Showing 2,041 - 2,060 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.16s Refine Results
  1. 2041

    AML-Based Multi-Dimensional Co-Evolution Approach Supported by Blockchain: Architecture Design and Case Study on Intelligent Production Lines for Industry 4.0 by Kai Ding, Detlef Gerhard, Liuqun Fan

    Published 2025-03-01
    “…As a transparent decentralized network, blockchain’s compatibility with the challenges of AML collaboration processes, data security, and privacy is not ideal. This paper proposes a new method to enhance the collaborative evolution of IPLs. …”
    Get full text
    Article
  2. 2042

    Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications by Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan

    Published 2021-01-01
    “…Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality. …”
    Get full text
    Article
  3. 2043

    Impact of telemedicine on antenatal care at a teaching institution in Eastern India: An insight into the future of better India by Ipsita Mohapatra, Vikash K. Rai, Subha Ranjan Samantaray

    Published 2023-11-01
    “…Materials and Methods: Primary data were collected by means of a telephonic survey of all the antenatal patients who used telemedicine services of AIIMS, Kalyani, based on a preformed questionnaire. …”
    Get full text
    Article
  4. 2044
  5. 2045

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  6. 2046

    Identification of Factors Affecting the Selection of Women's Gyms by Abbas Naghizadeh-Baghi, Masoud Imanzadeh, Mitra Lalfam, Farzad Nobakht Sareban, Majid Javid

    Published 2021-06-01
    “…The data were analyzed by SPSS26 software using Exploratory Factor Analysis test.Results: The results showed that 44 final characteristics affecting the selection of the gym were factorized into 8 factors by factor analysis and these factors explain 67% of the total variance.Conclusion:   Factors influencing the selection of women's gymnasiums in order of priority include Physical Evidence, process, Place, price, product, People, Promotion and Privacy.…”
    Get full text
    Article
  7. 2047

    Inpatient satisfaction with nursing care in a backward region: a cross-sectional study from northwestern China by Xiaoying Wang, Juxia Zhang, Limei Yang, Jiao Dai, Wenjing Shan, Jiancheng Wang

    Published 2020-09-01
    “…Objectives The aim of the study was to examine the level of patient satisfaction with nursing care and identify the factors affecting satisfaction from the inpatient’s perspective in a backward region of China.Design This was a cross-sectional study.Setting The study was conducted at a tertiary hospital located in northwest China.Participants Patients admitted to the ward for at least 48 hours were chosen to participate in the survey.Primary outcome measure The Newcastle Satisfaction with Nursing Care Scale was used. Data were collected from 219 patients.Results The overall inpatient satisfaction with nursing care was 78.15±4.74. …”
    Get full text
    Article
  8. 2048

    A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things by Baohua ZHAO, Zhihao WANG, Liandong CHEN, Chunhui REN, Fajiang YU, Qing XU

    Published 2022-05-01
    “…The structure of unbalanced hash tree generates less verification information during device verification and protects privacy. The sparse Merkel tree multiproofs method is used to generate the verification information to implement the batch authentication of devices. …”
    Get full text
    Article
  9. 2049

    Rapid Whole-Genome Sequencing in Critically Ill Infants and Children with Suspected, Undiagnosed Genetic Diseases: Evolution to a First-Tier Clinical Laboratory Test in the Era of... by Rina Kansal

    Published 2025-03-01
    “…Factors that will help to develop rWGS as a clinical test in critically ill infants and the limitations are briefly discussed, including an evaluation of the clinical utility and accessibility of genetic testing, education for parents and providers, cost-effectiveness, ethical challenges, consent issues, secondary findings, data privacy concerns, false-positive and false-negative results, challenges in variant interpretation, costs and reimbursement, the limited availability of genetic counselors, and the development of evidence-based guidelines, which would all need to be addressed to facilitate the implementation of pediatric genomic sequencing in an effective widespread manner in the era of precision medicine.…”
    Get full text
    Article
  10. 2050

    Pre-class learning assessment on integrating artificial intelligence into evidence-based medicine curriculum by ZUHAER·Yisha, CHEN Xiaowei, CAO Wangnan, WU Shanshan, LIU Junchang, SUN Yumei, WU Tao, ZHAN Siyan, SUN Feng

    Published 2025-05-01
    “…In practice, students primarily used AI for tasks such as translation, writing, and information retrieval, with limited application to complex EBM-related tasks. …”
    Get full text
    Article
  11. 2051

    User and Provider Experiences With Health Education Chatbots: Qualitative Systematic Review by Кyung-Eun (Anna) Choi, Sebastian Fitzek

