Showing 2,621 - 2,640 results of 2,784 for search '(((( useddds OR useddddds) OR uses) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.29s Refine Results
  1. 2621

    The Analysis of the Effective Factors on Urban Blight in District 3, Region 12, Tehran City by Hossein Mansourian, Ahmad Pour Ahmad, Hasan Ashouri

    Published 2019-09-01
    “…Materials and Methods This study is mostly based on the initial data resulted from surveying the households using a researcher-made questionnaire; however, the tools of the interview, observation, and the results obtained from the public censuses of population and housing are also used to achieve the required data and information. …”
    Get full text
    Article
  2. 2622

    Effect of transcranial magnetic stimulation on perioperative neurocognitive dysfunction: study protocol for a systematic review and meta-analysis of randomised controlled trials by Ying Yang, Yongming Tian, Yulan Luo, Jiarong Zeng

    Published 2025-06-01
    “…Meta-analysis will be conducted using STATA V.15.1 statistical software. The data synthesis process will incorporate standardised methodologies, including heterogeneity testing, sensitivity analysis and assessment of publication bias.Ethics and dissemination This study will not involve the collection of biometric information or medical privacy data throughout the research process, thus complying with the exemption criteria outlined in the ‘Measures for Ethical Review of Biomedical Research Involving Human Subjects.’ …”
    Get full text
    Article
  3. 2623
  4. 2624

    Perceptions of academic staff and students of senior high school in implementing game-based exercises in physical education classes—a research protocol for a qualitative descriptiv... by Donald Manlapaz, Jose Avelino Vergara, Keisha Marie Bea Alpuerto, Iszaac Khalil Señora De Los Santos, Michaela Urian Enriquez, Zamantha Zamora Manicio, Joshua Emmanuel Ferrera Mendres, Casey Gwyn Salvaleon Tolosa, Zachary Gabriel Dee Vilela, Zeraia Ezra Gabriel Alonzo Zabat

    Published 2023-12-01
    “…Once done, they will undergo FGDs conducted through Google Meet. Data will be coded and analysed via thematic analysis using manual coding and NVivo V.12 software to summarise central themes and perceptions.Ethics and dissemination This study will abide by the Nuremberg Code, Declaration of Helsinki, Belmont Report, Data Privacy Act of 2012 and National Ethical Guidelines (for health-related research) of 2017. …”
    Get full text
    Article
  5. 2625

    Vicarious shame in a cross-cultural perspective: emotion concepts A.-S. SPANISH SHAME and Ger. FREMDSCHÄMEN/FREMDSCHAM by Kostiantyn I. Mizin, Liudmyla L. Slavova

    Published 2024-06-01
    “…To meet this objective, a three-stage methodology was developed, which was based on the use of interdisciplinary research tools (traditional linguistics, cognitive and corpus linguistics), as well as the involvement of data from psychology, anthropology, and sociology. …”
    Get full text
    Article
  6. 2626

    Characterizing Performance on a Suite of English-Language NeuroUX Mobile Cognitive Tests in a US Adult Sample: Ecological Momentary Cognitive Testing Study by Emily W Paolillo, Jessica Bomyea, Colin A Depp, Ashley M Henneghan, Anunay Raj, Raeanne C Moore

    Published 2024-11-01
    “… BackgroundMobile cognitive testing is growing in popularity, with numerous advantages over traditional cognitive testing; however, the field lacks studies that deeply examine mobile cognitive test data from general adult samples. ObjectiveThis study characterized performance for a suite of 8 mobile cognitive tests from the NeuroUX platform in a sample of US adults across the adult lifespan. …”
    Get full text
    Article
  7. 2627

    Effectiveness and safety of acupuncture therapy for inflammatory bowel disease: a protocol of systematic review and meta-analysis by Fan-rong Liang, Ning Sun, Rui-Rui Sun, Yuan-Fang Zhou, Shi-Rui Cheng, Xiao-Dong Deng, Xiang-Yin Ye, Zheng-Jie Li, Gui-Xing Xu, Yu-Zhu Qu, Liu-Yang Huang

