Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,101 - 1,120 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"usedds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.16s Refine Results
  1. 1101

    Integration of smart sensors and IOT in precision agriculture: trends, challenges and future prospectives by Sheikh Mansoor, Shahzad Iqbal, Simona M. Popescu, Song Lim Kim, Yong Suk Chung, Jeong-Ho Baek

    Published 2025-05-01
    “…Precision agriculture presents a viable solution by optimizing resource use, enhancing efficiency, and fostering sustainable practices through data-driven decision-making supported by advanced sensors and Internet of Things (IoT) technologies. …”
    Get full text
    Article
  2. 1102

    Local large language model‐assisted literature mining for on‐surface reactions by Juan Xiang, Yizhang Li, Xinyi Zhang, Yu He, Qiang Sun

    Published 2025-03-01
    “…Herein, we introduce a method for extracting scientific data from unstructured texts using a local LLM, exemplifying its applications to scientific literatures on the topic of on‐surface reactions. …”
    Get full text
    Article
  3. 1103

    Blockchain-enabled cross-border insurance: from legal issues, solution design, to implementation by Jiaxin Ran, Dechuan Li, Qixin Zheng, Jerome Yen, Yingjie Xue

    Published 2024-05-01
    “…However, when it comes to cross-border insurance service, current solutions fall short in effectively navigating the legal and compliance complexities inherent in cross-border insurance service delivery. When transmitting data across borders, it is essential to adhere to the legal requirements of cross-border laws and regulations, especially considering the variations in regional data protection and privacy legislation. …”
    Get full text
    Article
  4. 1104

    Application of artificial intelligence in triage in emergencies and disasters: a systematic review by Azadeh Tahernejad, Ali Sahebi, Ali Salehi Sahl Abadi, Mehdi Safari

    Published 2024-11-01
    “…Implementing intelligent triage systems faced challenges such as trust issues, training needs, equipment shortages, and data privacy concerns. Conclusion Developing assessment systems using artificial intelligence enables timely treatment and better resuscitation services for people injured in disasters. …”
    Get full text
    Article
  5. 1105

    Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs by Siva Janakiraman, Vinoth Raj R, R. Sivaraman, A. Sridevi, Har Narayan Upadhyay, Rengarajan Amirtharajan

    Published 2025-03-01
    “…A 512-bit hashing scheme using the Whirlpool algorithm is implemented to maintain data integrity, providing a robust hash comparison mechanism. …”
    Get full text
    Article
  6. 1106

    Some ethical and technological challenges of smart cities by Brian G. Field

    Published 2025-12-01
    “…The moral dilemma and important ethical questions resulting from the use of big data to scrutinise and profile individuals and communities, compromising their privacy and anonymity without their knowledge or consent, cannot be underestimated and appears beyond the control of prevailing data protection protocols.…”
    Get full text
    Article
  7. 1107
  8. 1108

    Integrating multi-modal learning analytics dashboard in K-12 education: insights for enhancing orchestration and teacher decision-making by Isabella Possaghi, Boban Vesin, Feiran Zhang, Kshitij Sharma, Cecilie Knudsen, Håkon Bjørkum, Sofia Papavlasopoulou

    Published 2025-08-01
    “…Further research should investigate students’ responses more closely and further develop strategies for the responsible, explainable, and unbiased use of student affective data in real classrooms.…”
    Get full text
    Article
  9. 1109

    Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing by Sijjad Ali, Shuaib Ahmed Wadho, Aun Yichiet, Ming Lee Gan, Chen Kang Lee

    Published 2024-09-01
    “…Cloud computing security and data protection are becoming increasingly critical as its use increases. …”
    Get full text
    Article
  10. 1110

    Algorithmic fandom: how generative AI is reshaping sports marketing, fan engagement, and the integrity of sport by Hans Westerbeek

    Published 2025-05-01
    “…The integration of AI in gambling platforms and the commercialisation of fan data raise significant concerns around privacy, consent, and long-term wellbeing. …”
    Get full text
    Article
  11. 1111

    FOCC: A Synthetically Balanced Federated One-Class-Classification for Cyber Threat Intelligence in Software Defined Networking by Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar

