Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 2,341 - 2,360 results of 2,784 for search '(((( useddds OR useddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.18s Refine Results
  1. 2341

    Application progress of artificial intelligence in managing thyroid disease by Qing Lu, Yu Wu, Jing Chang, Li Zhang, Qing Lv, Hui Sun

    Published 2025-06-01
    “…Despite the broad prospects of AI applications, challenges related to data privacy, model interpretability, and clinical applicability remain. …”
    Get full text
    Article
  2. 2342

    An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs by T. Sudhakar, R. Praveen, V. Natarajan

    Published 2025-03-01
    “…Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. …”
    Get full text
    Article
  3. 2343

    Mapping the landscape of machine learning in chronic disease management: A comprehensive bibliometric study by Shiying Shen, Wenhao Qi, Sixie Li, Jianwen Zeng, Xin Liu, Xiaohong Zhu, Chaoqun Dong, Bin Wang, Qian Xu, Shihua Cao

    Published 2025-07-01
    “…Conclusion ML is rapidly integrating into personalized medicine, real-time monitoring, and multimodal data fusion. However, challenges such as limited collaboration, weak model generalization, and data privacy persist. …”
    Get full text
    Article
  4. 2344

    Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns by Shunfang Hu, Yuanyuan Zhang, Yanru Guo, Yanru Chen, Liangyin Chen

    Published 2025-02-01
    “…IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. …”
    Get full text
    Article
  5. 2345

    Machine learning for post-diploma educational and career guidance: a scoping review in AI-driven decision support systems by Flavio Manganello, Elisa Rasca, Alberto Villa, Andrea Maddalena, Giannangelo Boccuzzi

    Published 2025-05-01
    “…This scoping review maps the application of ML in post-diploma guidance by examining the types of models used, data sources, reported outcomes, and ethical considerations related to fairness, privacy, and transparency. …”
    Get full text
    Article
  6. 2346

    Technology-enabled CONTACT tracing in care homes in the COVID-19 pandemic: the CONTACT non-randomised mixed-methods feasibility study by Carl A Thompson, Thomas A Willis, Amanda Farrin, Adam Gordon, Amrit Daffu-O’Reilly, Catherine Noakes, Kishwer Khaliq, Andrew Kemp, Tom Hall, Chris Bojke, Karen Spilsbury

    Published 2025-05-01
    “…Quantitative data were analysed using descriptive statistical methods, and qualitative data were thematically analysed using normalisation process theory. …”
    Get full text
    Article
  7. 2347

    Trusted execution environments for quantum computers by Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer, Jakub Szefer

    Published 2025-06-01
    “…The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both. …”
    Get full text
    Article
  8. 2348

    Integrating artificial intelligence in drug discovery and early drug development: a transformative approach by Alberto Ocana, Atanasio Pandiella, Cristian Privat, Iván Bravo, Miguel Luengo-Oroz, Eitan Amir, Balazs Gyorffy

    Published 2025-03-01
    “…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
    Get full text
    Article
  9. 2349

    Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring by Mauro Rodriguez-Marin, Luis Gustavo Orozco-Alatorre

    Published 2025-02-01
    “…Despite these advancements, challenges remain regarding data quality, clinical integration, and privacy concerns. …”
    Get full text
    Article
  10. 2350

    Federated Online Learning for adaptive load forecasting across decentralized nodes by Mohamed Ahmed T.A. Elgalhud, Mohammad Navid Fekri, Syed Mir, Katarina Grolinger

    Published 2025-08-01
    “…The main drawbacks are twofold: (1) data sharing and transfer results in privacy and security risks, and (2) static models miss opportunities to learn from new data. …”
    Get full text
    Article
  11. 2351

    Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach by Jian Yang, Shaoxian Zhu, Zhongyi Wen, Qiang Li

    Published 2025-07-01
    “…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
    Get full text
    Article
  12. 2352

    Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications by MD. Abdur Rahman, M. Shamim Hossain, George Loukas, Elham Hassanain, Syed Sadiqur Rahman, Mohammed F. Alhamid, Mohsen Guizani

    Published 2018-01-01
    “…For security, the framework uses blockchain–Tor-based distributed transactions to preserve the therapeutic data privacy, ownership, generation, storage, and sharing. …”
    Get full text
    Article
  13. 2353

