Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,181 - 2,200 results of 2,784 for search '"\"((((\\"useds OR \"usedddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 2181

    From Neural Networks to Emotional Networks: A Systematic Review of EEG-Based Emotion Recognition in Cognitive Neuroscience and Real-World Applications by Evgenia Gkintoni, Anthimos Aroutzidis, Hera Antonopoulou, Constantinos Halkiopoulos

    Published 2025-02-01
    “…Further, related ethical issues with respect to privacy, data security, and machine learning model biases need to be much more proclaimed to responsibly apply research on emotions to areas such as healthcare, human–computer interaction, and marketing. …”
    Get full text
    Article
  2. 2182

    Interior design assistant algorithm based on indoor scene analysis by Lu Zhang

    Published 2025-12-01
    “…The proposed indoor scene analysis algorithm using color images as privileged information significantly improves the accuracy of indoor scene analysis and reduces reliance on manually annotated data. …”
    Get full text
    Article
  3. 2183

    SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation by Seyed Salar Sefati, Bahman Arasteh, Octavian Fratu, Simona Halunga

    Published 2025-07-01
    “…A similarity graph is built from the log data, allowing for effective anomaly detection using graph-based methods. …”
    Get full text
    Article
  4. 2184

    Enhancing insights in sexually transmitted infection mapping: Syphilis in Forsyth County, North Carolina, a case study. by Lani Fox, William C Miller, Dionne Gesink, Irene Doherty, Marc Serre

    Published 2024-10-01
    “…Results were assessed using latent rate theory cross validation. We show combining a moving window and a UMBME analysis with geomasked data effectively predicted the true or latent syphilis rate 5% to 26% more accurate than the traditional, geopolitical boundary method. …”
    Get full text
    Article
  5. 2185

    Predicting Student Dropout Through Text and Media Content Analysis of VKontakte Profiles by Sergei S. Gorshkov, Dmitry I. Ignatov, Anastasia Yu. Chernysheva

    Published 2025-01-01
    “…While this approach depends on publicly available VK data and may be limited by privacy settings, it still provides useful insights. …”
    Get full text
    Article
  6. 2186

    Impact of Mask-Wearing on Public Attitudes, Perceptions, and Interest in Rhinoplasty During the COVID-19 Pandemic by Mohanad M. Alsuhaim, MD, MBBS, Abdullah A. Fallatah, MD, MBBS, Mohammed H. Shawosh, MD, MBBS, Adil N. Althobaity, MBBS, SB-PLAST, EBOPRAS

    Published 2025-03-01
    “…This study aimed to investigate the influence of mask use on attitudes, perceptions, and interests in rhinoplasty during the COVID-19 pandemic in Saudi Arabia. …”
    Get full text
    Article
  7. 2187

    Parameter optimization of 3D convolutional neural network for dry-EEG motor imagery brain-machine interface by Nobuaki Kobayashi, Musashi Ino

    Published 2025-02-01
    “…By completing the system on the edge, the privacy of personal MI data can be ensured, and the system is ubiquitous, which improves user convenience. …”
    Get full text
    Article
  8. 2188

    MAGMA-MICK: A state-of-the-art digital platform facilitating the programmatic implementation of whole genome sequencing for TB care and prevention by Prof Annelies Van Rie, Fulvio Vigilante, Dr. Walter Sanseverino, Prof Annelies Van Rie

    Published 2025-03-01
    “…Methods: We MICK, a state-of-the-art secure digital platform, for the use of NGS to guide the care and prevention of (DR)-TB. …”
    Get full text
    Article
  9. 2189

    A review of machine learning and deep learning for Parkinson’s disease detection by Hajar Rabie, Moulay A. Akhloufi

    Published 2025-03-01
    “…However, challenges like the need for large and diverse datasets, data privacy concerns, and data quality in healthcare remain. …”
    Get full text
    Article
  10. 2190

    Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping by ZHENG Junhua, JIANG Hongwei, LIU Rong, LI Yixiu, LI Wen, WENG Jian

    Published 2024-12-01
    “…Finally, the potential application of the scheme in cross-departmental supervision scenarios of multi-industry and multi-source data sales data was explored, which helped the tax department to realize tax verification under the premise of protecting data privacy, and helped promote the digital transformation and healthy development of various industries.…”
    Get full text
    Article
  11. 2191

    Source-Free Domain Adaptation for Cross-Modality Abdominal Multi-Organ Segmentation Challenges by Xiyu Zhang, Xu Chen, Yang Wang, Dongliang Liu, Yifeng Hong

