Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,881 - 1,900 results of 2,784 for search '"\"((((\\"useddds OR \"usedddddds) OR \"useddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 1881

    Algorithms, allyship, and advice: A qualitative analysis of fertility tracker marketing by Kate Sheridan Clay, Sue Ziebland, John Powell

    Published 2025-08-01
    “…Its critics argue industry uses the moniker to popularise platforms that surveil reproductive data for profit. …”
    Get full text
    Article
  2. 1882

    The streetlights are watching you: A historical perspective on value change and public lighting by Taylor Stone

    Published 2022-02-01
    “…Smart city trends are spurring a new generation of streetlights, with lampposts being fitted with sensors, cameras and a host of other technologies aimed at monitoring and data collection. This has raised concerns about privacy, surveillance and power relations, arguably creating a changing value landscape for streetlights. …”
    Get full text
    Article
  3. 1883

    Artificial Intelligence in Geography Teaching: Potentialities, Applications, And Challenges by Cennet Şanlı

    Published 2025-06-01
    “…Therefore, the study recommends developing in-service teacher training programs, implementing AI-supported instructional scenarios, creating culturally responsive and localized content, and promoting ethical data use awareness. It also emphasizes the need for experimental research using quantitative and qualitative methods to evaluate AI's pedagogical value in enhancing students' mapping skills, spatial thinking, and conceptual understanding. …”
    Get full text
    Article
  4. 1884

    Federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain by Ming YANG, Xuexian HU, Qihui ZHANG, Jianghong WEI, Wenfen LIU

    Published 2021-12-01
    “…Federated learning is a new distributed machine learning technology, where training tasks are deployed on user side and training model parameters are sent to the server side.In the whole process, participants do not need to share their own data directly, which greatly avoids privacy issues.However, the trust relationship between mobile users in the learning model has not been established in advance, there is hidden safety when users perform cooperative train with each other.In view of the above problems, a federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain was proposed.The scheme allowed the server side to use subjective logic models to evaluate the reputation of participating mobile users and provided them with credible reputation opinions sharing environment and dynamic access strategy interface based on the technique of smart contract of blockchain.Theoretical and experimental analys is results show that the scheme can enable the server side to select reliable users for training.And it can achieve more fair and effective reputation calculations, which improves the accuracy of federated learning.…”
    Get full text
    Article
  5. 1885

    Wearable Devices for Training and Patient Monitoring: A Comprehensive Review by Magdalena Kajzar

    Published 2024-10-01
    “…However, challenges such as data accuracy, privacy concerns, and integration with healthcare systems must be addressed and present opportunities for future advancements. …”
    Get full text
    Article
  6. 1886

    From Capturing a Moment to New Insights: A Methodological Reflection on Reflexive Photo-Elicitation Interviews to Understand Visitor Experiences in Cultural Institutions by Tesfaye Fentaw Nigatu, Alexander Trupp, Pek Yen Teh, Elangkovan Narayanan Alagas

    Published 2025-07-01
    “…Innovative qualitative methods like photo-elicitation interviews are gaining traction for their ability to produce data through negotiation and reflexivity. Reflective Photo-Elicitation Interviews (RPIs) are commonly used in nature and community-based tourism research, but their application in cultural institutions remains limited. …”
    Get full text
    Article
  7. 1887

    How AI-powered consultation services in internet hospitals influence patient satisfaction: A structural analysis by Junkai Wang, Linru Fu, Zeguang Huang, Kan Hu, Zhizhuo Lin, Qiuhong Tang

    Published 2025-07-01
    “…A dual-path analytical framework was developed: the technical path uses the E-S-QUAL model to assess the quality of intelligent consultation guidance services in terms of efficiency, system availability, privacy, and fulfillment; the experiential path is based on the Patient Experience-Driven Model, which integrates service encounter theory (focusing on patient-system interactions) and the Stimulus–Organism–Response theory (explaining how external stimuli trigger psychological and behavioral responses). …”
    Get full text
    Article
  8. 1888

    Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection by Ma Viet Duc, Pham Minh Dang, Tran Thu Phuong, Truong Duc Truong, Vu Hai, Nguyen Huu Thanh

    Published 2025-07-01
    “…Detecting such evolving threats is especially challenging in decentralized environments where raw traffic data cannot be aggregated due to privacy or policy constraints. …”
    Get full text
    Article
  9. 1889

    Blockchain Enabled Federated Learning for Detection of Malicious Internet of Things Nodes by Rachid Alami, Anjanava Biswas, Varun Shinde, Ahmad Almogren, Ateeq Ur Rehman, Tahseen Shaikh

    Published 2024-01-01
    “…This will not only enhance the accuracy of the unified federated learning model but also preserve the privacy of each cluster because no actual data is sent to fog layer for central model training. …”
    Get full text
    Article
  10. 1890