    Published 2021-08-01
    “…The primary outcome was symptoms alleviation after acupuncture treatment or even in the follow-up.Ethics and dissemination Ethical approval will not be needed because data of this review are not involved in patient’s information and privacy. …”
    Get full text
    Article
  8. 2628

    Developing a Behavioral Phenotyping Layer for Artificial Intelligence–Driven Predictive Analytics in a Digital Resiliency Course: Protocol for a Randomized Controlled Trial by Trevor van Mierlo, Rachel Fournier, Siu Kit Yeung, Sofiia Lahutina

    Published 2025-08-01
    “…Ethical safeguards include institutional review board approval, informed consent, and strict data privacy standards. ResultsThis protocol was designed in January 2025. α and β testing of the intervention are scheduled to begin in July 2025, with a soft launch anticipated in August 2025. …”
    Get full text
    Article
  9. 2629

    Study protocol for a Prospective Observational study of Safety Threats and Adverse events in Trauma (PrO-STAT): a pilot study at a level-1 trauma centre in Canada by Melissa McGowan, Charles Keown-Stoneman, Brodie Nolan, Teodor Grantcharov, Eliane M Shore, Anisa Nazir

    Published 2025-01-01
    “…All consecutive trauma team activations over 12 months will be included, with data collected using audio-visual recordings and physiological monitoring. …”
    Get full text
    Article
  10. 2630

    Barriers and facilitators of transition of adolescents living with HIV into adult care in under-resourced settings of Southern Ethiopia: a qualitative study by Mulugeta Shegaze Shimbre, Belay Boda Bodicha, Abakundana Nsenga Ariston Gabriel, Lubna Ghazal, Kedi Jiao, Wei Ma

    Published 2024-10-01
    “…Purposive sampling was used to gather data through in-depth interviews (IDIs) and focus group discussions (FDGs) involving ALWHs and their parents. …”
    Get full text
    Article
  11. 2631

    Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection by Rafael Abreu, Emanuel Simão, Carlos Serôdio, Frederico Branco, António Valente

    Published 2024-11-01
    “…Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. …”
    Get full text
    Article
  12. 2632

    From lab to field with machine learning – Bridging the gap for movement analysis in real-world environments: A commentary by Carlo Dindorf, Fabian Horst, Djordje Slijepčević, Bernhard Dumphart, Jonas Dully, Matthias Zeppelzauer, Brian Horsak, Michael Fröhlich

    Published 2024-09-01
    “…Event detection (c) in time series data is the annotation of certain events that are used to extract useful and vital information or to remove unwanted and unnecessary data for further analysis. …”
    Get full text
    Article
  13. 2633

    Leveraging federated learning for DoS attack detection in IoT networks based on ensemble feature selection and deep learning models by Tasneem Qasem Al-Ghadi, Selvakumar Manickam, I. Dewa Made Widia, Eka Ratri Noor Wulandari, Shankar Karuppayah

    Published 2025-12-01
    “…However, IoT systems face numerous security threats, making data protection against cyberattacks essential. While deploying an Intrusion Detection System (IDS) in a centralized framework can lead to data leakage, Federated Learning (FL) offers a privacy-preserving alternative by training models locally and transmitting only the updated model weights to a central server for aggregation. …”
    Get full text
    Article
  14. 2634

    Factors Associated with Caregiver Burden in Families of Patients with Palliative and Chronic Illness: A Cross-Sectional Study by Haroen H, Juniarti N, Sari CWM, Prista Sari S, Arovah NI, Pardosi JF, Wibowo DA

    Published 2025-07-01
    “…Data were analyzed using the Rasch model and bivariate tests.Results: A high burden was reported by 50.7% of caregivers, while 39.4% and 9.9% experienced moderate and low burden, respectively. …”
    Get full text
    Article
  15. 2635

