Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 841 - 860 results of 2,784 for search '"\"((((\\"usedds OR \"useddddddds) OR \"usedds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.18s Refine Results
  1. 841

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. …”
    Get full text
    Article
  2. 842

    Integrating Data Analytics into Traditional Media: Opportunities and Strategic Advantages by Веньхао Чжен, Вікторія Опанасенко

    Published 2025-05-01
    “…Moreover, the use of personal data raises concerns in terms of privacy and ethical standards, which necessitates a careful balancing act between leveraging data for analysing and maintaining the users’ trust. …”
    Get full text
    Article
  3. 843

    Improved Private Data Protection Scheme for Blockchain Smart Contracts by Sheng Hu

    Published 2023-01-01
    “…To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. …”
    Get full text
    Article
  4. 844

    Particular qualities of evaluation of electronic card data in modern healthcare by I. R. Svechkareva, A. A. Kurylev, D. E. Shilova

    Published 2025-01-01
    “…The article discusses various aspects of the implementation and use of EHR, including technical difficulties, data privacy and security issues. …”
    Get full text
    Article
  5. 845

    ARTIFICIAL INTELLIGENCE AND BIG DATA ANALYSIS IN CRIME PREVENTION AND COMBAT by George-Marius ȚICAL

    Published 2025-03-01
    “…In the era of accelerated digitalization, the use of artificial intelligence (AI) and big data analysis has become a necessity in crime prevention and combat. …”
    Get full text
    Article
  6. 846

    The Ethics of Data and Its Governance: A Discourse Theoretical Approach by Bernd Carsten Stahl

    Published 2025-06-01
    “…This can refer to specific ethical values that data governance is meant to preserve, most obviously in the area of privacy and data protection. …”
    Get full text
    Article
  7. 847

    Bringing it All Together: Data from Everywhere to Build Dashboards by David Schuster

    Published 2023-12-01
    “…Using Power BI, Power Automate and a Microsoft gateway, we can see the power of easy access to data without knowing all of the disparate systems. …”
    Get full text
    Article
  8. 848

    Revolutionizing Data Exchange Through Intelligent Automation: Insights and Trends by Yeison Nolberto Cardona-Álvarez, Andrés Marino Álvarez-Meza, German Castellanos-Dominguez

    Published 2025-05-01
    “…Furthermore, it underscores the urgent need for robust ethical frameworks to guide the responsible use of AI and to protect data privacy. In addressing these challenges, the paper calls for innovative research aimed at overcoming current limitations in scalability and security. …”
    Get full text
    Article
  9. 849

    SoK: The Impact of Educational Data Mining on Organisational Administration by Hamad Almaghrabi, Ben Soh, Alice Li, Idrees Alsolbi

    Published 2024-11-01
    “…It outlines key data mining techniques used in tasks like resource allocation, staff evaluation, and institutional planning. …”
    Get full text
    Article
  10. 850

    Fingerprint-Based Deduplication for Renewable Energy Data On-Site Analyzing by Zeng Zeng, Liyuan Gao, Hongyue Ma, Wenjing Li

    Published 2025-01-01
    “…By studying fine-grained data fingerprinting and neural network-based renewable energy data edge-analysis technologies, we have enabled edge processing of data, reducing latency and privacy issues, and enhancing the system’s real-time processing capabilities and responsiveness.…”
    Get full text
    Article
  11. 851

    Synthetic data in medicine: Legal and ethical considerations for patient profiling by Maja Nisevic, Dusko Milojevic, Daniela Spajic

    Published 2025-01-01
    “…Synthetic data is increasingly used in healthcare to facilitate privacy-preserving research, algorithm training, and patient profiling. …”
    Get full text
    Article
  12. 852

    BioGAN: Enhancing Transcriptomic Data Generation with Biological Knowledge by Francesca Pia Panaccione, Sofia Mongardi, Marco Masseroli, Pietro Pinoli

    Published 2025-06-01
    “…The advancement of computational genomics has significantly enhanced the use of data-driven solutions in disease prediction and precision medicine. …”
    Get full text
    Article
  13. 853

    Smart Grids Data Aggregation Method on Paillier Homomorphic Encryption by Shaodong Zhao

    Published 2024-12-01
    “…Smart grid (SGs) is a highly integrated power system, it is gradually replacing the traditional power grid, but at present there are problems in the SGs data aggregation, such as user privacy leakage, grid data query inflexibly and data leakage. …”
    Get full text
    Article
  14. 854

    Synthetic data distillation enables the extraction of clinical information at scale by Elizabeth Geena Woo, Michael C. Burkhart, Emily Alsentzer, Brett K. Beaulieu-Jones

    Published 2025-05-01
    “…Abstract Large-language models (LLMs) show promise for clinical note information extraction, but deployment challenges include high computational costs and privacy concerns. We used synthetic data distillation to fine-tune smaller, open-source LLMs to achieve performance comparable to larger models while enabling local hardware deployment or reduced cloud costs. …”
    Get full text
    Article
  15. 855

    Legal paternalism’s influence on the balancing data protection and fundamental rights by I. Patricheev

    Published 2025-03-01
    “…Soft paternalism, on the other hand, can be seen in EU lawmakers’ attempts to nudge data subjects into using their data carefully and reasonably in digital environments without heavily restricting their data autonomy. …”
    Get full text
    Article
  16. 856

    Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security by Xiaolu Chu, Ke Cheng, Anxiao Song, Jiaxuan Fu

    Published 2025-01-01
    “…Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). …”
    Get full text
    Article
  17. 857

    Cardiac disease diagnosis based on GAN in case of missing data. by Xing Chen, Na Zhang, Xiaohui Yang, Chunyan Wang, Qi Na, Tianyun Luan, Wendi Zhu, Chenjie Zhang, Chao Yang

    Published 2024-01-01
    “…In daily life, two common algorithms are used for collecting medical disease data: data integration of medical institutions and questionnaires. …”
    Get full text
    Article
  18. 858
  19. 859

    Recognition of Human Activities Based on Ambient Audio and Vibration Data by Marcel Koch, Thomas Pfitzinger, Fabian Schlenke, Fabian Kohlmorgen, Roland Groll, Hendrik Wohrle

    Published 2024-01-01
    “…The data obtained by the AMSNs is classified using two distinct neural networks. …”
    Get full text
    Article
  20. 860

    Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications by Milos Simic, Jovana Dedeic, Milan Stojkov, Ivan Prokic

    Published 2025-01-01
    “…This architectural decision does not come without additional costs when managing isolation and data privacy between tenants. That is a known challenge in cloud computing that translates to systems closer to the users, namely edge computing and micro clouds. …”
    Get full text
    Article