Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
2001
Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty
Published 2025-03-01“…One approach to improve trustworthiness and fairness in AI systems is to use bias mitigation algorithms. However, most bias mitigation algorithms require data sets that contain sensitive attribute values to assess the fairness of the algorithm. …”
Get full text
Article -
2002
Enhancing medical image classification via federated learning and pre-trained model
Published 2024-09-01“…Federated learning (FL) offers a promising method for collaborative training on distributed data held by various entities, ensuring the privacy of patient information. …”
Get full text
Article -
2003
Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers
Published 2025-06-01“…The analysis highlights the use of cloud storage as a media to store the proceeds of crime, in the form of data privacy. …”
Get full text
Article -
2004
Digital marketing excellence : planning, optimizing and integrating online marketing /
Published 2023View in OPAC
Electronic eBook -
2005
Algorithms weighing lives and freedoms: The case of China’s health code
Published 2023-03-01“…Digital contact tracing has attracted enormous interest among academics and legislators since the outbreak of COVID-19, which resulted in several policy papers and research works, discussing issues, such as the effectiveness and accuracy of virus detection, as well concerns in regard to discrimination and data privacy. However, most of the articles refers to technologies and its implications in the West, and less to the peculiarities and problems related to the use of Chinese health code. …”
Get full text
Article -
2006
HIV Self-Testing among Men Who Have Sex with Men (MSM) in the UK: A Qualitative Study of Barriers and Facilitators, Intervention Preferences and Perceived Impacts.
Published 2016-01-01“…The window period was the most important element of an HIVST, with strong preference for 4th generation testing. Kits which used a blood sample were more popular than those using saliva due to higher perceived accuracy although phobia of needles and/or blood meant some would only access HIVST if a saliva sample option was available. …”
Get full text
Article -
2007
Unsupervised intrusion detection model based on temporal convolutional network
Published 2025-01-01“…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. In addition, UDMT can adopt different privacy layer modes, and the configuration was flexible to meet the requirements of different detection rates and detection delays. …”
Get full text
Article -
2008
The nature of online civil dispute resolution in modern India
Published 2024-12-01“…Some believe that the introduction of information technology in the activities of the courts creates high risks for the security and privacy of data and the lack of digital literacy will contribute to this, while others believe that the future belongs to virtual courts and online dispute resolution.…”
Get full text
Article -
2009
Automotive Cybersecurity: A Survey on Frameworks, Standards, and Testing and Monitoring Technologies
Published 2024-09-01“…To sustain and enhance the performance, quality, and reliability of vehicle systems, software engineers face significant challenges, including in diverse communication channels, software integration, complex testing, compatibility, core reusability, safety and reliability assurance, data privacy, and software security. Addressing cybersecurity risks presents a substantial challenge in finding practical solutions to these issues. …”
Get full text
Article -
2010
Decentralized Distributed Sequential Neural Networks Inference on Low-Power Microcontrollers in Wireless Sensor Networks: A Predictive Maintenance Case Study
Published 2025-07-01“…The growing adoption of IoT applications has led to increased use of low-power microcontroller units (MCUs) for energy-efficient, local data processing. …”
Get full text
Article -
2011
Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences
Published 2025-03-01“…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
Get full text
Article -
2012
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى
Published 2019-10-01“…The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. …”
Get full text
Article -
2013
Bridging the Gap between Neuroarchitecture, Artificial Intelligence, and Sustainability: A Systematic Review of Mental Health in the Built Environment
Published 2025-09-01“…Ethical considerations related to data privacy and consent are also discussed, providing a comprehensive understanding of the potential and challenges in designing AI-driven neuroarchitecture-sustainable adaptive designs.…”
Get full text
Article -
2014
Developing a youth-friendly internet-enabled HIV risk calculator: A collaborative approach with young key populations, living in Soweto, South Africa.
Published 2025-01-01“…Framework analysis was used to analyse qualitative data through a qualitative data analysis software called NVivo. …”
Get full text
Article -
2015
Decision-making model in digital commerce: electronic trust-based purchasing intention through online food delivery applications (OFDAs)
Published 2024-09-01“…Design/methodology/approach – Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. …”
Get full text
Article -
2016
Encrypted traffic identification scheme based on sliding window and randomness features
Published 2024-08-01“…Specifically, the scheme involved sampling the payloads of data packets in sessions using a sliding window mechanism to obtain data block sequences that reflect the information patterns of the original traffic. …”
Get full text
Article -
2017
Factors that affect clinical youth engagement in digital mental health research: a qualitative sub-study nested within a prospective cohort study
Published 2025-04-01“…Methods Semi-structured interviews were conducted with a purposive sample of participants from the 3S-YP study. Interview data was analysed using codebook thematic analysis. …”
Get full text
Article -
2018
GOVERNANCE TOKENS IN THE CONCEPT OF ELECTRONIC GOVERNMENT
Published 2023-12-01“…We emphasized that the use of blockchain technology raises significant privacy concerns, as many e-government services involve personal data that must be properly protected to avoid situations where the blockchain could become the target of attacks by attackers trying to obtain unauthorized access to the personal information of citizens. …”
Get full text
Article -
2019
ENGLISH:FROM MANUSCRIPTS TO MONITORS: THE DIGITAL EVOLUTION OF ISLAMIC KNOWLEDGE AND THE ROLE OF COMPUTERIZING IN SAFEGUARDING TRADITION FOR FUTURE GENERATIONS
Published 2024-06-01“…The paper explores the danger of breaching privacy and the abuse of personal data pointing to the necessity and effectiveness of a policy against such issues. …”
Get full text
Article -
2020
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01“…Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. …”
Get full text
Article