Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 1,201 - 1,220 results of 2,784 for search '(((( useddds OR usedddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.22s Refine Results
  1. 1201

    Prevalence of adolescent dual tobacco use and its associated factors: findings from a cross-sectional study by Mohd Firdaus Razali, Mohd Ruhaizie Riyadzi, Hamizatul Akmal Abd Hamid, Khaw Wan-Fei, Ummi Nadiah Yusoff

    Published 2025-07-01
    “…Objective To determine the prevalence and its associated factors of dual tobacco use among Malaysian adolescents in developing effective public health strategies.Design Cross-sectional study.Setting This study analysed data from the National Health and Morbidity Survey (NHMS) 2022: Adolescent Health Survey (AHS), a nationwide cross-sectional survey conducted among secondary school students across Malaysia.Participants This cross-sectional study used data from the NHMS 2022: AHS, which included a representative national sample of Malaysian adolescents between the ages of 13 and 17. …”
    Get full text
    Article
  2. 1202
  3. 1203

    Health Care Professionals’ Use of Digital Technology in the Secondary Prevention of Cardiovascular Disease in Austria: Online Survey Study by Luisa Lunz, Sabine Würth, Stefan Tino Kulnik

    Published 2025-06-01
    “…Quantitative survey data were analyzed using descriptive statistics, group comparison tests, and association statistics. …”
    Get full text
    Article
  4. 1204

    A content review of COVID-19-related apps used in Vietnam by Linh Tran, Federica Cucé, Nguyen Thanh An, Kadek Agus Surya Dila, Nguyen Hai Nam, Doan Le Nguyet Cat, Lee Wei Jun, Farrukh Ansar, Fatima Abdallh, Au Vo, Nguyen Tien Huy

    Published 2025-02-01
    “…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
    Get full text
    Article
  5. 1205

    Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization by Mohamed Abd Elaziz, Mohamed Abd Elaziz, Mohamed Abd Elaziz, Ibrahim A. Fares, Abdelghani Dahou, Mansour Shrahili

    Published 2025-05-01
    “…The goal of the developed framework is to improve the detection of IDS without using centralized data to preserve privacy. Whereas it enhances the processing and detection capability of huge amounts of data generated from IoT devices. …”
    Get full text
    Article
  6. 1206

    Some ethical and technological challenges of smart cities by Brian G. Field

    Published 2025-12-01
    “…The moral dilemma and important ethical questions resulting from the use of big data to scrutinise and profile individuals and communities, compromising their privacy and anonymity without their knowledge or consent, cannot be underestimated and appears beyond the control of prevailing data protection protocols.…”
    Get full text
    Article
  7. 1207

    Integrating multi-modal learning analytics dashboard in K-12 education: insights for enhancing orchestration and teacher decision-making by Isabella Possaghi, Boban Vesin, Feiran Zhang, Kshitij Sharma, Cecilie Knudsen, Håkon Bjørkum, Sofia Papavlasopoulou

    Published 2025-08-01
    “…Further research should investigate students’ responses more closely and further develop strategies for the responsible, explainable, and unbiased use of student affective data in real classrooms.…”
    Get full text
    Article
  8. 1208

    Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing by Sijjad Ali, Shuaib Ahmed Wadho, Aun Yichiet, Ming Lee Gan, Chen Kang Lee

    Published 2024-09-01
    “…Cloud computing security and data protection are becoming increasingly critical as its use increases. …”
    Get full text
    Article
  9. 1209
  10. 1210

    Building occupancy estimation using single channel CW radar and deep learning by Sourav Kumar Pramanik, Md. Shafkat Hossain, Shekh Md. Mahmudul Islam

    Published 2025-04-01
    “…Unlike previous studies that rely on WiFi or PIR-based sensors, this approach provides a robust alternative without privacy concerns. The time-frequency scalograms generated from radar echoes were used to train deep-learning models, including DarkNet19, MobileNetV2, and ResNet18. …”
    Get full text
    Article
  11. 1211

    Blockchain framework with IoT device using federated learning for sustainable healthcare systems by B. Bhasker, P. Muralidhara Rao, P. Saraswathi, S. Gopal Krishna Patro, Javed Khan Bhutto, Saiful Islam, Mohammed Kareemullah, Addisu Frinjo Emma

    Published 2025-07-01
    “…The proposed method achieves data privacy and security by 98.73%, intrusion detection efficiency by 97.16%, disease detection accuracy by 96.425, proactive healthcare management by 98.37%, and interoperability by 96.74%.…”
    Get full text
    Article
  12. 1212

    Unobtrusive stress detection using wearables: application and challenges in a university setting by Peter Neigel, Andrew Vargo, Benjamin Tag, Koichi Kise

    Published 2025-08-01
    “…Advances in sensing accuracy and utility design in wearables might make this feasible; however, real-world adoption faces challenges, as users often fail to wear or use these devices consistently and correctly. Additionally, institutional monitoring raises privacy concerns.MethodsIn this study, we analyze real-world data from a cohort of 103 Japanese university students to identify periods of cyclical stress while ensuring individual privacy through aggregation. …”
    Get full text
    Article
  13. 1213
  14. 1214
  15. 1215

    Algorithmic fandom: how generative AI is reshaping sports marketing, fan engagement, and the integrity of sport by Hans Westerbeek

    Published 2025-05-01
    “…The integration of AI in gambling platforms and the commercialisation of fan data raise significant concerns around privacy, consent, and long-term wellbeing. …”
    Get full text
    Article
  16. 1216

    FOCC: A Synthetically Balanced Federated One-Class-Classification for Cyber Threat Intelligence in Software Defined Networking by Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar

    Published 2025-01-01
    “…Federated Learning offers a promising approach for building Cyber Threat Intelligence (CTI) by utilizing cross-domain data in Software Defined Networking (SDN) while addressing privacy concerns. …”
    Get full text
    Article
  17. 1217

    Equipment Fault Diagnosis Method Based on High-efficient Communication Federated Learning by LIU Jing, ZHAO Yichen, LIU Xinghua, WU Youxi, JI Haipeng

    Published 2025-04-01
    “…Federated learning achieves joint training modeling of fault data from various factories while protecting privacy. …”
    Get full text
    Article
  18. 1218

    New discrete memristive hyperchaotic map: modeling, dynamic analysis, and application in image encryption by Fei Yu, Yiya Wu, Xuqi Wang, Ting He, ShanKou Zhang, Jie Jin

    Published 2025-06-01
    “…With the rapid development of information technology, the demand for ensuring data security and privacy protection has become increasingly urgent. …”
    Get full text
    Article
  19. 1219
  20. 1220

    Heartbeat detection and personal authentication using a 60 GHz Doppler sensor by Takuma Asano, Shintaro Izumi, Hiroshi Kawaguchi

    Published 2025-08-01
    “…Unlike fingerprint and facial recognition systems, they offer authentication without physical contact or privacy concerns. This study focuses on non-contact seismocardiography using microwave Doppler sensors and aims to apply this technology for biometric authentication.MethodWe proposed a method for authenticating and identifying heartbeat signals through supervised learning using a conditional variational autoencoder (CVAE). …”
    Get full text
    Article