Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 2,421 - 2,440 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 2421

    A hybrid approach to time series forecasting: Integrating ARIMA and prophet for improved accuracy by Sherly A, Mary Subaja Christo, Jesi V Elizabeth

    Published 2025-09-01
    “…With the increasing volume of data generated by IoT devices, performing analytics at the edge offers significant advantages in terms of latency, bandwidth consumption, and privacy. …”
    Get full text
    Article
  2. 2422

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The obtained raw data is pre-processed by using handling missing values and adaptive min-max normalization. …”
    Get full text
    Article
  3. 2423

    Revolutionizing e-health: the transformative role of AI-powered hybrid chatbots in healthcare solutions by Jack Ng Kok Wah

    Published 2025-02-01
    “…After screening 116 studies, 29 met the criteria for inclusion. Data was extracted using a structured template, capturing study objectives, methodologies, findings, and challenges. …”
    Get full text
    Article
  4. 2424

    BSVA: blockchain-enabled secured vertical aggregation algorithm for transactions management in drug traceability framework by P. Bhuvaneshwari, Y. Harold Robinson, M. Bagya Lakshmi

    Published 2025-07-01
    “…The Certificate Authority is used to maintain a secure data-sharing process. The robust aggregation is used for the local models to process the chain code, ensuring the successful execution of the secured transaction. …”
    Get full text
    Article
  5. 2425

    Investigating the Applications and Challenges of Metaverse in Education: A Systematic Review by Asadollah Khadivi

    Published 2024-11-01
    “…The research findings indicate that remote learning, immersion learning, collaborative learning, personalized learning, flipped learning, student-centered learning, experiential learning, hybrid learning, mobile learning, simulated learning, skill-based learning and Borderless and question-based learning are the most common uses of metaverse in education. However, the metaverse is associated with technical, ethical and social challenges such as the nascent nature of the technology, high cost of equipment, weak support infrastructure, inaccessibility to everyone, violation of privacy, data and network security, lack of legal guidelines and regulations. …”
    Get full text
    Article
  6. 2426

    Vicarious shame in a cross-cultural perspective: emotion concepts A.-S. SPANISH SHAME and Ger. FREMDSCHÄMEN/FREMDSCHAM by Kostiantyn I. Mizin, Liudmyla L. Slavova

    Published 2024-06-01
    “…To meet this objective, a three-stage methodology was developed, which was based on the use of interdisciplinary research tools (traditional linguistics, cognitive and corpus linguistics), as well as the involvement of data from psychology, anthropology, and sociology. …”
    Get full text
    Article
  7. 2427

    Characterizing Performance on a Suite of English-Language NeuroUX Mobile Cognitive Tests in a US Adult Sample: Ecological Momentary Cognitive Testing Study by Emily W Paolillo, Jessica Bomyea, Colin A Depp, Ashley M Henneghan, Anunay Raj, Raeanne C Moore

    Published 2024-11-01
    “…Poststudy feedback indicated that participants found NeuroUX easy to learn and use, an enjoyable experience, and an app that would be helpful in understanding their thinking skills. …”
    Get full text
    Article
  8. 2428

    Nurturing Sustainability in Toddlerhood: Investigating Preschool Teachers’ Views and Daily Practices in a Swedish Preschool by Deniz Kahriman-Pamuk, Ingrid Pramling Samuelsson

    Published 2024-11-01
    “…Methods: We employed a case study approach, incorporating observations, interviews, and document analysis for data collection. Qualitative techniques were used for data analysis. …”
    Get full text
    Article
  9. 2429

    Artificial intelligence optimizes the standardized diagnosis and treatment of chronic sinusitis by Yang-Yang Liu, Shao-Peng Jiang, Ying-Bin Wang

    Published 2025-03-01
    “…There may also be data privacy issues involved. Therefore, more research and improvements are needed to realise the full potential of AI in the diagnosis and treatment of CRS.ConclusionOur findings inform the clinical diagnosis and treatment of CRS and the development of AI-assisted clinical diagnosis and treatment systems. …”
    Get full text
    Article
  10. 2430
  11. 2431

    Level of satisfaction and associated factors among patients attending outpatient departments of south Wollo health facilities, Ethiopia. by Wolde Melese Ayele, Abdurahman Ewunetu, Muluken Genetu Chanie