    Published 2025-06-01
    “…For RQ2, accessibility and ease of use emerged as facilitators, whereas trust deficits, technical glitches, and cultural misalignment were key barriers. …”
    Get full text
    Article
  12. 2052

    Exploring Perceived Barriers in the Assessment and Management of Female Sexual Dysfunction: An Integrated Qualitative and Quantitative Study among Trainee Residents by Yogender Kumar Malik, Adwitiya Ray, Sujata Sethi, Rajiv Gupta

    Published 2025-01-01
    “…A total of 92 trainee residents from related medical specialties of psychiatry, gynecology, dermatology, and urology, who provided informed consent, participated in the study. Data were collected using a validated questionnaire regarding perceived barriers related to residents’ knowledge and attitudes toward assessing FSD and a case vignette. …”
    Get full text
    Article
  13. 2053

    Exploring the Limitations of Federated Learning: A Novel Wasserstein Metric-Based Poisoning Attack on Traffic Sign Classification by Suzan Almutairi, Ahmed Barnawi

    Published 2025-01-01
    “…For example, in a cross-silo setting using Krum, WMPA reduces the FL model’s accuracy from 70% to 30.1%. …”
    Get full text
    Article
  14. 2054

    Integrating Artificial Intelligence into Service Innovation, Business Development, and Legal Compliance: Insights from the Hainan Free Trade Port Era by Yincheng Li, Shumin Wang, Muhammad Bilawal Khaskheli

    Published 2024-10-01
    “…Hypothesis 3 state that HFTP enterprises comply with these laws while systemically assuring, in theory, and practice, the legal risks of artificial intelligence and its implications for legal regulation, which is a significant aspect of research, addressing legal risks related to data privacy, security, and algorithmic bias with many strategies being proposed. …”
    Get full text
    Article
  15. 2055

    Green banking practices and customer satisfaction-way to green sustainability by Ajaz Akbar Mir, Aijaz Ahmad Bhat, Ahmad Samed Al-Adwan, Summaira Farooq, Dima Jamali, Irshad Ahmad Malik

    Published 2025-04-01
    “…The data show that digital banking, green services, and green loans positively and significantly affect customer satisfaction, while green infrastructure does not. …”
    Get full text
    Article
  16. 2056

    Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA by Abdullah Sevin, Abdu Ahmed Osman Mohammed

    Published 2024-12-01
    “…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
    Get full text
    Article
  17. 2057

    Exploring the Challenges of Mobile Phone Utilization for Library Service Delivery: The Librarians’ Perspectives by Qudus Bankole

    Published 2025-04-01
    “…A self-developed questionnaire was used to collect data, which was analyzed using descriptive statistics. …”
    Get full text
    Article
  18. 2058

    Multimodal Cancellable Biometric Template Protection and Person Verification in Transformed Domain by Devendra Reddy Rachapalli, Venkatesulu Dondeti, Hemantha Kumar Kalluri

    Published 2024-01-01
    “…Combining biometric features increases system reliability, safety, and user privacy. We used a colorization technique to generate three separate colors Quick Response (QR) codes from a user-defined Red, Green, Blue (RGB) tuple random seed, which we then combined to create a one-way cancellable template. …”
    Get full text
    Article
  19. 2059

    Navigating the ethical terrain of AI in education: A systematic review on framing responsible human-centered AI practices by Yao Fu, Zhenjie Weng

    Published 2024-12-01
    “…Following the Preferred Reporting Items for Systematic Review and Meta-Analysis (PRISMA) guidelines, we searched Scopus and Web of Science and identified 40 empirical studies that satisfied our inclusion criteria. Specifically, we used four criteria for the screening process: (1) the study's full text was available in English; (2) the study was published before April 10th, 2024 in peer-reviewed journals or conference proceedings; (3) the study was primary research that collected original data and applied qualitative, quantitative, or mixed-methods as the study methodology; and (4) the study had a clear focus on ethical and/or responsible AI in one or multiple educational context(s). …”
    Get full text
    Article
  20. 2060

    Micro, Small and Medium-sized Enterprises in the Digital Economy: Barriers to Digitalisation by Grażyna Węgrzyn

    Published 2025-06-01
    “…Implications / Recommendations: There is a need for education and support of digital competences, as well as to increase awareness among the owners of small firms as to the benefits digitalisation promises. At the same time, data and privacy must be protected in order to encourage entrepreneurs to safely implement digital solutions. …”
    Get full text
    Article