Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
Showing 2,601 - 2,620 results of 2,784 for search '(((( useddds OR usedddds) OR usedds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.16s Refine Results
  1. 2601

    Lung-AttNet: An Attention Mechanism-Based CNN Architecture for Lung Cancer Detection With Federated Learning by Chamak Saha, Somak Saha, Md. Asadur Rahman, Md. Mahmudul Haque Milu, Hiroki Higa, Mohd Abdur Rashid, Nasim Ahmed

    Published 2025-01-01
    “…Furthermore, to address medical data sensitivity and privacy concerns, the model is deployed in a Federated Learning (FL) framework, where the global model is trained using weights from local models rather than sharing raw data. …”
    Get full text
    Article
  2. 2602

    Hybrid Transformer-KAN Within Federated Learning Framework: A Novel Machine Learning Approach for Improved Short-Term Weather Forecasting by Shuai Jin, Qiang Li, Sanqiu Liu, Olebogeng Kevin Joel, Xiaohu Ge

    Published 2025-01-01
    “…Furthermore, federated learning is applied to the proposed method to exploit the spatio-temporal dependencies while protecting data privacy. As a result, a novel framework of Federated-Transformer-KAN is proposed to collaboratively forecast weather variables in a distributed manner, without sharing data that is collected by the intelligent sensors equipped at each weather station locally. …”
    Get full text
    Article
  3. 2603

    Assessment of breastfeeding self-efficacy in nursing mothers following earthquakes: A case study of the Kahramanmaraş earthquakes in Turkey by Sinem Güven Dinmez, Ozen Karaman, Emine Bakir

    Published 2025-06-01
    “…During the study period, all eligible mothers visiting the polyclinic who met the inclusion criteria were evaluated. Data were collected using a "Descriptive Data Form" and the "Breastfeeding Self-Efficacy Short Form Scale." …”
    Get full text
    Article
  4. 2604

    A cross-sectional study assessing customers’ perception, satisfaction, and attitude toward e-pharmacy services in Saudi Arabia by Ahmed Khaled Bahamdan, Mona Almanasef

    Published 2024-12-01
    “…A self-administered online questionnaire was distributed via social media, and convenience sampling was used to collect data from December 2022 to January 2023. …”
    Get full text
    Article
  5. 2605

    Leveraging machine learning in nursing: innovations, challenges, and ethical insights by Sophie So Wan Yip, Sheng Ning, Niki Yan Ki Wong, Jeffrey Chan, Kei Shing Ng, Bernadette Oi Ting Kwok, Robert L. Anders, Simon Ching Lam

    Published 2025-05-01
    “…However, key challenges include ethical considerations, such as data privacy, algorithmic bias, and patient autonomy, which necessitate ongoing research and regulatory oversight.ConclusionsML in nursing offers transformative potential across patient care, education, and operational efficiency, which is balanced by significant challenges and ethical considerations. …”
    Get full text
    Article
  6. 2606

    Insights From a User Experience‐Focused Virtual Study on the Feasibility and Challenges of Decentralized Clinical Trials by Yue Ma, Le Li, Gaili Gao, Huan Zhou, Jianmiao Yang, Jiao Zheng, Li Zheng, Lu Zhang, Min Jiang, Pu Li, Wenjing Zhou, Xia Chen, Ying Wang, Weiyi Zheng, Yan Zhang

    Published 2025-08-01
    “…Standard procedures were developed for each DCT element, addressing issues like identity verification and data privacy based on user perspectives. This study provided insights on implementing DCTs in China, identifying areas that need optimization to meet local regulatory and stakeholders' requirements. …”
    Get full text
    Article
  7. 2607

    Large language models aided patient progression documentation according to the ICD standard by Nuria Lebeña, Arantza Casillas, Alicia Pérez

    Published 2025-01-01
    “…In previous works, this task has been carried out using structured data, such as, ICD-coded diagnoses, overlooking unstructured textual information in EHRs. …”
    Get full text
    Article
  8. 2608

    Sustainable financial infrastructure and governance: A fuzzy multi-criteria decision-making analysis of open service innovation in unstable economies by Homa Molavi, Lihong Zhang, Mohammad Khanbabaei

    Published 2025-06-01
    “…Regulatory sandboxes and innovation clusters can foster collaboration between banks, fintech companies, and regulators, enhancing trust and compliance. Strict data governance frameworks aligned with global standards are essential to balancing innovation with privacy.…”
    Get full text
    Article
  9. 2609

    Factors Influencing the Implementation and Adoption of Digital Nursing Technologies: Systematic Umbrella Review by Stefan Walzer, Christoph Armbruster, Sonja Mahler, Erik Farin-Glattacker, Christophe Kunze

    Published 2025-07-01
    “…MethodsWe used an umbrella review methodology to synthesize the evidence on DNTs and the complexities of their implementation. …”
    Get full text
    Article
  10. 2610

    A hybrid explainable federated-based vision transformer framework for breast cancer prediction via risk factors by Aymen M. Al-Hejri, Archana Harsing Sable, Riyadh M. Al-Tam, Mugahed A. Al-antari, Sultan S. Alshamrani, Kaled M. Alshmrany, Wedad Alatebi

