Search alternatives:
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedds » \"useddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
Showing 2,301 - 2,320 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR (\"usedds OR \"useddds)) privacy data\\"))\""', query time: 0.18s Refine Results
  1. 2301

    The Effect of AI (Artificial Intelligence) in Education on Student Motivation: A Systematic Literature Review by Badarudin, Lalu Parhanuddin, Ahmad Tohri, Muhammad Suhardi

    Published 2024-04-01
    “…However, challenges such as limited technological access, resistance to change, and concerns regarding data privacy and ethics remain critical barriers. …”
    Get full text
    Article
  2. 2302

    A Systematic Survey of Distributed Decision Support Systems in Healthcare by Basem Almadani, Hunain Kaisar, Irfan Rashid Thoker, Farouq Aliyu

    Published 2025-02-01
    “…Finally, it discusses open issues as future research directions in the field of DDSSs in the healthcare sector, including data structure standardization, alert fatigue for healthcare workers using DDSSs, and the lack of adherence of emerging technologies like blockchain to medical regulations.…”
    Get full text
    Article
  3. 2303

    ROBOTISATION AND SERVICE AUTOMATION IN THE TOURISM AND HOSPITALITY SECTOR: A META-STUDY (1993-2024) by Dušan MANDIĆ, Miroslav KNEŽEVIĆ, Dušan BOROVČANIN, Aleksandra VUJKO

    Published 2024-09-01
    “…Analyses 310 publications published in the last 32 years processed using Google Scholar search engine. The data sets used for the observations consist primarily of key research works, predominantly appearing in peer-reviewed international journals. …”
    Get full text
    Article
  4. 2304

    Artificial intelligence assistance in English for communication competence of english for specific purposes by Muchamad Muchibbuddin Waly, Aniqotul Milla Zakiyyah

    Published 2024-12-01
    “…A sequential explanatory mixed-methods design collected data from thirty-one undergraduate students using a Likert-scale questionnaire followed by semi-structured interviews to provide more detailed insights. …”
    Get full text
    Article
  5. 2305

    A Survey on Hybrid-CNN and LLMs for Intrusion Detection Systems: Recent IoT Datasets by Saida Elouardi, Anas Motii, Mohammed Jouhari, Abdoul Nasser Hassane Amadou, Mustapha Hedabou

    Published 2024-01-01
    “…Various IDS methodologies, including those using Machine Learning (ML), Deep Learning (DL) and Large Language Models (LLMs), are employed to identify intrusions within the data; however, improvements to the detection systems are still needed. …”
    Get full text
    Article
  6. 2306

    Society 5.0: Shaping the future of e-commerce by Arturs Bernovskis, Deniss Sceulovs, Agnis Stibe

    Published 2024-12-01
    “…While acknowledging the limitations of relying solely on secondary literature, the paper underscores the need for future research to include empirical studies and address challenges like data privacy, the digital divide, and evolving regulatory frameworks within the e-commerce landscape.…”
    Get full text
    Article
  7. 2307

    Unleashing the Potential of Blockchain and Machine Learning: Insights and Emerging Trends From Bibliometric Analysis by Nouhaila El Akrami, Mohamed Hanine, Emmanuel Soriano Flores, Daniel Gavilanes Aray, Imran Ashraf

    Published 2023-01-01
    “…Alternatively, ML is a sub-field of artificial intelligence (AI) that empowers systems to enhance their performance by learning from data. The integration of these data-driven paradigms holds the potential to reinforce data privacy and security, improve data analysis accuracy, and automate complex processes. …”
    Get full text
    Article
  8. 2308

    Federated deep reinforcement learning-based urban traffic signal optimal control by Mi Li, Xiaolong Pan, Chuhui Liu, Zirui Li

    Published 2025-04-01
    “…The proposed method improves the model generalization ability of different local models during global cross-region distributed joint training under the premise of ensuring information security and data privacy, solves the problem of non-independent and homogeneous distribution of environmental data faced by different agents in real intersection scenarios, and significantly accelerates the convergence speed of the model training phase. …”
    Get full text
    Article
  9. 2309

    Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty by Septyanto Galan Prakoso, Royce Kharisma Agung Wibowo, Nadia Dian Ardita, Ferdian Ahya Al Putra, Retnaningtyas Puspitasari

    Published 2025-01-01
    “…Eitemen and Money Laundering Concept itself. This paper uses an explanative qualitative method, and a literature study to obtain the data to strengthen this paper. …”
    Get full text
    Article
  10. 2310

    Patient Satisfaction Regarding Quality Nursing Care by Valentina Christi, Anandi Macwan, Sangita Valand, Dolita Gohil