    HIV pre-exposure prophylaxis in Latin America: Public policies, healthcare systems and human rights by Herta de Oliveira Alexandre, Sofia Gruskin, Adriano Massuda, Maria Rita Bertolozzi, Aluisio Cotrim Segurado

    Published 2025-06-01
    “…Achieving universal healthcare and adhering to human rights norms can improve access/use of this essential HIV prevention tool.…”
    Get full text
    Article
  14. 2354

    Dimensions related to telemedicine and telehealth competencies of health professionals: A scoping review by Jacqueline Ibarra-Peso, Marcela Hechenleitner-Carvallo, Carlos Zúñiga-San Martín, Angelica Avendaño-Veloso, Eileen Sepúlveda-Valenzuela

    Published 2025-03-01
    “…Introduction Telehealth and telemedicine have proven to be useful in complementing face-to-face care, especially when long distances exist or when it is difficult to access specialists. …”
    Get full text
    Article
  15. 2355

    Acceptability of Guided Symptom Entry and Asynchronous Clinical Communication Software Among Primary Care Staff: Qualitative Study by Riina Raudne, Taavi Tillmann

    Published 2025-07-01
    “…The software was reported to satisfy perceived feature needs for patient verification, privacy and data security, editable plain-language symptom summaries of symptoms, and integration with prewritten response templates (particularly for staff who were nonnative speakers). …”
    Get full text
    Article
  16. 2356

    Implementing a chatbot to promote hereditary breast & ovarian cancer genetic screening in women’s health: identifying barriers and facilitators to screening adoption by Easton N. Wollney, Shireen Madani Sims, Luisel J. Ricks-Santi, Elizabeth Eddy, Daniel Wiesman, Carla L. Fisher

    Published 2025-07-01
    “…Findings illustrate how each factor functioned as a facilitator and/or barrier in women’s uptake (e.g., technology being trusted for accuracy versus concerns for data privacy and security). Conclusions While chatbots can extend women’s cancer risk screening access, particularly in rural regions and with college-educated women, systems-level (cost) and individual-level factors (perceived risk, misconceptions about repeating genetic testing) should be addressed to promote adoption. …”
    Get full text
    Article
  17. 2357

    Foreground-Driven Contrastive Learning for Unsupervised Human Keypoint Detection by Shuxian Li, Hui Luo, Zhengwei Miao, Zhixing Wang, Qiliang Bao, Jianlin Zhang

    Published 2025-01-01
    “…Recently, unsupervised human keypoint detection has become prevalent due to concerns about data privacy. Most existing methods are based on a reconstruction process that extracts appearance and pose information from transformed image pairs and spatially aligns them to obtain a reconstructed image for detection. …”
    Get full text
    Article
  18. 2358

    Sustainable Innovation: Harnessing AI and Living Intelligence to Transform Higher Education by Hesham Mohamed Allam, Benjamin Gyamfi, Ban AlOmar

    Published 2025-03-01
    “…However, while AI has the potential to improve education significantly, it also introduces challenges, such as ethical concerns, data privacy risks, and algorithmic bias. The real challenge is not just about embracing AI’s benefits but ensuring it is used responsibly, fairly, and in a way that aligns with educational values. …”
    Get full text
    Article
  19. 2359

    Assessment of the attitude and fears of the physicians of Pakistan regarding artificial intelligence: a cross-sectional survey in 2024 by Abdur Rehman Khalid, Farooq Ahmad, Smak Ahmed, Muhammad Ahrar Bin Naeem, Noor ul Ain, Hassan Mehmood, Aasma Sajawal, Muhammad Umar, Aiman Atta, Hassaan Amin, Shahid Mahmood

    Published 2025-08-01
    “…Subject and methods A nation-wide cross-sectional study was conducted using an online questionnaire, based on standardized General Attitude Towards Artificial Intelligence Scale (GAAIS) and self-devised questions, aimed at collecting data about demographic details, attitude and fears of the physicians regarding AI. …”
    Get full text
    Article
  20. 2360

    B5G Applications and Emerging Services in Smart IoT Environments by Hani Attar, Mohammed Alghanim, Jafar Ababneh, Khosro Rezaee, Ayat Alrosan, Mohanad A. Deif

    Published 2025-04-01
    “…Furthermore, the proposed study examines the techniques employed for data transmission in B5G applications, such as Vehicle-to-Vehicle (V2V), Device-to-Device (D2D), and Machine to Machine (M2M) transmissions. …”
    Get full text
    Article