    Published 2025-01-01
    “…Federated Learning offers a promising approach for building Cyber Threat Intelligence (CTI) by utilizing cross-domain data in Software Defined Networking (SDN) while addressing privacy concerns. …”
    Get full text
    Article
  12. 1112

    Equipment Fault Diagnosis Method Based on High-efficient Communication Federated Learning by LIU Jing, ZHAO Yichen, LIU Xinghua, WU Youxi, JI Haipeng

    Published 2025-04-01
    “…Federated learning achieves joint training modeling of fault data from various factories while protecting privacy. …”
    Get full text
    Article
  13. 1113

    New discrete memristive hyperchaotic map: modeling, dynamic analysis, and application in image encryption by Fei Yu, Yiya Wu, Xuqi Wang, Ting He, ShanKou Zhang, Jie Jin

    Published 2025-06-01
    “…With the rapid development of information technology, the demand for ensuring data security and privacy protection has become increasingly urgent. …”
    Get full text
    Article
  14. 1114

    A Semi-Supervised-Learning-Aided Explainable Belief Rule-Based Approach to Predict the Energy Consumption of Buildings by Sami Kabir, Mohammad Shahadat Hossain, Karl Andersson

    Published 2025-05-01
    “…This data availability becomes either expensive or difficult due to privacy protection. …”
    Get full text
    Article
  15. 1115

    Barriers and strategies for recruitment of pregnant women in contemporary longitudinal birth cohort studies by Slawa Rokicki, Amulya Gobburu, Melissa Weidner, Nashwah Azam, Michelle Jansen, Zorimar Rivera-Núñez, Adriana De Resende, Veenat Parmar, Gloria Bachmann, Nancy Reilly, Reynold Panettieri, Maria Gloria Dominguez-Bello, Daniel B. Horton, Martin J. Blaser, Emily S. Barrett

    Published 2025-04-01
    “…Five themes emerged: challenges in committing time and resources to a research study; utility of compensation and resources; fears that research procedures would negatively impact child; concerns regarding data privacy and children's consent; and benefits for their family, community, and society. …”
    Get full text
    Article
  16. 1116

    Leveraging dual‐blockchain collaboration for logistics supply chain supervision by Licheng Lin, Senshan Pan, Pujie Jing, Xiangmei Song

    Published 2024-12-01
    “…Current blockchain‐based LSC features distributed structure and data privacy requirements, hindering the supervision of logistics transactions. …”
    Get full text
    Article
  17. 1117

    Research on insider threat detection based on personalized federated learning and behavior log analysis by Xiaoyun Ye, Faqin Luo, Huangrongbin Cui, Jinlong Wang, Xiaoyun Xiong, Wencui Zhang, Jiawei Yu, Wenhao Zhao

    Published 2025-06-01
    “…Drawing on the DeepInsight concept, we convert different data types into image formats for use with Convolutional Neural Networks (CNNs) to train insider threat detection models. …”
    Get full text
    Article
  18. 1118

    AI-Driven Leadership in Educational Policy: A Systematic Literature Review by Dean Collin Langeveldt

    Published 2025-05-01
    “…It highlights the role of Artificial Intelligence (AI) in making data-driven decisions easier. Policymakers can use AI to improve resources, curriculum, and policy choices. …”
    Get full text
    Article
  19. 1119

    TraceTogether contact tracing: a Smart Nation innovation by Michael Motet Hansen, Bharat Dahiya

    Published 2025-04-01
    “…While the TraceTogether app demonstrated efficient crisis response, challenges remain regarding data privacy, digital divide, and long-term scalability. …”
    Get full text
    Article
  20. 1120

    BLE Signal Processing and Machine Learning for Indoor Behavior Classification by Yi-Shiun Lee, Yong-Yi Fanjiang, Chi-Huang Hung, Yung-Shiang Huang

    Published 2025-07-01
    “…This study proposes a Bluetooth Low Energy (BLE)-enabled indoor positioning and behavior recognition system, integrating machine learning techniques to support sustainable and privacy-preserving health monitoring. Key optimizations include: (1) a vertically mounted Data Collection Unit (DCU) for improved height positioning, (2) synchronized data collection to reduce discrepancies, (3) Kalman filtering to smooth RSSI signals, and (4) AI-based RSSI analysis for enhanced behavior recognition. …”
    Get full text
    Article