    Published 2024-01-01
    “…Laschingerrsquos ldquoPS with quality nursing care questionnairerdquo was used as the study tool. Patients operated on with all kinds of heart surgery as well as nine dimensions were included in the study. …”
    Get full text
    Article
  11. 2311

    Policy Factors Affecting the Technological Catch-up of Electronic Health Services in Iran through Blockchain Technology by Reza Naghizadeh

    Published 2022-06-01
    “…According to the Blockchain Opportunity window, a technological and economic catch-up is possible in e-health services in the country. Decentralization, data transparency, security and privacy are the key features of Blockchain technology. …”
    Get full text
    Article
  12. 2312

    Audio–Visual Synchronization and Lip Movement Analysis for Real-Time Deepfake Detection by Muhammad Javed, Zhaohui Zhang, Fida Hussain Dahri, Asif Ali Laghari, Martin Krajčík, Ahmad Almadhor

    Published 2025-07-01
    “…By integrating visual and audio features using multimodal fusion techniques, AVSFF aims to distinguish between authentic and manipulated media. …”
    Get full text
    Article
  13. 2313

    Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi. by Christi J Guerrini, Louiza Kalokairinou, Jill O Robinson, Whitney Bash Brooks, Stephanie M Fullerton, Sara Huston, Jacklyn Dahlquist, Diana Madden, Norah Crossnohere, Nicola Campoamor, John F P Bridges, Amy L McGuire

    Published 2025-01-01
    “…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. …”
    Get full text
    Article
  14. 2314

    SparseBatch: Communication-efficient Federated Learning with Partially Homomorphic Encryption by Chong Wang, Jing Wang, Zheng Lou, Linghai Kong, WeiSong Tao, Yun Wang

    Published 2025-01-01
    “…It operates by aggregating local gradient updates contributed by participating clients, all the while safeguarding the privacy of sensitive data. Industrial FL frameworks employ additively homomorphic encryption (HE) to ensure that local gradient updates are masked during aggregation, guaranteeing no update is revealed. …”
    Get full text
    Article
  15. 2315

    Exploring the promising role of internet of things in urban water systems: a comprehensive global analysis of insights, trends, and research priorities by Shaher Zyoud

    Published 2025-03-01
    “…Most explored areas include water quality monitoring, leak detection, smart metering, and demand management, while challenges in the future lie in data security, privacy, and interoperability. Despite growing research interests, gaps remain in standardization, community engagement, and developing robust IoT architectures. …”
    Get full text
    Article
  16. 2316

    Cross-Room CO<sub>2</sub>-Based Presence Detection for Occupancy Profiling by Jelle Vanhaeverbeke, Emiel Deprost, Steven Verstockt, Sofie van Hoecke

    Published 2025-01-01
    “…The first contribution involves the development of a presence detection model based on CO2 data, which is easy to measure and non-privacy intrusive. …”
    Get full text
    Article
  17. 2317

    Unlocking potential of open source model training in decentralized federated learning environment by Ekaterina Pavlova, Grigorii Melnikov, Yury Yanovich, Alexey Frolov

    Published 2025-06-01
    “…Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. …”
    Get full text
    Article
  18. 2318

    Parents’ understanding and attitudes toward the application of AI in pediatric healthcare: a cross-sectional survey study by Yan-Dan Huang, Shu-Long Zeng, Jie Lin, Zhi-Peng Mao, Qi-Liang Zhang, Gao-Zhong Feng, Qiong-Xia Ou

    Published 2025-08-01
    “…Most participants (91.1%) believed that AI cannot replace doctors in the future.ConclusionAlthough most parents were aware of the use of AI in pediatric healthcare and recognized its convenience and efficiency, they expressed concerns about accuracy, accountability, and data privacy. …”
    Get full text
    Article
  19. 2319

    Looking Back on Digital Medical Education Over the Last 25 Years and Looking to the Future: Narrative Review by Oluwadamilola Ogundiya, Thahmina Jasmine Rahman, Ioan Valnarov-Boulter, Tim Michael Young

    Published 2024-12-01
    “…The rapid evolution and use of web-based and digital techniques have been significantly transforming this field since the beginning of the new millennium. …”
    Get full text
    Article
  20. 2320

    Transformation of Dependent Rights In The Digital Era A Study In Electronic Implementation by Waradatun Nafi’ah, Arofa, Andianita Nur Ilahiyah, Moh Basri, Ahmad Musadad

    Published 2025-03-01
    “…However, in its implementation, there are still various obstacles, such as limited technological infrastructure, low public digital literacy, and challenges in maintaining data security and user privacy. This study uses normative juridical methods, utilizing legal and conceptual approaches to examine the effectiveness of regulations regarding electronic liens. …”
    Get full text
    Article