Showing 2,481 - 2,500 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR (\"uses OR \"used)) privacy data\\"))~\""', query time: 0.25s Refine Results
  1. 2481

    A hybrid approach to time series forecasting: Integrating ARIMA and prophet for improved accuracy by Sherly A, Mary Subaja Christo, Jesi V Elizabeth

    Published 2025-09-01
    “…With the increasing volume of data generated by IoT devices, performing analytics at the edge offers significant advantages in terms of latency, bandwidth consumption, and privacy. …”
    Get full text
    Article
  2. 2482

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The obtained raw data is pre-processed by using handling missing values and adaptive min-max normalization. …”
    Get full text
    Article
  3. 2483

    Generative AI in higher education: A global perspective of institutional adoption policies and guidelines by Yueqiao Jin, Lixiang Yan, Vanessa Echeverria, Dragan Gašević, Roberto Martinez-Maldonado

    Published 2025-06-01
    “…Despite these efforts, gaps remain in comprehensive policy frameworks, particularly in addressing data privacy concerns and ensuring equitable access to GAI tools. …”
    Get full text
    Article
  4. 2484

    Development of a Digital Platform: A Perspective to Advance Space Telepharmacy by Marlise A dos Santos, Juliana Herbert, Ilaria Cinelli, Jose Antonio L Burmann, Vinicius V Soares, Thais Russomano

    Published 2023-01-01
    “…It has specific service protocols for service standardization, including artificial intelligence, to allow agility in services and escalation. All data is protected by privacy and professional ethics guidelines. …”
    Get full text
    Article
  5. 2485

    Benchmarking In-Sensor Machine Learning Computing: An Extension to the MLCommons-Tiny Suite by Fabrizio Maria Aymone, Danilo Pietro Pau

    Published 2024-10-01
    “…This benchmark evaluates models trained with Quantization Aware Training (QAT) and compares their performance with Post-Training Quantization (PTQ) across three use cases: Human Activity Recognition (HAR) by means of the SHL dataset, Physical Activity Monitoring (PAM) by means of the PAMAP2 dataset, and superficial electromyography (sEMG) regression with the NINAPRO DB8 dataset. …”
    Get full text
    Article
  6. 2486

    Consumer perspectives on the national electronic health record and barriers to its adoption in Germany: does health policy require a change in communication? by Saskia Kröner, Björn Schreiweis, Veronika Strotbaum, Lea Christine Brandl, Monika Pobiruchin, Martin Wiesner

    Published 2025-01-01
    “…Results The top three ePA use cases were medical document collection, simplified data exchange between medical institutions, and emergency medical information. …”
    Get full text
    Article
  7. 2487

    Federated Bayesian Deep Learning: The Application of Statistical Aggregation Methods to Bayesian Models by John Fischer, Marko Orescanin, Justin Loomis, Patrick Mcclure

    Published 2024-01-01
    “…Federated learning (FL) is an approach to training machine learning models that takes advantage of multiple distributed datasets while maintaining data privacy and reducing communication costs associated with sharing local datasets. …”
    Get full text
    Article
  8. 2488

    LITERATURE REVIEW ON THE DOUBLE-EDGED SWORD OF AI IN MENTAL HEALTH: A DEEP DIVE INTO CHATGPT'S CAPABILITIES AND LIMITATIONS by Paul Arjanto, Feibry Feronika Wiwenly Senduk

    Published 2024-04-01
    “…Key ethical concerns include data privacy and accountability. Conclusion: The study recommends a balanced approach, suggesting ChatGPT as an adjunct rather than a replacement for conventional mental health services. …”
    Get full text
    Article
  9. 2489

    Electronic health record in military healthcare systems: A systematic review. by Amir Torab-Miandoab, Mahdi Basiri, Arasb Dabbagh-Moghaddam, Leila Gholamhosseini

    Published 2025-01-01
    “…Current literature on EHR use in military healthcare is lacking and disjointed. …”
    Get full text
    Article
  10. 2490

    Predicting and Preventing School Dropout with Business Intelligence: Insights from a Systematic Review by Diana-Margarita Córdova-Esparza, Juan Terven, Julio-Alejandro Romero-González, Karen-Edith Córdova-Esparza, Rocio-Edith López-Martínez, Teresa García-Ramírez, Ricardo Chaparro-Sánchez

    Published 2025-04-01
    “…We collected literature from the Google Scholar and Scopus databases using a comprehensive search strategy, incorporating keywords such as “business intelligence”, “machine learning”, and “big data”. …”
    Get full text
    Article
  11. 2491

    Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples by Cheng Liu, Junrong Li, Xiheng Liu, Bo Li, Mengsu Hou, Wei Yu, Yujun Li, Wenjun Liu

