Search alternatives:
\\"useds » \\"uses (Expand Search)
Showing 2,461 - 2,480 results of 2,784 for search '"\"((((\\"useds OR \"useddddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.21s Refine Results
  1. 2461

    Federated Bayesian Deep Learning: The Application of Statistical Aggregation Methods to Bayesian Models by John Fischer, Marko Orescanin, Justin Loomis, Patrick Mcclure

    Published 2024-01-01
    “…Federated learning (FL) is an approach to training machine learning models that takes advantage of multiple distributed datasets while maintaining data privacy and reducing communication costs associated with sharing local datasets. …”
    Get full text
    Article
  2. 2462

    Personal, environmental and behavioral predictors associated with online fraud victimization among adults. by Vimala Balakrishnan, Umayma Ahhmed, Faris Basheer

    Published 2025-01-01
    “…A self-reporting questionnaire was developed based on the PEB framework and used to collect data targeting Malaysian adults. …”
    Get full text
    Article
  3. 2463

    Relationship between breast feeding and motor development in children: protocol for a systematic review and meta-analysis by Vicente Martínez-Vizcaíno, Diana P Pozuelo-Carrascosa, Celia Álvarez-Bueno, Monserrat Hernández Luengo, Carlos Berlanga-Macías

    Published 2019-09-01
    “…Subgroup analyses will be carried out based on the characteristics of motor skill development and the population included.Ethics and dissemination Ethical approval is not required because the data used will be obtained from published studies, and there will be no concerns about privacy. …”
    Get full text
    Article
  4. 2464

    Predicting and Preventing School Dropout with Business Intelligence: Insights from a Systematic Review by Diana-Margarita Córdova-Esparza, Juan Terven, Julio-Alejandro Romero-González, Karen-Edith Córdova-Esparza, Rocio-Edith López-Martínez, Teresa García-Ramírez, Ricardo Chaparro-Sánchez

    Published 2025-04-01
    “…We collected literature from the Google Scholar and Scopus databases using a comprehensive search strategy, incorporating keywords such as “business intelligence”, “machine learning”, and “big data”. …”
    Get full text
    Article
  5. 2465

    Smart Safety Helmets with Integrated Vision Systems for Industrial Infrastructure Inspection: A Comprehensive Review of VSLAM-Enabled Technologies by Emmanuel A. Merchán-Cruz, Samuel Moveh, Oleksandr Pasha, Reinis Tocelovskis, Alexander Grakovski, Alexander Krainyukov, Nikita Ostrovenecs, Ivans Gercevs, Vladimirs Petrovs

    Published 2025-08-01
    “…This paper compiles numerous industrial use cases, from bridges and tunnels to plants and power facilities, demonstrating significant improvements in inspection efficiency, data quality, and worker safety. …”
    Get full text
    Article
  6. 2466

    A hybrid approach to time series forecasting: Integrating ARIMA and prophet for improved accuracy by Sherly A, Mary Subaja Christo, Jesi V Elizabeth

    Published 2025-09-01
    “…With the increasing volume of data generated by IoT devices, performing analytics at the edge offers significant advantages in terms of latency, bandwidth consumption, and privacy. …”
    Get full text
    Article
  7. 2467

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The obtained raw data is pre-processed by using handling missing values and adaptive min-max normalization. …”
    Get full text
    Article
  8. 2468

    Deep Learning dengan Teknik Early Stopping untuk Mendeteksi Malware pada Perangkat IoT by Iwang Moeslem Andika Surya, Triawan Adi Cahyanto, Lutfi Ali Muharom

    Published 2025-02-01
    “…This approach utilizes machine learning techniques and intense learning to identify and mitigate cyber threats. The use of Convolutional Neural Network (CNN) in classifying the IoT-23 dataset with the SMOTE (Synthetic Minority Oversampling Technique) data balancing technique and the Early Stopping function shows high results. …”
    Get full text
    Article
  9. 2469

    Home Occupant Archetypes by Marco Antonio ORTIZ SANCHEZ

    Published 2019-11-01
    “…Parallelly, in-depth and semi-structured interviews were conducted, which are techniques used to gather qualitative behavioural data from the home occupants. …”
    Get full text
    Article
  10. 2470

    LITERATURE REVIEW ON THE DOUBLE-EDGED SWORD OF AI IN MENTAL HEALTH: A DEEP DIVE INTO CHATGPT'S CAPABILITIES AND LIMITATIONS by Paul Arjanto, Feibry Feronika Wiwenly Senduk

