Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 1,361 - 1,380 results of 2,784 for search '(((( useddds OR usedddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.17s Refine Results
  1. 1361
  2. 1362

    AI optimization algorithms enhance higher education management and personalized teaching through empirical analysis by XiWen Xu

    Published 2025-03-01
    “…The research also identifies challenges and limitations, including data privacy issues, algorithmic bias, and the need for human-AI interaction. …”
    Get full text
    Article
  3. 1363

    A Denoising Diffusion Probabilistic Model-Based Human Respiration Monitoring Method Using a UWB Radar by Ping Wang, Haoran Liu, Xiusheng Liang, Zhenya Zhang

    Published 2025-01-01
    “…This paper proposes a denoising diffusion probabilistic model (DDPM)-based human respiration monitoring method using an ultra-wideband (UWB) radar, where the localization calculation of the target based on the respiration-motion energy ratio, maximum ratio combining (MRC), and principal component analysis (PCA) are included for data enhancement. …”
    Get full text
    Article
  4. 1364

    Using telemedicine to support care for people with type 2 diabetes mellitus: a qualitative analysis of patients’ perspectives by Jun Yang Lee, Carina Ka Yee Chan, Siew Siang Chua, Thomas Paraidathathu, Kenneth Kwing-Chin Lee, Christina San San Tan, Nazrila Nasir, Shaun Wen Huey Lee

    Published 2019-10-01
    “…Four themes emerged from the analysis: (1) generational difference; (2) independence and convenience, (3) sharing of health data and privacy and (4) concerns and challenges. …”
    Get full text
    Article
  5. 1365
  6. 1366

    Metaheuristic-Based Cepstral Sensing Technique for Prolonging Network Lifetime and Mitigating Primary User Emulation Attacks in Cognitive Radio Sensor Network by V. Abilasha, A. Karthikeyan

    Published 2025-01-01
    “…Extensive simulations are used to analyze the proposed algorithm, incorporating important performance parameters including error probability, energy efficiency, residual energy, data gathering efficiency, network longevity, and throughput. …”
    Get full text
    Article
  7. 1367

    Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users by George Alex Stelea, Livia Sangeorzan, Nicoleta Enache-David

    Published 2025-06-01
    “…The proliferation of the Internet of Things (IoT) has led to an abundance of data streams and real-time dashboards in domains such as smart cities, healthcare, manufacturing, and agriculture. …”
    Get full text
    Article
  8. 1368
  9. 1369

    Women’s hospital birth experiences in Harar, eastern Ethiopia: a qualitative study using Roy’s Adaptation Model by Roseanne C Schuster, Nega Assefa, Maleda Tefera, Kedir Teji Roba, Letta Gedefa, Alex Brewis

    Published 2022-07-01
    “…Interviews were audio-recorded and transcribed on the spot and the interviews were analysed using a deductive content analysis approach. Data were analysed using the four components of Roy’s Adaptation Model (RAM) as a guiding framework of women’s experiences: physiological, self-concept, role and function, and interdependence.Results Various behaviours were identified: under physiological mode, common behaviours identified included labour pain, fatigue, surgical site pain and anaesthesia-related complication. …”
    Get full text
    Article
  10. 1370

    Industry 4.0 in commercial airlines: a bibliometric analysis by Nicholas Omido, Rose Luke, Joash Mageto, Thomas Ombati, Thomas Ombati

    Published 2025-08-01
    “…Commercial airlines face numerous challenges related to operational inefficiencies, poor maintenance practices, overcrowding of airports, supply chain complexity, lack of seamless customer experience, safety issues, data privacy and security issues, increasing fuel prices, and sustainability issues; however, Industry 4.0 technologies are widely regarded as a transformative solution, offering advanced tools and methodologies to address these challenges effectively. …”
    Get full text
    Article
  11. 1371

    Bootstrapping BI-RADS classification using large language models and transformers in breast magnetic resonance imaging reports by Yuxin Liu, Xiang Zhang, Weiwei Cao, Wenju Cui, Tao Tan, Yuqin Peng, Jiayi Huang, Zhen Lei, Jun Shen, Jian Zheng

