Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 1,341 - 1,360 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.21s Refine Results
  1. 1341

    Acceptance and perceived usefulness of digital health services in the management of chronic urticaria: a survey of patients and physicians by Michael Hindelang, Alexander Zink, Johannes Knitza, Robert Darkow, Martin Welcker, Tilo Biedermann, Susann May, Felix Muehlensiepen

    Published 2025-07-01
    “…Key barriers to adoption were identified, including concerns over data privacy, limitations in technical infrastructure, and a lack of awareness of available digital health solutions. …”
    Get full text
    Article
  2. 1342

    Realizing the potential of Internet of Things (IoT) in Industrial applications by Bharat Rathi, S. Thapaswi, Meghana Kambhampati, Vineet Jain, P. Akshay, Trilok Nath Pandey, Sunil Kumar Pradhan

    Published 2025-04-01
    “…However, challenges like data privacy, interoperability, and scalability remain critical barriers to widespread adoption. …”
    Get full text
    Article
  3. 1343

    Using Artificial Intelligence to Predict Customer Satisfaction with E-Payment Systems during the COVID-19 Pandemic by Samer H. Atawneh, Nawaf N. Hamadneh, Jamil J. Jaber, S. Al Wadi, Waqar A. Khan

    Published 2022-01-01
    “…Descriptive analytical approach of a sample of 1,025 people living in Saudi Arabia was used to answer the study questions and test its hypotheses. …”
    Get full text
    Article
  4. 1344

    Telehealth service use and quality of care among US adults with diabetes: A cross-sectional study of the 2022 health information national trends survey by Zhigang Xie, Kea Turner, Ashby F Walker, Young-Rock Hong, Oliver T Nguyen

    Published 2024-10-01
    “…Objective To characterise telehealth use, reasons for using or not using telehealth and the factors associated with telehealth use among US adults with diabetes.Design A cross-sectional study.Setting Data were sourced from the 2022 Health Information National Trends Survey.Participants US adults aged 18 years or older with self-reported diagnosis of diabetes (both type 1 and type 2).Primary and secondary outcomes Past 12-month utilisation of telehealth services, modality (eg, video, voice only), overall perception of quality of care, perceived trust in healthcare system and patient-centred communication score.Results In an analysis of 1116 US adults with diabetes, representing 33.6 million individuals, 48.1% reported telehealth use in the past year. …”
    Get full text
    Article
  5. 1345

    Improving Transformer Performance for French Clinical Notes Classification Using Mixture of Experts on a Limited Dataset by Thanh-Dung Le, Philippe Jouvet, Rita Noumeir

    Published 2025-01-01
    “…The MoE-Transformer addresses the dual challenges of effective training with limited data and low-resource computation suitable for in-house hospital use. …”
    Get full text
    Article
  6. 1346

    Insights From Art Therapists on Using AI-Generated Art in Art Therapy: Mixed Methods Study by Fereshtehossadat Shojaei, Fatemehalsadat Shojaei, John Osorio Torres, Patrick C Shih

    Published 2024-12-01
    “…ResultsThe study began in August 2023, with data collection involving 10 participants taking place in October 2023. …”
    Get full text
    Article
  7. 1347

    A Non-Invertible Secure Template Generation Using AES Encrypted MCC and Random Triangle Projection by Mohd Imran, Mohammad Sarosh Umar, Furkan Ahmad

    Published 2025-01-01
    “…In recent years, due to the exponential growth in the applicability of biometric authentication systems, it has become essential to address the privacy and security concerns of user biometric information. …”
    Get full text
    Article
  8. 1348

    Real-Time Acoustic Scene Recognition for Elderly Daily Routines Using Edge-Based Deep Learning by Hongyu Yang, Rou Dong, Rong Guo, Yonglin Che, Xiaolong Xie, Jianke Yang, Jiajin Zhang

    Published 2025-03-01
    “…Traditional acoustic scene monitoring systems that rely on cloud computing are limited by data transmission delays and privacy concerns. Hence, this study proposes an acoustic scene recognition system that integrates edge computing with deep learning to enable real-time monitoring of elderly individuals’ daily activities. …”
    Get full text
    Article
  9. 1349