    Published 2024-04-01
    “…Key ethical concerns include data privacy and accountability. Conclusion: The study recommends a balanced approach, suggesting ChatGPT as an adjunct rather than a replacement for conventional mental health services. …”
    Get full text
    Article
  11. 2471

    Electronic health record in military healthcare systems: A systematic review. by Amir Torab-Miandoab, Mahdi Basiri, Arasb Dabbagh-Moghaddam, Leila Gholamhosseini

    Published 2025-01-01
    “…Current literature on EHR use in military healthcare is lacking and disjointed. …”
    Get full text
    Article
  12. 2472

    Investigating the Applications and Challenges of Metaverse in Education: A Systematic Review by Asadollah Khadivi

    Published 2024-11-01
    “…The research findings indicate that remote learning, immersion learning, collaborative learning, personalized learning, flipped learning, student-centered learning, experiential learning, hybrid learning, mobile learning, simulated learning, skill-based learning and Borderless and question-based learning are the most common uses of metaverse in education. However, the metaverse is associated with technical, ethical and social challenges such as the nascent nature of the technology, high cost of equipment, weak support infrastructure, inaccessibility to everyone, violation of privacy, data and network security, lack of legal guidelines and regulations. …”
    Get full text
    Article
  13. 2473
  14. 2474

    Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings by Colm Dowling, Hadi Larijani, Mike Mannion, Matt Marais, Simon Black

    Published 2024-09-01
    “…Our solution uses an unscented Kalman filter for target tracking over time and analyses features of movement to determine whether targets are human or not. …”
    Get full text
    Article
  15. 2475

    Descriptive Phenomenology from Instances of Dishonesty in Psychotherapy by Psychotherapists by Hossein Alipour, Mahdi Akbari

    Published 2024-11-01
    “…A total of 16 psychotherapists constituted the sample for this research, and data were collected using a five-axis semi-structured interview protocol focused on psychotherapy dishonesty. …”
    Get full text
    Article
  16. 2476

    Optimized summary-statistic-based single-cell eQTL meta-analysis by Maryna Korshevniuk, Harm-Jan Westra, Roy Oelen, Monique G. P. van der Wijst, Lude Franke, Marc Jan Bonder, sc-eQTLGen Consortium

    Published 2025-08-01
    “…These are however, complicated by privacy constraints due to sharing of genotype data and the measurement and technical variety across different scRNA-seq datasets as a result of differences in mRNA capture efficiency, experimental protocols, and sequencing strategies. …”
    Get full text
    Article
  17. 2477

    Digital Empowerment in Social Work: Leveraging AI to Enhance Educational Access in Developing Nations by Zvinodashe Revesai, Benjamin Tungwa, Telson Anesu Chisosa, Vanessa Runyararo Meki

    Published 2024-12-01
    “…Data were analyzed using thematic analysis, examining cases and models where AI has expanded access to scholarly materials through automated translation services, enabled localized resources through virtual training simulations, and facilitated the incorporation of culturally aligned self-help tools such as AI chatbots and wellness applications. …”
    Get full text
    Article
  18. 2478

    The Influence of Fintech on the National Security System: Law, Economic Potential and Digital Defense Strategy by Ngasiman Djoyonegoro, Muhammad Noor Harisudin, Hariyanto Hariyanto

    Published 2025-06-01
    “…Governments need to implement stringent regulations to safeguard Fintech user data and privacy and closely supervise Fintech operations to mitigate the risks of financial technology misuse. …”
    Get full text
    Article
  19. 2479

    Designing digital conversational agents for youth with multiple mental health conditions: Insights on key features from a youth-engaged qualitative descriptive study by Jingyi Hou, Jamie Gibson, Thalia Phi, Brian Ritchie, Louise Gallagher, Gillian Strudwick, George Foussias, Darren B Courtney, Aristotle Voineskos, Stephanie Ameis, Kristin Cleverley, Lisa D Hawke

    Published 2025-03-01
    “…Results Four key themes were generated from the focus group data: (1) the importance of a customizable and flexible design for personalization; (2) confidentiality, privacy features and risk mitigation features; (3) the need for reliable, informative content that is user tested and validated; (4) a friendly and human-like interaction style. …”
    Get full text
    Article
  20. 2480

    De-identification of Emergency Medical Records in French: Survey and Comparison of State-of-the-Art Automated Systems by Loick Bourdois, Marta Avalos, Gabrielle Chenais, Frantz Thiessard, Philippe Revel, Cedric Gil-Jardine, Emmanuel Lagarde

    Published 2021-04-01
    “…For visits motivated by a traumatic event, information on the causes are stored in free-text clinical notes. To exploit these data, an automated de-identification system guaranteeing protection of privacy is required. …”
    Get full text
    Article