Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 1,381 - 1,400 results of 2,784 for search '(((( useddds OR usedddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.17s Refine Results
  1. 1381

    Determinants of behavioral intentions and their impact on student performance in the use of AI technology in higher education in Indonesia: A SEM-PLS analysis based on TPB, UTAUT,... by Muhammad Nurtanto, Septiari Nawanksari, Valiant Lukad Perdana Sutrisno, Husni Syahrudin, Nur Kholifah, Didik Rohmantoro, Iga Setia Utami, Farid Mutohhari, Mustofa Abi Hamid

    Published 2025-01-01
    “…The findings reveal that Attitude toward Behavior and Technology Anxiety significantly influence Student Performance through mediating variables such as Performance Expectancy, Facilitating Conditions, and Behavioral Intention to Use. Notably, perceived risk negatively affects behavioral intention and academic outcomes, suggesting high student awareness of data privacy, technological dependency, and accuracy uncertainty. …”
    Get full text
    Article
  2. 1382
  3. 1383

    Enhancing unmanned aerial vehicle and smart grid communication security using a ConvLSTM model for intrusion detection by Raed Alharthi

    Published 2024-12-01
    “…The emergence of small-drone technology has revolutionized the way we use drones. Small drones leverage the Internet of Things (IoT) to deliver location-based navigation services, making them versatile tools for various applications. …”
    Get full text
    Article
  4. 1384

    Using malware for software-defined networking–based smart home security management through a taint checking approach by Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Wen-Hui Lin, Hsiao-Chung Lin, Wun-Jie Chao

    Published 2016-08-01
    “…Accordingly, this article proposes a taint propagation analysis model incorporating a weighted spanning tree analysis scheme for tracking data with taint marking using several taint checking tools with an open software-defined networking architecture for solving the dynamic taint propagation analysis problem. …”
    Get full text
    Article
  5. 1385

    Using AI chatbots (e.g., CHATGPT) in seeking health-related information online: The case of a common ailment by Pouyan Esmaeilzadeh, Mahed Maddah, Tala Mirzaei

    Published 2025-03-01
    “…Using structural equation modeling on survey data collected from 231 respondents in the US, our study examines the hypotheses linking hedonic and utilitarian values, user satisfaction, willingness to reuse conversational AI, and intentions to take recommended actions. …”
    Get full text
    Article
  6. 1386
  7. 1387

    Grouping Digital Health Apps Based on Their Quality and User Ratings Using K-Medoids Clustering: Cross-Sectional Study by Maciej Marek Zych, Raymond Bond, Maurice Mulvenna, Lu Bai, Jorge Martinez-Carracedo, Simon Leigh

    Published 2025-07-01
    “…With over 350,000 digital health apps available on the app stores today, those apps need to be of sufficient quality to be safe to use. Discovering the typology of digital health apps regarding professional and clinical assurance (PCA), user experience (UX), data privacy (DP), and user ratings may help in determining the areas where digital health apps can improve. …”
    Get full text
    Article
  8. 1388

    Barriers and facilitators to seeking psychological support among healthcare professionals: a qualitative study using the Theoretical Domains Framework by Sha Liu, Yinhuan Hu, Holger Pfaff, Xiaoyun Lei, Zhen Qi, Xiandong Feng

    Published 2025-03-01
    “…Data were analyzed using framework analysis and relevant domains were identified according to the frequency of participants’ belief statements. …”
    Get full text
    Article
  9. 1389

    Employing combined spatial and frequency domain image features for machine learning-based malware detection by Abul Bashar

    Published 2024-07-01
    “…The ubiquitous adoption of Android devices has unfortunately brought a surge in malware threats, compromising user data, privacy concerns, and financial and device integrity, to name a few. …”
    Get full text
    Article
  10. 1390

    Artificial Intelligence in Healthcare: Innovation and Impact in Medical Practice by Amelia-Maria ISAC, Corina VERNIC

    Published 2025-05-01
    “…Furthermore, federated learning and domain adaptation techniques may help address data privacy concerns and improve model robustness across diverse populations. …”
    Get full text
    Article
  11. 1391

    Building a Digital Health Research Platform to Enable Recruitment, Enrollment, Data Collection, and Follow-Up for a Highly Diverse Longitudinal US Cohort of 1 Million People in the... by Dave Klein, Aisha Montgomery, Mark Begale, Scott Sutherland, Sherilyn Sawyer, Jacob L McCauley, Letheshia Husbands, Deepti Joshi, Alan Ashbeck, Marcy Palmer, Praduman Jain

    Published 2025-01-01
    “…Digital research platforms can be used to increase participant access, improve study engagement, streamline data collection, and increase data quality; however, the efficacy and sustainability of digitally enabled studies rely heavily on the design, implementation, and management of the digital platform being used. …”
    Get full text
    Article
  12. 1392

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services by charu awasthi, Satya Prakash, Prashant Kumar Mishra

