Search alternatives:
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useds » \"usedds (Expand Search)
Showing 2,441 - 2,460 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR \"useds) privacy data\\"))~\""', query time: 0.14s Refine Results
  1. 2441

    Advanced Monte Carlo for Acquisition Sampling in Bayesian Optimization by Javier Garcia-Barcos, Ruben Martinez-Cantin

    Published 2025-01-01
    “…Bayesian optimization (BO) has proved to be a suitable optimization method in these situations thanks to its sample efficiency and principled way of learning from previous data, but it typically requires that experiments are sequentially performed. …”
    Get full text
    Article
  2. 2442

    Comparative Performance Evaluation of Real-Time Webcam and HOG-Based Facial Recognition Systems for Children's Screen Time Management by Fatimah Alghamdi, Abdulrahman Alghamdi

    Published 2025-06-01
    “…It highlights critical security and privacy considerations, particularly the responsible handling of facial data in environments accessible to minors. …”
    Get full text
    Article
  3. 2443

    A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service by Hwankuk Kim, Jongin Lim, Kyungho Lee

    Published 2015-09-01
    “…Since existing studies mainly focus on simple statistical analysis of the K-ISMS assessment results, analysis on the cause of certification assessment fault based on past data analysis is insufficient. As a method of managing the certification inspection quality, in this paper, we analyze the association among the fault items of the K-ISMS certification assessment results using association rule mining which involves identifying an association rule among items in the database.…”
    Get full text
    Article
  4. 2444

    A Fully Distributed Power Flow Algorithm with Exponentially Fast Convergence by Changzheng GAO, Bo YAN, Jiarui WANG, Xuefei CHANG, Yue SUN

    Published 2019-10-01
    “…In order to meet the data privacy requirements for interconnected power system power flow calculations, a fully distributed power flow algorithm is proposed. …”
    Get full text
    Article
  5. 2445

    A Multi-Criteria Decision-Making Framework for Evaluating Emerging Digital Technologies in Supply Chain Optimization by Nabil M. AbdelAziz, Dina Mohamed, Hasnaa Soliman

    Published 2025-07-01
    “…Ten critical attributes covering technical, economic, and environmental dimensions were identified through expert consultation and a review of relevant literature, including scalability, integration ease, performance benefit, costeffectiveness, environmental and social sustainability, data privacy, and supply chain resilience. The evaluation framework combines the Entropy method for determining objective attribute weights with the TOPSIS method for ranking alternatives. …”
    Get full text
    Article
  6. 2446

    Performance Evaluation of Decentralized Federated Learning: Impact of Fully and K-Connected Topologies, Heterogeneous Computing Resources, and Communication Bandwidth by Vo van Truong, Pham Khanh Quan, Dong-Hwan Park, Taehong Kim

    Published 2025-01-01
    “…Decentralized federated learning (DFL) enables collaborative model training across distributed devices while preserving data privacy. Despite this, the performance of DFL in real-world scenarios, characterized by varying network topologies, heterogeneous client resources, and communication bandwidth, remains underexplored. …”
    Get full text
    Article
  7. 2447

    A Systematic Literature Review on Sustainability Integration and Marketing Intelligence in the Era of Artificial Intelligence by Md Mehedi Hasan Emon, Tahsina Khan

    Published 2024-12-01
    “…The conversation delves into the difficulties and moral aspects involved in using AI in marketing, such as issues related to data privacy, algorithmic bias, and the importance of a strategic framework that focuses on sustainable development goals. …”
    Get full text
    Article
  8. 2448

    Asynchronous blockchain‐based federated learning for tokenized smart power contract of heterogeneous networked microgrid system by Desh Deepak Sharma

    Published 2024-12-01
    “…For simulation purposes, MATLAB and python programming have been used with real‐time data of microgrids.…”
    Get full text
    Article
  9. 2449

    A Survey on the Effectiveness of Existing Smart Home Cyber Attacks Detection Solution: A Broadband Service Providers’ Perspective by Md Mizanur Rahman, Faycal Bouhafs, Frank den Hartog

    Published 2025-01-01
    “…We also discuss future research directions, emphasising scalable and data-efficient methods to reduce storage requirements, costs, and privacy concerns, which will enable BSPs to manage millions of customer networks more effectively.…”
    Get full text
    Article
  10. 2450

    Availability and utilization of sexual and reproductive health services among adolescents of Godawari Municipality, Nepal: A cross-sectional study. by Laxmi Gautam, Aastha Maharjan, Harikrishna Bhattarai, Sujan Gautam

    Published 2025-01-01
    “…Only 13.22% of them had ever used ASRH services, and the reasons for not using services were the lack of realization of the need for services (60.39%), while 14.55% of them felt that privacy was not maintained at all. …”
    Get full text
    Article
  11. 2451

