Showing 2,541 - 2,560 results of 2,784 for search '(((( uses OR usedddds) OR used) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.28s Refine Results
  1. 2541

    Acceptability of digital vending machines to improve access to sexual and reproductive health in Brighton, UK: a qualitative analysis by Jaime H Vera, Richard Cooper, Syra Dhillon, John Mear, Gillian Louise Dean, Rhys D Wenlock

    Published 2024-04-01
    “…Stakeholders were staff on sites where the VM was placed. Data analysis took place on NVivo, using a thematic approach.Results 12 users completed the interview. 42% within the age 18–25 years with equal male and female identifying distributions. 33% were heterosexual, 25% homosexual and 33% bisexual. …”
    Get full text
    Article
  2. 2542

    Advanced Monte Carlo for Acquisition Sampling in Bayesian Optimization by Javier Garcia-Barcos, Ruben Martinez-Cantin

    Published 2025-01-01
    “…Bayesian optimization (BO) has proved to be a suitable optimization method in these situations thanks to its sample efficiency and principled way of learning from previous data, but it typically requires that experiments are sequentially performed. …”
    Get full text
    Article
  3. 2543

    Comparative Performance Evaluation of Real-Time Webcam and HOG-Based Facial Recognition Systems for Children's Screen Time Management by Fatimah Alghamdi, Abdulrahman Alghamdi

    Published 2025-06-01
    “…It highlights critical security and privacy considerations, particularly the responsible handling of facial data in environments accessible to minors. …”
    Get full text
    Article
  4. 2544

    A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service by Hwankuk Kim, Jongin Lim, Kyungho Lee

    Published 2015-09-01
    “…Since existing studies mainly focus on simple statistical analysis of the K-ISMS assessment results, analysis on the cause of certification assessment fault based on past data analysis is insufficient. As a method of managing the certification inspection quality, in this paper, we analyze the association among the fault items of the K-ISMS certification assessment results using association rule mining which involves identifying an association rule among items in the database.…”
    Get full text
    Article
  5. 2545

    A Multi-Criteria Decision-Making Framework for Evaluating Emerging Digital Technologies in Supply Chain Optimization by Nabil M. AbdelAziz, Dina Mohamed, Hasnaa Soliman

    Published 2025-07-01
    “…Ten critical attributes covering technical, economic, and environmental dimensions were identified through expert consultation and a review of relevant literature, including scalability, integration ease, performance benefit, costeffectiveness, environmental and social sustainability, data privacy, and supply chain resilience. The evaluation framework combines the Entropy method for determining objective attribute weights with the TOPSIS method for ranking alternatives. …”
    Get full text
    Article
  6. 2546

    Performance Evaluation of Decentralized Federated Learning: Impact of Fully and K-Connected Topologies, Heterogeneous Computing Resources, and Communication Bandwidth by Vo van Truong, Pham Khanh Quan, Dong-Hwan Park, Taehong Kim

    Published 2025-01-01
    “…Decentralized federated learning (DFL) enables collaborative model training across distributed devices while preserving data privacy. Despite this, the performance of DFL in real-world scenarios, characterized by varying network topologies, heterogeneous client resources, and communication bandwidth, remains underexplored. …”
    Get full text
    Article
  7. 2547

    A Systematic Literature Review on Sustainability Integration and Marketing Intelligence in the Era of Artificial Intelligence by Md Mehedi Hasan Emon, Tahsina Khan

    Published 2024-12-01
    “…The conversation delves into the difficulties and moral aspects involved in using AI in marketing, such as issues related to data privacy, algorithmic bias, and the importance of a strategic framework that focuses on sustainable development goals. …”
    Get full text
    Article
  8. 2548

    Applying photovoice and human-centered design to contextualize an adolescent micronutrient supplementation intervention in Mozambique by Sarah Bauler, Carmen Tse, Aicha Dos Santos, Lucilia Moises, Nicole Mbouemboue, Melissa Young, Joel Gittelsohn, Christine Marie George, Elli Leontsini

    Published 2025-06-01
    “…While school-based supplementation is the standard practice, participants strongly preferred to take supplements at home to avoid stigma and benefit from the comfort and privacy of their own homes. We used these insights to refine the adolescent nutrition curriculum and design a multiple micronutrient supplementation delivery platform. …”
    Get full text
    Article
  9. 2549

    An evaluation of menstrual health apps’ functionality, inclusiveness, and health education information by Emma Bucher, Callie Sharkey, Abby Henderson, Briette Basaran, Sarah Meyer, Chen X. Chen

    Published 2025-05-01
    “…Methods In this descriptive study, two reviewers independently searched, screened, and evaluated each app using a standardized tool. Three terms (i.e., “period pain,” “period app,” and “menstrual cramp”) were used to search the Apple App Store. …”
    Get full text
    Article
  10. 2550

    Arabic speaking women’s experience of postpartum contraceptive counselling in Sweden by Sofia Berglundh, Khadija Abunnaja, Sibylle Herzig van Wees, Elin C. Larsson, Helena Kilander

