Showing 1,101 - 1,120 results of 2,784 for search '"\"((((\"uses OR \\"useddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.24s Refine Results
  1. 1101

    Mental Health Classification Using Machine Learning with PCA and Logistics Regression Approaches for Decision Making by Hendra Hendra, Mustafa Mat Deris, Ika Safitri Windiarti

    Published 2025-02-01
    “…Mental health statistics come with numerous challenges, beginning with data integrity. Ensuring data accuracy and reliability is essential, especially if these datasets are to be used for advanced analysis or research. …”
    Get full text
    Article
  2. 1102
  3. 1103
  4. 1104

    Standardized patient profile review using large language models for case adjudication in observational research by Martijn J. Schuemie, Anna Ostropolets, Aleh Zhuk, Uladzislau Korsik, Seung In Seo, Marc A. Suchard, George Hripcsak, Patrick B. Ryan

    Published 2025-01-01
    “…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
    Get full text
    Article
  5. 1105

    Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study by Muhammad Shah, Shimee Shahzadi, Shehzad Akbar Khan

    Published 2025-01-01
    “…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
    Get full text
    Article
  6. 1106

    Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing by Prashanth Choppara, S. Sudheer Mangalampalli

    Published 2025-01-01
    “…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
    Get full text
    Article
  7. 1107

    Client aware adaptive federated learning using UCB-based reinforcement for people re-identification by Dinah Waref, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El Ghany, Mohammed A.-M. Salem

    Published 2025-05-01
    “…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
    Get full text
    Article
  8. 1108

    A DLP Module Design Based on Plug-in for MS Word by Hussein Al-sanabani, Murat İskefiyeli

    Published 2020-08-01
    “…This model uses security measures such as data encryption and access control to prevent accidental leakage of the classified files by the insiders. …”
    Get full text
    Article
  9. 1109

    Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method by Didik Sudyana, Nora Lizarti

    Published 2019-05-01
    “…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
    Get full text
    Article
  10. 1110

    A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation by Denis Moser, Matthias Bender, Murat Sariyar

    Published 2025-12-01
    “…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
    Get full text
    Article
  11. 1111

    Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain by Semra Tebrizcik, Süleyman Ersöz, Elvan Duman, Adnan Aktepe, Ahmet Kürşad Türker

    Published 2025-07-01
    “…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
    Get full text
    Article
  12. 1112
  13. 1113

    GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor by Hong Nhung Nguyen, Yong-Hwa Kim

    Published 2025-01-01
    “…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
    Get full text
    Article
  14. 1114

    Nuclei segmentation and classification from histopathology images using federated learning for end-edge platform. by Anjir Ahmed Chowdhury, S M Hasan Mahmud, Md Palash Uddin, Seifedine Kadry, Jung-Yeon Kim, Yunyoung Nam

    Published 2025-01-01
    “…To protect data privacy, the framework employs a FedAvg-based federated learning scheme, enabling decentralized training without exposing sensitive data. …”
    Get full text
    Article
  15. 1115
  16. 1116

    A framework for systematically applying humanistic ethics when using AI as a design material by Kyle Dent, Richelle Dumond, Mike Kuniavsky

    Published 2019-07-01
    “…Because AI-supported and autonomous decision making has the potential for widespread negative personal, social, and environmental effects, we aim to take a proactive stance to uphold human rights, respect individuals’ privacy, protect personal data, and enable freedom of expression and equality. …”
    Get full text
    Article
  17. 1117

    Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm by Zainab Abdullah Jasim, Ameer Kadhim Hadi

    Published 2025-01-01
    “…Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. …”
    Get full text
    Article
  18. 1118

    Analysis of MAXIM Application Service Quality on User Satisfaction using the E-Service Quality Method by Putri Wulandari, Nur Rachman Dzakiyullah, Asti Ratnasari, Dadang Heksaputra

    Published 2024-11-01
    “…Efficiency, fulfillment, system availability, privacy, responsiveness, compensation, and interaction are the seven factors used, while user satisfaction is the dependent variable. …”
    Get full text
    Article
  19. 1119

    Global Health care Professionals’ Perceptions of Large Language Model Use In Practice: Cross-Sectional Survey Study by Ecem Ozkan, Aysun Tekin, Mahmut Can Ozkan, Daniel Cabrera, Alexander Niven, Yue Dong

    Published 2025-05-01
    “…The majority of our participants found ChatGPT to be useful; however, there are concerns about patient privacy, data security, and its legal and ethical issues as well as the accuracy of its information. …”
    Get full text
    Article
  20. 1120