Showing 2,141 - 2,160 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR \\"uses) privacy data\\"))~\""', query time: 0.13s Refine Results
  1. 2141

    Hybrid-CID: Securing IoT with Mongoose Optimization by S. Merlin Sheeba, R. S. Shaji

    Published 2025-03-01
    “…After preprocessing, the Hybrid-CID framework develops a hybrid optimization algorithm to identify the intrusions from the traffic data which ensures data privacy by maintaining the reliability and integrity of IoT deployments. …”
    Get full text
    Article
  2. 2142

    A Comprehensive Survey of Electric Vehicle Charging Demand Forecasting Techniques by Mamunur Rashid, Tarek Elfouly, Nan Chen

    Published 2024-01-01
    “…Meanwhile, emerging machine learning techniques bring promising prospects, yet exhibit suboptimal performance with insufficient data. Additionally, existing studies often overlook several critical areas such as overcoming data scarcity, security and privacy concerns, managing the inherent stochasticity of demand data, selecting forecasting methods for a specific feature, and developing standardized performance metrics. …”
    Get full text
    Article
  3. 2143

    A CAE model-based secure deduplication method by Chunbo Wang, Guoying Zhang, Hui Qi, Bin Chen

    Published 2025-07-01
    “…Abstract Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. …”
    Get full text
    Article
  4. 2144

    A Bibliometric Analysis of Publications on Surveillance and New Media Concepts in The Web of Science Database by Anıl Durmuşahmet

    Published 2025-06-01
    “…To this end, a bibliometric analysis based on quantitative data is conducted using the Web of Science (WoS) database as of June 23, 2024. …”
    Get full text
    Article
  5. 2145

    Mental Health Apps Available in App Stores for Indian Users: Protocol for a Systematic Review by Seema Mehrotra, Ravikesh Tripathi, Pramita Sengupta, Abhishek Karishiddimath, Angelina Francis, Pratiksha Sharma, Paulomi Sudhir, Srikanth TK, Girish N Rao, Rajesh Sagar

    Published 2025-04-01
    “…Additionally, the apps will be reviewed for quality using the Mobile Application Rating Scale. The data analysis and synthesis strategy will incorporate descriptive statistics based on quality evaluation using the Mobile Application Rating Scale and examining the content of the apps for generating descriptive information. …”
    Get full text
    Article
  6. 2146

    Features of Structured, One-to-One Videoconference Interventions That Actively Engage People in the Management of Their Chronic Conditions: Scoping Review by Yu-Ting Chen, Michelle Lehman, Toni Van Denend, Jacqueline Kish, Yue Wu, Katharine Preissner, Matthew Plow, Tanya L Packer

    Published 2025-02-01
    “…Studies reporting assessment or routine care were excluded. Extracted text data were analyzed using thematic analysis and published taxonomies. …”
    Get full text
    Article
  7. 2147

    ARTIFICIAL INTELLIGENCE IN ACADEMIA: OPPORTUNITY OR CHALLENGE? by L.H. Grigoryan, M. V. Badalyan, A.Z. Grigoryan

    Published 2025-06-01
    “…On the other hand, the growing reliance on AI raises serious concerns related to academic integrity, data privacy, algorithmic bias, and the potential deskilling of educators. …”
    Get full text
    Article
  8. 2148

    Dynamics of Robo-Advisory Financial Services in Saudi Arabia by Heba Gazzaz

    Published 2025-06-01
    “…The key limitations of adopting Robo-advisory services include algorithmic bias, a lack of trust and transparency, legal and regulatory issues, privacy and data security concerns, and limited financial literacy. …”
    Get full text
    Article
  9. 2149

    Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Han-Chieh Chao

    Published 2024-11-01
    “…Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.…”
    Get full text
    Article
  10. 2150

    AI Robotics in Healthcare Between the EU Medical Device Regulation and the Artificial Intelligence Act<subtitle>Gaps and Inconsistencies in the Protection of Patients and Care Reci... by Martin Ebers

    Published 2024-10-01
    “…The growing inclusion of social robots in therapeutic situations raises a variety of unresolved legal and ethical issues, including risks to patient autonomy, human dignity and trust, the potentially life-threatening effects of inaccurate or malfunctioning technology, diminished privacy due to the reliance on enormous amounts of personal (sensitive health) data, new challenges to data security due to the cyber-physical nature of robots, and the problem of how to obtain informed consent to medical treatments based on opaque AI decision making. …”
    Get full text
    Article
  11. 2151

    Federated learning-based user access strategy and energy consumption optimization in cell-free massive MIMO network by Yuanyuan YAO, Yiqiu LIU, Sai HUANG, Chunyu PAN, Xuehua LI, Xin YUAN