    Empowering Healthcare: TinyML for Precise Lung Disease Classification by Youssef Abadade, Nabil Benamar, Miloud Bagaa, Habiba Chaoui

    Published 2024-10-01
    “…Recently, there has been growing interest in the automated analysis of lung sounds using Deep Learning (DL). Nevertheless, the execution of large DL models in the cloud often leads to latency, dependency on internet connectivity, and potential privacy issues due to the transmission of sensitive health data. …”
    Get full text
    Article
  12. 2452

    Multicountry research on comprehensive abortion policy implementation in Latin America: a mixed-methods study protocol by Guillermo Carroli, Antonella Lavelanet, Silvina Ramos, Mariana Romero, Rodolfo Gomez Ponce de Leon, Berenise Carroli, Celina Gialdini, Agustina Ramón Michel, Mercedes Vila Ortiz

    Published 2024-01-01
    “…Informed consent will be obtained from participants. Data will be treated with careful attention to protecting privacy and confidentiality. …”
    Get full text
    Article
  13. 2453

    Arabic speaking women’s experience of postpartum contraceptive counselling in Sweden by Sofia Berglundh, Khadija Abunnaja, Sibylle Herzig van Wees, Elin C. Larsson, Helena Kilander

    Published 2025-07-01
    “…The FGDs were conducted in Arabic and translated to English. Data was analysed using reflexive thematic analysis. …”
    Get full text
    Article
  14. 2454

    Enhancing technological sustainability in academia: leveraging ChatGPT for teaching, learning and evaluation by Labaran Isiaku, Abubakar Sadiq Muhammad, Hyelda Ibrahim Kefas, Fitzgerald Chidozie Ukaegbu

    Published 2024-12-01
    “…However, it also sheds light on the ethical issues and challenges associated with its use, including privacy and data protection, transparency and alignment with educational principles. …”
    Get full text
    Article
  15. 2455
  16. 2456

    Exploring unsupervised feature extraction algorithms: tackling high dimensionality in small datasets by Hongqi Niu, Gabrielle B. McCallum, Anne B. Chang, Khalid Khan, Sami Azam

    Published 2025-07-01
    “…Abstract Small datasets are common in many fields due to factors such as limited data collection opportunities or privacy concerns. …”
    Get full text
    Article
  17. 2457

    Establishing a Collaborative Genomic Repository for Adult Burn Survivors: A Burn Model System Feasibility Study by Stephen Sibbett, Jamie Oh, Gretchen Carrougher, Lara Muffley, Nathaniel Ashford, Maiya Pacleb, Samuel Mandell, Jeffrey Schneider, Steven Wolf, Barclay Stewart, Nicole S. Gibran

    Published 2024-11-01
    “…We set out two primary objectives, namely (1) to develop standard operating procedures for genetic sample collection and storage, DNA isolation, and data integration into an existing multicenter database; and (2) to demonstrate the feasibility of correlating genetic variation to functional outcomes in a pilot study, using the catechol-O-methyltransferase (COMT) gene. …”
    Get full text
    Article
  18. 2458

    Advancing sustainability: The impact of emerging technologies in agriculture by Ashoka Gamage, Ruchira Gangahagedara, Shyamantha Subasinghe, Jeewan Gamage, Chamini Guruge, Sera Senaratne, Thevin Randika, Chamila Rathnayake, Zammil Hameed, Terrence Madhujith, Othmane Merah

    Published 2024-12-01
    “…However, it is important to carefully address ethical and socio-economic considerations, including accessibility and data privacy, to manage these effects effectively. …”
    Get full text
    Article
  19. 2459

    Apical extrusion of debris with different rotary and reciprocating single-file endodontic instrumentation systems: a systematic review and meta-analysis protocol by Muhammad Zubair Ahmad, Durre Sadaf, Marcy McCall MacBain, Ahmed Nabil Mohamed

    Published 2020-09-01
    “…We will measure the statistical heterogeneity by applying the Cochrane Q test and quantify using the I2 statistic. Existence of covariates and any potential heterogeneity will be explored through prespecified subgroup and sensitivity analyses.Ethics and dissemination Approval from an ethical research committee is not required because it will be done using data that have been already published and have no concerns related to the privacy of patients. …”
    Get full text
    Article
  20. 2460

    Barriers and facilitators to oral pre-exposure prophylaxis uptake among adolescents girls and young women at elevated risk of HIV acquisition in Lilongwe, Malawi: A qualitative stu... by Simon C Nicholas, Maureen Matewere, Agatha Bula, Mercy Tsidya, Mina C Hosseinipour, Mitch Matoga, Alinane Linda Nyondo Mipando

    Published 2025-01-01
    “…The data were digitally recorded, managed using NVivo software and analysed using a thematic approach guided by the Consolidated Framework for Implementation Research (CFIR). …”
    Get full text
    Article