    A Reference Model of GaaP Readiness Indexes Using Systematic Review and Meta-Synthesis Method by Sayyed Mahdi Razavi, Sahar Kousari, Roozbeh Balounejad Nouri, Fatemeh Saghafi

    Published 2025-03-01
    “…This is a qualitative study and a systematic review of the literature in which the meta-synthesis method is used to analyze and analyze the data extracted from selected sources. …”
    Get full text
    Article
  10. 1350

    Blockchain Applications in the Military Domain: A Systematic Review by Nikos Kostopoulos, Yannis C. Stamatiou, Constantinos Halkiopoulos, Hera Antonopoulou

    Published 2025-01-01
    “…It addresses many problems related to data security, privacy, communication, and supply chain management. …”
    Get full text
    Article
  11. 1351

    The Ways of Using Social Media for Health Promotion Among Adolescents: Qualitative Interview and Focus Group Study by Elizabeth Zimmermann, Samuel Tomczyk

    Published 2025-06-01
    “…In addition, 5 individual interviews with boys were carried out to balance gender representation, as boys were less vocal in group settings. Data were analyzed using content analysis with a combined deductive-inductive coding approach in MAXQDA software, achieving high intercoder reliability (Cohen κ=0.93). …”
    Get full text
    Article
  12. 1352
  13. 1353

    Design of an Improved Model for Smart Grid Pricing Using ST-GNN-PNet and MAD-RL-StackelNet by Jalit S. A., Warkad S. B., Rane P. R., Bonde S. V.

    Published 2025-01-01
    “…However, current pricing models fail to capture spatio-temporal load behavior, consumer heterogeneity, and externalities like emissions. Privacy constraints also hinder granular data collection, causing revenue loss. …”
    Get full text
    Article
  14. 1354
  15. 1355

    The Impact of AI-Driven Application Programming Interfaces (APIs) on Educational Information Management by David Pérez-Jorge, Miriam Catalina González-Afonso, Anthea Gara Santos-Álvarez, Zeus Plasencia-Carballo, Carmen de los Ángeles Perdomo-López

    Published 2025-06-01
    “…In today’s digitalized educational landscape, the intelligent use of information is essential for personalizing learning, improving assessment accuracy, and supporting data-driven pedagogical decisions. …”
    Get full text
    Article
  16. 1356

    Automated Digital Safety Planning Interventions for Young Adults: Qualitative Study Using Online Co-design Methods by Jonah Meyerhoff, Sarah A Popowski, Tanvi Lakhtakia, Emily Tack, Rachel Kornfield, Kaylee P Kruzan, Charles J Krause, Theresa Nguyen, Kevin Rushton, Anthony R Pisani, Madhu Reddy, Kimberly A Van Orden, David C Mohr

    Published 2025-02-01
    “…Young adult participants also shared 3 key technological needs of an automated intervention: (1) transparency about how the intervention functions, the kinds of actions it does and does not take, the limits of confidentiality, and the role of human oversight within the program; (2) strong privacy practices—data security around how content within the intervention and how private data created by the intervention would be maintained and used was extremely important to young adult participants given the sensitive nature of suicide-related data; and (3) usability, convenience, and accessibility were particularly important to participants—this includes having an approachable and engaging message tone, customizable message delivery options (eg, length, number, content focus), and straightforward menu navigation. …”
    Get full text
    Article
  17. 1357
  18. 1358

    Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach by Khalid Kadhim Jabbar, Fahmi Ghozzi, Ahmed Fakhfakh

    Published 2023-12-01
    “…On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. …”
    Get full text
    Article
  19. 1359
  20. 1360

    FedDrip: Federated Learning With Diffusion-Generated Synthetic Image by Karin Huangsuwan, Timothy Liu, Simon See, Aik Beng Ng, Peerapon Vateekul

    Published 2025-01-01
    “…In the realm of machine learning in healthcare, federated learning (FL) is often recognized as a practical solution for addressing issues related to data privacy and data distribution. However, many real-world datasets are not identically and independently distributed (non-IID). …”
    Get full text
    Article