Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,201 - 2,220 results of 2,784 for search '"\"((((\\"useddds OR \"usedddddddds) OR \"useddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 2201

    Predicting Student Dropout Through Text and Media Content Analysis of VKontakte Profiles by Sergei S. Gorshkov, Dmitry I. Ignatov, Anastasia Yu. Chernysheva

    Published 2025-01-01
    “…While this approach depends on publicly available VK data and may be limited by privacy settings, it still provides useful insights. …”
    Get full text
    Article
  2. 2202

    5G-MobiCare: A Secure 5G Assisted Remote Mobile Health Monitoring Platform by Hemangi Goswami, Tarun Pandey, Hiten Choudhury

    Published 2025-01-01
    “…This setup generates vast amounts of real-time data, making secure device authentication essential to ensure data privacy and security. …”
    Get full text
    Article
  3. 2203

    Considerations of Cloud Computing Contracts at the Conclusion Stage by Mohammadali Hasanian, Esmaeil Shahsavandi, Amirabbas Bozorgmehr

    Published 2025-03-01
    “…On the other hand, studies show that data security and privacy are among the most important challenges of cloud computing contracts. …”
    Get full text
    Article
  4. 2204

    The role of artificial intelligence in enhancing personalized learning pathways and clinical training in dental education by Chengchen Hu, Fang Li, Shengguo Wang, Zhi Gao, Shan Pan, Maofeng Qing

    Published 2025-12-01
    “…The review also addresses the expanding integration of AI into educational settings, highlighting both the benefits and the ethical challenges, including issues related to data privacy, algorithmic bias, and the evolving role of human educators. …”
    Get full text
    Article
  5. 2205

    AI adoption in Chinese universities: Insights, challenges, and opportunities from academic leaders by Xibing Wang, Shuli Zhao, Xiaoshu Xu, Huanhuan Zhang, Vivian Ngan-Lin Lei

    Published 2025-08-01
    “…Additionally, resource allocation, funding constraints, and concerns over data privacy and security present significant barriers. …”
    Get full text
    Article
  6. 2206

    Impact of telemedicine on antenatal care at a teaching institution in Eastern India: An insight into the future of better India by Ipsita Mohapatra, Vikash K. Rai, Subha Ranjan Samantaray

    Published 2023-11-01
    “…Materials and Methods: Primary data were collected by means of a telephonic survey of all the antenatal patients who used telemedicine services of AIIMS, Kalyani, based on a preformed questionnaire. …”
    Get full text
    Article
  7. 2207

    Large language models to process, analyze, and synthesize biomedical texts: a scoping review by Simona Emilova Doneva, Sijing Qin, Beate Sick, Tilia Ellendorff, Jean-Philippe Goldman, Gerold Schneider, Benjamin Victor Ineichen

    Published 2024-12-01
    “…We conclude that, despite offering opportunities to manage the growing volume of biomedical data, LLMs also present challenges, particularly in clinical medicine and evidence synthesis, such as issues with transparency and privacy concerns.…”
    Get full text
    Article
  8. 2208

    Modeling the adoption of urban air mobility based on technology acceptance and risk perception theories: A case study on flying cars by Sangen Hu, Zikang Huang, Ke Wang, Haiyuan Lin, Mingyang Pei

    Published 2025-06-01
    “…Results revealed significant associations between the intention to use flying cars and various factors, including attitudes towards usage, perceived usefulness, and personal innovativeness. …”
    Get full text
    Article
  9. 2209

    Human Dignity in Genetics and Reproductive Health in the Digital Age by Archibong EI, Ukeagu LOC, Arinmi AO, Emeka EE, Igalawuye GO

    Published 2025-07-01
    “…The bringing together of genetics, reproductive health, and digital technologies threatens human dignity from the angle of data security breaches, possible exploitation, and erosion of trust through false information and its related constraints. …”
    Get full text
    Article
  10. 2210

    A novel half-complementary cipher for in-situ secure computing-in-memory by Ying Zhou, Wenbiao Zhang, Yinuo Shi, Xiaomi Chen, Jianting Liu, Xiang Feng, Tiejun Zhou, Bo Liu

    Published 2025-04-01
    “…The advent of the new AI era has led to an increase in the number of intelligent terminals in use and the generation of a vast amount of data, driving the development of novel AI accelerator techniques. …”
    Get full text
    Article
  11. 2211

