Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 1,741 - 1,760 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.20s Refine Results
  1. 1741

    Social media integration in marketing education: A way forward to improve engagement and learning outcomes by Hesham Fazel, Amer Sayaf

    Published 2025-03-01
    “…The findings indicate that social media significantly increased student engagement and knowledge retention. Perceived ease of use, institutional support, and effectiveness in meeting instructional objectives were most significant to adoption. …”
    Get full text
    Article
  2. 1742

    Application of blockchain in urban rail traffic edge computing network by Gaochang XIE, Hua LU, Qinqin TANG, Han ZHU, Chenghao LIANG, Wen WEN, Renchao XIE

    Published 2021-10-01
    “…Multi-access edge computing (MEC) can provide high-quality service capabilities for computing-intensive services and delay-sensitive services in urban rail traffic.However, many edge facilities in rail traffic edge computing network are exposed to an open environment, and their privacy protection and transmission security are facing great challenges.Blockchain has functional characteristics such as distributed ledger, consensus mechanism, smart contract, and decentralized application.Therefore, the use of blockchain can build a systematic security protection mechanism for the distributed rail traffic edge computing network to ensure network security and data security and realize high-quality urban rail traffic services.Firstly, the basic concept of the blockchain and the urban rail traffic edge computing network architecture were introduced.Then, the structure and application content of the rail traffic edge computing network security protection mechanism integrated with the blockchain was discussed in detail.Finally, the open research issues and challenges of the security protection mechanism were analyzed.…”
    Get full text
    Article
  3. 1743

    Comprehensive synthesis of mHealth interventions in psychiatry: insights from systematic, scoping, narrative reviews and content analysis by Zaakira Shahul Hameed Mahreen, Noor Azziah Zainuldin, Melvyn Weibin Zhang

    Published 2024-10-01
    “…Conclusion: Despite positive outcomes, challenges such as data privacy, user engagement and healthcare integration persist. …”
    Get full text
    Article
  4. 1744

    Arduino – Based Electronic Voting Machine by Marwa Adeeb Al-jawaherry

    Published 2019-01-01
    “…During the construction of any electronic voting system, several aspects must consider, the most important is the privacy of voters and the accuracy of the voting process in addition to maintaining the security of data, this research provides a safe and reliable voting system. …”
    Get full text
    Article
  5. 1745

    PERCEPTIONS AND EXPERIENCES OF M-HEALTH TECHNOLOGIES AND SOCIAL MEDIA: A QUALITATIVE STUDY IN PATIENTS WITH SCHIZOPHRENIA by Pasquale Caponnetto, Maria Salvina Signorelli, Jennifer Tiralongo, Alessandro Rodolico, Carmen Concerto, Antonino Petralia, Lucio Inguscio

    Published 2023-12-01
    “…The qualitative methodology used consists of an individual structured interview and the data were subjected to thematic analysis. …”
    Get full text
    Article
  6. 1746

    Co-similar malware infection patterns as a predictor of future risk. by Amir Yavneh, Roy Lothan, Dan Yamin

    Published 2021-01-01
    “…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
    Get full text
    Article
  7. 1747

    Design of an intelligent AI-based multi-layer optimization framework for grid-tied solar PV-fuel cell hybrid energy systems by Prashant Nene, Dolly Thankachan

    Published 2025-12-01
    “…With this, we now have a scalable and real-time energy-efficient solution for future smart grid systems. • Integrated Intelligence Stack: Combines RL-ENN, T-STFREP, FL-DEO, GNNHSCO, and Q-GAN-ESO into a unified architecture for real-time control, forecasting, decentralized optimization, network routing, and synthetic scenario generation. • Real-Time, Scalable, and Privacy-Preserving: Enables adaptive energy dispatch, federated optimization without compromising data privacy, and graph-based power routing, making it suitable for large-scale, smart grid deployments. • Proven Long-Term Performance: Achieved significant improvements over traditional methods (GA, PSO) with 27.5 % lower NPC, 18.2 % reduction in COE, and 30.2 % increase in battery life, validated using 30 years of meteorological data.…”
    Get full text
    Article
  8. 1748

    Challenges of online teaching and adaptation strategies among Iranian female teachers during the COVID-19 pandemic: a qualitative study by Javad Yoosefi lebni, Seyed Fahim Irandoost, Mandana Saki, Masoud Behzadifar, Ahmad Ahmadi

    Published 2025-01-01
    “…Data analysis was carried out using the Colaizzi approach in MAXQDA-2018 software, and the Guba and Lincoln criteria were used to improve the quality of the findings. …”
    Get full text
    Article
  9. 1749

    Evaluation of the strategy for implementing the GLA:D programme in Switzerland: protocol for an implementation-effectiveness hybrid type 3 design study with a mixed-method approach by Karin Niedermann, Lea Ettlin, Marina Bruderer-Hofstetter, Anne-Kathrin Rausch-Osthoff, Irina Nast, Olivier Gaugler

