Showing 1,901 - 1,920 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"used) privacy data\\"))~\""', query time: 0.18s Refine Results
  1. 1901

    Multimodal Detection of Agitation in People With Dementia in Clinical Settings: Observational Pilot Study by Abeer Badawi, Somayya Elmoghazy, Samira Choudhury, Sara Elgazzar, Khalid Elgazzar, Amer M Burhan

    Published 2025-07-01
    “…ObjectiveThis study proposes a novel, multimodal system for predicting AA episodes in individuals with severe dementia, integrating wearable sensor data and privacy-preserving video analytics. …”
    Get full text
    Article
  2. 1902

    A CAE model-based secure deduplication method by Chunbo Wang, Guoying Zhang, Hui Qi, Bin Chen

    Published 2025-07-01
    “…Abstract Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. …”
    Get full text
    Article
  3. 1903

    Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme by Meng Wu, Xiufeng Zhao, Weitao Song

    Published 2025-03-01
    “…With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. …”
    Get full text
    Article
  4. 1904

    Public awareness, attitudes, and motivation toward biobanks: a survey of China by Mingtao Huang, Lanyi Yu, Xiaonan Wang, Kun Li, Jichao Wang, Xinrui Cheng, Xiaomei Zhai

    Published 2025-01-01
    “…The respondents raised concerns about the commercialization of biobanks (56.66%) and data privacy (55.84%). Notably, only 37.01% of the respondents were concerned about the risk of discrimination in biobanks, where this was lower compared with the results for populations in Western countries. …”
    Get full text
    Article
  5. 1905

    A Trusted Federated Learning Method Based on Consortium Blockchain by Xiaojun Yin, Xijun Wu, Xinming Zhang

    Published 2024-12-01
    “…Federated learning (FL) has gained significant attention in distributed machine learning due to its ability to protect data privacy while enabling model training across decentralized data sources. …”
    Get full text
    Article
  6. 1906

    Enhancing medical image classification via federated learning and pre-trained model by Parvathaneni Naga Srinivasu, G. Jaya Lakshmi, Sujatha Canavoy Narahari, Jana Shafi, Jaeyoung Choi, Muhammad Fazal Ijaz

    Published 2024-09-01
    “…Federated learning (FL) offers a promising method for collaborative training on distributed data held by various entities, ensuring the privacy of patient information. …”
    Get full text
    Article
  7. 1907

    Phenomena of Malaysian, and Japanese Languages from an Intercultural Communication Perspective by Machawan Arsyl Elensyah Rhema, Sanjaya Sonda, Zubbir Nadiah Binti

    Published 2024-01-01
    “…Employing a qualitative method, supplemented with an ethnographic approach tailored to how researchers gather data, this study examined Japanese language phenomena and language phenomena used in the Malayan Peninsula region (Singapore and Malaysia) over five days. …”
    Get full text
    Article
  8. 1908

    Leveraging AI-Generated Virtual Speakers to Enhance Multilingual E-Learning Experiences by Sergio Miranda, Rosa Vegliante

    Published 2025-02-01
    “…Future research should focus on addressing ethical considerations, such as data privacy and algorithmic bias, and expanding the user base to include more languages and proficiency levels.…”
    Get full text
    Article
  9. 1909

    Advancements of Deep Learning Model-Based Rehabilitation Training System by Xu Chiyu

    Published 2025-01-01
    “…The experimental results show that there is still room for the development of rehabilitation training assessment systems in terms of privacy, interpretation ability, and application scenarios, and that researchers can address the above issues by using federated learning, developing an expert system, and using transfer learning domain adaptation, respectively.…”
    Get full text
    Article
  10. 1910

    Factors influencing academic staff satisfaction and continuous usage of generative artificial intelligence (GenAI) in higher education by Maria Ijaz Baig, Elaheh Yadegaridehkordi

    Published 2025-02-01
    “…Therefore, this study aims to identify factors influencing academic staff satisfaction and continuous GenAI usage in higher education, employing a survey method and analyzing data using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  11. 1911

    BERTinchamps: Cost-Effective In-House Training of Language Models in French by Amaury Fierens, Sébastien Jodogne

    Published 2024-12-01
    “…While training LMs directly inside an institution is desirable for leveraging local data and addressing data privacy concerns, this process demands a costly and complex computational infrastructure. …”
    Get full text
    Article
  12. 1912