    Integrating Large Language Models into Robotic Autonomy: A Review of Motion, Voice, and Training Pipelines by Yutong Liu, Qingquan Sun, Dhruvi Rajeshkumar Kapadia

    Published 2025-07-01
    “…We also highlight the use of physics-informed neural networks (PINNs) to model object deformation and support precision in contact-rich manipulation tasks. …”
    Get full text
    Article
  12. 2212

    Exploring the Limitations of Federated Learning: A Novel Wasserstein Metric-Based Poisoning Attack on Traffic Sign Classification by Suzan Almutairi, Ahmed Barnawi

    Published 2025-01-01
    “…For example, in a cross-silo setting using Krum, WMPA reduces the FL model’s accuracy from 70% to 30.1%. …”
    Get full text
    Article
  13. 2213

    Implementation of NGS and SNP microarrays in routine forensic practice: opportunities and barriers by Sharlize Pedroza Matute, Sasitaran Iyavoo

    Published 2025-05-01
    “…Conversely, SNP microarrays offer a cost-effective solution for extended kinship testing, Forensic Investigative Genetic Genealogy (FIGG), and phenotypic prediction, though they are less effective with low-quality samples and DNA mixtures. Ethical, legal, and privacy concerns, particularly surrounding the use of Forensic DNA Phenotyping (FDP) and consumer genetic data in FIGG, further complicate their integration into forensic workflows. …”
    Get full text
    Article
  14. 2214

    Decentralized electrochemical biosensors for biomedical applications: From lab to home by Pramod K. Kalambate, Vipin Kumar, Dhanjai

    Published 2025-01-01
    “…However, potential risks such as data security vulnerabilities, privacy concerns, and regulatory challenges must be addressed to ensure safe and ethical deployment of these technologies. …”
    Get full text
    Article
  15. 2215

    Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD by Mustafa Khairallah

    Published 2025-03-01
    “… Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a committing AEAD scheme into a succinctly committing AEAD scheme. …”
    Get full text
    Article
  16. 2216

    Close to the Comfort Zone: Stakeholders’ Perspectives on Implementing Leisure Activities in Dementia and Eldercare by Golnaz Atefi, Hannah L. Christie, Marjolein E. de Vugt, Michael P. Craven

    Published 2025-03-01
    “…Stakeholders highlighted the importance of tailored activities, ease of use, and privacy. Challenges included resource allocation and availability. …”
    Get full text
    Article
  17. 2217

    Analyzing the Efficacy of Artificial Intelligence in Facilitating Medico-Legal Investigations and Enhancing Forensic Processes for Emergency Trauma Patients: A Systematic Review by Rajiv Ratan Singh, Sachin Kumar Tripathi, Azad Kumar Bharti, Pradeep Kumar Yadav

    Published 2025-01-01
    “…However, medicolegal concerns must be addressed for responsible AI implementation, including patient privacy, data security, liability, and ethics. Conclusion: AI can revolutionize trauma and emergency care by improving diagnosis, decision-making, and patient outcomes. …”
    Get full text
    Article
  18. 2218

    Demographic disparities, service efficiency, safety, and user satisfaction in public bus transit system: A survey-based case study in the city of Charlotte, NC by Sanaz Sadat Hosseini, Babak Rahimi Ardabili, Mona Azarbayjani, Hamed Tabkhi

    Published 2025-01-01
    “…This research examines service limitations, safety concerns, and attitudes towards technological improvements in Charlotte’s transit system, using survey data from 160 participants collected in 2022 and 2023. …”
    Get full text
    Article
  19. 2219

    Comprehensive Review and Future Research Directions on ICT Standardisation by Mohammed Najah Mahdi, Ray Walshe, Sharon Farrell, Harshvardhan J. Pandit

    Published 2024-11-01
    “…Standardisation also solves problems, such as the use of mobile devices, which requires travel abroad when out of range. …”
    Get full text
    Article
  20. 2220

    Exploring Digital Stress of Finnish Adolescents and Their Parents by Dimitrios Siakas, Niilo Siakas, Kerstin Siakas, Georgios Lampropoulos

    Published 2024-11-01
    “…Results: “Privacy Intrusion”, “Availability stress/Online vigilance”, and “Usefulness” were the most essential stressor factors for both students and parents. …”
    Get full text
    Article