Showing 2,121 - 2,140 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.15s Refine Results
  1. 2121

    A Bibliometric Analysis on Federated Learning by Ersin Namlı, Yusuf Sait Türkan, Mesut Ulu, Ömer Algorabi

    Published 2024-12-01
    “…With the rapid advancement of technology and growing concerns about data privacy, federated learning (FL) has attracted considerable attention from the scientific community. …”
    Get full text
    Article
  2. 2122

    A Comprehensive Survey of Deep Learning Approaches in Image Processing by Maria Trigka, Elias Dritsas

    Published 2025-01-01
    “…Metrics used for rigorous model evaluation are also discussed, underscoring the importance of performance assessment in varied application contexts. …”
    Get full text
    Article
  3. 2123

    Opportunities, challenges and development areas of chartered accountants in the Fourth Industrial Revolution by Chené Brands, Claude-Hélène Mayer, Rudolf M. Oosthuizen

    Published 2024-12-01
    “…Research approach/design and method: The research followed a qualitative approach to data collection and obtained the data through 14 semi-structured interviews. …”
    Get full text
    Article
  4. 2124

    Digital Newsroom Transformation: A Systematic Review of the Impact of Artificial Intelligence on Journalistic Practices, News Narratives, and Ethical Challenges by Alem Febri Sonni, Hasdiyanto Hafied, Irwanto Irwanto, Rido Latuheru

    Published 2024-10-01
    “…The key findings show a significant increase in the use of AI for news writing automation (73% of news organizations), data analysis (68%), and content personalization (62%). …”
    Get full text
    Article
  5. 2125

    A Comparative Analysis of Blockchain-Smart Contracts-ERP Integration Strategies for Supply Network (SN) Collaboration by Goknur Arzu Akyuz, Omer Ileri

    Published 2025-01-01
    “…After identifying main configuration dimensions of privacy setting (public/private/consortium), smart contract utilization for business logic implementation (full/none) and degree of transactional data decentralization (full/only critical data/none), 18 deployment scenarios are developed for advanced SN collaboration. …”
    Get full text
    Article
  6. 2126

    Generative AI for Industry 5.0: Analyzing the Impact of ChatGPT, DALLE, and Other Models by Siva Sai, Revant Sai, Vinay Chamola

    Published 2025-01-01
    “…The paper scrutinizes the multifaceted use-cases of GAI, emphasizing its instrumental function in amplifying operational efficiency, minimizing downtime, and fostering economic savings through predictive maintenance and acute real-time data analytics. …”
    Get full text
    Article
  7. 2127

    Treatment-emergent Affective Switch: A Case Series Study by Jesvin L Johnson, M Shashwath Sathyanth, Anil Kakunje

    Published 2024-07-01
    “…Managing antidepressant use in bipolar disorder is crucial due to the risk of the treatment-emergent affective switch (TEAS), where antidepressants can induce shifts from depression to mania or hypomania, a complex phenomenon influenced by genetics, neurobiology, and environment. …”
    Get full text
    Article
  8. 2128

    Electroencephalography-Based Brain-Computer Interfaces in Rehabilitation: A Bibliometric Analysis (2013–2023) by Ana Sophia Angulo Medina, Maria Isabel Aguilar Bonilla, Ingrid Daniela Rodríguez Giraldo, John Fernando Montenegro Palacios, Danilo Andrés Cáceres Gutiérrez, Yamil Liscano

    Published 2024-11-01
    “…Ethical considerations, including data privacy, transparency, and equitable access to BCI technologies, must be prioritized to ensure the inclusive development and use of these technologies across diverse socioeconomic groups.…”
    Get full text
    Article
  9. 2129
  10. 2130

    Resilience in the Internet of Medical Things: A Review and Case Study by Vikas Tomer, Sachin Sharma, Mark Davis

    Published 2024-11-01
    “…Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. …”
    Get full text
    Article
  11. 2131

    SCRHM: A Secure Continuous Remote Health Monitoring System by Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen

