Showing 2,061 - 2,080 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddddds) OR \"uses) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.18s Refine Results
  1. 2061

    Generative adversarial networks (GANS) for generating face images by Dolly Indra, Muh Wahyu Hidayat, Fitriyani Umar

    Published 2025-07-01
    “…However, the use of public facial datasets such as CelebA and FFHQ faces limitations in representing global demographic diversity and raises privacy concerns. …”
    Get full text
    Article
  2. 2062

    Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption by Min Hou, Yue Wu

    Published 2025-01-01
    “…The participants’ private data are encoded as single photons, which are encrypted using a rotational encryption method. …”
    Get full text
    Article
  3. 2063

    Self-Regulation of Internet Behaviors on Social Media Platforms by Clara B. Rebello, Kiana L. C. Reddock, Sonia Ghir, Angelie Ignacio, Gerald C. Cupchik

    Published 2024-10-01
    “…The current research sought a comprehensive understanding about the consequences of information-sharing behavior on social media, given public concerns about privacy violations. We used a mixed-methods approach to investigate the influence of the self on “revealing” and emotional “healing” experiences online. …”
    Get full text
    Article
  4. 2064

    Potential benefits and challenges of artificial intelligence in human resource management in public institutions by Kelvin M. Mwita, Felician Andrew Kitole

    Published 2025-05-01
    “…The findings on the perceived benefits of AI in HRM show that increased efficiency, better decision-making, and cost reduction are the top advantages, while ease of use ranks the lowest. However, challenges such as lack of expertise, data privacy concerns, high costs, and resistance to change remain significant barriers. …”
    Get full text
    Article
  5. 2065

    Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things by P. S. Klimushyn

    Published 2025-06-01
    “…It is noted that the analysis of the security of IoT communication technologies using specialised communication protocols across networks with different topologies, communication ranges and bandwidths is a pressing issue, as the number of security and privacy breaches in the IoT ecosystem is growing, which is constantly expanding in various sectors of the economy and human life with the introduction of billions of heterogeneous smart devices. …”
    Get full text
    Article
  6. 2066

    Mobile robot navigation path algorithm in 3d industrial internet of thing (iot) environment based on 5g mobile communication by Pei Ping, Yu. N. Petrenko

    Published 2019-07-01
    “…Each of industrial IoT as service domains has its own communication requirements that are measured differently in both such as reliability, Quality of service (QoS), and privacy. According to the development of industrial automation, the industrial Internet of things (IoT) is widely used in smart factories to capture the data and manage the production. …”
    Get full text
    Article
  7. 2067

    AI in Structural Health Monitoring for Infrastructure Maintenance and Safety by Vagelis Plevris, George Papazafeiropoulos

    Published 2024-12-01
    “…We examine seven core areas where AI significantly advances SHM capabilities: (1) data acquisition and sensor networks, highlighting improvements in sensor technology and data collection; (2) data processing and signal analysis, where AI techniques enhance feature extraction and noise reduction; (3) anomaly detection and damage identification using machine learning (ML) and deep learning (DL) for precise diagnostics; (4) predictive maintenance, using AI to optimize maintenance scheduling and prevent failures; (5) reliability and risk assessment, integrating diverse datasets for real-time risk analysis; (6) visual inspection and remote monitoring, showcasing the role of AI-powered drones and imaging systems; and (7) resilient and adaptive infrastructure, where AI enables systems to respond dynamically to changing conditions. …”
    Get full text
    Article
  8. 2068

    Perceptions, Attitudes, and Concerns on Artificial Intelligence Applications in Patients with Cancer by Enes Erul MD, Yusuf Aktekin MD, Furkan Berk Danışman BSc, Şükrü Armanç Gümüştaş, Büşra Saraç Aktekin MD, Emre Yekedüz MD, Yüksel Ürün MD

    Published 2025-05-01
    “…The survey included three distinct sections: (1) Perceptions: Patients’ general views on AI’s impact in oncology; (2) Attitudes: Comfort level with AI performing medical tasks; (3) Concerns: Specific fears related to AI implementation (eg, diagnostic errors, data privacy, healthcare costs). Survey responses were summarized descriptively, and differences by age, gender, and education were analyzed using chi-square tests. …”
    Get full text
    Article
  9. 2069

    Potential and Legal Challenges of the Metaverse for Environmental Awareness and Sustainability in Nigeria: A Comparative Analysis with Singapore by Paul Atagamen Aidonojie, Toyin Afolabi Majekodunmi, Eregbuonye Obieshi, Omolola Janet Adeyemi-Balogun

    Published 2024-04-01
    “…A total of 304 questionnaires were distributed to Nigerian respondents, and data were analyzed using descriptive and analytical methods. …”
    Get full text
    Article
  10. 2070

