Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,141 - 1,160 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.18s Refine Results
  1. 1141

    Crypto management: a novel organizational management model based on blockchain by Juanjuan LI, Ge WANG, Xiao WANG, Junqing LI, Yong YUAN, Fei-Yue WANG

    Published 2022-06-01
    “…Aim to deal with the problem of data, trust and timeliness asymmetry faced by modern organizational management from the root, a novel organizational management model towards Web 3.0 namely crypto management was proposed.It was enabled by blockchain technology and smart contracts based on it, supported by the federated data, organized in the form of DAO (decentralized autonomous organization), and driven by the incentive mechanism with NFT (non-fungible token) as the core.The primary goal of crypto management was to realize trustable, reliable and usable real-time management decision-making under the premise of data security and privacy protection.The framework of crypto management was formulated, its core components and implementation mode were discussed, and its operation process using the example of personnel performance management was also introduced.Towards the end, the potential future works in this emerging new area were discussed.…”
    Get full text
    Article
  2. 1142

    The relevance of implementing the employee digital profile as an element of the employer’s HR policy by O. V. Shcherbakova

    Published 2025-06-01
    “…At the same time, the lack of normative methodologies for the creation and operation of employee digital profiles and comprehensive scientific research predetermine increasing risks of violation of personal data of employees, privacy of employees, as well as discrimination in making legally significant decisions. …”
    Get full text
    Article
  3. 1143

    Tabular transformer generative adversarial network for heterogeneous distribution in healthcare by Ha Ye Jin Kang, Minsam Ko, Kwang Sun Ryu

    Published 2025-03-01
    “…However, privacy concerns have hindered their widespread use. …”
    Get full text
    Article
  4. 1144

    The Impact of Artificial Intelligence on Personalized Learning in Higher Education: A Systematic Review by Carlos Merino-Campos

    Published 2025-03-01
    “…The risk of bias was assessed using a standardized ranking system. This systematic review follows the PRISMA guidelines to ensure transparency in study selection, data extraction, and synthesis. …”
    Get full text
    Article
  5. 1145

    Realizing the potential of Internet of Things (IoT) in Industrial applications by Bharat Rathi, S. Thapaswi, Meghana Kambhampati, Vineet Jain, P. Akshay, Trilok Nath Pandey, Sunil Kumar Pradhan

    Published 2025-04-01
    “…However, challenges like data privacy, interoperability, and scalability remain critical barriers to widespread adoption. …”
    Get full text
    Article
  6. 1146

    Blockchain Applications in the Military Domain: A Systematic Review by Nikos Kostopoulos, Yannis C. Stamatiou, Constantinos Halkiopoulos, Hera Antonopoulou

    Published 2025-01-01
    “…It addresses many problems related to data security, privacy, communication, and supply chain management. …”
    Get full text
    Article
  7. 1147

    FedDrip: Federated Learning With Diffusion-Generated Synthetic Image by Karin Huangsuwan, Timothy Liu, Simon See, Aik Beng Ng, Peerapon Vateekul

    Published 2025-01-01
    “…In the realm of machine learning in healthcare, federated learning (FL) is often recognized as a practical solution for addressing issues related to data privacy and data distribution. However, many real-world datasets are not identically and independently distributed (non-IID). …”
    Get full text
    Article
  8. 1148

    The Impact of AI-Driven Application Programming Interfaces (APIs) on Educational Information Management by David Pérez-Jorge, Miriam Catalina González-Afonso, Anthea Gara Santos-Álvarez, Zeus Plasencia-Carballo, Carmen de los Ángeles Perdomo-López

    Published 2025-06-01
    “…In today’s digitalized educational landscape, the intelligent use of information is essential for personalizing learning, improving assessment accuracy, and supporting data-driven pedagogical decisions. …”
    Get full text
    Article
  9. 1149

    AI optimization algorithms enhance higher education management and personalized teaching through empirical analysis by XiWen Xu

    Published 2025-03-01
    “…The research also identifies challenges and limitations, including data privacy issues, algorithmic bias, and the need for human-AI interaction. …”
    Get full text
    Article
  10. 1150

    Metaheuristic-Based Cepstral Sensing Technique for Prolonging Network Lifetime and Mitigating Primary User Emulation Attacks in Cognitive Radio Sensor Network by V. Abilasha, A. Karthikeyan

