Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
Showing 2,261 - 2,280 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"useddddds OR \"usedddddds)) privacy data\\"))~\""', query time: 0.15s Refine Results
  1. 2261

    Integrating Large Language Models into Robotic Autonomy: A Review of Motion, Voice, and Training Pipelines by Yutong Liu, Qingquan Sun, Dhruvi Rajeshkumar Kapadia

    Published 2025-07-01
    “…We also highlight the use of physics-informed neural networks (PINNs) to model object deformation and support precision in contact-rich manipulation tasks. …”
    Get full text
    Article
  2. 2262

    Implementation of NGS and SNP microarrays in routine forensic practice: opportunities and barriers by Sharlize Pedroza Matute, Sasitaran Iyavoo

    Published 2025-05-01
    “…Conversely, SNP microarrays offer a cost-effective solution for extended kinship testing, Forensic Investigative Genetic Genealogy (FIGG), and phenotypic prediction, though they are less effective with low-quality samples and DNA mixtures. Ethical, legal, and privacy concerns, particularly surrounding the use of Forensic DNA Phenotyping (FDP) and consumer genetic data in FIGG, further complicate their integration into forensic workflows. …”
    Get full text
    Article
  3. 2263

    Decentralized electrochemical biosensors for biomedical applications: From lab to home by Pramod K. Kalambate, Vipin Kumar, Dhanjai

    Published 2025-01-01
    “…However, potential risks such as data security vulnerabilities, privacy concerns, and regulatory challenges must be addressed to ensure safe and ethical deployment of these technologies. …”
    Get full text
    Article
  4. 2264

    Comprehensive Review and Future Research Directions on ICT Standardisation by Mohammed Najah Mahdi, Ray Walshe, Sharon Farrell, Harshvardhan J. Pandit

    Published 2024-11-01
    “…Standardisation also solves problems, such as the use of mobile devices, which requires travel abroad when out of range. …”
    Get full text
    Article
  5. 2265

    Ethical and Safety Challenges of Implantable Brain-Computer Interface by Ihab Abdulrahman Satam, Róbert Szabolcsi

    Published 2025-04-01
    “…The study of brain-computer interfaces (BCIs) holds immense potential across various fields, particularly in Human-Robot Interaction, where invasive BCIs offer precise and direct communication between the human brain and robotic devices. However, the use of invasive BCIs raises significant ethical, safety, and security concerns that must be addressed to ensure their responsible deployment. …”
    Get full text
    Article
  6. 2266

    Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure by Anas Motii, Mahmoud El Hamlaoui, Robert Basmadjian

    Published 2024-11-01
    “…This interconnection raises concerns about security, privacy, and the expanding risk of cyber-attacks within the electric vehicle landscape. …”
    Get full text
    Article
  7. 2267

    Beijing’s urbanization reflected in apartment layouts: a computer vision and isovist analysis (1970–2020) by Yanhua Yao, Ashutosh Kumar, Martina Mazzarello, Fábio Duarte, Lei Shao, Limin Song, Carlo Ratti

    Published 2025-05-01
    “…Our findings show a trend in the isovist intensity of living rooms, dining rooms, and kitchens, indicative of shifts toward privacy and mixed-use spaces, shaped by household occupancy patterns. …”
    Get full text
    Article
  8. 2268

    Detecting Learning Behavior in Programming Assignments by Analyzing Versioned Repositories by John Chen, Serena Lau, Juho Leinonen, Valerio Terragni, Nasser Giacaman

    Published 2024-01-01
    “…The Polivr ecosystem comprises three key modules: Polivr Anonymiser, which ensures data privacy by anonymising student identities; Polivr Core, which mines learning metrics from Git repositories; and Polivr Web Viewer, which transforms the raw metrics into insightful visualisations for educators. …”
    Get full text
    Article
  9. 2269

    Evaluation of comprehensive abortion care service in University of Gondar Comprehensive Specialized Hospital in Northwest Ethiopia: mixed case study design by Birtukan Demis Getaneh, Nigusu Worku, Kaleb Assegid Demissie, Tesfahun Zemene Tafere, Melak Jejaw

    Published 2025-03-01
    “…Besides, none of the providers comply with hand washing protocols and used personal protective equipment, and there were delays in providing abortion services. …”
    Get full text
    Article
  10. 2270

    Evaluation of a piloted digital reproductive health registry in Jordan to improve mother and child health by Mirwais Amiri, Majd Al-Soukhni, Manal Tahtamouni, Mohannad Al Nsour

    Published 2025-05-01
    “…Conclusion The new hRHR has a high acceptance level among stakeholders, health providers and women using MCH services. The evaluation showed that the system improved documentation of data, decreased time, and effort of data reporting and retrieval, and improved access to patient data.…”
    Get full text
    Article
  11. 2271

    Developing an Ontology to Enhance Semantic Interoperability in IoT Environment by Maria Cornejo-Lupa, Ana Aguilera, Irvin Dongo

    Published 2025-05-01
    “…This study proposes the development of an enhanced ontology that integrates different ontologies in the IoT domain, including key aspects such as interoperability, security, privacy, energy efficiency, and ethics. A formal methodology for ontology design and construction was used in four phases: ontology requirements, design, construction, and evaluation. …”
    Get full text
    Article
  12. 2272

