Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,141 - 2,160 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"usedddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.17s Refine Results
  1. 2141

    Adaptive Learning Algorithms for Low Dose Optimization in Coronary Arteries Angiography: A Comprehensive Review by Komal Tariq, Muhammad Adnan Munir, Hafiza Tooba Aftab, Amir Naveed, Ayesha Yousaf, Sajjad Ul Hassan

    Published 2024-06-01
    “…Results: The extracted data shows a comprehensive data on various techniques that are used for low dose CAA, advancements in image segmentation, noise reduction, and operator dose reduction highlight the potential of machine learning techniques. …”
    Get full text
    Article
  2. 2142

    Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications by Velliangiri A, Damle Madhavi, Abraham Peter Soosai Anandaraj, Satish Babu Jampani

    Published 2025-05-01
    “…To increase security, the model uses a hybrid encryption scheme that combines elliptic curve cryptography (ECC) with lightweight symmetric encryption, ensuring data confidentiality with minimal computational overhead. …”
    Get full text
    Article
  3. 2143

    Bi-Modal Multiperspective Percussive (BiMP) Dataset for Visual and Audio Human Fall Detection by Joe Dibble, Michael C. F. Bazzocchi

    Published 2025-01-01
    “…Typical fall detection systems classify a fall event using either inertial- or vision-based data. Aside from these two modes of input for fall detection, sparse human fall audio data is available. …”
    Get full text
    Article
  4. 2144

    Application and Effectiveness of Modern Technologies in Sports Training - a Literature Review by Tomasz Włoch, Marcin Kwiatkowski, Tomasz Koziński, Marta Donderska, Paulina Bochniak, Jakub Kołacz, Patrycja Oleś, Mateusz Bryła, Zofia Bryła, Monika Szpaczyńska-Kwiatkowska

    Published 2025-06-01
    “…In spite of the encouraging developments, challenges abound in the form of data accuracy, privacy concerns, and the high cost of implementation. …”
    Get full text
    Article
  5. 2145

    Exploring internal challenges and coping strategies in online English learning via Google Meet: A study of 7th grade students in Yogyakarta by Bambang Widi Pratolo, Liza Beliarita, Naif Daifullah Alsulami

    Published 2024-10-01
    “…Data were collected through interviews and documentation, with pseudonyms used to protect students' privacy. …”
    Get full text
    Article
  6. 2146

    Role of Artificial Intelligence in Dentistry by V. Hysenaj-Cakolli, B. Kolgeci, V. Hysenaj-Hoxha, D. Kolgeci

    Published 2025-06-01
    “…Dental professionals require specialized training, many regions lack access to advanced AI technology, and patient data privacy raises ethical concerns. While AI holds great potential, it should complement human expertise rather than replace it. …”
    Get full text
    Article
  7. 2147

    Covid-19 and Technological Disruption in Health Care Delivery in England by Louise Dalingwater

    Published 2023-11-01
    “…There is also an increased privacy risk when health data is digitalised. There are thus significant governance and infrastructure issues in the delivery of health care via digital devices, which this paper will explore. …”
    Get full text
    Article
  8. 2148

    Artificial Intelligence and Quantum Technologies and Their Role in the Development of the U.S. Economy by Likhota Oleksandr V.

    Published 2025-03-01
    “…An equally important factor is the need for ethical regulation, as the development of AI may pose threats to human rights and data privacy. To achieve the set aim, the research employed analysis and synthesis methods, which allowed for a deeper assessment of the impact of new technologies on economic processes. …”
    Get full text
    Article
  9. 2149

    Quantitative and qualitative analysis of balcony usage and its impact on the landscape of the neighborhood by Fatemeh Foghani, azadeh shahcheraghi, Zahra Sadat Saeideh zarabadi

    Published 2024-07-01
    “…This research is of qualitative-interpretive type, research strategy, case study and data collection was done by field method. In this research, 20 medium-rise residential buildings built in the 90s, consisting of 100 balconies, were selected in the Darya neighborhood of District 2, Tehran. how they were used by users was analyzed. …”
    Get full text
    Article
  10. 2150

    Wearable Sensors for Ensuring Sports Safety in Children with Autism Spectrum Disorder: A Comprehensive Review by Ofir Arbili, Lior Rokach, Seffi Cohen

    Published 2025-02-01
    “…However, challenges remain regarding device usability, data privacy, and the need for further research to validate the effectiveness of these technologies in real-world sports environments. …”
    Get full text
    Article
  11. 2151

