Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,501 - 1,520 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.21s Refine Results
  1. 1501

    Impact of Modern Technology on Social Research Methods in Educational Contexts by Horia Aljounid

    Published 2025-02-01
    “…The findings reveal that frequent use of technology significantly enhances research efficiency and data accuracy, providing educational researchers with expanded data collection capabilities and improved analytical precision. …”
    Get full text
    Article
  2. 1502

    Understanding the Semantic System by Tehrani Residents from a Private Spacial Perception by Seyed Hasan Hosseini, shahla teymournejad

    Published 2022-11-01
    “…The data of this study was collected through in-depth interviews and theoritical-purposeful sampling method with forty-two related residents and for analyzing data, five methods of open coding and recognition of concepts, development of concepts in terms of dimensions and characteristics, data analysis using grounded theory, inserting the process into the analysis, and integration of categories were used. …”
    Get full text
    Article
  3. 1503

    Distributed Training Techniques for Intelligent Model in Space-Based Information Networks by LI Yuanjun, YANG Dewei, LI Jianing, FENG Xiao

    Published 2025-03-01
    “…In addressing the issues of data distribution heterogeneity, outdated models, and data privacy and security in distributed training of intelligent models, a federated learning architecture of intelligent models was designed based on blockchain technology and applied to space-based information networks. …”
    Get full text
    Article
  4. 1504

    Evaluating GPT models for clinical note de-identification by Bayan Altalla’, Sameera Abdalla, Ahmad Altamimi, Layla Bitar, Amal Al Omari, Ramiz Kardan, Iyad Sultan

    Published 2025-01-01
    “…Abstract The rapid digitalization of healthcare has created a pressing need for solutions that manage clinical data securely while ensuring patient privacy. This study evaluates the capabilities of GPT-3.5 and GPT-4 models in de-identifying clinical notes and generating synthetic data, using API access and zero-shot prompt engineering to optimize computational efficiency. …”
    Get full text
    Article
  5. 1505

    Comparison of anonymization techniques regarding statistical reproducibility. by David Pau, Camille Bachot, Charles Monteil, Laetitia Vinet, Mathieu Boucher, Nadir Sella, Romain Jegou

    Published 2025-02-01
    “…<h4>Background</h4>Anonymization opens up innovative ways of using secondary data without the requirements of the GDPR, as anonymized data does not affect anymore the privacy of data subjects. …”
    Get full text
    Article
  6. 1506

    Insights from the Incheon Airport Case in South Korea: balancing public safety and individual rights with global scalability analysis by Haesung Lee, Eunsoo Kim, Do Hyun Park

    Published 2025-07-01
    “…In pursuit of a comprehensive data governance framework for FRT, we are emphasizing the need to establish a more specific and operable data governance structure, strengthen the Privacy by Design principle, and balance security imperatives with individual rights as key alternatives. …”
    Get full text
    Article
  7. 1507

    Multi-level high utility-itemset hiding. by Loan T T Nguyen, Hoa Duong, An Mai, Bay Vo

    Published 2025-01-01
    “…Privacy is as a critical issue in the age of data. …”
    Get full text
    Article
  8. 1508

    Multi-stakeholder perspective on responsible artificial intelligence and acceptability in education by Alexander John Karran, Patrick Charland, Joé Trempe-Martineau, Ana Ortiz de Guinea Lopez de Arana, Anne-Marie Lesage, Sylvain Sénécal, Pierre-Majorique Léger

    Published 2025-07-01
    “…The data collection, comprising a final sample of 1198 participants, focused on individual responses to four AI use cases. …”
    Get full text
    Article
  9. 1509

    Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis by Mohammad Mehraeen, Laya Mahmoudi

    Published 2024-12-01
    “…As a result, five critical challenges have been identified regarding the use of blockchain in healthcare including data privacy/security, scalability, governance, interoperability and standards, and cost.…”
    Get full text
    Article
  10. 1510

    Machine Learning Methods in Customer Segmentation and Recommendation Systems by Guo Yiran

    Published 2025-01-01
    “…As access to all kinds of data becomes more and more available, the need for people to efficiently classify and extract useful data is urgent, especially for businesses. …”
    Get full text
    Article
  11. 1511

    Decentralized traffic management with Federated Edge AI: a reinforced transnet model for real-time vehicle object detection and collaborative route optimization by C. E. Mohankumar, A. Manikandan

