Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,081 - 2,100 results of 2,784 for search '"\"((((\\"useds OR \"useddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.21s Refine Results
  1. 2081

    Advancements in artificial intelligence for atopic dermatitis: diagnosis, treatment, and patient management by Fang Cao, Yujie Yang, Cui Guo, Hui Zhang, Qianying Yu, Jing Guo

    Published 2025-12-01
    “…Despite challenges in data privacy and model transparency, the potential of artificial intelligence in advancing AD care is enormous, bringing the future to precision medicine and improving patient outcomes. …”
    Get full text
    Article
  2. 2082

    Analysis of Modernization Movements in Housing During the Early Republican Period: Karabük, Türkiye by Ayşe Merve Saraçoğlu Gezer, Ayşen Esra Bölükbaşı Ertürk

    Published 2025-04-01
    “…In this study, the idea that houses are not only structural products, but the structures that have become homes for humans, is approached and discussed through concepts such as spatial organization, relationality, accessibility, visibility, density of use, depth, privacy, and belonging. The Yenişehir district in Karabük province, which is thought to have been transformed into design by considering these concepts, also constitutes the focus area of the study idea in this sense. …”
    Get full text
    Article
  3. 2083

    Motivated by Design: A Codesign Study to Promote Challenging Misinformation on Social Media by Selin Gurgun, Emily Arden-Close, Keith Phalp, Raian Ali

    Published 2024-01-01
    “…We applied the unified theory of acceptance and use of technology (UTAUT) as a theoretical framework and analysed our data based on the core constructs of this framework: performance expectancy, effort expectancy, social influence, and facilitating conditions. …”
    Get full text
    Article
  4. 2084

    The Interdependence of Competition Policy, Consumer Policy and Regulation in Introducing and Safeguarding Effective Competition in the EU Telecommunications Market by Andreas Bartels, Doru Alexandru Pleșea, Michael Studeny, Vanessa Just

    Published 2017-05-01
    “…In the case of telecommunications, several initiatives of the European Commission and of national regulatory authorities to falls in prices and forced operators to implement customer friendly rules and to protect customer data and privacy. The authors consider that the European Commission has tried to establish and harmonise rules across all member states in order to protect the interests and rights of consumers on the telecommunication market. …”
    Get full text
    Article
  5. 2085

    The Transformative Impact of Artificial Intelligence in Healthcare: Innovations, applications, and future prospects by Shen Ruoyu

    Published 2024-01-01
    “…At the same time, the application of AI in healthcare poses a number of challenges, such as data privacy, algorithmic bias, and ethics. This study also explores the role of AI in global health, the need for policies and regulations, and the long-term impact of AI on future healthcare systems. …”
    Get full text
    Article
  6. 2086

    Views on the incorporation of Geolocation Devices in Field Trips by Marta Magallón, Cristina Mercader

    Published 2022-01-01
    “…Geolocation in field trips has great potential, but it is an understudied field that needs more research and discussion to ensure data privacy.…”
    Get full text
    Article
  7. 2087

    Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem by Saša Malešević, Michael Lustenberger, Florian Spychiger

    Published 2020-12-01
    “…Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. …”
    Get full text
    Article
  8. 2088

    An intelligent conversational agent for querying satellite manoeuvre detections: a case study by Wathsala Karunarathne, David P Shorten, Matthew Roughan

    Published 2025-06-01
    “…Moreover, our system can handle sensitive and confidential data without breaching privacy. This paper presents the results of deploying SatChat in conjunction with a particle filter based manoeuvre detection system.…”
    Get full text
    Article
  9. 2089

    IoT-driven smart grid monitoring with enhanced energy routing and advanced encryption techniques by K. Perachi, S. Balaji

    Published 2025-11-01
    “…The proposed work incorporates Improved Paillier Homomorphic (IPH) based encryption scheme, which assures integrity and confidentiality of data transmitted. The outcomes of proposed smart grid system using MATLAB and FPGA controller demonstrate significant improvements by providing enhanced security and optimal routing. …”
    Get full text
    Article
  10. 2090

    Revolutionizing Midwifery Education : A Scoping Review of Artificial Intelligence Methods by Harridhil Silmi, Ari Indra Susanti

