Showing 2,141 - 2,160 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.18s Refine Results
  1. 2141

    A Non-Invasive Approach for Facial Action Unit Extraction and Its Application in Pain Detection by Mondher Bouazizi, Kevin Feghoul, Shengze Wang, Yue Yin, Tomoaki Ohtsuki

    Published 2025-02-01
    “…A significant challenge that hinders advancements in medical research is the sensitive and confidential nature of patient data in available datasets. In particular, sharing patients’ facial images poses considerable privacy risks, especially with the rise of generative artificial intelligence (AI), which could misuse such data if accessed by unauthorized parties. …”
    Get full text
    Article
  2. 2142

    Availability and utilization of sexual and reproductive health services among adolescents of Godawari Municipality, Nepal: A cross-sectional study. by Laxmi Gautam, Aastha Maharjan, Harikrishna Bhattarai, Sujan Gautam

    Published 2025-01-01
    “…Only 13.22% of them had ever used ASRH services, and the reasons for not using services were the lack of realization of the need for services (60.39%), while 14.55% of them felt that privacy was not maintained at all. …”
    Get full text
    Article
  3. 2143

    Exploring the potential of GenAI for personalised English teaching: Learners' experiences and perceptions by Lucas Kohnke, Di Zou, Fan Su

    Published 2025-06-01
    “…Our results underscore the need for professional development for educators and the establishment of guidelines to address academic integrity and data privacy.…”
    Get full text
    Article
  4. 2144

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  5. 2145

    kMoL: an open-source machine and federated learning library for drug discovery by Romeo Cozac, Haris Hasic, Jun Jin Choong, Vincent Richard, Loic Beheshti, Cyrille Froehlich, Takuto Koyama, Shigeyuki Matsumoto, Ryosuke Kojima, Hiroaki Iwata, Aki Hasegawa, Takao Otsuka, Yasushi Okuno

    Published 2025-02-01
    “…Graph Convolutional Network (GCN) models have proven especially promising due to their inherent ability to model molecular structures using graph-based representations. However, maximizing the potential of such models in practice is challenging, as companies prioritize data privacy and security over collaboration initiatives to improve model performance and robustness. kMoL is an open-source machine learning library with integrated federated learning capabilities developed to address such challenges. …”
    Get full text
    Article
  6. 2146

    Large Language Models in Medicine: Clinical Applications, Technical Challenges, and Ethical Considerations by Kyu-Hwan Jung

    Published 2025-04-01
    “…Ethical concerns involve algorithmic bias risking health inequities, threats to patient safety from inaccuracies, unclear accountability, data privacy, and impacts on clinician-patient interactions. …”
    Get full text
    Article
  7. 2147

    Evaluating the Ethical Practices in Developing AI and Ml Systems in Tanzania by Lazaro Inon Kumbo, Victor Simon Nkwera, Rodrick Frank Mero

    Published 2024-09-01
    “…Artificial Intelligence (AI) and Machine Learning (ML) present transformative opportunities for sectors in developing countries like Tanzania that were previously hindered by manual processes and data inefficiencies. Despite these advancements, the ethical challenges of bias, fairness, transparency, privacy, and accountability are critical during AI and ML system design and deployment. …”
    Get full text
    Article
  8. 2148

    Hybrid Transformer-KAN Within Federated Learning Framework: A Novel Machine Learning Approach for Improved Short-Term Weather Forecasting by Shuai Jin, Qiang Li, Sanqiu Liu, Olebogeng Kevin Joel, Xiaohu Ge

    Published 2025-01-01
    “…Furthermore, federated learning is applied to the proposed method to exploit the spatio-temporal dependencies while protecting data privacy. As a result, a novel framework of Federated-Transformer-KAN is proposed to collaboratively forecast weather variables in a distributed manner, without sharing data that is collected by the intelligent sensors equipped at each weather station locally. …”
    Get full text
    Article
  9. 2149

    Advancing the Sensitivity Frontier in digital contact tracing: Comparative analysis of proposed methods toward maximized utility by Junko Ami, Yanbo Pang, Hiroshi Masui, Takashi Okumura, Yoshihide Sekimoto

    Published 2025-01-01
    “…During the COVID-19 pandemic, many countries adopted Digital Contact Tracing (DCT) technology to control infections. However, the widely-used Bluetooth Low Energy (BLE)-based DCT requires both the infected individual and the contact to have the application activated to detect exposure. …”
    Get full text
    Article
  10. 2150

    Receptiveness to participating in cannabis research in pregnancy: a survey study at The Ottawa Hospital [version 1; peer review: 2 approved] by Kira Bombay, Amy McGee, Christina Cantin, Kathryn M Denize, Malia SQ Murphy, Daniel J Corsi, Mark C Walker, Shi Wu Wen, Ruth Rennicks White

