriber Identification Module by Navid Khalili, Dimitrios Makrakis, Yaser Baseri, Abdelhakim Senhaji Hafid

    Published 2025-01-01
    “…This approach safeguards user privacy and data security. By employing blockchain technology, B2-GAS eliminates SPOFs, ensures tamper-proof transaction storage, and guarantees transparency. …”
    Get full text
    Article
  15. 2135

    Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme by Meng Wu, Xiufeng Zhao, Weitao Song

    Published 2025-03-01
    “…With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. …”
    Get full text
    Article
  16. 2136

    Revolutionizing Imaging Design Content With AIGC: User-Centered Challenges, Opportunities, and Workflow Evolution by Zijian Zhu, Tao Yu, Yijing Wang, Junping Xu

    Published 2025-01-01
    “…Technological maturity and public acceptance serve as key adoption drivers, while social construction and innovation underscore AI’s capacity to foster creativity and design diversity. Ethics and privacy reflect user concerns over data security, whereas learning costs negatively affect adoption due to perceived complexity. …”
    Get full text
    Article
  17. 2137

    Fine-Tuned YOLO Model for Monitoring Children Across Medical Scenes Based on a Large-Scale Real-World Dataset for Children Detection by Samuel Diop, Francois Jouen, Jean Bergounioux, Imen Trabelsi

    Published 2025-01-01
    “…Accurate detection and monitoring of children in medical settings using computer vision systems present unique challenges due to anatomical differences, environmental complexity, and stringent privacy constraints. …”
    Get full text
    Article
  18. 2138

    The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers by Mehrunnisa Saleem jan, Salman Ahmed, Safdar Nawaz Khan Marwat

    Published 2022-06-01
    “… Dynamic navigation devices like Global Positioning Systems (GPSs) are deployed for various purposes in different areas and these devices are usually the central point of interest of various groups like hackers to exploit the data sent and received by GPS systems. The GPS data is usually manipulated using spoofing attacks. …”
    Get full text
    Article
  19. 2139

    Multiscale network alignment model based on convolution of homogeneous multilayer graphs by CUI Jiahao, JIANG Tao, XU Mengyao

    Published 2024-12-01
    “…In terms of node characteristics, the K-nearest neighbor algorithm was used to aggregate node neighborhood information to model the deep network structure, so as to enhance the data. …”
    Get full text
    Article
  20. 2140

    Blockchain in maritime: applications, effects and challenges by Zhao Li, Zhao Li, Yongqiang Sun

    Published 2025-07-01
    “…To prevent issues such as information concealment and privacy breaches, these stakeholders often establish complex and multi-layered data exchange processes, which significantly reduce the operational efficiency of the shipping market. …”
    Get full text
    Article