    Published 2025-04-01
    “…Despite these advancements, challenges such as ethical concerns (algorithmic bias, privacy issues), poor data quality, limited AI expertise among educators, and resistance to change in traditional learning environments were noted. …”
    Get full text
    Article
  11. 2091

    DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems by Yucong Duan, Zhendong Guo

    Published 2025-07-01
    “…The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. …”
    Get full text
    Article
  12. 2092

    Criminal Law Challenged by Crossing into Virtual Reality by Mahdi Karimi

    Published 2025-03-01
    “…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
    Get full text
    Article
  13. 2093

    A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things by Sasikumar Asaithambi, Senthilkumar Nallusamy, Jing Yang, Sunil Prajapat, Gyanendra Kumar, Pramod Singh Rathore

    Published 2025-05-01
    “…This article presents a blockchain-assisted safe data-sharing mechanism that provides security requirements in the industry using IoT. …”
    Get full text
    Article
  14. 2094

    Analisis Pengaruh Kualitas Layanan Terhadap Kepuasan Pelanggan dan Loyalitas Pengguna Aplikasi Jenius Menggunakan Model E-S- Qual dan E- Recs- QUal (Studi Kasus: Pengguna Aplikasi... by Alfansya Achmad Mulyadi, Satrio Hadi Wijoyo, Hanifah Muslimah Az-Zahra

    Published 2022-12-01
    “…This study involved 100 samples of Jenius application users in Malang City. This research uses purposive sampling as a sampling technique and multiple and simple linear regression analysis as a technique in data analysis. …”
    Get full text
    Article
  15. 2095

    Federated Learning Enhanced MLP–LSTM Modeling in an Integrated Deep Learning Pipeline for Stock Market Prediction by Jayaraman Kumarappan, Elakkiya Rajasekar, Subramaniyaswamy Vairavasundaram, Ketan Kotecha, Ambarish Kulkarni

    Published 2024-10-01
    “…A global model is created and updated through repeated training and totaling of parameters while preserving privacy of the data going to each node. In the performance evaluation, quantitative measures like Root-Mean-Square Error (RMSE), and accuracy are seven used. …”
    Get full text
    Article
  16. 2096

    Blockchain enhanced smart healthcare management for chronic diseases by Shruti Saxena, Shivani Saxena, Nikunj Tahilramani, Panem Charanarur

    Published 2025-06-01
    “…Abstract Chronic diseases affect millions of people worldwide, making it a significant issue for the efficient and secure management of patient data. Most traditional chronic disease management systems fail to manage data in real time and struggle with interoperability and security issues. …”
    Get full text
    Article
  17. 2097

    Hybrid-CID: Securing IoT with Mongoose Optimization by S. Merlin Sheeba, R. S. Shaji

    Published 2025-03-01
    “…After preprocessing, the Hybrid-CID framework develops a hybrid optimization algorithm to identify the intrusions from the traffic data which ensures data privacy by maintaining the reliability and integrity of IoT deployments. …”
    Get full text
    Article
  18. 2098

    A Comprehensive Survey of Electric Vehicle Charging Demand Forecasting Techniques by Mamunur Rashid, Tarek Elfouly, Nan Chen

    Published 2024-01-01
    “…Meanwhile, emerging machine learning techniques bring promising prospects, yet exhibit suboptimal performance with insufficient data. Additionally, existing studies often overlook several critical areas such as overcoming data scarcity, security and privacy concerns, managing the inherent stochasticity of demand data, selecting forecasting methods for a specific feature, and developing standardized performance metrics. …”
    Get full text
    Article
  19. 2099

    A CAE model-based secure deduplication method by Chunbo Wang, Guoying Zhang, Hui Qi, Bin Chen

    Published 2025-07-01
    “…Abstract Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. …”
    Get full text
    Article
  20. 2100

    A Bibliometric Analysis of Publications on Surveillance and New Media Concepts in The Web of Science Database by Anıl Durmuşahmet

    Published 2025-06-01
    “…To this end, a bibliometric analysis based on quantitative data is conducted using the Web of Science (WoS) database as of June 23, 2024. …”
    Get full text
    Article