Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,321 - 1,340 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"usedddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 1321

    Artificial intelligence methods used in various aquaculture applications: A systematic literature review by Thurein Aung, Rafiza Abdul Razak, Adibi Rahiman Bin Md Nor

    Published 2025-02-01
    “…However, the review also uncovered substantial challenges that will continue limiting widespread adoption, including restricted access to representative data, prohibitive expenses, technical complexities, lack of social acceptance, and data privacy and security concerns. …”
    Get full text
    Article
  2. 1322
  3. 1323

    Scientific Evidence for Clinical Text Summarization Using Large Language Models: Scoping Review by Lydie Bednarczyk, Daniel Reichenpfader, Christophe Gaudet-Blavignac, Amon Kenna Ette, Jamil Zaghir, Yuanyuan Zheng, Adel Bensahla, Mina Bjelogrlic, Christian Lovis

    Published 2025-05-01
    “…ResultsA total of 30 original studies were included in the analysis. All used observational retrospective designs, mainly using real patient data (n=28, 93%). …”
    Get full text
    Article
  4. 1324
  5. 1325
  6. 1326

    Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator by David Khoury, Samir Haddad, Patrick Sondi, Gaby Abou Haidar, David Semaan, Jinane Sayah

    Published 2024-01-01
    “…Scalability, resource limitations, and privacy concerns are analyzed as IoT devices handle sensitive information, and the transparent and immutable nature of blockchain can raise data protection. …”
    Get full text
    Article
  7. 1327

    A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features by Fazeel Zafar, Talha Ahmed Khan, Salas Akbar, Muhammad Talha Ubaid, Sameena Javaid, Kushsairy Abdul Kadir

    Published 2025-01-01
    “…The system dissects video inputs into frames to extract features comprehensively by using Multi Test Convolutional Networks (MTCNN). …”
    Get full text
    Article
  8. 1328

    Standardized patient profile review using large language models for case adjudication in observational research by Martijn J. Schuemie, Anna Ostropolets, Aleh Zhuk, Uladzislau Korsik, Seung In Seo, Marc A. Suchard, George Hripcsak, Patrick B. Ryan

    Published 2025-01-01
    “…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
    Get full text
    Article
  9. 1329

    Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study by Muhammad Shah, Shimee Shahzadi, Shehzad Akbar Khan

    Published 2025-01-01
    “…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
    Get full text
    Article
  10. 1330

    Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing by Prashanth Choppara, S. Sudheer Mangalampalli

    Published 2025-01-01
    “…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
    Get full text
    Article
  11. 1331

    Client aware adaptive federated learning using UCB-based reinforcement for people re-identification by Dinah Waref, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El Ghany, Mohammed A.-M. Salem

    Published 2025-05-01
    “…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
    Get full text
    Article
  12. 1332

    Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method by Didik Sudyana, Nora Lizarti

    Published 2019-05-01
    “…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
    Get full text
    Article
  13. 1333

    A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation by Denis Moser, Matthias Bender, Murat Sariyar

    Published 2025-12-01
    “…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
    Get full text
    Article
  14. 1334

    Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain by Semra Tebrizcik, Süleyman Ersöz, Elvan Duman, Adnan Aktepe, Ahmet Kürşad Türker

    Published 2025-07-01
    “…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
    Get full text
    Article
  15. 1335

    GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor by Hong Nhung Nguyen, Yong-Hwa Kim

    Published 2025-01-01
    “…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
    Get full text
    Article
  16. 1336

    Nuclei segmentation and classification from histopathology images using federated learning for end-edge platform. by Anjir Ahmed Chowdhury, S M Hasan Mahmud, Md Palash Uddin, Seifedine Kadry, Jung-Yeon Kim, Yunyoung Nam

    Published 2025-01-01
    “…To protect data privacy, the framework employs a FedAvg-based federated learning scheme, enabling decentralized training without exposing sensitive data. …”
    Get full text
    Article
  17. 1337

    Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment by Wonyoung Jang, Sun-Young Lee

    Published 2020-03-01
    “…This article proposes a method for partially encrypting private information in images using FF1 and FF3-1. The proposed method encrypts private information without increasing the data size, solving the problem of wasted storage space. …”
    Get full text
    Article
  18. 1338

    Federated Learning-Based State of Charge Estimation in Electric Vehicles Using Federated Adaptive Client Momentum by Metin Yilmaz, Eyup Cinar, Ahmet Yazici

    Published 2025-01-01
    “…The proposed method is initially validated via experimental results using the collected data from Musoshi L5 type EV. …”
    Get full text
    Article
  19. 1339
  20. 1340

    A framework for systematically applying humanistic ethics when using AI as a design material by Kyle Dent, Richelle Dumond, Mike Kuniavsky

    Published 2019-07-01
    “…Because AI-supported and autonomous decision making has the potential for widespread negative personal, social, and environmental effects, we aim to take a proactive stance to uphold human rights, respect individuals’ privacy, protect personal data, and enable freedom of expression and equality. …”
    Get full text
    Article