    TriagE-NLU: A Natural Language Understanding System for Clinical Triage and Intervention in Multilingual Emergency Dialogues by Béatrix-May Balaban, Ioan Sacală, Alina-Claudia Petrescu-Niţă

    Published 2025-07-01
    “…The system is built on a federated learning architecture to ensure data privacy and adaptability across regions and is trained using TriageX, a synthetic, clinically grounded dataset covering five languages (English, Spanish, Romanian, Arabic, and Mandarin). …”
    Get full text
    Article
  11. 1891

    "If my husband was in the labor ward with me, my baby wouldn't have died"; experiences on birth companionship from a tertiary health facility, Tanzania. by Michael Obed Mwakyusa, Ali Said, Shekha Selemani, Musa Kakiziba, Judica Christopher, Nathanael Shauri Sirili, Fadhlun M Alwy Al-Beity

    Published 2025-01-01
    “…Braun and Clarke's six-step thematic analysis approach was used to analyze the data.<h4>Results</h4>Three major themes emerged: "Bonding and Learning with Spouse/Partner," "Assurance of Maternal Safety," and "Fear of Blame and Breach of Confidentiality." …”
    Get full text
    Article
  12. 1892

    An Industry Application of Secure Augmentation and Gen-AI for Transforming Engineering Design and Manufacturing by Dulana Rupanetti, Corissa Uberecken, Adam King, Hassan Salamy, Cheol-Hong Min, Samantha Schmidgall

    Published 2025-07-01
    “…Built on an LLM framework enhanced by RAG, the system performs similarity-based retrieval and part recommendations while preserving data privacy through selective obfuscation using the ROT13 algorithm. …”
    Get full text
    Article
  13. 1893

    FL-TENB4: A Federated-Learning-Enhanced Tiny EfficientNetB4-Lite Approach for Deepfake Detection in CCTV Environments by Jimin Ha, Abir El Azzaoui, Jong Hyuk Park

    Published 2025-01-01
    “…The TinyML-based local model ensures real-time deepfake detection with minimal latency, while FL enables privacy-preserving training by aggregating model updates without transferring sensitive video data to centralized servers. …”
    Get full text
    Article
  14. 1894

    Mapping the digital silk road: evolution and strategic shifts in Chinese social media marketing (2015–2025) by Xinrui Liang, Wan Mohd Hirwani Wan Hussain, Mohammed R. M. Salem

    Published 2025-12-01
    “…However, hyper-personalized marketing creates a performance–trust trade-off, raising privacy concerns. Integrating the Technology Acceptance Model, Uses and Gratifications Theory, and Resource-Based View, the review underscores transparent AI integration, cross-platform coordination, and community co-creation as critical for sustained advantage, alongside privacy-centric, explainable, and ethically governed marketing practices.…”
    Get full text
    Article
  15. 1895

    Assessment of The Potential Interference and Conflict of Artificial Intelligence With Human Rights and Citizenship: Challenges and Solutions by Hossein Khazaei, Mojtaba Hemmati

    Published 2025-03-01
    “…Therefore, it is necessary to devise solutions to address these challenges, which may include diversifying data, ensuring operational transparency, establishing legal and ethical frameworks, government commitments to balance the use of artificial intelligence with the fulfillment and enforcement of the right to work, data protection, respect for privacy, reducing discrimination, collaborating with stakeholders, establishing international legal standards, and fostering international cooperation for the safe development of artificial intelligence. …”
    Get full text
    Article
  16. 1896
  17. 1897

    Generative AI in AI-Based Digital Twins for Fault Diagnosis for Predictive Maintenance in Industry 4.0/5.0 by Emilia Mikołajewska, Dariusz Mikołajewski, Tadeusz Mikołajczyk, Tomasz Paczkowski

    Published 2025-03-01
    “…They create synthetic datasets that improve training quality while addressing data scarcity and data imbalance. The aim of this paper was to present the current state of the art and perspectives for using AI-based generative DTs for fault diagnosis for predictive maintenance in Industry 4.0/5.0. …”
    Get full text
    Article
  18. 1898

    The daunting challenge of Artificial Intelligence in Education: a systematic literature review by Rubén Arriazu

    Published 2025-03-01
    “…Finally, there are also ethical and social challenges that address concerns about the privacy of student data, equity in access to advanced technologies, and the potential of AI to perpetuate existing biases. …”
    Get full text
    Article
  19. 1899

    Exploring the influence of cognitive factors among Chinese parents on the sustainability of children’s digital education by Tingyu Zhang, Qianling Jiang, Wenjing Zhang

    Published 2025-03-01
    “…Findings Perceived playability, usefulness, social influence, and satisfaction significantly predict continuance intention. …”
    Get full text
    Article
  20. 1900

    CLOUD COMPUTING SECURITY by Ştefan IOVAN, Alina Anabela IOVAN

    Published 2016-05-01
    “…Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. …”
    Get full text
    Article