    Published 2025-07-01
    “…As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on password data. In password guessing research, there is a conflict between the traditional models’ need for large training samples and the limitations on accessing password data imposed by privacy protection regulations. …”
    Get full text
    Article
  12. 2492

    Smart Safety Helmets with Integrated Vision Systems for Industrial Infrastructure Inspection: A Comprehensive Review of VSLAM-Enabled Technologies by Emmanuel A. Merchán-Cruz, Samuel Moveh, Oleksandr Pasha, Reinis Tocelovskis, Alexander Grakovski, Alexander Krainyukov, Nikita Ostrovenecs, Ivans Gercevs, Vladimirs Petrovs

    Published 2025-08-01
    “…This paper compiles numerous industrial use cases, from bridges and tunnels to plants and power facilities, demonstrating significant improvements in inspection efficiency, data quality, and worker safety. …”
    Get full text
    Article
  13. 2493

    Deep Learning dengan Teknik Early Stopping untuk Mendeteksi Malware pada Perangkat IoT by Iwang Moeslem Andika Surya, Triawan Adi Cahyanto, Lutfi Ali Muharom

    Published 2025-02-01
    “…This approach utilizes machine learning techniques and intense learning to identify and mitigate cyber threats. The use of Convolutional Neural Network (CNN) in classifying the IoT-23 dataset with the SMOTE (Synthetic Minority Oversampling Technique) data balancing technique and the Early Stopping function shows high results. …”
    Get full text
    Article
  14. 2494
  15. 2495

    Descriptive Phenomenology from Instances of Dishonesty in Psychotherapy by Psychotherapists by Hossein Alipour, Mahdi Akbari

    Published 2024-11-01
    “…A total of 16 psychotherapists constituted the sample for this research, and data were collected using a five-axis semi-structured interview protocol focused on psychotherapy dishonesty. …”
    Get full text
    Article
  16. 2496

    Optimized summary-statistic-based single-cell eQTL meta-analysis by Maryna Korshevniuk, Harm-Jan Westra, Roy Oelen, Monique G. P. van der Wijst, Lude Franke, Marc Jan Bonder, sc-eQTLGen Consortium

    Published 2025-08-01
    “…These are however, complicated by privacy constraints due to sharing of genotype data and the measurement and technical variety across different scRNA-seq datasets as a result of differences in mRNA capture efficiency, experimental protocols, and sequencing strategies. …”
    Get full text
    Article
  17. 2497

    Digital Empowerment in Social Work: Leveraging AI to Enhance Educational Access in Developing Nations by Zvinodashe Revesai, Benjamin Tungwa, Telson Anesu Chisosa, Vanessa Runyararo Meki

    Published 2024-12-01
    “…Data were analyzed using thematic analysis, examining cases and models where AI has expanded access to scholarly materials through automated translation services, enabled localized resources through virtual training simulations, and facilitated the incorporation of culturally aligned self-help tools such as AI chatbots and wellness applications. …”
    Get full text
    Article
  18. 2498

    Designing digital conversational agents for youth with multiple mental health conditions: Insights on key features from a youth-engaged qualitative descriptive study by Jingyi Hou, Jamie Gibson, Thalia Phi, Brian Ritchie, Louise Gallagher, Gillian Strudwick, George Foussias, Darren B Courtney, Aristotle Voineskos, Stephanie Ameis, Kristin Cleverley, Lisa D Hawke

    Published 2025-03-01
    “…Results Four key themes were generated from the focus group data: (1) the importance of a customizable and flexible design for personalization; (2) confidentiality, privacy features and risk mitigation features; (3) the need for reliable, informative content that is user tested and validated; (4) a friendly and human-like interaction style. …”
    Get full text
    Article
  19. 2499

    De-identification of Emergency Medical Records in French: Survey and Comparison of State-of-the-Art Automated Systems by Loick Bourdois, Marta Avalos, Gabrielle Chenais, Frantz Thiessard, Philippe Revel, Cedric Gil-Jardine, Emmanuel Lagarde

    Published 2021-04-01
    “…For visits motivated by a traumatic event, information on the causes are stored in free-text clinical notes. To exploit these data, an automated de-identification system guaranteeing protection of privacy is required. …”
    Get full text
    Article
  20. 2500

    Blockchain-Based Incentive Mechanism for Electronic Medical Record Sharing Platform: An Evolutionary Game Approach by Dexin Zhu, Yuanbo Li, Zhiqiang Zhou, Zilong Zhao, Lingze Kong, Jianan Wu, Jian Zhao, Jun Zheng

    Published 2025-03-01
    “…This system considers the potential malicious behaviors of both users and research institutions, encouraging research institutions to protect users’ privacy, reduce users’ concerns, and guide users to actively contribute data. …”
    Get full text
    Article