    Published 2023-10-01
    “…To solve the problem that how users choose access points in cell-free massive multiple-input multiple-output (CF-mMIMO) network, a prioritized access strategy for poorer users based on channel coefficient ranking was proposed.First, users were evaluated and ranked for their channel quality and stability after channel sensing, and suitable access points were selected in sequence according to the order of the channel state information.Second, considering issues such as users' energy consumption and data security, a federal learning framework was used to enhance user's data privacy and security.Meanwhile, an alternating optimization variables algorithm based on energy consumption optimization was proposed to optimize the multi-dimensional variables, for the purpose of minimizing the total energy consumption of the system.Simulation results show that compared with the traditional user-centric in massive MIMO, the proposed access strategy can improve the average uplink reachable rate of users by 20%, and the uplink rate of users with poor channels can be double improved; in terms of energy consumption optimization, the total energy consumption can be reduced by much more than 50% after optimization.…”
    Get full text
    Article
  12. 2152

    Examining Factors Impacting Online Survey Response Rates in Educational Research: Perceptions of Graduate Students by Amany Saleh, Krishna Bista

    Published 2017-09-01
    “…The authors used descriptive statistics (percentage, average mean) and inferential statistics (chi-square and correlations) to report the data analysis and findings. …”
    Get full text
    Article
  13. 2153

    Assessing the Effects of Cancer Diagnosis and Coping Strategies on Patients in Vhembe District Hospitals, Limpopo Province by Dorah Ursula Ramathuba, Takalani Friddah Rafundisani, Maria Sonto Maputle

    Published 2025-06-01
    “…A self-administered questionnaire was used to collect data, and the data were analyzed using a software package for descriptive statistics (SPSS version 23). …”
    Get full text
    Article
  14. 2154

    Pooled Rideshare in the U.S.: An Exploratory Study of User Preferences by Rakesh Gangadharaiah, Johnell Brooks, Lisa Boor, Kristin Kolodge, Haotian Su, Yunyi Jia

    Published 2025-05-01
    “…The study incorporated 77 actionable items developed from the results of the 2021 survey to assess whether addressing specific user-generated topics such as safety, reliability, convenience, and privacy can improve pooled rideshare use. A side-by-side comparison of the 2021 and 2025 data revealed shifts in transportation behavior, with personal rideshare usage increasing from 22% to 28%, public transportation from 21% to 27%, and pooled rideshare from 6% to 8%, while personal vehicle (79%) use remained dominant. …”
    Get full text
    Article
  15. 2155

    Towards AI-Powered Applications: The Development of a Personalised LLM for HRI and HCI by Khashayar Ghamati, Maryam Banitalebi Dehkordi, Abolfazl Zaraki

    Published 2025-03-01
    “…Furthermore, this study engages with the broader ethical dimensions of PLLM, critically discussing issues of generalisability and data privacy concerns in AI research. Our findings demonstrate the usability of using the PLLM in a human–robot interaction scenario in real-world settings, highlighting its applicability across diverse domains, including healthcare, education, and assistive technologies. …”
    Get full text
    Article
  16. 2156

    Bibliometric analysis of digital transformation on organization design by Božić Katarina

    Published 2025-01-01
    “…Using the Bibliometrix software package in the R programming language, bibliographic data analysis was performed in order to identify the most influential authors, key topics and future research directions. …”
    Get full text
    Article
  17. 2157

    Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks by ALEKSANDAR JEVREMOVIC, Zona Kostic, Ivan Chorbev, Dragan Perakovic, Andrii Shalaginov, Ivan Cvitic

    Published 2025-01-01
    “…The ability to process data locally using complex algorithms is becoming increasingly important in Internet of Things (IoT) contexts. …”
    Get full text
    Article
  18. 2158

    GLOBE Observer: A Case Study in Advancing Earth System Knowledge with AI-Powered Citizen Science by Peder V. Nelson, Russanne Low, Holli Kohl, David Overoye, Di Yang, Xiao Huang, Sriram Chellappan, Farhat Binte Azam, Ryan M. Carney, Monika Falk, Joan Garriga, Larisa Schelkin, Rebecca Boger, Theresa Schwerin

    Published 2024-12-01
    “…GLOBE citizen science data has been used to develop automated data classification routines that enable information discovery of mosquito larvae and land cover labels. …”
    Get full text
    Article
  19. 2159

    Enabling All In-Edge Deep Learning: A Literature Review by Praveen Joshi, Mohammed Hasanuzzaman, Chandra Thapa, Haithem Afli, Ted Scully

    Published 2023-01-01
    “…Moreover, most of the time central cloud servers are used for such computation, thus opening up other significant challenges, such as high latency, increased communication costs, and privacy concerns. …”
    Get full text
    Article
  20. 2160

    Exploring the Knowledge and Utilization of Video-Based Surgical Learning Among Medical Students in a Teaching Hospital in Nigeria: A Mixed-Methods Study by Asogun Daniel, Akhaine Jesu-Oboh Precious, Sulymon A. Saka, Vivian Oghobaghase, Ojeh-Oziegbe Oseyomon, Francis Ufuah, Adomi Solomon

    Published 2025-03-01
    “…Quantitative data were analyzed using SPSS version 21 for descriptive statistics, while thematic coding was applied to qualitative data using NVivo. …”
    Get full text
    Article