    Published 2025-01-01
    “…Extensive simulations are used to analyze the proposed algorithm, incorporating important performance parameters including error probability, energy efficiency, residual energy, data gathering efficiency, network longevity, and throughput. …”
    Get full text
    Article
  11. 1151

    Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users by George Alex Stelea, Livia Sangeorzan, Nicoleta Enache-David

    Published 2025-06-01
    “…The proliferation of the Internet of Things (IoT) has led to an abundance of data streams and real-time dashboards in domains such as smart cities, healthcare, manufacturing, and agriculture. …”
    Get full text
    Article
  12. 1152

    Industry 4.0 in commercial airlines: a bibliometric analysis by Nicholas Omido, Rose Luke, Joash Mageto, Thomas Ombati, Thomas Ombati

    Published 2025-08-01
    “…Commercial airlines face numerous challenges related to operational inefficiencies, poor maintenance practices, overcrowding of airports, supply chain complexity, lack of seamless customer experience, safety issues, data privacy and security issues, increasing fuel prices, and sustainability issues; however, Industry 4.0 technologies are widely regarded as a transformative solution, offering advanced tools and methodologies to address these challenges effectively. …”
    Get full text
    Article
  13. 1153
  14. 1154

    A Survey on Anti-Money Laundering Techniques in Blockchain Systems by Leyuan Liu, Xiangye Li, Tian Lan, Yakun Cheng, Wei Chen, Zhixin Li, Sheng Cao, Weili Han, Xiaosong Zhang, Hongfeng Chai

    Published 2025-04-01
    “…Furthermore, this study discusses the practical applications of these techniques and reviews commonly used datasets that support AML research. Looking ahead, the advancement of AML technologies in blockchain systems necessitates progress in several critical areas: the construction of AML datasets capable of addressing data imbalance and annotation uncertainty, development of trusted AML algorithms, design of detection mechanisms for covert financial activities, and formulation of privacy-preserving yet regulation-compliant AML solutions. …”
    Get full text
    Article
  15. 1155

    "I don't see a reason why we should be hidden from view": Views of a convenience sample of people living with HIV on sharing HIV status data in routinely collected health and care... by Elizabeth Ford, Katie Goddard, Michael Smith, Jaime Vera

    Published 2025-01-01
    “…The overarching theme was around trust, both the loss of trust experienced by participants due to previous negative or discriminatory experiences, and the need to slowly build trust in data-sharing initiatives. Further themes showed that participants were supportive of data being used for research and health care improvements, but needed a guarantee that their privacy would be protected. …”
    Get full text
    Article
  16. 1156

    Advanced intrusion detection technique (AIDT) for secure communication among devices in internet of medical things (IoMT) by M. Ramya, Pradeep Sudhakaran, Yuvaraj Sivagnanam, C. Santhana Krishnan

    Published 2025-05-01
    “…Considering the aforementioned, this study suggests an advanced intrusion detection technology (AIDT) to guarantee safe data exchange amongst IoMT devices. The model uses a probabilistic neural network (PNN) to classify whether intrusions are present or not, and particle swarm optimization (PSO) for feature extraction. …”
    Get full text
    Article
  17. 1157

    Employing combined spatial and frequency domain image features for machine learning-based malware detection by Abul Bashar

    Published 2024-07-01
    “…The ubiquitous adoption of Android devices has unfortunately brought a surge in malware threats, compromising user data, privacy concerns, and financial and device integrity, to name a few. …”
    Get full text
    Article
  18. 1158

    Artificial Intelligence in Healthcare: Innovation and Impact in Medical Practice by Amelia-Maria ISAC, Corina VERNIC

    Published 2025-05-01
    “…Furthermore, federated learning and domain adaptation techniques may help address data privacy concerns and improve model robustness across diverse populations. …”
    Get full text
    Article
  19. 1159

    Building a Digital Health Research Platform to Enable Recruitment, Enrollment, Data Collection, and Follow-Up for a Highly Diverse Longitudinal US Cohort of 1 Million People in the... by Dave Klein, Aisha Montgomery, Mark Begale, Scott Sutherland, Sherilyn Sawyer, Jacob L McCauley, Letheshia Husbands, Deepti Joshi, Alan Ashbeck, Marcy Palmer, Praduman Jain

    Published 2025-01-01
    “…Digital research platforms can be used to increase participant access, improve study engagement, streamline data collection, and increase data quality; however, the efficacy and sustainability of digitally enabled studies rely heavily on the design, implementation, and management of the digital platform being used. …”
    Get full text
    Article
  20. 1160