    Published 2025-05-01
    “…While unsupervised domain adaptation (UDA) has shown promise in addressing these issues by transferring knowledge from a different modality (source domain), its reliance on both source and target data during training presents a practical challenge in many clinical settings due to data privacy concerns. …”
    Get full text
    Article
  12. 2192

    SensorsConnect Framework: World-Wide Web for Internet of Things by Abdelrahman Elewah, Khalid Elgazzar

    Published 2024-01-01
    “…A motivating scenario illustrates its potential impact in real-life situations, such as finding a drive-thru coffee shop or crossing a country border. Using real-time road status and service occupancy data, SensorsConnect enhances Google Maps service recommendations, not only minimizing customer wait times but also distributing workload more evenly across service points. …”
    Get full text
    Article
  13. 2193

    Exploring the Frontier: Generative AI Applications in Online Consumer Behavior Analytics by Takuma Kimura

    Published 2025-03-01
    “…Furthermore, the paper discusses the challenges associated with generative AI, emphasizing the need to consider ethical issues, such as bias and data privacy. This comprehensive review contributes to a deeper understanding of generative AI’s role in OCBA, outlining its applications and functionalities from a technical perspective. …”
    Get full text
    Article
  14. 2194

    Federated learning-based non-intrusive load monitoring adaptive to real-world heterogeneities by Qingquan Luo, Chaofan Lan, Tao Yu, Minhang Liang, Wencong Xiao, Zhenning Pan

    Published 2025-05-01
    “…Recently, federated learning has enabled NILM to learn from decentralized meter data while preserving privacy. However, as real-world heterogeneities in electricity consumption data, local models, and AMI facilities cannot be eliminated in advance, federated learning-based NILM (FL-NILM) may underperform or even fail. …”
    Get full text
    Article
  15. 2195

    ADF-SL: An Adaptive and Fair Scheme for Smart Learning Task Distribution by Ahmed A. Al-Saedi, Veselka Boeva

    Published 2025-01-01
    “…However, training models within SL is affected by data heterogeneity and sensitivity, and often requires more computational resources than an individual data provider can afford. …”
    Get full text
    Article
  16. 2196

    Impact of telemedicine on antenatal care at a teaching institution in Eastern India: An insight into the future of better India by Ipsita Mohapatra, Vikash K. Rai, Subha Ranjan Samantaray

    Published 2023-11-01
    “…Materials and Methods: Primary data were collected by means of a telephonic survey of all the antenatal patients who used telemedicine services of AIIMS, Kalyani, based on a preformed questionnaire. …”
    Get full text
    Article
  17. 2197

    Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD by Mustafa Khairallah

    Published 2025-03-01
    “… Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a committing AEAD scheme into a succinctly committing AEAD scheme. …”
    Get full text
    Article
  18. 2198

    A systematic review of serious games as tools for STEM education by Talia Tene, Diego Fabián Vique López, Paulina Elizabeth Valverde Aguirre, Nilo Israel Cabezas Oviedo, Cristian Vacacela Gomez, Stefano Bellucci

    Published 2025-02-01
    “…Policymakers are encouraged to support these efforts by providing financial resources and promoting frameworks for ethical, data-secure use of serious games in education. Future research should focus on establishing a globally recognized framework for serious games in STEM, conducting longitudinal studies to evaluate long-term impacts, and exploring diverse educational contexts to ensure inclusive and effective integration.…”
    Get full text
    Article
  19. 2199

    Exploring the Limitations of Federated Learning: A Novel Wasserstein Metric-Based Poisoning Attack on Traffic Sign Classification by Suzan Almutairi, Ahmed Barnawi

    Published 2025-01-01
    “…This reference model is then used to generate an adversarial local model characterized by low accuracy but minimal perturbation. …”
    Get full text
    Article
  20. 2200

    Analyzing the Efficacy of Artificial Intelligence in Facilitating Medico-Legal Investigations and Enhancing Forensic Processes for Emergency Trauma Patients: A Systematic Review by Rajiv Ratan Singh, Sachin Kumar Tripathi, Azad Kumar Bharti, Pradeep Kumar Yadav

    Published 2025-01-01
    “…However, medicolegal concerns must be addressed for responsible AI implementation, including patient privacy, data security, liability, and ethics. Conclusion: AI can revolutionize trauma and emergency care by improving diagnosis, decision-making, and patient outcomes. …”
    Get full text
    Article