Showing 2,401 - 2,420 results of 2,784 for search '"\"((\\"use privacy data\\") OR (((\"useds OR \"uses) OR \"used) privacy data\\"))~\""', query time: 0.21s Refine Results
  1. 2401

    Trusted execution environments for quantum computers by Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer, Jakub Szefer

    Published 2025-06-01
    “…Without dedicated security protections, quantum circuits submitted to cloud-based quantum computer providers could be accessed by the cloud provider, or malicious insiders working in the cloud provider's data centers. Furthermore, data embedded in these circuits can similarly be accessed as it is encoded using quantum gates inside the circuit. …”
    Get full text
    Article
  2. 2402

    Integrating artificial intelligence in drug discovery and early drug development: a transformative approach by Alberto Ocana, Atanasio Pandiella, Cristian Privat, Iván Bravo, Miguel Luengo-Oroz, Eitan Amir, Balazs Gyorffy

    Published 2025-03-01
    “…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
    Get full text
    Article
  3. 2403

    Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring by Mauro Rodriguez-Marin, Luis Gustavo Orozco-Alatorre

    Published 2025-02-01
    “…Unlike complex machine learning models, it offers parsimony in transparency, efficiency, and reproducibility, making it ideal for clinical settings where explainable, data-driven decisions are essential. Methods: A logistic regression model was developed using R to analyze biometric and demographic data from a cross-sectional dataset, including real-world data from public institucions. …”
    Get full text
    Article
  4. 2404

    Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach by Jian Yang, Shaoxian Zhu, Zhongyi Wen, Qiang Li

    Published 2025-07-01
    “…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
    Get full text
    Article
  5. 2405

    The Analysis of the Effective Factors on Urban Blight in District 3, Region 12, Tehran City by Hossein Mansourian, Ahmad Pour Ahmad, Hasan Ashouri

    Published 2019-09-01
    “…Materials and Methods This study is mostly based on the initial data resulted from surveying the households using a researcher-made questionnaire; however, the tools of the interview, observation, and the results obtained from the public censuses of population and housing are also used to achieve the required data and information. …”
    Get full text
    Article
  6. 2406

    Identification of Factors Affecting the Selection of Women's Gyms by Abbas Naghizadeh-Baghi, Masoud Imanzadeh, Mitra Lalfam, Farzad Nobakht Sareban, Majid Javid

    Published 2021-06-01
    “…The data were analyzed by SPSS26 software using Exploratory Factor Analysis test.Results: The results showed that 44 final characteristics affecting the selection of the gym were factorized into 8 factors by factor analysis and these factors explain 67% of the total variance.Conclusion:   Factors influencing the selection of women's gymnasiums in order of priority include Physical Evidence, process, Place, price, product, People, Promotion and Privacy.…”
    Get full text
    Article
  7. 2407

    Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective by Karin Brodén, Jonas Andersson, Agnieszka Kitkowska, Awais Ahmad, Peter Mozelius

    Published 2025-06-01
    “…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
    Get full text
    Article
  8. 2408

    A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023 by Shalini Kumari, Chander Prabha, Asif Karim, Md. Mehedi Hassan, Sami Azam

    Published 2024-01-01
    “…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
    Get full text
    Article
  9. 2409

    The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs): by Mugisha, Justin, Francis Adyanga, Akena, Ocan, Johnson

    Published 2025
    “…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
    Get full text
    Article
  10. 2410

    Evaluating new technologies and organizational structures by Ofira Schwartz, Michele Hayslett

    Published 2024-12-01
    “…The author suggests that using this relatively new technology may reduce the time and effort required by data repositories staff for data curation and may enhance data findability and usability. …”
    Get full text
    Article
  11. 2411

    Preferences and Willingness to Pay for Health App Assessments Among Health Care Stakeholders: Discrete Choice Experiment by Anna-Lena Frey, Simon Leigh, Carla Toro, Carme Pratdepàdua Bufill, Charles McCay, Tatjana Prenđa Trupec, Giuseppe D'Avenio, Menno Kok, Antanas Montvila, Philipp Goedecker, Petra Hoogendoorn

    Published 2025-05-01
    “… BackgroundThe adoption of high-quality health apps has been slow, despite the myriad benefits associated with their use. This is partly due to concerns regarding the effectiveness, safety, and data privacy of such apps. …”
    Get full text
    Article
  12. 2412

    Pre-class learning assessment on integrating artificial intelligence into evidence-based medicine curriculum by ZUHAER·Yisha, CHEN Xiaowei, CAO Wangnan, WU Shanshan, LIU Junchang, SUN Yumei, WU Tao, ZHAN Siyan, SUN Feng

    Published 2025-05-01
    “…Differences between master’s and doctoral students were analyzed using the Mann-Whitney U test.Results A total of 46 students participated in the survey (34 Masters and below, and 12 PhDs). …”
    Get full text
    Article
  13. 2413

    Exploring Perceived Barriers in the Assessment and Management of Female Sexual Dysfunction: An Integrated Qualitative and Quantitative Study among Trainee Residents by Yogender Kumar Malik, Adwitiya Ray, Sujata Sethi, Rajiv Gupta

    Published 2025-01-01
    “…A total of 92 trainee residents from related medical specialties of psychiatry, gynecology, dermatology, and urology, who provided informed consent, participated in the study. Data were collected using a validated questionnaire regarding perceived barriers related to residents’ knowledge and attitudes toward assessing FSD and a case vignette. …”
    Get full text
    Article
  14. 2414

    Revolutionizing Sports: The Role of Wearable Technology and AI in Training and Performance Analysis by Stanisław Dudek, Weronika Koziak, Michalina Makieła, Aleksandra Bętkowska, Agata Kornacka, Wojciech Dudek, Kamila Szostak, Rafał Tomaka, Anna Byra

    Published 2025-03-01
    “…Additionally, AI-driven wearables raise concerns over data security, ethical handling, and equitable access, as high costs limit their use in amateur sports. …”
    Get full text
    Article
  15. 2415

    Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection by Rafael Abreu, Emanuel Simão, Carlos Serôdio, Frederico Branco, António Valente

    Published 2024-11-01
    “…Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. …”
    Get full text
    Article
  16. 2416

    A NLP analysis of digital demand for healthcare jobs in China by Yirui Chen, Xinrui Zhan, Wencan Yang, Xueying Yan, Yuxin Du, Tieniu Zhao

    Published 2025-04-01
    “…This involved designing task-specific prompts, preprocessing the data to remove duplicates and normalize text, and training the model using the Hugging Face Transformers library. …”
    Get full text
    Article
  17. 2417
  18. 2418

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  19. 2419

    Green banking practices and customer satisfaction-way to green sustainability by Ajaz Akbar Mir, Aijaz Ahmad Bhat, Ahmad Samed Al-Adwan, Summaira Farooq, Dima Jamali, Irshad Ahmad Malik

    Published 2025-04-01
    “…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
    Get full text
    Article
  20. 2420

    Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA by Abdullah Sevin, Abdu Ahmed Osman Mohammed

    Published 2024-12-01
    “…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
    Get full text
    Article