    AI Chatbots in Education: Challenges and Opportunities by Narius Farhad Davar, M. Ali Akber Dewan, Xiaokun Zhang

    Published 2025-03-01
    “…Educators can leverage such chatbots to create course content, generate assessments, evaluate student performance, and utilize them for data analysis and research. However, this technology presents significant challenges concerning data security and privacy. …”
    Get full text
    Article
  11. 2071

    Access to information in the context of virtual space in the legal system of Iran and United States by Hedieh sadat Mirtorabi, Mojtaba Ansarian

    Published 2025-03-01
    “…In Iran, restrictions on access to information may reduce the spread of ideas and thoughts, ban potentially useful information, and cause problems in cultural development. …”
    Get full text
    Article
  12. 2072

    Opportunities, challenges and development areas of chartered accountants in the Fourth Industrial Revolution by Chené Brands, Claude-Hélène Mayer, Rudolf M. Oosthuizen

    Published 2024-12-01
    “…Research approach/design and method: The research followed a qualitative approach to data collection and obtained the data through 14 semi-structured interviews. …”
    Get full text
    Article
  13. 2073

    Digital Newsroom Transformation: A Systematic Review of the Impact of Artificial Intelligence on Journalistic Practices, News Narratives, and Ethical Challenges by Alem Febri Sonni, Hasdiyanto Hafied, Irwanto Irwanto, Rido Latuheru

    Published 2024-10-01
    “…The key findings show a significant increase in the use of AI for news writing automation (73% of news organizations), data analysis (68%), and content personalization (62%). …”
    Get full text
    Article
  14. 2074

    A Comparative Analysis of Blockchain-Smart Contracts-ERP Integration Strategies for Supply Network (SN) Collaboration by Goknur Arzu Akyuz, Omer Ileri

    Published 2025-01-01
    “…After identifying main configuration dimensions of privacy setting (public/private/consortium), smart contract utilization for business logic implementation (full/none) and degree of transactional data decentralization (full/only critical data/none), 18 deployment scenarios are developed for advanced SN collaboration. …”
    Get full text
    Article
  15. 2075

    Generative AI for Industry 5.0: Analyzing the Impact of ChatGPT, DALLE, and Other Models by Siva Sai, Revant Sai, Vinay Chamola

    Published 2025-01-01
    “…The paper scrutinizes the multifaceted use-cases of GAI, emphasizing its instrumental function in amplifying operational efficiency, minimizing downtime, and fostering economic savings through predictive maintenance and acute real-time data analytics. …”
    Get full text
    Article
  16. 2076

    Treatment-emergent Affective Switch: A Case Series Study by Jesvin L Johnson, M Shashwath Sathyanth, Anil Kakunje

    Published 2024-07-01
    “…Managing antidepressant use in bipolar disorder is crucial due to the risk of the treatment-emergent affective switch (TEAS), where antidepressants can induce shifts from depression to mania or hypomania, a complex phenomenon influenced by genetics, neurobiology, and environment. …”
    Get full text
    Article
  17. 2077

    Cross-device federated unsupervised learning for the detection of anomalies in single-lead electrocardiogram signals. by Maximilian Kapsecker, Stephan M Jonas

    Published 2025-04-01
    “…<h4>Background</h4>Federated unsupervised learning offers a promising approach to leveraging decentralized data stored on consumer devices, addressing concerns about privacy and lack of annotation. …”
    Get full text
    Article
  18. 2078

    SCRHM: A Secure Continuous Remote Health Monitoring System by Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen

    Published 2015-12-01
    “…With this scheme, remote health monitoring service provider is able to detect outliers over encrypted health parameters. Using analysis, we prove the correctness and security of the proposed scheme on privacy protection of users’ health data. …”
    Get full text
    Article
  19. 2079

    FLavourite: Horizontal and Vertical Federated Learning Setting Comparison by Walter Riviera, Ilaria Boscolo Galazzo, Gloria Menegaz

    Published 2025-01-01
    “…We assess the classification of Alzheimer&#x2019;s disease using non-independent and identically distributed (non-i.i.d.) 3D images and tabular data. …”
    Get full text
    Article
  20. 2080

    AML-Based Multi-Dimensional Co-Evolution Approach Supported by Blockchain: Architecture Design and Case Study on Intelligent Production Lines for Industry 4.0 by Kai Ding, Detlef Gerhard, Liuqun Fan

    Published 2025-03-01
    “…As a transparent decentralized network, blockchain’s compatibility with the challenges of AML collaboration processes, data security, and privacy is not ideal. This paper proposes a new method to enhance the collaborative evolution of IPLs. …”
    Get full text
    Article