    Published 2024-12-01
    “…Here the fog nodes gather the information from the medical sensor devices and the data is validated using smart contracts in the blockchain network. …”
    Get full text
    Article
  13. 1393

    Non-Contact Fall Detection System Using 4D Imaging Radar for Elderly Safety Based on a CNN Model by Sejong Ahn, Museong Choi, Jongjin Lee, Jinseok Kim, Sungtaek Chung

    Published 2025-05-01
    “…A CNN model classifies postures into standing, sitting, and lying, while changes in the speed and position distinguish falling actions from lying-down actions. The Point Cloud data were normalized and organized using zero padding and k-means clustering to improve the learning efficiency. …”
    Get full text
    Article
  14. 1394

    Akrivia Health Database—deep patient characterisation using a secondary mental healthcare dataset in England and Wales: cohort profile by Ana Todorovic, Philip Craig, Simon Pillinger, Panagiota Kontari, Sophie Gibbons, Luke Bryden, Tarso Franarin, Ceyda Uysal, Gloria Roque, Benjamin Fell

    Published 2024-10-01
    “…The data are anonymised, structured and harmonised from the source electronic health records across a range of information technology systems, enabling for unified, privacy-preserving access for research purposes.Participants The cohort contains data from electronic health records for over 4.6 million patients in England and Wales, as of January 2024. …”
    Get full text
    Article
  15. 1395

    AI-based model for Prediction of Power consumption in smart grid-smart way towards smart city using blockchain technology by Emran Aljarrah

    Published 2024-12-01
    “…Ensuring data integrity, privacy, and trust among grid applicants, transmit the data securely and reliably to a centralized or distributed cloud platform utilizing blockchain technology—a secure transmission and storage using Distributed Authentication and Authorization (DAA) protocol. …”
    Get full text
    Article
  16. 1396

    Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM) by R. Priya, N. Sivakumar

    Published 2022-12-01
    “…Abbreviations: VANETs: vehicular ad hoc networks; IVC: inter-vehicular communication; NC-WTM: node-centric weight-based trust management algorithm; WTM: weight-based trust management algorithm; RPRep: robust and privacy-preserving reputation management scheme; ART: attack-resistant trust management scheme; MANET: mobile ad hoc network; DSRC: dedicated short-range communication; WAVE: wireless access in vehicular environment; IVC: inter-vehicular communication; I2V: infrastructure-to-vehicle; V2I: vehicle-to-infrastructure; V2V: vehicle-to-vehicle; TA: trust authority; RSU: road side unit; OBU: on-board unit; GPS: global positioning system; WSN: wireless sensor network; VASNETs: vehicular sensor networks; CCW: cooperative collision warning; BMA: bad mouth attack; TDMA: time division multiple access; GDVAN: greedy detection for VANETs; SMTS: spider monkey time synchronization; SVM: support vector machine; DST: Dempster-Shafer theory of evidence; TA: trust authority; PCA: puzzle-based co-authentication; VLC: visible light communication; NE: Nash equilibrium; RTB: request-to-broadcast; CTB: clear-to-broadcast; RREQ: route request message; RREP: route reply; DDR: data disseminate ratio; Dir: direct trust; IDir: indirect trust; TCE: trust computation error; PDR: packet delivery ratio…”
    Get full text
    Article
  17. 1397

    Using information technology to communicate about health and wellbeing, assessment and review: audio computer assisted self-interviewing (A-CASI) by Murray Davies

    Published 2009-10-01
    “…In addition, its use is thought to decrease respondent error or fatigue and allows the relatively easy use of more complicated questionnaires, providing richer data than other self-completion approaches (Tourangeau and Smith, 1996).…”
    Article
  18. 1398

    A True Random Number Generator Based on Race Hazard and Jitter of Braided and Cross-Coupled Logic Gates Using FPGA by Hossam O. Ahmed, Donghoon Kim, William J. Buchanan

    Published 2024-01-01
    “…Cryptographic algorithms, which are critical for protecting user data privacy, rely on cryptographic keys to ensure data security. …”
    Get full text
    Article
  19. 1399

    What multimodal components, tools, dataset and focus of emotion are used in the current research of multimodal emotion: a systematic literature review by Reny Rahmalina, Wawan Gunawan

    Published 2024-12-01
    “…Data were obtained from IEEE Xplore, Science Direct and Emerald journals which were then sorted based on the PRISMA method. …”
    Get full text
    Article
  20. 1400

    Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework by Manal Abdullah Alohali, Hatim Dafaalla, Mohammed Baihan, Sultan Alahmari, Achraf Ben Miled, Othman Alrusaini, Ali Alqazzaz, Hanadi Alkhudhayr

    Published 2025-07-01
    “…The main objective of the SAMFL-SCDCOA methodology is to provide an effective method for preventing cyberattacks in real time using FL and advanced optimization algorithms. Initially, the Z-score normalization is utilized to scale and standardize data to improve analysis consistency and accuracy. …”
    Get full text
    Article