Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 961 - 980 results of 2,784 for search '"\"((((\\"useds OR \"useddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.16s Refine Results
  1. 961

    Building occupancy estimation using single channel CW radar and deep learning by Sourav Kumar Pramanik, Md. Shafkat Hossain, Shekh Md. Mahmudul Islam

    Published 2025-04-01
    “…Abstract Counting the number of people in a room is crucial for optimizing smart buildings, enhancing energy efficiency, and ensuring security while preserving privacy. This study introduces a novel radar-based occupancy estimation method leveraging a 24-GHz Continuous Wave (CW) radar system integrated with time-frequency mapping techniques using Continuous Wavelet Transform (CWT) and power spectrum analysis. …”
    Get full text
    Article
  2. 962

    Blockchain framework with IoT device using federated learning for sustainable healthcare systems by B. Bhasker, P. Muralidhara Rao, P. Saraswathi, S. Gopal Krishna Patro, Javed Khan Bhutto, Saiful Islam, Mohammed Kareemullah, Addisu Frinjo Emma

    Published 2025-07-01
    “…The proposed method achieves data privacy and security by 98.73%, intrusion detection efficiency by 97.16%, disease detection accuracy by 96.425, proactive healthcare management by 98.37%, and interoperability by 96.74%.…”
    Get full text
    Article
  3. 963

    Unobtrusive stress detection using wearables: application and challenges in a university setting by Peter Neigel, Andrew Vargo, Benjamin Tag, Koichi Kise

    Published 2025-08-01
    “…Advances in sensing accuracy and utility design in wearables might make this feasible; however, real-world adoption faces challenges, as users often fail to wear or use these devices consistently and correctly. Additionally, institutional monitoring raises privacy concerns.MethodsIn this study, we analyze real-world data from a cohort of 103 Japanese university students to identify periods of cyclical stress while ensuring individual privacy through aggregation. …”
    Get full text
    Article
  4. 964
  5. 965
  6. 966

    Heartbeat detection and personal authentication using a 60 GHz Doppler sensor by Takuma Asano, Shintaro Izumi, Hiroshi Kawaguchi

    Published 2025-08-01
    “…Unlike fingerprint and facial recognition systems, they offer authentication without physical contact or privacy concerns. This study focuses on non-contact seismocardiography using microwave Doppler sensors and aims to apply this technology for biometric authentication.MethodWe proposed a method for authenticating and identifying heartbeat signals through supervised learning using a conditional variational autoencoder (CVAE). …”
    Get full text
    Article
  7. 967

    Emotion Estimation Using Noncontact Environmental Sensing with Machine and Deep Learning Models by Tsumugi Isogami, Nobuyoshi Komuro

    Published 2025-01-01
    “…This paper presents a method for estimating arousal and emotional valence levels using non-contact environmental sensing, addressing challenges such as discomfort from long-term device wear and privacy concerns associated with facial image analysis. …”
    Get full text
    Article
  8. 968

    Using Digital Technology to Conduct COVID-19 Surveillance: A Systematic Review by Fitrisia Rahma, Fatmah Fatmah, Rachmadhi Purwana

    Published 2025-06-01
    “…Unique Contribution: This study emphasises the role of digital technologies in virus detection, monitoring, and prevention as a medium of infectious disease transmission, particularly in contact tracing, symptom monitoring, location tracking, and real-time data management. It highlights the challenges of privacy, data security, and public adoption issues. …”
    Get full text
    Article
  9. 969
  10. 970

    Development of an intelligent intrusion detection system for IoT networks using deep learning by Haozhe Zhang

    Published 2025-07-01
    “…However, attack diversity, device heterogeneity, and traditional security limitations necessitate advanced data analysis. Researchers increasingly use deep learning, which excels in handling large-scale data, to develop robust intrusion detection systems. …”
    Get full text
    Article
  11. 971

    High-fidelity steganography in EEG signals using advanced transform-based methods by Enes Efe

    Published 2025-05-01
    “…The increasing prevalence of digital health solutions and smart health devices (SHDs) ensures the continuity of personal biometric data while simultaneously raising concerns about their security and privacy. …”
    Get full text
    Article
  12. 972
  13. 973
  14. 974

    Reporting the potential risk of using AI in higher Education: Subjective perspectives of educators by Marcel Pikhart, Liqaa Habeb Al-Obaydi

    Published 2025-05-01
    “…The findings reveal significant concerns about privacy risks, academic integrity, and the validity of AI-generated data. …”
    Get full text
    Article
  15. 975

    Deep Learning for Medical Image Analysis Applications in Disease Detection and Diagnosis by Panchadhyayee Swagata, N Shirisha, S Sureshkumar, Priya S Harthy Ruby, Ramalingam Vanaja, M Mahima

    Published 2025-01-01
    “…Its potential applications are indeed great, but realising its potential has been slow owing to a host of challenges such as implementing it in a real-life scenario, data privacy challenges, ethical concerns, AI models being biased, operating system structures needing to be interoperable with existing systems, and their compliance with regulating standards. …”
    Get full text
    Article
  16. 976

    A Survey on Android Malware Detection Techniques Using Supervised Machine Learning by Safa J. Altaha, Ahmed Aljughaiman, Sonia Gul

    Published 2024-01-01
    “…Android malware threatens users’ privacy, data security, and overall device performance. …”
    Get full text
    Article
  17. 977

    Pre-service English Teacher’s Perceptions About Learning Using Artificial Intelligence by Carolina Reyes Galindo, Oscar Manuel Narvaez Trejo, Esteban Fabian Perez Lobato

    Published 2025-03-01
    “…Using a mixed-methods approach, data were collected form 104 PSETs via a structured questionnaire and semi-structured interviews with eight-participants. …”
    Get full text
    Article
  18. 978
  19. 979

    Health Unchained Podcast on New Decentralized Industry Coalition by Ray Dogum

    Published 2025-04-01
    “…Concepts explored during the conversation include: • Financial systems interacting with health • AI agents interacting with AI agents, exchanging value and micro payments • Building frameworks that make it easy to consume for CIOs around globe • Blockchain transaction framework • AI analytical framework • Privacy preservation data complying with HIPAA and HL7 • Coming together to solve industry problems  • Real world implementations, use cases - including reporting, health data, and DeSci, clinical innovations and research, tokenization, ethical AI, and verifiable intelligence • Stable coins for cross border payments • Full access to data, and payments around globe • Supply chain ecosystem, pharmacy, pharma, insurance/payors, clinics, doctors, and patients • Who will new intermediaries be to move data, bill, and secure the data? …”
    Get full text
    Article
  20. 980

    The Possibilities of Legal Leveling of Political, Organizational and Managerial Risks of Using Artificial Intelligence by Alexander S. Kiselev

    Published 2025-07-01
    “…The absence of human morality in artificial intelligence is emphasized, leading to ethical concerns regarding AI application, data privacy issues, the creation and spread of misinformation (for example, deepfakes), AI-driven discrimination, and unequal access to AI technologies. …”
    Get full text
    Article