Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,081 - 2,100 results of 2,784 for search '"\"((((\\"useddds OR \"usedddddds) OR \"useddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.18s Refine Results
  1. 2081

    Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem by Saša Malešević, Michael Lustenberger, Florian Spychiger

    Published 2020-12-01
    “…Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. …”
    Get full text
    Article
  2. 2082

    An intelligent conversational agent for querying satellite manoeuvre detections: a case study by Wathsala Karunarathne, David P Shorten, Matthew Roughan

    Published 2025-06-01
    “…Moreover, our system can handle sensitive and confidential data without breaching privacy. This paper presents the results of deploying SatChat in conjunction with a particle filter based manoeuvre detection system.…”
    Get full text
    Article
  3. 2083

    IoT-driven smart grid monitoring with enhanced energy routing and advanced encryption techniques by K. Perachi, S. Balaji

    Published 2025-11-01
    “…The proposed work incorporates Improved Paillier Homomorphic (IPH) based encryption scheme, which assures integrity and confidentiality of data transmitted. The outcomes of proposed smart grid system using MATLAB and FPGA controller demonstrate significant improvements by providing enhanced security and optimal routing. …”
    Get full text
    Article
  4. 2084

    Revolutionizing Midwifery Education : A Scoping Review of Artificial Intelligence Methods by Harridhil Silmi, Ari Indra Susanti

    Published 2025-04-01
    “…Despite these advancements, challenges such as ethical concerns (algorithmic bias, privacy issues), poor data quality, limited AI expertise among educators, and resistance to change in traditional learning environments were noted. …”
    Get full text
    Article
  5. 2085

    The Transformative Impact of Artificial Intelligence in Healthcare: Innovations, applications, and future prospects by Shen Ruoyu

    Published 2024-01-01
    “…At the same time, the application of AI in healthcare poses a number of challenges, such as data privacy, algorithmic bias, and ethics. This study also explores the role of AI in global health, the need for policies and regulations, and the long-term impact of AI on future healthcare systems. …”
    Get full text
    Article
  6. 2086

    Views on the incorporation of Geolocation Devices in Field Trips by Marta Magallón, Cristina Mercader

    Published 2022-01-01
    “…Geolocation in field trips has great potential, but it is an understudied field that needs more research and discussion to ensure data privacy.…”
    Get full text
    Article
  7. 2087

    Global Education Development Plan to Build Sustainable Education Based on Artificial Intelligence by Siti Marisa, Gunawan Gunawan, Evi Susilawati

    Published 2024-04-01
    “…Ethical aspects, student data privacy, and fairness in access and use of AI technology should be key concerns in designing sustainable global education development. …”
    Get full text
    Article
  8. 2088

    Collection and sharing of health information in mental health and related systems in Australia: perspectives of people who access mental health services by Anne Honey, Nicola Hancock, Helen Glover, Justin Newton Scanlan, Yidan Cao, Andrew Povolny, Mark Orr, Grenville Rose, Sumathi Govindasamy, Lorraine Smith, Naseem Ahmadapour

    Published 2024-12-01
    “…Focused group activities were conducted in which participants were asked to discuss and create a visual map to describe their collective experiences of sharing information relating to mental health and recovery. The data were analysed using qualitative content analysis and the coding techniques of constant comparative analysis. …”
    Get full text
    Article
  9. 2089

    Exploring the application of ChatGPT in ESL/EFL education and related research issues: a systematic review of empirical studies by Chung Kwan Lo, Philip Leung Ho Yu, Simin Xu, Davy Tsz Kit Ng, Morris Siu-yung Jong

    Published 2024-11-01
    “…The included studies collectively provide solid evidence regarding the affordances (e.g., increased learning opportunities, personalised learning, and teacher support) and potential drawbacks (e.g., incorrect information, privacy leakage, and academic dishonesty) of ChatGPT use in ESL/EFL education. …”
    Get full text
    Article
  10. 2090

    Federated learning for crop yield prediction: A comprehensive review of techniques and applications by Vani Hiremani, Raghavendra M. Devadas, Preethi, R. Sapna, T. Sowmya, Praveen Gujjar, N. Shobha Rani, K.R. Bhavya

    Published 2025-06-01
    “…Federated Learning (FL) as a decentralized approach to machine learning facilitates collaborative model training on different data sources while maintaining privacy—making it highly applicable technology for sensitive agricultural data. …”
    Get full text
    Article
  11. 2091