    Published 2025-05-01
    “…These models are assessed on binary, multi-class, and Breast Imaging Reporting and Data System (BI-RADS) classification tasks using a unique dataset encompassing real-world risk factors. …”
    Get full text
    Article
  11. 2611

    The Human Voice as a Digital Health Solution Leveraging Artificial Intelligence by Pratyusha Muddaloor, Bhavana Baraskar, Hriday Shah, Keerthy Gopalakrishnan, Divyanshi Sood, Prem C. Pasupuleti, Akshay Singh, Dipankar Mitra, Sumedh S. Hoskote, Vivek N. Iyer, Scott A. Helgeson, Shivaram P. Arunachalam

    Published 2025-05-01
    “…The primary ethical challenge when incorporating voice as a diagnostic tool is that of privacy and security. To eliminate this, encryption methods exist to convert patient-identifiable vocal data into a more secure, private nature. …”
    Get full text
    Article
  12. 2612
  13. 2613

    Differentiating atypical parkinsonian syndromes with hyperbolic few-shot contrastive learning by Won June Choi, Jin HwangBo, Quan Anh Duong, Jae-Hyeok Lee, Jin Kyu Gahm

    Published 2024-12-01
    “…However, the models typically require extensively labeled training datasets, which are costly and pose patient privacy risks. To address the issue of limited training datasets, we propose a novel few-shot learning framework for classifying multiple system atrophy parkinsonian (MSA-P) and progressive supranuclear palsy (PSP) within the APS category using fewer data items. …”
    Get full text
    Article
  14. 2614

    Vision-Based Activity Recognition for Unobtrusive Monitoring of the Elderly in Care Settings by Rahmat Ullah, Ikram Asghar, Saeed Akbar, Gareth Evans, Justus Vermaak, Abdulaziz Alblwi, Amna Bamaqa

    Published 2025-05-01
    “…The system integrates a frame differencing algorithm with adjustable sensitivity parameters and an anomaly detection model tailored to identify deviations from individual behavior patterns without relying on large volumes of labeled data. The system was validated through real-world deployments across multiple care home rooms, demonstrating significant improvements in emergency response times and ensuring resident privacy through anonymized frame differencing views. …”
    Get full text
    Article
  15. 2615

    A Multi-Criteria Decision-Making Framework for Blockchain Technology Adoption in Smart Healthcare by Deepika Gaur, Shivani Bali, Angappa Gunasekaran, Nitish Joshi, Kuldeep Chaudhary, Vikram Bali

    Published 2025-10-01
    “…Among the three blockchain platforms evaluated, the results indicate that permissioned blockchain technology is the most suitable for the healthcare sector, primarily due to its strengths in regulatory compliance, data privacy, and system integration. The study’s findings would help practitioners identify and choose the best blockchain platform, thus contributing to a transition in the healthcare industry called “Smart Healthcare 5.0”.…”
    Get full text
    Article
  16. 2616

    Optimized Identity Authentication via Channel State Information for Two-Factor User Verification in Information Systems by Chuangeng Tian, Fanjia Li, Xiaomeng Liu, Juanjuan Li

    Published 2025-04-01
    “…For classification, a kernel support vector machine (SVM) model is trained using a randomized hyperparameter search algorithm. …”
    Get full text
    Article
  17. 2617

    Inpatient satisfaction with nursing care in a backward region: a cross-sectional study from northwestern China by Xiaoying Wang, Juxia Zhang, Limei Yang, Jiao Dai, Wenjing Shan, Jiancheng Wang

    Published 2020-09-01
    “…Objectives The aim of the study was to examine the level of patient satisfaction with nursing care and identify the factors affecting satisfaction from the inpatient’s perspective in a backward region of China.Design This was a cross-sectional study.Setting The study was conducted at a tertiary hospital located in northwest China.Participants Patients admitted to the ward for at least 48 hours were chosen to participate in the survey.Primary outcome measure The Newcastle Satisfaction with Nursing Care Scale was used. Data were collected from 219 patients.Results The overall inpatient satisfaction with nursing care was 78.15±4.74. …”
    Get full text
    Article
  18. 2618

    Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation by Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson

    Published 2025-03-01
    “…As the proliferation of Internet of Things (IoT) devices grows, challenges in security, privacy, and interoperability become increasingly significant. …”
    Get full text
    Article
  19. 2619

    A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things by Baohua ZHAO, Zhihao WANG, Liandong CHEN, Chunhui REN, Fajiang YU, Qing XU

    Published 2022-05-01
    “…The structure of unbalanced hash tree generates less verification information during device verification and protects privacy. The sparse Merkel tree multiproofs method is used to generate the verification information to implement the batch authentication of devices. …”
    Get full text
    Article
  20. 2620

    A "Quıet" need ın the dısaster of the century: a qualıtatıve study on menstrual hygıene management by Ayşe Aydın, Meltem Şirin Gok, Bahar Çiftçi

    Published 2025-02-01
    “…The interviews were analyzed using content analysis, and themes and sub-themes reflecting the women's experiences were identified. …”
    Get full text
    Article