Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1501
Impact of Modern Technology on Social Research Methods in Educational Contexts
Published 2025-02-01“…The findings reveal that frequent use of technology significantly enhances research efficiency and data accuracy, providing educational researchers with expanded data collection capabilities and improved analytical precision. …”
Get full text
Article -
1502
Understanding the Semantic System by Tehrani Residents from a Private Spacial Perception
Published 2022-11-01“…The data of this study was collected through in-depth interviews and theoritical-purposeful sampling method with forty-two related residents and for analyzing data, five methods of open coding and recognition of concepts, development of concepts in terms of dimensions and characteristics, data analysis using grounded theory, inserting the process into the analysis, and integration of categories were used. …”
Get full text
Article -
1503
Distributed Training Techniques for Intelligent Model in Space-Based Information Networks
Published 2025-03-01“…In addressing the issues of data distribution heterogeneity, outdated models, and data privacy and security in distributed training of intelligent models, a federated learning architecture of intelligent models was designed based on blockchain technology and applied to space-based information networks. …”
Get full text
Article -
1504
Evaluating GPT models for clinical note de-identification
Published 2025-01-01“…Abstract The rapid digitalization of healthcare has created a pressing need for solutions that manage clinical data securely while ensuring patient privacy. This study evaluates the capabilities of GPT-3.5 and GPT-4 models in de-identifying clinical notes and generating synthetic data, using API access and zero-shot prompt engineering to optimize computational efficiency. …”
Get full text
Article -
1505
Comparison of anonymization techniques regarding statistical reproducibility.
Published 2025-02-01“…<h4>Background</h4>Anonymization opens up innovative ways of using secondary data without the requirements of the GDPR, as anonymized data does not affect anymore the privacy of data subjects. …”
Get full text
Article -
1506
Insights from the Incheon Airport Case in South Korea: balancing public safety and individual rights with global scalability analysis
Published 2025-07-01“…In pursuit of a comprehensive data governance framework for FRT, we are emphasizing the need to establish a more specific and operable data governance structure, strengthen the Privacy by Design principle, and balance security imperatives with individual rights as key alternatives. …”
Get full text
Article -
1507
Multi-level high utility-itemset hiding.
Published 2025-01-01“…Privacy is as a critical issue in the age of data. …”
Get full text
Article -
1508
Multi-stakeholder perspective on responsible artificial intelligence and acceptability in education
Published 2025-07-01“…The data collection, comprising a final sample of 1198 participants, focused on individual responses to four AI use cases. …”
Get full text
Article -
1509
Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis
Published 2024-12-01“…As a result, five critical challenges have been identified regarding the use of blockchain in healthcare including data privacy/security, scalability, governance, interoperability and standards, and cost.…”
Get full text
Article -
1510
Machine Learning Methods in Customer Segmentation and Recommendation Systems
Published 2025-01-01“…As access to all kinds of data becomes more and more available, the need for people to efficiently classify and extract useful data is urgent, especially for businesses. …”
Get full text
Article -
1511
Decentralized traffic management with Federated Edge AI: a reinforced transnet model for real-time vehicle object detection and collaborative route optimization
Published 2025-07-01“…The aim is to enhance real-time vehicle detection, optimize traffic routes, and alleviate congestion while ensuring the privacy of sensitive data. The proposed system processes traffic data locally on edge devices, minimizing the need for data transfer and preserving privacy. …”
Get full text
Article -
1512
Ultra-Short-Term Distributed Photovoltaic Power Probabilistic Forecasting Method Based on Federated Learning and Joint Probability Distribution Modeling
Published 2025-01-01“…Existing methods regarding cluster information sharing tend to easily trigger issues of data privacy leakage during information sharing, or they suffer from insufficient information sharing while protecting data privacy, leading to suboptimal forecasting performance. …”
Get full text
Article -
1513
Design Hybrid Algorithm for Video Encoding
Published 2013-12-01“…Due to the fact that all the studies and researches that have been found were focused on the use of some of the ways of encrypting the texts like data encryption standard (DES) in encrypting video files ,and the fact that all the weakness points were related to the calculations, so in this research, many of these methods were connected with modification required to reduce the calculations and to obtain the speed of encrypting video files and give them a high privacy. …”
Get full text
Article -
1514
πFL: Private, atomic, incentive mechanism for federated learning based on blockchain
Published 2025-06-01“…Federated learning (FL) is predicated on the provision of high-quality data by multiple clients, which is then used to train global models. …”
Get full text
Article -
1515
BFS: A blockchain-based financing scheme for logistics company in supply chain finance
Published 2022-12-01“…BFS utilises more efficient and interpretative smart contract technology, as well as improved privacy information query and invocation algorithms, to realise automatic control of entity node privacy information flow and significantly simplifying the steps and lowering the thresholds to financing for logistics companies, while protecting the privacy of their data. …”
Get full text
Article -
1516
Role of artificial intelligence in healthcare insurance: systematic literature review
Published 2025-04-01“…Privacy presents a challenge in AI, especially because of the widespread use of large data sets and algorithms that could misuse consumer information.…”
Get full text
Article -
1517
Federated Learning Applications in Fingerprint and Finger Vein Recognition
Published 2025-01-01“…One of the frameworks for fingerprint recognition, Federated Learning-Fingerprint Recognition, uses sparse representation techniques such as the Discrete Cosine Transform for data preprocessing. …”
Get full text
Article -
1518
Problematic aspects of IoT cybersecurity standardisation
Published 2025-04-01“…There are also issues of user protection, security and privacy. The cybersecurity and privacy of IoT consumers can be negatively affected by the development of these technologies if vulnerable devices and their environments are used. …”
Get full text
Article -
1519
THE IMPACT OF DIGITAL INNOVATION ON E-COMMERCE YOUNG CUSTOMER SATISFACTION IN VIETNAM
Published 2025-01-01“…It investigates key factors influencing user satisfaction employing frameworks such as the Uses and Gratifications Theory (U&G), Technology Acceptance Model (TAM), and the Unified Theory of Acceptance and Use of Technology (UTAUT), including utilitarian, hedonic, technological, and social gratifications, privacy risk, and social influence. …”
Get full text
Article -
1520
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى
Published 2018-07-01“…The studyalso comes up with the following results: positively, individuals of the academiccommunity succeeded at protecting their personal data automatically and at ahigh rate. Selection of fake names constitutes half of the academic community (53.2%), who use social networks and this is explored by their deny of personaldata or by writing fake personal data. …”
Get full text
Article