    Published 2025-07-01
    “…The FGDs were conducted in Arabic and translated to English. Data was analysed using reflexive thematic analysis. …”
    Get full text
    Article
  11. 2551

    Enhancing technological sustainability in academia: leveraging ChatGPT for teaching, learning and evaluation by Labaran Isiaku, Abubakar Sadiq Muhammad, Hyelda Ibrahim Kefas, Fitzgerald Chidozie Ukaegbu

    Published 2024-12-01
    “…However, it also sheds light on the ethical issues and challenges associated with its use, including privacy and data protection, transparency and alignment with educational principles. …”
    Get full text
    Article
  12. 2552
  13. 2553

    Exploring unsupervised feature extraction algorithms: tackling high dimensionality in small datasets by Hongqi Niu, Gabrielle B. McCallum, Anne B. Chang, Khalid Khan, Sami Azam

    Published 2025-07-01
    “…Abstract Small datasets are common in many fields due to factors such as limited data collection opportunities or privacy concerns. …”
    Get full text
    Article
  14. 2554

    Establishing a Collaborative Genomic Repository for Adult Burn Survivors: A Burn Model System Feasibility Study by Stephen Sibbett, Jamie Oh, Gretchen Carrougher, Lara Muffley, Nathaniel Ashford, Maiya Pacleb, Samuel Mandell, Jeffrey Schneider, Steven Wolf, Barclay Stewart, Nicole S. Gibran

    Published 2024-11-01
    “…We set out two primary objectives, namely (1) to develop standard operating procedures for genetic sample collection and storage, DNA isolation, and data integration into an existing multicenter database; and (2) to demonstrate the feasibility of correlating genetic variation to functional outcomes in a pilot study, using the catechol-O-methyltransferase (COMT) gene. …”
    Get full text
    Article
  15. 2555

    Advancing sustainability: The impact of emerging technologies in agriculture by Ashoka Gamage, Ruchira Gangahagedara, Shyamantha Subasinghe, Jeewan Gamage, Chamini Guruge, Sera Senaratne, Thevin Randika, Chamila Rathnayake, Zammil Hameed, Terrence Madhujith, Othmane Merah

    Published 2024-12-01
    “…However, it is important to carefully address ethical and socio-economic considerations, including accessibility and data privacy, to manage these effects effectively. …”
    Get full text
    Article
  16. 2556

    Barriers and facilitators to oral pre-exposure prophylaxis uptake among adolescents girls and young women at elevated risk of HIV acquisition in Lilongwe, Malawi: A qualitative stu... by Simon C Nicholas, Maureen Matewere, Agatha Bula, Mercy Tsidya, Mina C Hosseinipour, Mitch Matoga, Alinane Linda Nyondo Mipando

    Published 2025-01-01
    “…The data were digitally recorded, managed using NVivo software and analysed using a thematic approach guided by the Consolidated Framework for Implementation Research (CFIR). …”
    Get full text
    Article
  17. 2557

    Effects of Virtual Care on Patient and Provider Experience of the Clinical Encounter: Qualitative Hermeneutic Study by Graham McCaffrey, Erin Wilson, Lela V Zimmer, Anurag Singh, Steinunn Jonatansdottir, Peter Zimmer, David Snadden, Ian D Graham, Martha MacLeod

    Published 2024-11-01
    “…A total of 17 patients and 10 providers from various disciplines were interviewed by phone as part of a study on health care implementation in the context of a kidney care service in northern British Columbia, Canada. The interview data were analyzed using a hermeneutic approach, which emphasizes careful attention to reported experiences in relation to the relationships and contexts of care. …”
    Get full text
    Article
  18. 2558

    A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture by Rui Lu, Lei Shi, Yinlong Liu, Zhongkai Dang

    Published 2025-05-01
    “…This study designs a progressive solution by (1) building a crowdsourced data collection network, using mobile terminals equipped with GPS technology to automatically collect device signal features, replacing inefficient manual drive tests; (2) developing a progressive signal update algorithm that integrates real-time crowdsourced data and historical signals to optimize the signal fingerprint database in dynamic environments; (3) establishing an edge service architecture to offload signal matching and trajectory estimation tasks to MEC nodes, using lightweight computing engines to reduce the load on the core network. …”
    Get full text
    Article
  19. 2559

    Retracted: An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks by Pratima Upadhyay, Venkatadri Marriboina, Shiv Kumar, Sunil Kumar, Mohd Asif Shah

    Published 2022-01-01
    “…Also, the safety messages are modified or discarded by the attacker or any other node and it may lead to the loss of privacy, integrity, confidentiality, and authentication of the data.So to enhance the security of VANETs, it is very much essential to invent a secure communication protocol, to protect the infrastructure of the network and the confidentiality of the data. …”
    Get full text
    Article
  20. 2560

    Potential of Internet of Medical Things (IoMT) applications in building a smart healthcare system: A systematic review by Ruby Dwivedi, Divya Mehrotra, Shaleen Chandra

    Published 2022-03-01
    “…However mass adoption seems challenging due to factors like privacy and security of data, management of large amount of data, scalability and upgradation etc. …”
    Get full text
    Article