    Feasibility of a computerized clinical decision support system delivered via a socially assistive robot during grand rounds: A pilot study by Valentino Šafran, Urška Smrke, Bojan Ilijevec, Samo Horvat, Vojko Flis, Nejc Plohl, Izidor Mlakar

    Published 2025-04-01
    “…Background Adopting Clinical Decision Support Systems in healthcare faces challenges such as complexity, poor integration with workflows, and concerns about data privacy and quality. Issues such as too many alerts, confusing errors, and difficulty using the technology in front of patients make adoption challenging and prevent it from fitting into daily workflows. …”
    Get full text
    Article
  12. 2092

    Blockchain enhanced smart healthcare management for chronic diseases by Shruti Saxena, Shivani Saxena, Nikunj Tahilramani, Panem Charanarur

    Published 2025-06-01
    “…Abstract Chronic diseases affect millions of people worldwide, making it a significant issue for the efficient and secure management of patient data. Most traditional chronic disease management systems fail to manage data in real time and struggle with interoperability and security issues. …”
    Get full text
    Article
  13. 2093

    Hybrid-CID: Securing IoT with Mongoose Optimization by S. Merlin Sheeba, R. S. Shaji

    Published 2025-03-01
    “…After preprocessing, the Hybrid-CID framework develops a hybrid optimization algorithm to identify the intrusions from the traffic data which ensures data privacy by maintaining the reliability and integrity of IoT deployments. …”
    Get full text
    Article
  14. 2094

    A Comprehensive Survey of Electric Vehicle Charging Demand Forecasting Techniques by Mamunur Rashid, Tarek Elfouly, Nan Chen

    Published 2024-01-01
    “…Meanwhile, emerging machine learning techniques bring promising prospects, yet exhibit suboptimal performance with insufficient data. Additionally, existing studies often overlook several critical areas such as overcoming data scarcity, security and privacy concerns, managing the inherent stochasticity of demand data, selecting forecasting methods for a specific feature, and developing standardized performance metrics. …”
    Get full text
    Article
  15. 2095

    Criminal Law Challenged by Crossing into Virtual Reality by Mahdi Karimi

    Published 2025-03-01
    “…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
    Get full text
    Article
  16. 2096

    Analisis Pengaruh Kualitas Layanan Terhadap Kepuasan Pelanggan dan Loyalitas Pengguna Aplikasi Jenius Menggunakan Model E-S- Qual dan E- Recs- QUal (Studi Kasus: Pengguna Aplikasi... by Alfansya Achmad Mulyadi, Satrio Hadi Wijoyo, Hanifah Muslimah Az-Zahra

    Published 2022-12-01
    “…This study involved 100 samples of Jenius application users in Malang City. This research uses purposive sampling as a sampling technique and multiple and simple linear regression analysis as a technique in data analysis. …”
    Get full text
    Article
  17. 2097

    A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things by Sasikumar Asaithambi, Senthilkumar Nallusamy, Jing Yang, Sunil Prajapat, Gyanendra Kumar, Pramod Singh Rathore

    Published 2025-05-01
    “…This article presents a blockchain-assisted safe data-sharing mechanism that provides security requirements in the industry using IoT. …”
    Get full text
    Article
  18. 2098

    A CAE model-based secure deduplication method by Chunbo Wang, Guoying Zhang, Hui Qi, Bin Chen

    Published 2025-07-01
    “…Abstract Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. …”
    Get full text
    Article
  19. 2099

    A Bibliometric Analysis of Publications on Surveillance and New Media Concepts in The Web of Science Database by Anıl Durmuşahmet

    Published 2025-06-01
    “…To this end, a bibliometric analysis based on quantitative data is conducted using the Web of Science (WoS) database as of June 23, 2024. …”
    Get full text
    Article
  20. 2100

    Mental Health Apps Available in App Stores for Indian Users: Protocol for a Systematic Review by Seema Mehrotra, Ravikesh Tripathi, Pramita Sengupta, Abhishek Karishiddimath, Angelina Francis, Pratiksha Sharma, Paulomi Sudhir, Srikanth TK, Girish N Rao, Rajesh Sagar

    Published 2025-04-01
    “…Additionally, the apps will be reviewed for quality using the Mobile Application Rating Scale. The data analysis and synthesis strategy will incorporate descriptive statistics based on quality evaluation using the Mobile Application Rating Scale and examining the content of the apps for generating descriptive information. …”
    Get full text
    Article