Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,061 - 1,080 results of 2,784 for search '"\"((((\\"usedddds OR \"useddddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 1061

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “…Abstract  The current condition of the Internet of Things tends to be without the use of security features, especially in the field of privacy and data confidentiality, especially in the low power sensor module i.e. …”
    Get full text
    Article
  2. 1062

    Federated Conditional Variational Auto Encoders for Cyber Threat Intelligence: Tackling Non-IID Data in SDN Environments by Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, Kashif Nisar, Mohammed Azmi Al-Betar

    Published 2025-01-01
    “…Federated Learning is a promising paradigm for sharing Cyber Threat Intelligence (CTI) without privacy issues by leveraging the cross-silos data in Software Defined Networking (SDN). …”
    Get full text
    Article
  3. 1063

    A Comparative Analysis of Data Protection in E-commerce B2C Contracts in Georgia and the European Union by Nato Gugava, Lika Kobaladze, Tamta Kenia, Oliko Kobakhidze

    Published 2024-12-01
    “…A lot of people communicate with the extensive use of the internet and technologies, including e-procurement, which, in these relationships require the correct processing of personal data, whereas improper protection of great deal of information increases risks of using data for criminal purposes and threatens personal privacy of consumers. …”
    Get full text
    Article
  4. 1064

    Nairobi motorcycle transit comparison dataset: Fuel vs. electric vehicle performance tracking (2023)Mendeley Data by Alois Mbutura, Martin Kitetu, Halloran Stratford, M.J. Booysen

    Published 2025-08-01
    “…To safeguard rider privacy, location data for the first and last trips of each day are excluded. …”
    Get full text
    Article
  5. 1065

    Fed-DPSDG-WGAN: Differentially Private Synthetic Data Generation for Loan Default Prediction via Federated Wasserstein GAN by Padmaja Ramachandra, Santhi Vaithiyanathan

    Published 2025-01-01
    “…We investigate the potential of replacing the original data with statistically similar synthetic data to be used as training data to predict loan defaulters. …”
    Get full text
    Article
  6. 1066

    Enhancing Approach for Information Security in Hadoop by Raghad Z. Yousif, Shahab W. Kareem, Shadan M. Abdalwahid

    Published 2020-06-01
    “…This event motivates the need of a policy which will control these challenges. Hadoop may be a used policy recommended to beat this big data problem which usually utilizes MapReduce design to arrange huge amounts of information of the cloud system. …”
    Get full text
    Article
  7. 1067

    The Association of Psychological Factors With Willingness to Share Health-Related Data From Technological Devices: Cross-Sectional Questionnaire Study by Marijn Eversdijk, Emma Rixt Douma, Mirela Habibovic, Willem Johan Kop

    Published 2025-01-01
    “…However, the use of health technology data might be hampered by the reluctance of patients to share personal health technology data because of the privacy sensitivity of this information. …”
    Get full text
    Article
  8. 1068
  9. 1069

    Santé et Big Data : l’Etat et les individus, impuissants face aux pouvoirs des réseaux by Joël Colloc

    Published 2017-03-01
    “…The use of Internet and of the social networks, lead the users to share data concerning their private life and their health. …”
    Get full text
    Article
  10. 1070

    FedWeight: mitigating covariate shift of federated learning on electronic health records data through patients re-weighting by He Zhu, Jun Bai, Na Li, Xiaoxiao Li, Dianbo Liu, David L. Buckeridge, Yue Li

    Published 2025-05-01
    “…Abstract Federated learning (FL) enables collaborative analysis of decentralized medical data while preserving patient privacy. However, the covariate shift from demographic and clinical differences can reduce model generalizability. …”
    Get full text
    Article
  11. 1071
  12. 1072

    Navigating the future of higher education in Saudi Arabia: implementing AI, machine learning, and big data for sustainable university development by Muhammad Adnan Khan, Abdur Rehman, Asghar Ali Shah, Sagheer Abbas, Meshal Alharbi, Munir Ahmad, Taher M. Ghazal

    Published 2025-06-01
    “…This paper looks at ways to successfully use artificial intelligence (AI) and big data analytics in Saudi higher education while supporting long-term growth. …”
    Get full text
    Article
  13. 1073

    Machine Learning-Powered Smart Healthcare Systems in the Era of Big Data: Applications, Diagnostic Insights, Challenges, and Ethical Implications by Sita Rani, Raman Kumar, B. S. Panda, Rajender Kumar, Nafaa Farhan Muften, Mayada Ahmed Abass, Jasmina Lozanović

    Published 2025-07-01
    “…It explores the principal challenges of data heterogeneity, privacy, computational complexity, and advanced methods such as federated learning (FL) and edge computing. …”
    Get full text
    Article
  14. 1074
  15. 1075

    Separable Reversible Data Hiding in Encrypted 3D Mesh Models Based on Spatial Clustering and Multi-MSB Prediction by Y. Mao, Y. Xu

    Published 2025-07-01
    “…Reversible data hiding in the encrypted domain (RDH-ED) involves performing data encryption to protect privacy and hiding data for covert communication or access control. …”
    Get full text
    Article
  16. 1076

    Securing IoMT data with Algorand blockchain, XChaCha20-Poly1305 encryption, and decentralized storage alternatives by Divya K, Uma Priyadarsini P.S

    Published 2025-07-01
    “…To properly encrypt sensitive IoMT data before storing the data in DSNs including IPFS, Storj, and Filecoin, a modern stream cipher called ‘XChaCha20-Poly1305’ is used. …”
    Get full text
    Article
  17. 1077

    Model Complexity Reduction for ZKML Healthcare applications by Sathya Krishnasamy, Ilangovan Govindarajan

    Published 2024-08-01
    “…As an extension, this paper discusses how one such enabler, ZKML, combines two streams of technology that are merging in unique ways to address problems in privacy and the cost of inference. The authors have conceptualized the technical and operational feasibility and implemented a reference healthcare implementation using the synthetic ICHOM in the evaluation phase in a global healthcare setting for high-volume data collection, including patient-reported outcomes. …”
    Get full text
    Article
  18. 1078

    Research on real-world knowledge mining and knowledge graph completion (I): overview of re-al-world data and knowledge map by Xu-Hui LI, Si-Yu YAN, Mu-Kun CHEN, Hai-Feng ZHU, Jie-Jun TAN, Kuang GAO, Yong-Bo WANG, Qiao HUANG, Xiang-Ying REN, Ying-Hui JIN, Xing-Huan WANG

    Published 2023-04-01
    “…At present, using real-world data to build a medical knowledge map or using real-world data to complete the medical knowledge map are the main ways of combining the two applications. …”
    Get full text
    Article
  19. 1079

    Multi-Task Faces (MTF) Data Set: A Legally and Ethically Compliant Collection of Face Images for Various Classification Tasks by Rami Haffar, David Sanchez, Josep Domingo-Ferrer

    Published 2025-01-01
    “…As a result, several previously published face data sets have been removed from the internet due to inadequate data collection methods and privacy concerns. …”
    Get full text
    Article
  20. 1080

    Impacts of Online Banking on Customer Satisfaction in Commercial Banks in the 2nd District of Albay by Laurence Bernadette Abapo

    Published 2025-03-01
    “…It also aimed to formulate recommendations and an action plan for online banking services to enhance customer satisfaction. The study used a quantitative research design to analyze and hence boost data validity. …”
    Get full text
    Article