    Published 2025-07-01
    “…The aim is to enhance real-time vehicle detection, optimize traffic routes, and alleviate congestion while ensuring the privacy of sensitive data. The proposed system processes traffic data locally on edge devices, minimizing the need for data transfer and preserving privacy. …”
    Get full text
    Article
  12. 1512

    Ultra-Short-Term Distributed Photovoltaic Power Probabilistic Forecasting Method Based on Federated Learning and Joint Probability Distribution Modeling by Yubo Wang, Chao Huo, Fei Xu, Libin Zheng, Ling Hao

    Published 2025-01-01
    “…Existing methods regarding cluster information sharing tend to easily trigger issues of data privacy leakage during information sharing, or they suffer from insufficient information sharing while protecting data privacy, leading to suboptimal forecasting performance. …”
    Get full text
    Article
  13. 1513

    Design Hybrid Algorithm for Video Encoding by Ghada Tahir Qasim, Toqa Zuhair, Sahar Saleh, Amena Emad

    Published 2013-12-01
    “…Due to the fact that all the studies and researches that have been found were focused on the use of some  of the ways of encrypting the texts like data encryption standard (DES) in encrypting video files ,and the fact that all the weakness points were related to the calculations, so in this research, many of these methods were connected with modification required to reduce the calculations and to obtain the speed of encrypting video files and give them a high privacy. …”
    Get full text
    Article
  14. 1514

    πFL: Private, atomic, incentive mechanism for federated learning based on blockchain by Kejia Chen, Jiawen Zhang, Xuanming Liu, Zunlei Feng, Xiaohu Yang

    Published 2025-06-01
    “…Federated learning (FL) is predicated on the provision of high-quality data by multiple clients, which is then used to train global models. …”
    Get full text
    Article
  15. 1515

    BFS: A blockchain-based financing scheme for logistics company in supply chain finance by Jia Fu, Bangcan Cao, Xiaoliang Wang, Pengjie Zeng, Wei Liang, Yuzhen Liu

    Published 2022-12-01
    “…BFS utilises more efficient and interpretative smart contract technology, as well as improved privacy information query and invocation algorithms, to realise automatic control of entity node privacy information flow and significantly simplifying the steps and lowering the thresholds to financing for logistics companies, while protecting the privacy of their data. …”
    Get full text
    Article
  16. 1516

    Role of artificial intelligence in healthcare insurance: systematic literature review by Ahmed Ali Alkhelb, Salah Alshagrawi

    Published 2025-04-01
    “…Privacy presents a challenge in AI, especially because of the widespread use of large data sets and algorithms that could misuse consumer information.…”
    Get full text
    Article
  17. 1517

    Federated Learning Applications in Fingerprint and Finger Vein Recognition by Wang Yongchao

    Published 2025-01-01
    “…One of the frameworks for fingerprint recognition, Federated Learning-Fingerprint Recognition, uses sparse representation techniques such as the Discrete Cosine Transform for data preprocessing. …”
    Get full text
    Article
  18. 1518

    Problematic aspects of IoT cybersecurity standardisation by P. S. Klimushyn

    Published 2025-04-01
    “…There are also issues of user protection, security and privacy. The cybersecurity and privacy of IoT consumers can be negatively affected by the development of these technologies if vulnerable devices and their environments are used. …”
    Get full text
    Article
  19. 1519

    THE IMPACT OF DIGITAL INNOVATION ON E-COMMERCE YOUNG CUSTOMER SATISFACTION IN VIETNAM by Minh-Hoa Le, Que-Nhu Duong, Hieu-Nghia Nguyen, Quynh-Nhu Au, Nhat-Nam Pham

    Published 2025-01-01
    “…It investigates key factors influencing user satisfaction employing frameworks such as the Uses and Gratifications Theory (U&G), Technology Acceptance Model (TAM), and the Unified Theory of Acceptance and Use of Technology (UTAUT), including utilitarian, hedonic, technological, and social gratifications, privacy risk, and social influence. …”
    Get full text
    Article
  20. 1520

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى by د. مها أحمد ابراهیم محمد

    Published 2018-07-01
    “…The studyalso comes up with the following results: positively, individuals of the academiccommunity succeeded at protecting their personal data automatically and at ahigh rate. Selection of fake names constitutes half of the academic community (53.2%), who use social networks and this is explored by their deny of personaldata or by writing fake personal data. …”
    Get full text
    Article