    SortAlign: a score-based aggregation technique for neural networks in one-round federated learning by Antonio Nappa, Oihan Joyot, Izar Azpiroz, Juan Luis Ferrando Chacón, Mikel Sáez de Buruaga

    Published 2024-12-01
    “…In recent years, the growth of data generated on a daily basis in critical domains, such as industrial processes, where data privacy plays a key role, has led to the strong development of Federated Learning. …”
    Get full text
    Article
  13. 1913

    Association between sedentary behaviour and chronic pelvic pain in women: a protocol for systematic review and meta-analysis by Lei Tang, Guohua Wang, Yangyan Guo

    Published 2025-05-01
    “…The research team will ensure data privacy and participant confidentiality through anonymised data processing and strict compliance with relevant regulations. …”
    Get full text
    Article
  14. 1914

    Blockchain driven medical image encryption employing chaotic tent map in cloud computing by Usman Shahid, Shamsa Kanwal, Mahwish Bano, Saba Inam, Manal Elzain Mohamed Abdalla, Zaffar Ahmed Shaikh

    Published 2025-02-01
    “…To sum up, the BCTMES effectively addresses a number of prevalent risks to picture security and offers a complete solution that may be implemented in cloud-based settings where data integrity and privacy are crucial. This work suggests a promising path for further investigation and practical uses in secure image transmission.…”
    Get full text
    Article
  15. 1915

    A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things by Sasikumar Asaithambi, Senthilkumar Nallusamy, Jing Yang, Sunil Prajapat, Gyanendra Kumar, Pramod Singh Rathore

    Published 2025-05-01
    “…This article presents a blockchain-assisted safe data-sharing mechanism that provides security requirements in the industry using IoT. …”
    Get full text
    Article
  16. 1916

    Assessment of The Potential Interference and Conflict of Artificial Intelligence With Human Rights and Citizenship: Challenges and Solutions by Hossein Khazaei, Mojtaba Hemmati

    Published 2025-03-01
    “…Therefore, it is necessary to devise solutions to address these challenges, which may include diversifying data, ensuring operational transparency, establishing legal and ethical frameworks, government commitments to balance the use of artificial intelligence with the fulfillment and enforcement of the right to work, data protection, respect for privacy, reducing discrimination, collaborating with stakeholders, establishing international legal standards, and fostering international cooperation for the safe development of artificial intelligence. …”
    Get full text
    Article
  17. 1917

    BERT ensemble based MBR framework for android malware detection by Faisal S. Alsubaei, Abdulwahab Ali Almazroi, Walid Said Atwa, Abdulaleem Ali Almazroi, Nasir Ayub, Noor Zaman Jhanjhi

    Published 2025-04-01
    “…By leveraging their strengths, the MBR model introduces significant innovation. By using ensemble methods on static data, the MBR framework not only provides a reliable malware detection solution but also presents a novel strategy. …”
    Get full text
    Article
  18. 1918

    Telemedicine and information technology in health care management: Perspectives and barriers among the nursing students by N Sheeliya White, S Sathya Franklin, N Juliet, Selvia Arokiya Mary Amalanathan, Puvaneswari Kanagaraj, Anasani Somasekhara Babu

    Published 2024-10-01
    “…Data collection was facilitated through a structured questionnaire, and the gathered data were analyzed using SPSS version 22. …”
    Get full text
    Article
  19. 1919

    Description and utilization of the United States department of defense serum repository: a review of published studies, 1985-2012. by Christopher L Perdue, Angelia A Eick Cost, Mark V Rubertone, Luther E Lindler, Sharon L Ludwig

    Published 2015-01-01
    “…The Armed Forces Health Surveillance Center (AFHSC) information systems and open (online) sites were used as data sources. Through 2012, the repository contained 54,542,658 serum specimens, of which 228,610 (0.42%) have been accessed for any purpose. …”
    Get full text
    Article
  20. 1920

    From Surveillance to Sentencing: Evaluating AI's Role in Indian Criminal Justice by Kumar Navin

    Published 2025-06-01
    “…However, the integration of AI into criminal investigations raises critical concerns regarding privacy, surveillance, data protection, and algorithmic bias. …”
    Get full text
    Article