Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useddds » \"usedddds (Expand Search)
Showing 861 - 880 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"useddds) privacy data\\"))~\""', query time: 0.17s Refine Results
  1. 861

    ARTIFICIAL INTELLIGENCE AND BIG DATA ANALYSIS IN CRIME PREVENTION AND COMBAT by George-Marius ȚICAL

    Published 2025-03-01
    “…In the era of accelerated digitalization, the use of artificial intelligence (AI) and big data analysis has become a necessity in crime prevention and combat. …”
    Get full text
    Article
  2. 862

    Particular qualities of evaluation of electronic card data in modern healthcare by I. R. Svechkareva, A. A. Kurylev, D. E. Shilova

    Published 2025-01-01
    “…The article discusses various aspects of the implementation and use of EHR, including technical difficulties, data privacy and security issues. …”
    Get full text
    Article
  3. 863

    The Ethics of Data and Its Governance: A Discourse Theoretical Approach by Bernd Carsten Stahl

    Published 2025-06-01
    “…Drawing on Habermas’s Theory of Communicative Action and using the example of neuro data, this paper argues that data shapes and is shaped by discourses. …”
    Get full text
    Article
  4. 864

    Bringing it All Together: Data from Everywhere to Build Dashboards by David Schuster

    Published 2023-12-01
    “…Using Power BI, Power Automate and a Microsoft gateway, we can see the power of easy access to data without knowing all of the disparate systems. …”
    Get full text
    Article
  5. 865

    Revolutionizing Data Exchange Through Intelligent Automation: Insights and Trends by Yeison Nolberto Cardona-Álvarez, Andrés Marino Álvarez-Meza, German Castellanos-Dominguez

    Published 2025-05-01
    “…Furthermore, it underscores the urgent need for robust ethical frameworks to guide the responsible use of AI and to protect data privacy. In addressing these challenges, the paper calls for innovative research aimed at overcoming current limitations in scalability and security. …”
    Get full text
    Article
  6. 866

    SoK: The Impact of Educational Data Mining on Organisational Administration by Hamad Almaghrabi, Ben Soh, Alice Li, Idrees Alsolbi

    Published 2024-11-01
    “…It outlines key data mining techniques used in tasks like resource allocation, staff evaluation, and institutional planning. …”
    Get full text
    Article
  7. 867

    Fingerprint-Based Deduplication for Renewable Energy Data On-Site Analyzing by Zeng Zeng, Liyuan Gao, Hongyue Ma, Wenjing Li

    Published 2025-01-01
    “…By studying fine-grained data fingerprinting and neural network-based renewable energy data edge-analysis technologies, we have enabled edge processing of data, reducing latency and privacy issues, and enhancing the system’s real-time processing capabilities and responsiveness.…”
    Get full text
    Article
  8. 868

    Synthetic data in medicine: Legal and ethical considerations for patient profiling by Maja Nisevic, Dusko Milojevic, Daniela Spajic

    Published 2025-01-01
    “…Synthetic data is increasingly used in healthcare to facilitate privacy-preserving research, algorithm training, and patient profiling. …”
    Get full text
    Article
  9. 869

    BioGAN: Enhancing Transcriptomic Data Generation with Biological Knowledge by Francesca Pia Panaccione, Sofia Mongardi, Marco Masseroli, Pietro Pinoli

    Published 2025-06-01
    “…The advancement of computational genomics has significantly enhanced the use of data-driven solutions in disease prediction and precision medicine. …”
    Get full text
    Article
  10. 870

    Smart Grids Data Aggregation Method on Paillier Homomorphic Encryption by Shaodong Zhao

    Published 2024-12-01
    “…In this paper, the Paillier HE algorithm was used to study the power grid data, and the encrypted data was numerically calculated under different encryption states. …”
    Get full text
    Article
  11. 871

    Synthetic data distillation enables the extraction of clinical information at scale by Elizabeth Geena Woo, Michael C. Burkhart, Emily Alsentzer, Brett K. Beaulieu-Jones

    Published 2025-05-01
    “…Abstract Large-language models (LLMs) show promise for clinical note information extraction, but deployment challenges include high computational costs and privacy concerns. We used synthetic data distillation to fine-tune smaller, open-source LLMs to achieve performance comparable to larger models while enabling local hardware deployment or reduced cloud costs. …”
    Get full text
    Article
  12. 872

    Legal paternalism’s influence on the balancing data protection and fundamental rights by I. Patricheev

    Published 2025-03-01
    “…Soft paternalism, on the other hand, can be seen in EU lawmakers’ attempts to nudge data subjects into using their data carefully and reasonably in digital environments without heavily restricting their data autonomy. …”
    Get full text
    Article
  13. 873

    Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security by Xiaolu Chu, Ke Cheng, Anxiao Song, Jiaxuan Fu

    Published 2025-01-01
    “…Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). …”
    Get full text
    Article
  14. 874

    Cardiac disease diagnosis based on GAN in case of missing data. by Xing Chen, Na Zhang, Xiaohui Yang, Chunyan Wang, Qi Na, Tianyun Luan, Wendi Zhu, Chenjie Zhang, Chao Yang

    Published 2024-01-01
    “…In daily life, two common algorithms are used for collecting medical disease data: data integration of medical institutions and questionnaires. …”
    Get full text
    Article
  15. 875
  16. 876

    Recognition of Human Activities Based on Ambient Audio and Vibration Data by Marcel Koch, Thomas Pfitzinger, Fabian Schlenke, Fabian Kohlmorgen, Roland Groll, Hendrik Wohrle

    Published 2024-01-01
    “…The data obtained by the AMSNs is classified using two distinct neural networks. …”
    Get full text
    Article
  17. 877

    Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications by Milos Simic, Jovana Dedeic, Milan Stojkov, Ivan Prokic

    Published 2025-01-01
    “…By extending the existing virtual clouds model, we introduce a new dataspaces layer and protocols for data discovery using the concept of hierarchical namespaces and transforming non-shareable resources, such as files and folders, into collaborative resources. …”
    Get full text
    Article
  18. 878
  19. 879

    Deep Learning for Medical Image Analysis Applications in Disease Detection and Diagnosis by Panchadhyayee Swagata, N Shirisha, S Sureshkumar, Priya S Harthy Ruby, Ramalingam Vanaja, M Mahima

    Published 2025-01-01
    “…Its potential applications are indeed great, but realising its potential has been slow owing to a host of challenges such as implementing it in a real-life scenario, data privacy challenges, ethical concerns, AI models being biased, operating system structures needing to be interoperable with existing systems, and their compliance with regulating standards. …”
    Get full text
    Article
  20. 880

    Health Unchained Podcast on New Decentralized Industry Coalition by Ray Dogum

    Published 2025-04-01
    “…Concepts explored during the conversation include: • Financial systems interacting with health • AI agents interacting with AI agents, exchanging value and micro payments • Building frameworks that make it easy to consume for CIOs around globe • Blockchain transaction framework • AI analytical framework • Privacy preservation data complying with HIPAA and HL7 • Coming together to solve industry problems  • Real world implementations, use cases - including reporting, health data, and DeSci, clinical innovations and research, tokenization, ethical AI, and verifiable intelligence • Stable coins for cross border payments • Full access to data, and payments around globe • Supply chain ecosystem, pharmacy, pharma, insurance/payors, clinics, doctors, and patients • Who will new intermediaries be to move data, bill, and secure the data? …”
    Get full text
    Article