    Published 2025-04-01
    “…Specifically, missing category information (MCI) that is absent in the free-text reports is supplemented by assigning default values to the missing categories in the structured reports. To ensure data privacy, a locally deployed Qwen-Chat model is employed. …”
    Get full text
    Article
  12. 1372

    Management of the Chain of Custody of Digital Evidence Using Blockchain and Self-Sovereign Identities: A Systematic Literature Review by Leandro Loffi, Gerson Luiz Camillo, Cristiano Antonio De Souza, Carla Merkle Westphall, Carlos Becker Westphall

    Published 2025-01-01
    “…While state-of-the-art reviews identify various aspects, it is necessary to include the use of Self-Sovereign Identity (SSI) systems within the scope of research. …”
    Get full text
    Article
  13. 1373

    A Survey on Anti-Money Laundering Techniques in Blockchain Systems by Leyuan Liu, Xiangye Li, Tian Lan, Yakun Cheng, Wei Chen, Zhixin Li, Sheng Cao, Weili Han, Xiaosong Zhang, Hongfeng Chai

    Published 2025-04-01
    “…Furthermore, this study discusses the practical applications of these techniques and reviews commonly used datasets that support AML research. Looking ahead, the advancement of AML technologies in blockchain systems necessitates progress in several critical areas: the construction of AML datasets capable of addressing data imbalance and annotation uncertainty, development of trusted AML algorithms, design of detection mechanisms for covert financial activities, and formulation of privacy-preserving yet regulation-compliant AML solutions. …”
    Get full text
    Article
  14. 1374

    Assessment of the Quality of Smartphone-Based Applications and Games for Teaching Medical Terminology Using the Mobile Application Rating Scale (MARS) by Seyyedeh Fatemeh Mousavi Baigi, Reyhaneh Norouzi Aval, Masoumeh Sarbaz, Khalil Kimiafar

    Published 2024-10-01
    “…The same checklist was used for data extraction. The quality of apps was measured using the Mobile App Rating Scale (MARS). …”
    Get full text
    Article
  15. 1375

    "I don't see a reason why we should be hidden from view": Views of a convenience sample of people living with HIV on sharing HIV status data in routinely collected health and care... by Elizabeth Ford, Katie Goddard, Michael Smith, Jaime Vera

    Published 2025-01-01
    “…The overarching theme was around trust, both the loss of trust experienced by participants due to previous negative or discriminatory experiences, and the need to slowly build trust in data-sharing initiatives. Further themes showed that participants were supportive of data being used for research and health care improvements, but needed a guarantee that their privacy would be protected. …”
    Get full text
    Article
  16. 1376
  17. 1377

    Advanced intrusion detection technique (AIDT) for secure communication among devices in internet of medical things (IoMT) by M. Ramya, Pradeep Sudhakaran, Yuvaraj Sivagnanam, C. Santhana Krishnan

    Published 2025-05-01
    “…Considering the aforementioned, this study suggests an advanced intrusion detection technology (AIDT) to guarantee safe data exchange amongst IoMT devices. The model uses a probabilistic neural network (PNN) to classify whether intrusions are present or not, and particle swarm optimization (PSO) for feature extraction. …”
    Get full text
    Article
  18. 1378

    Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning by Muhammad Dilshad, Madiha Haider Syed, Semeen Rehman

    Published 2025-01-01
    “…Detection methods currently face challenges due to the complex and enormous amounts of data inherent in IoV systems. This paper presents a new approach toward improving DDoS attack detection by using the Gini index in feature selection and Federated Learning during model training. …”
    Get full text
    Article
  19. 1379
  20. 1380

    ReACT_OCRS: An AI-Driven Anonymous Online Reporting System Using Synergized Reasoning and Acting in Language Models by Amir Aboubakr Shaker Mahmoud, Wesam Shishah, Nilay R. Mistry

    Published 2025-01-01
    “…Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response times. …”
    Get full text
    Article