    Quality of Breast Cancer Information on the Internet by African Organizations: An Appraisal by Cynthia Pomaa Akuoko

    Published 2017-01-01
    “…The identified websites were assessed using European Commission (EC) quality criteria for health-related websites, which comprises different assessment areas including, completeness, transparency and honesty, authority, privacy and data protection, updating of information, accountability, and accessibility. …”
    Get full text
    Article
  13. 2273

    Making temporary homes by Marjolein Overtoom

    Published 2024-06-01
    “…The interviews were analysed with Interpretative Phenomenological Analysis, and the visual data (photos made by the interviewees and sometimes the researcher, and drawings made by the researcher) was used to place the content of the interviews in a physical context. …”
    Get full text
    Article
  14. 2274

    Web 3.0: The future of the decentralized Internet by Božić Tamara

    Published 2023-01-01
    “…Decentralization plays an important role in transferring power from providers to users, protecting privacy and regaining control over their information and data. …”
    Get full text
    Article
  15. 2275

    Perspectives of stakeholders on enhancing access to self-injectable contraception in rural South Sudan by Grace W. Kimemia, Mamothena Carol Mothupi, Lual Agok Luka, Teresia Macharia, Sidonia Akon, Alom Atak Ayom, Lual James Baak, Amijong Deng, Kadra Noor, Taban John Mark, Naoko Kozuki

    Published 2025-03-01
    “…Abstract Background Although self-injectable subcutaneous depot medroxyprogesterone acetate (DMPA-SC) has demonstrated promise, there are significant barriers in promoting initiation and continued use in low-resource settings. This study sought to understand the perspectives of stakeholders on promotion of self-injectable contraception use in rural South Sudan. …”
    Get full text
    Article
  16. 2276

    A STUDY OF PEOPLE’S PERCEPTION OF ARTIFICIAL INTELLIGENCE IN FINANCE AND SOCIETY by Dan MITRA, Ioana-Florina COITA

    Published 2025-07-01
    “…This paper investigates how people perceive artificial intelligence (AI), using both original survey data and insights from recent academic and policy literature. …”
    Get full text
    Article
  17. 2277

    AI in humanitarian healthcare: a game changer for crisis response by Diala Haykal, Mohamad Goldust, Hugues Cartier, Patrick Treacy

    Published 2025-07-01
    “…Ethical concerns such as data privacy, bias, and access inequities remain critical to responsible deployment. …”
    Get full text
    Article
  18. 2278

    Cooperative inference analysis based on DNN convolutional kernel partitioning by Jialin ZHI, Yinglei TENG, Xinyang ZHANG, Tao NIU, Mei SONG

    Published 2022-12-01
    “…With the popularity of intelligent chip in the application of edge terminal devices, a large number of AI applications will be deployed on the edge of networks closer to data sources in the future.The method based on DNN partition can realize deep learning model training and deployment on resource-constrained terminal devices, and solve the bottleneck problem of edge AI computing ability.Thekernel based partition method (KPM) was proposed as a new scheme on the basis of traditional workload based partition method (WPM).The quantitative analysis of inference performance was carried out from three aspects of computation FLOPS, memory consumption and communication cost respectively, and the qualitative analysis of the above two schemes was carried out from the perspective of flexibility, robustness and privacy of inference process.Finally, a software and hardware experimental platform was built, and AlexNet and VGG11 networks were implemented using PyTorch to further verify the performance advantages of the proposed scheme in terms of delay and energy consumption.It was concluded that, compared with the WPM scheme, the KPM scheme had better DNN reasoning acceleration effect in large-scale computing scenarios.And it has lower memory usage and energy consumption.…”
    Get full text
    Article
  19. 2279

    Student attendance and evaluation system : A review by Sura Falih, Yaseen Ismael

    Published 2025-06-01
    “…Previous studies have explored a variety of approaches and techniques to achieve these goals, such as using RFID for automatic attendance recording, Arduino systems for automated testing, and machine learning algorithms for analyzing academic performance. …”
    Get full text
    Article
  20. 2280

    Cooperative inference analysis based on DNN convolutional kernel partitioning by Jialin ZHI, Yinglei TENG, Xinyang ZHANG, Tao NIU, Mei SONG

    Published 2022-12-01
    “…With the popularity of intelligent chip in the application of edge terminal devices, a large number of AI applications will be deployed on the edge of networks closer to data sources in the future.The method based on DNN partition can realize deep learning model training and deployment on resource-constrained terminal devices, and solve the bottleneck problem of edge AI computing ability.Thekernel based partition method (KPM) was proposed as a new scheme on the basis of traditional workload based partition method (WPM).The quantitative analysis of inference performance was carried out from three aspects of computation FLOPS, memory consumption and communication cost respectively, and the qualitative analysis of the above two schemes was carried out from the perspective of flexibility, robustness and privacy of inference process.Finally, a software and hardware experimental platform was built, and AlexNet and VGG11 networks were implemented using PyTorch to further verify the performance advantages of the proposed scheme in terms of delay and energy consumption.It was concluded that, compared with the WPM scheme, the KPM scheme had better DNN reasoning acceleration effect in large-scale computing scenarios.And it has lower memory usage and energy consumption.…”
    Get full text
    Article