    Published 2022-06-01
    “…The study population will be the healthcare professionals who are involved in the conservative management of knee OA in Switzerland, that is, physiotherapists and medical doctors, and their patients.Ethics and dissemination The use of the registry data containing data of patients participating in the GLA:D Switzerland OA programme does not fall within the scope of the Swiss Human Research Act (BASEC-Nr. …”
    Get full text
    Article
  10. 1750

    The daunting challenge of Artificial Intelligence in Education: a systematic literature review by Rubén Arriazu

    Published 2025-03-01
    “…Finally, there are also ethical and social challenges that address concerns about the privacy of student data, equity in access to advanced technologies, and the potential of AI to perpetuate existing biases. …”
    Get full text
    Article
  11. 1751

    Exploring the influence of cognitive factors among Chinese parents on the sustainability of children’s digital education by Tingyu Zhang, Qianling Jiang, Wenjing Zhang

    Published 2025-03-01
    “…Findings Perceived playability, usefulness, social influence, and satisfaction significantly predict continuance intention. …”
    Get full text
    Article
  12. 1752

    CLOUD COMPUTING SECURITY by Ştefan IOVAN, Alina Anabela IOVAN

    Published 2016-05-01
    “…Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. …”
    Get full text
    Article
  13. 1753

    ENGLISH:FROM MANUSCRIPTS TO MONITORS: THE DIGITAL EVOLUTION OF ISLAMIC KNOWLEDGE AND THE ROLE OF COMPUTERIZING IN SAFEGUARDING TRADITION FOR FUTURE GENERATIONS by Tariq Hussain Jalbani, Muhammad Irfan Baloch, Syed Abrar Ali Shah

    Published 2024-06-01
    “…The paper explores the danger of breaching privacy and the abuse of personal data pointing to the necessity and effectiveness of a policy against such issues. …”
    Get full text
    Article
  14. 1754

    GOVERNANCE TOKENS IN THE CONCEPT OF ELECTRONIC GOVERNMENT by Oleksii Dotsenko, Marko Zelenskyi

    Published 2023-12-01
    “…We emphasized that the use of blockchain technology raises significant privacy concerns, as many e-government services involve personal data that must be properly protected to avoid situations where the blockchain could become the target of attacks by attackers trying to obtain unauthorized access to the personal information of citizens. …”
    Get full text
    Article
  15. 1755

    Perceptions and Needs of Stakeholders Regarding MyPal Project’s Electronic Patient-Reported Outcome App: Cross-Sectional Qualitative Focus Group Study by Dimitrios Kyrou, Panos Bonotis, Christine Kakalou, Maria Vasilopoulou, Lydia Scarfò, Marcel Meyerheim, Annette Sander, Tomáš Arpáš, Eleni Kazantzaki, Christos Maramis, Christina Karamanidou

    Published 2025-08-01
    “…Questions emerged about how and when HCPs would review and respond to patient-reported data. In the third theme, applicability for use in health care, participants emphasized the importance of the system’s ease of use, particularly for older patients and young children. …”
    Get full text
    Article
  16. 1756

    Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration by Yazan Otoum, Chaosheng Hu, Eyad Haj Said, Amiya Nayak

    Published 2024-10-01
    “…Federated learning offers a framework for developing local models across institutions while safeguarding sensitive data. This paper introduces a novel approach for heart disease prediction using the TabNet model, which combines the strengths of tree-based models and deep neural networks. …”
    Get full text
    Article
  17. 1757

    The Impact of Personalized Office Spaces on Faculty Productivity, Performance, and Satisfaction in Universities’ Educational Facilities: Case Study of Al Yamamah University, Riyadh... by Dalia Abdelfattah

    Published 2025-07-01
    “…Data were analyzed using thematic analysis for qualitative insights, focusing on environmental aspects (such as: natural lighting, ventilation, noise control, etc.), psychological factors (such as: privacy, aesthetic appeal, etc.), and architectural settings (such as: area, space layout, materials, etc.). …”
    Get full text
    Article
  18. 1758

    An Elderly Fall Detection Method Based on Federated Learning and Extreme Learning Machine (Fed-ELM) by Zhigang Yu, Jiahui Liu, Mingchuan Yang, Yanmin Cheng, Jie Hu, Xinchi Li

    Published 2022-01-01
    “…Then, Federated Learning is applied to share data information among different users without involving user privacy. …”
    Get full text
    Article
  19. 1759

    Factors that affect clinical youth engagement in digital mental health research: a qualitative sub-study nested within a prospective cohort study by Amanda Bye, Emma Wilson-Lemoine, Kylee Trevillion, Ben Carter, Rina Dutta

    Published 2025-04-01
    “…Methods Semi-structured interviews were conducted with a purposive sample of participants from the 3S-YP study. Interview data was analysed using codebook thematic analysis. …”
    Get full text
    Article
  20. 1760