    Qualitative study exploring reintegration of clinical trial participants with HIV to public health services in Johannesburg, South Africa by Samanta Tresha Lalla-Edward, Kelechi Elizabeth Oladimeji, Sibongiseni Thandazani Nxumalo, Bernice Harris, Lizeka Napoles

    Published 2024-11-01
    “…Because transferring PLHIV back to PHCs post-clinical trials may result in decreased access to specialised care or resources that were available during the trial, this study explored insights into challenges faced during reintegration from clinical trial settings into PHCs and antiretroviral therapy (ART) adherence post-clinical trials.Design This cross-sectional study was conducted using a qualitative research approach. Participants were recruited using purposive sampling.Setting The study was conducted at the Ezintsha Research Centre in Johannesburg, South Africa, between November 2022 and February 2023.Participants The study population consisted of PLHIV who had participated in two clinical trials (DORA and ADVANCE) at the Ezintsha Research Centre in Johannesburg, South Africa.Methods Using a semistructured guide, 12 in-depth interviews were conducted with PLHIV until data saturation was reached. …”
    Get full text
    Article
  16. 2636

    Birth companion satisfaction for the usage of Maathru Samman Pants while attending labor of their pregnant women as an initiative of respectful maternity care: A mixed method study by B Venkatashiva Reddy, Pulla Sirisha, Madhur Verma, Priti Gupta, Rakesh Kakkar, Star Pala, Wansalan Karu Shullai

    Published 2025-06-01
    “…The present study was conducted to study birth companion satisfaction, acceptability, and demand for using Maathru Samman Pants (MSP) while attending labor of pregnant women in tertiary care health facilities. …”
    Get full text
    Article
  17. 2637

    Workflow for Conflict and Reinforcement Identification Based on STPA and STRIDE by Andrei Carniel, Juliana de Melo Bezerra, Celso Massaki Hirata

    Published 2025-01-01
    “…First, requirements identification is generally made using methods of specific concern, e.g. safety, cybersecurity, data privacy, and business, and it does not consider concerns jointly. …”
    Get full text
    Article
  18. 2638

    Large Language Models in Medical Diagnostics: Scoping Review With Bibliometric Analysis by Hankun Su, Yuanyuan Sun, Ruiting Li, Aozhe Zhang, Yuemeng Yang, Fen Xiao, Zhiying Duan, Jingjing Chen, Qin Hu, Tianli Yang, Bin Xu, Qiong Zhang, Jing Zhao, Yanping Li, Hui Li

    Published 2025-06-01
    “…ObjectiveThis scoping review aimed to provide an overview of the current state of research regarding the use of LLMs in medical diagnostics. The study sought to answer four primary subquestions, as follows: (1) Which LLMs are commonly used? …”
    Get full text
    Article
  19. 2639

    Exploring nurse and patient perspectives on WeChat-based prenatal education in Chinese public hospitals: a qualitative inquiry by Yushi He, Guangmei Fan, Guangrui Fan, Dandan Liu

    Published 2025-04-01
    “…Seventeen obstetric nurses and eight pregnant women participated in semi-structured interviews between March and August 2024. Data were analyzed using thematic analysis to identify commonalities and divergences between nurse-driven and patient-driven experiences. …”
    Get full text
    Article
  20. 2640

    Are the mothers admitted for childbirth in a tertiary care hospital satisfied with the health care services? A mixed methods study from Mangaluru, Karnataka state, India by S. Vineetha, Mubeena Haleema, Abhay S. Nirgude

    Published 2024-11-01
    “…Methods and material: It is a sequential explanatory mixed method study conducted in the Obstetrics and Gynaecology department in a tertiary college hospital among 291 pregnant women admitted for childbirth. Quantitative data obtained using expert validated questionnaire was entered in an Excel sheet and analyzed using IBM SPSS Version 23. …”
    Get full text
    Article