Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
Showing 2,701 - 2,720 results of 2,784 for search '(((( useddds OR usedddds) OR useddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.15s Refine Results
  1. 2701

    Optimized Video Watermarking With Entropy-Aware Block Selection and Modified Hénon-Map Encryption by Ranjan K. Senapati, Birendra Biswal, Sandeep Kautish, Gandharba Swain, Ayman Altameem, Abdulaziz S. Almazyad, Ali Wagdy Mohamed

    Published 2024-01-01
    “…Video watermarking is a technique used to embed information into video content, ensuring privacy protection and preventing data misuse. …”
    Get full text
    Article
  2. 2702

    Exploring health challenges and coping strategies in young patients undergoing maintenance hemodialysis: a qualitative study by Huiling Rao, Yiqian Guo, Luanning Qiu, Xiaomei Ren

    Published 2025-07-01
    “…Methods A qualitative study was conducted through semi-structured interviews with nine MHD patients in a tertiary hospital located in a new first-tier city in China. The interview data were analyzed using Colaizzi’s method with the aid of NVivo 14 (QSR International) software, and all patients’ information was anonymized to protect their privacy. …”
    Get full text
    Article
  3. 2703

    The lived experience of mothers who give birth after induction of labour in hospital settings in Southern Ethiopia: a phenomenological study by Adanech Abebe, Temesgen Nane Setato, Fithamlak Solomon Bisetegn, Samson Kastro Dake, Debritu Nane

    Published 2025-07-01
    “…Data were analyzed thematically using Braun and Clarke’s six-phase method, supported by Open Code Software Version 4.02. …”
    Get full text
    Article
  4. 2704

    Feasibility of digital healthcare in enhancing healthcare access in semiurban areas of Karachi, Pakistan: a qualitative descriptive study by Frances Griffiths, Romaina Iqbal, Bronwyn Harris, Narjis Rizvi, Rawshan Jabeen

    Published 2025-07-01
    “…Both inductive and deductive approaches were used for data analysis.Measure of outcomes The assessment of feasible demand-side and supply-side factors would be extremely useful in the planning and implementation of a sustainable digital health programme.Results Digital health is an acceptable and practically feasible option and is a potential solution to enhance healthcare access and equity, particularly in semiurban and rural remote areas, where healthcare access is limited. …”
    Get full text
    Article
  5. 2705

    Utilization of artificial intelligence in clinical practice: A systematic review of China's experiences by Yihan Qi, Emma Mohamad, Arina Anis Azlan, Chenglin Zhang

    Published 2025-05-01
    “…Methods Following PRISMA guidelines, this review conducted a comprehensive search in Web of Science, Scopus, and PubMed. Bias was assessed using the JBI and NOS tools. Data on study design, population, AI technologies, applications, clinical issues, and outcomes were extracted. …”
    Get full text
    Article
  6. 2706

    Special Issue on Contemporary Research Studies in Operations Research, Business Analytics, and Business Intelligence by Viswanath Kumar Ganesan, S. Vinodh, Malolan Sundararaman, M. Vimala Rani, M. Mathirajan

    Published 2025-06-01
    “…Ethical AI Considerations: Addressing ethical concerns such as data privacy, fairness, and biases in AI systems to ensure responsible use. 6. …”
    Get full text
    Article
  7. 2707

    Cyber Dating Violence: How Is It Perceived in Early Adolescence? by Iratxe Redondo, Naiara Ozamiz-Etxebarria, Joana Jaureguizar, Maria Dosil-Santamaria

    Published 2024-11-01
    “…Methods: Participants were 466 second- and third-year secondary school students. Data were collected through surveys, and responses were analysed using the Iramuteq program. …”
    Get full text
    Article
  8. 2708
  9. 2709

    Construction of an ethical competency evaluation system for clinical physicians in China by Chun-Yan Zeng, Wen-Tao Zhou, Jun-Hao Zhang, Yun-Yi Chen, Yi-Yu Zheng, Hong-Bo Miao, Ge-Yu Liu, Hao-Qing Feng

    Published 2025-07-01
    “…Methods This study was conducted using a literature review, interviews, and the expert Delphi method. …”
    Get full text
    Article
  10. 2710

    VILLAGE WEBSITE DEVELOPMENT TRAINING AS A DIGITAL-BASED SERVICE OPTIMIZATION IN ALANG-ALANG VILLAGE, TRAGAH, BANGKALAN by Erna Setijaningrum, Muhammad Ghofiqi, Luqman Purwanto, Rendy Billiyanto, Faried Effendy

    Published 2025-06-01
    “…The training covered website management, data privacy, and integration with local policies, facilitated by trainers and mentors from Universitas Airlangga. …”
    Get full text
    Article
  11. 2711