    User preferences for an mHealth app to support HIV testing and pre-exposure prophylaxis uptake among men who have sex with men in Malaysia. by Lindsay Palmer, Jeffrey A Wickersham, Kamal Gautam, Francesca Maviglia, Beverly-Danielle Bruno, Iskandar Azwa, Antoine Khati, Frederick L Altice, Kiran Paudel, Sherry Pagoto, Roman Shrestha

    Published 2024-10-01
    “…., telehealth, patient identification), minimizing privacy and confidentiality risks. Our data suggest that a tailored HIV prevention app would be acceptable among MSM in Malaysia. …”
    Get full text
    Article
  12. 2152

    Advancing communicative competence in the digital age: A case for AI tools in Japanese EFL education by Alexis Busso, Becky Sanchez

    Published 2024-07-01
    “…Finally, challenges and limitations are addressed, including ethical considerations surrounding data privacy, overreliance, predictive patterns, and watermarking. …”
    Get full text
    Article
  13. 2153

    Barriers to and enhancement of the utilization of digital mental health interventions in low-resource settings: Perceptions of young people in Uganda by Erisa Sabakaki Mwaka, Datsun Bazzeketa, Joy Mirembe, Reagan D. Emoru, Adelline Twimukye, Apollo Kivumbi

    Published 2025-02-01
    “…A thematic approach was used to interpret the results. Results Three themes were identified from the data including perceptions of using DMH services, the perceived barriers to utilization, and suggestions for enhancement of DMH for YP in low-resource settings. …”
    Get full text
    Article
  14. 2154

    Efficient Deep Learning-Based Cyber-Attack Detection for Internet of Medical Things Devices by Abigail Judith, G. Jaspher W. Kathrine, Salaja Silas, Andrew J

    Published 2023-12-01
    “…However, it comes with privacy issues that compromise the security of the data collected by medical sensors, making them vulnerable to potential cyber threats such as data modification, replay attacks, etc. …”
    Get full text
    Article
  15. 2155

    Deep multi-biometric fuzzy commitment scheme: fusion methods and performance by Valentina Fohr, Christian Rathgeb

    Published 2025-07-01
    “…Abstract Biometric cryptosystems enable privacy-preserving authentication using biometric data, such as fingerprints or iris scans. …”
    Get full text
    Article
  16. 2156

    Overview of Modern Technologies for Acquiring and Analysing Acoustic Information Based on AI and IoT by Sabina Szymoniak, Łukasz Kuczyński

    Published 2025-06-01
    “…In recent years, using sound as a source of information in environmental monitoring systems has become increasingly important. …”
    Get full text
    Article
  17. 2157

    Research on intrusion detection method for edge networks based on federated reinforcement learning by DING Kai, HUANG Yidu, TAO Ming, XIE Renping

    Published 2024-12-01
    “…However, as public awareness of privacy grows, many datasets are no longer shared, leading to the emergence of data silos, which hinders the improvement of IoT security. …”
    Get full text
    Article
  18. 2158

    Artificial intelligence in intelligent transportation systems by Leila Zemmouchi-Ghomari

    Published 2025-04-01
    “…Nonetheless, issues like data quality, real-time processing, security, public acceptability, and privacy concerns need resolution. …”
    Get full text
    Article
  19. 2159

    AIoT: a taxonomy, review and future directions by Jiyi WU, Wenjuan LI, Jian CAO, Shiyou QIAN, Qifei ZHANG, Rajkumar BUYYA

    Published 2021-08-01
    “…AIoT (artificial intelligence of things) is an integrated product of artificial intelligence (AI) and internet of things (IoT).Currently, it has been widely used in smart cities, smart homes, smart manufacturing, and driverless.However, the research of AIoT is still in its infancy, facing with many problems and challenges.In order to clarify the concept and provide possible solutions, a comprehensive survey was carried out on AIoT.Firstly, a clear definition of AIoT was provided, along with the brief introduction on its background and application scenarios.And then a novel cloud-edge-end hybrid AIoT architecture for intelligent information processing was constructed.Based on the research framework of AIoT, the research status and solutions were discussed, including AI integrated IoT data acquisition, complex event processing and coordination, cloud-edge-end integration, AI-enhanced IoT security and privacy, and AI-based applications, etc.Finally, it identified the open challenges and offers future research directions.…”
    Get full text
    Article
  20. 2160

    Considering the ethical aspects of artificial intelligence application from the consumer perspective by Jovanka Vukmirović, Lola Maričić, Selena Stanojevic, Aleksandra Vukmirović, Ivan Mandić

    Published 2025-01-01
    “…Artificial intelligence (AI) uses large datasets to "train" algorithms that make autonomous decisions, leading to significant changes across fields, including digital marketing and personalized advertising. …”
    Get full text
    Article