    Published 2021-05-01
    “…In the design of new cohort studies to evaluate the patterns and outcomes of cannabis use in pregnancy, consideration must be given to the factors influencing participation, data sharing, and contribution of biological samples. …”
    Get full text
    Article
  11. 2151

    “Invisible wounds of childbirth”; women’s experiences of obstetric violence: a phenomenological qualitative study by Esra Özer, Döndü Sevimli Güler

    Published 2025-08-01
    “…The interview data were transcribed and then subjected to qualitative content analysis in accordance with Standards for Qualitative Research Reporting (SRQR) using Graneheim and Lundman’s content analysis method. …”
    Get full text
    Article
  12. 2152

    Federated Online Learning for adaptive load forecasting across decentralized nodes by Mohamed Ahmed T.A. Elgalhud, Mohammad Navid Fekri, Syed Mir, Katarina Grolinger

    Published 2025-08-01
    “…The main drawbacks are twofold: (1) data sharing and transfer results in privacy and security risks, and (2) static models miss opportunities to learn from new data. …”
    Get full text
    Article
  13. 2153
  14. 2154

    Measuring large-scale social networks with high resolution. by Arkadiusz Stopczynski, Vedran Sekara, Piotr Sapiezynski, Andrea Cuttone, Mette My Madsen, Jakob Eg Larsen, Sune Lehmann

    Published 2014-01-01
    “…Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1000 individuals, using state-of-the-art smartphones as social sensors. …”
    Get full text
    Article
  15. 2155

    ROBOTISATION AND SERVICE AUTOMATION IN THE TOURISM AND HOSPITALITY SECTOR: A META-STUDY (1993-2024) by Dušan MANDIĆ, Miroslav KNEŽEVIĆ, Dušan BOROVČANIN, Aleksandra VUJKO

    Published 2024-09-01
    “…Analyses 310 publications published in the last 32 years processed using Google Scholar search engine. The data sets used for the observations consist primarily of key research works, predominantly appearing in peer-reviewed international journals. …”
    Get full text
    Article
  16. 2156

    A Survey on Hybrid-CNN and LLMs for Intrusion Detection Systems: Recent IoT Datasets by Saida Elouardi, Anas Motii, Mohammed Jouhari, Abdoul Nasser Hassane Amadou, Mustapha Hedabou

    Published 2024-01-01
    “…Various IDS methodologies, including those using Machine Learning (ML), Deep Learning (DL) and Large Language Models (LLMs), are employed to identify intrusions within the data; however, improvements to the detection systems are still needed. …”
    Get full text
    Article
  17. 2157

    Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi. by Christi J Guerrini, Louiza Kalokairinou, Jill O Robinson, Whitney Bash Brooks, Stephanie M Fullerton, Sara Huston, Jacklyn Dahlquist, Diana Madden, Norah Crossnohere, Nicola Campoamor, John F P Bridges, Amy L McGuire

    Published 2025-01-01
    “…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. …”
    Get full text
    Article
  18. 2158

    Advancing Remote Monitoring for Patients With Alzheimer Disease and Related Dementias: Systematic Review by Mohmmad Arif Shaik, Fahim Islam Anik, Md. Mehedi Hasan, Sumit Chakravarty, Mary Dioise Ramos, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Nazmus Sakib

    Published 2025-05-01
    “…The studies revealed a strong focus on various remote monitoring methods for capturing behavioral, physiological, and environmental data yet showed a gap in evaluating these methods for patient and caregiver needs, privacy, and usability. …”
    Get full text
    Article
  19. 2159

    The Application of Digital Intelligence Technology in the Management of Non-Hospitalized Patients with Rare Diseases by YAO Yiyang, GAO Yi, GUO Yixuan, QIN Zhuoyue, ZHANG Yaofang, JING Jiaqi, XIE Jing, GUO Jian, ZHANG Shuyang

    Published 2025-01-01
    “…Methods We designed the search strategy and used the words " rare diseases"" patient management"" non-hospitalized management"" community management"" digital intelligence"" big data"" telemedicine" as MESH terms or free words. …”
    Get full text
    Article
  20. 2160

    Internet of Medical Things Integrating IoT with Healthcare for Remote Monitoring and Diagnosis by R Suganya, P Sasikala, Lavanya Chinthamalla, Rashid Syed Zahidur, Tiwari Mohit, G Vijayakumari

    Published 2025-01-01
    “…By leveraging edge computing, AI, and blockchain-based security, the framework improves data privacy, reduces latency, and increases energy efficiency. …”
    Get full text
    Article