    Published 2022-01-01
    “…A multistage sampling technique was used to select participants. Data were collected an interviewer-administered structured validated questionnaire. …”
    Get full text
    Article
  12. 2432

    Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings by Colm Dowling, Hadi Larijani, Mike Mannion, Matt Marais, Simon Black

    Published 2024-09-01
    “…In line with these challenges, we propose a novel low-data solution to mitigate the impact of multipath reflections and other sources of noise in mmWave sensing. …”
    Get full text
    Article
  13. 2433

    Descriptive Phenomenology from Instances of Dishonesty in Psychotherapy by Psychotherapists by Hossein Alipour, Mahdi Akbari

    Published 2024-11-01
    “…A total of 16 psychotherapists constituted the sample for this research, and data were collected using a five-axis semi-structured interview protocol focused on psychotherapy dishonesty. …”
    Get full text
    Article
  14. 2434

    Optimized summary-statistic-based single-cell eQTL meta-analysis by Maryna Korshevniuk, Harm-Jan Westra, Roy Oelen, Monique G. P. van der Wijst, Lude Franke, Marc Jan Bonder, sc-eQTLGen Consortium

    Published 2025-08-01
    “…These are however, complicated by privacy constraints due to sharing of genotype data and the measurement and technical variety across different scRNA-seq datasets as a result of differences in mRNA capture efficiency, experimental protocols, and sequencing strategies. …”
    Get full text
    Article
  15. 2435

    Digital Empowerment in Social Work: Leveraging AI to Enhance Educational Access in Developing Nations by Zvinodashe Revesai, Benjamin Tungwa, Telson Anesu Chisosa, Vanessa Runyararo Meki

    Published 2024-12-01
    “…Data were analyzed using thematic analysis, examining cases and models where AI has expanded access to scholarly materials through automated translation services, enabled localized resources through virtual training simulations, and facilitated the incorporation of culturally aligned self-help tools such as AI chatbots and wellness applications. …”
    Get full text
    Article
  16. 2436

    The Influence of Fintech on the National Security System: Law, Economic Potential and Digital Defense Strategy by Ngasiman Djoyonegoro, Muhammad Noor Harisudin, Hariyanto Hariyanto

    Published 2025-06-01
    “…Governments need to implement stringent regulations to safeguard Fintech user data and privacy and closely supervise Fintech operations to mitigate the risks of financial technology misuse. …”
    Get full text
    Article
  17. 2437

    Preparing future educators for AI-enhanced classrooms: Insights into AI literacy and integration by Lucas Kohnke, Di Zou, Amy Wanyu Ou, Michelle Mingyue Gu

    Published 2025-06-01
    “…We conducted semi-structured interviews with 15 pre-service teachers and used thematic analysis to interpret the data. Our findings revealed that these future educators recognised AI's potential to enhance personalised learning and increase classroom efficiency but worried about relying on AI too much and losing the human element in teaching. …”
    Get full text
    Article
  18. 2438

    Artificial intelligence in personalized rehabilitation: current applications and a SWOT analysis by Elpidio Attoh-Mensah, Arnaud Boujut, Arnaud Boujut, Mikaël Desmons, Anaick Perrochon

    Published 2025-07-01
    “…Additionally, threats such as data privacy breaches and security vulnerabilities emphasize the need for robust, balanced regulatory frameworks. …”
    Get full text
    Article
  19. 2439

    Designing digital conversational agents for youth with multiple mental health conditions: Insights on key features from a youth-engaged qualitative descriptive study by Jingyi Hou, Jamie Gibson, Thalia Phi, Brian Ritchie, Louise Gallagher, Gillian Strudwick, George Foussias, Darren B Courtney, Aristotle Voineskos, Stephanie Ameis, Kristin Cleverley, Lisa D Hawke

    Published 2025-03-01
    “…Results Four key themes were generated from the focus group data: (1) the importance of a customizable and flexible design for personalization; (2) confidentiality, privacy features and risk mitigation features; (3) the need for reliable, informative content that is user tested and validated; (4) a friendly and human-like interaction style. …”
    Get full text
    Article
  20. 2440

    Pain expression and intercultural identity: a comparison between English and Persian among EFL learners by Hakimeh Abedini

    Published 2025-05-01
    “…Persian was often used for its emotionally resonant and metaphor-rich expressions, reflecting the cultural and historical depth of the language. …”
    Get full text
    Article