    Published 2015-12-01
    “…With this scheme, remote health monitoring service provider is able to detect outliers over encrypted health parameters. Using analysis, we prove the correctness and security of the proposed scheme on privacy protection of users’ health data. …”
    Get full text
    Article
  12. 2132

    FLavourite: Horizontal and Vertical Federated Learning Setting Comparison by Walter Riviera, Ilaria Boscolo Galazzo, Gloria Menegaz

    Published 2025-01-01
    “…We assess the classification of Alzheimer’s disease using non-independent and identically distributed (non-i.i.d.) 3D images and tabular data. …”
    Get full text
    Article
  13. 2133

    AML-Based Multi-Dimensional Co-Evolution Approach Supported by Blockchain: Architecture Design and Case Study on Intelligent Production Lines for Industry 4.0 by Kai Ding, Detlef Gerhard, Liuqun Fan

    Published 2025-03-01
    “…As a transparent decentralized network, blockchain’s compatibility with the challenges of AML collaboration processes, data security, and privacy is not ideal. This paper proposes a new method to enhance the collaborative evolution of IPLs. …”
    Get full text
    Article
  14. 2134

    “Invisible wounds of childbirth”; women’s experiences of obstetric violence: a phenomenological qualitative study by Esra Özer, Döndü Sevimli Güler

    Published 2025-08-01
    “…The interview data were transcribed and then subjected to qualitative content analysis in accordance with Standards for Qualitative Research Reporting (SRQR) using Graneheim and Lundman’s content analysis method. …”
    Get full text
    Article
  15. 2135

    Assessing the transferability of BERT to patient safety: classifying multiple types of incident reports by Ying Wang, Farah Magrabi

    Published 2025-08-01
    “…For ambiguous medium and low severity levels, the F-score improvements ranged from 3.6% to 19.7% across all test datasets.Discussion Fine-tuned BERT led to improved performance, particularly in identifying rare classes and generalising effectively to unseen data, compared with small CNNs.Conclusion Fine-tuned BERT may be useful for classification tasks in patient safety where data privacy, scarcity and imbalance are common challenges.…”
    Get full text
    Article
  16. 2136

    Unleashing the Power of Wireless Communication in Healthcare by Empowering Patient Care and Connectivity: A Comprehensive Survey by Urvashi Chaudhary, Mohammad Furqan Ali, Ambrish Kumar, Abhishek Sharma, Dushantha K. Nalin Jayakody

    Published 2025-01-01
    “…These challenges and opportunities include data security and privacy issues, as well as the need for a robust communication infrastructure. …”
    Get full text
    Article
  17. 2137

    ROBOTISATION AND SERVICE AUTOMATION IN THE TOURISM AND HOSPITALITY SECTOR: A META-STUDY (1993-2024) by Dušan MANDIĆ, Miroslav KNEŽEVIĆ, Dušan BOROVČANIN, Aleksandra VUJKO

    Published 2024-09-01
    “…Analyses 310 publications published in the last 32 years processed using Google Scholar search engine. The data sets used for the observations consist primarily of key research works, predominantly appearing in peer-reviewed international journals. …”
    Get full text
    Article
  18. 2138

    A Survey on Hybrid-CNN and LLMs for Intrusion Detection Systems: Recent IoT Datasets by Saida Elouardi, Anas Motii, Mohammed Jouhari, Abdoul Nasser Hassane Amadou, Mustapha Hedabou

    Published 2024-01-01
    “…Various IDS methodologies, including those using Machine Learning (ML), Deep Learning (DL) and Large Language Models (LLMs), are employed to identify intrusions within the data; however, improvements to the detection systems are still needed. …”
    Get full text
    Article
  19. 2139
  20. 2140

    The Effect of Viral Promotional Advergames on the Behavioral Reactions by Mostafa Heidari Haratemeh

    Published 2024-09-01
    “…This research used data from pre-measure and post-measure assessments within a real viral marketing campaign. …”
    Get full text
    Article