    Blockchain modeled swarm optimized lyapunov smart contract deep reinforced secure tasks offloading in smart home by Preethi, Mohammed Mujeer Ulla, Sapna R, Raghavendra M Devadas

    Published 2025-06-01
    “…The extensive issues regarding a smart home include offloading computational tasks, data security aspects, privacy issues, authentication of Internet of Things (IoT) devices, and so on. …”
    Get full text
    Article
  12. 2712

    Alleviating stressfeeding in the emergency department: Elucidating the tensions induced by workplace lactation space issues by Kimberly L. Moulton, Samantha A. Izuno, Nicole Prendergast, Nicole Battaglioli, Stefanie S. Sebok‐Syer

    Published 2024-08-01
    “…Methods Our team used an exploratory qualitative design to investigate lactation‐specific stressors and understand their relationship to individuals’ needs when lactating in EM workplace environments. …”
    Get full text
    Article
  13. 2713

    Factors enhancing operation and maintenance of sanitation facilities for improved service levels in Kampala Schools by Jude Zziwa Byansi, Swaib Semiyaga, Frank Kansiime, Robinah Nakawunde Kulabako

    Published 2025-02-01
    “…A cross-sectional study approach and systematic random sampling techniques were used to collect data from 274 schools (selected from 852) using checklists and questionnaires. …”
    Get full text
    Article
  14. 2714

    Wearable Technologies for Health Promotion and Disease Prevention in Older Adults: Systematic Scoping Review and Evidence Map by Yue Sun, Ji Chen, Mengmeng Ji, Xiaomei Li

    Published 2025-06-01
    “…The opportunities presented by wearable devices are countered by multiple challenges, including data availability and reliability, technical limitations, utility and user acceptance, cost, security and privacy, performance gaps, and challenges. …”
    Get full text
    Article
  15. 2715

    Bridging gaps in medical education for digital healthcare: A Singapore case study by Humairah Zainal, Xin Xiaohui, Julian Thumboo, Fong Kok Yong

    Published 2025-07-01
    “…Data were collected from September 2020 to February 2023 until thematic saturation was achieved, and analysed using qualitative thematic analysis. …”
    Get full text
    Article
  16. 2716

    Assessment of HPV screening modalities within primary care: a systematic review by Yahya Mostafa Waly, Abu-Baker Sharafeldin, Abdulrahman Al-Majmuei, Mohammad Alatoom, Salim Fredericks, Adri-Anna Aloia

    Published 2025-04-01
    “…This can possibly reduce the overall disease burden.MethodsA search strategy was conducted across multiple databases, including PubMed, Cochrane Library, Scopus, and Embase. Data extraction was performed using a standardized form to collect detailed information on study characteristics, participant demographics, and various outcomes. …”
    Get full text
    Article
  17. 2717

    PIRO: A web-based search platform for pathology reports, leveraging large language models to generate discrete searchable insights by Scott Robertson, Venkata Koppireddy, Jeremy Cumbo, Hooman Rashidi, Samer Albahra

    Published 2025-04-01
    “…To address this need, we developed PIRO (Pathology Information Retrieval Optimizer), a web-based platform enabling efficient text searches of diagnostic archives. Built using FastAPI, Angular, and Apache Solr, PIRO supports both basic and advanced search functionalities, faceted filtering, and data extraction, while ensuring compliance with institutional privacy protocols. …”
    Get full text
    Article
  18. 2718

    Preserving patient dignity in critical care units: A qualitative content analysis by Alireza Arman, Shahrzad Ghiyasvandian, Zahra Abbasi Dolatabadi, Meysam Khoshavi, Ali Yavari, Masoumeh Zakerimoghadam

    Published 2025-04-01
    “…Methods & Materials: This qualitative study was conducted on 20 patients selected from the Critical Care Units of Imam Khomeini Hospital, Tehran, Iran, through purposeful sampling. Data were collected via semi-structured interviews and were analyzed using Graneheim and Lundman’s conventional content analysis method. …”
    Get full text
    Article
  19. 2719

    Virtual Reality and User Experience: Current Trends and Future Challenges by Fatima Aviles-Castillo, Jorge Buele, Guillermo Palacios-Navarro

    Published 2025-01-01
    “…Future research should focus on refining interaction paradigms, improving accessibility, and developing ethical frameworks that respect data privacy and protect the user from cybersickness and the psychological effects of prolonged virtual reality exposure.…”
    Get full text
    Article
  20. 2720

    Análise estratégica sobre o emprego de federação de identidade no canal de Internet das organizações Identity federation on organizational internet channel strategic analysis by Heitor Luiz Murat de Meirelles Quintella, José Marcelo de Freitas Vilela

    Published 2007-08-01
    “…<br>Identity Federation, as a standard of security and identity data privacy intermediation, seems to be a real market solution and has been proposed by three alliances or groups: Shibboleth, WS-Federation and Liberty Alliance. …”
    Get full text
    Article