Showing 2,241 - 2,260 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.15s Refine Results
  1. 2241

    Human Dignity in Genetics and Reproductive Health in the Digital Age by Archibong EI, Ukeagu LOC, Arinmi AO, Emeka EE, Igalawuye GO

    Published 2025-07-01
    “…The study’s significance lies in the view that technology determines the trajectory of the rules of engagement in the comity of humans and even medical practice with the imperative of prioritising human dignity in the development and use of genetic and reproductive health technologies. …”
    Get full text
    Article
  2. 2242

    A novel half-complementary cipher for in-situ secure computing-in-memory by Ying Zhou, Wenbiao Zhang, Yinuo Shi, Xiaomi Chen, Jianting Liu, Xiang Feng, Tiejun Zhou, Bo Liu

    Published 2025-04-01
    “…The advent of the new AI era has led to an increase in the number of intelligent terminals in use and the generation of a vast amount of data, driving the development of novel AI accelerator techniques. …”
    Get full text
    Article
  3. 2243

    Integrating Large Language Models into Robotic Autonomy: A Review of Motion, Voice, and Training Pipelines by Yutong Liu, Qingquan Sun, Dhruvi Rajeshkumar Kapadia

    Published 2025-07-01
    “…We also highlight the use of physics-informed neural networks (PINNs) to model object deformation and support precision in contact-rich manipulation tasks. …”
    Get full text
    Article
  4. 2244

    Implementation of NGS and SNP microarrays in routine forensic practice: opportunities and barriers by Sharlize Pedroza Matute, Sasitaran Iyavoo

    Published 2025-05-01
    “…Conversely, SNP microarrays offer a cost-effective solution for extended kinship testing, Forensic Investigative Genetic Genealogy (FIGG), and phenotypic prediction, though they are less effective with low-quality samples and DNA mixtures. Ethical, legal, and privacy concerns, particularly surrounding the use of Forensic DNA Phenotyping (FDP) and consumer genetic data in FIGG, further complicate their integration into forensic workflows. …”
    Get full text
    Article
  5. 2245

    Decentralized electrochemical biosensors for biomedical applications: From lab to home by Pramod K. Kalambate, Vipin Kumar, Dhanjai

    Published 2025-01-01
    “…However, potential risks such as data security vulnerabilities, privacy concerns, and regulatory challenges must be addressed to ensure safe and ethical deployment of these technologies. …”
    Get full text
    Article
  6. 2246

    Comprehensive Review and Future Research Directions on ICT Standardisation by Mohammed Najah Mahdi, Ray Walshe, Sharon Farrell, Harshvardhan J. Pandit

    Published 2024-11-01
    “…Standardisation also solves problems, such as the use of mobile devices, which requires travel abroad when out of range. …”
    Get full text
    Article
  7. 2247

    Ethical and Safety Challenges of Implantable Brain-Computer Interface by Ihab Abdulrahman Satam, Róbert Szabolcsi

    Published 2025-04-01
    “…The study of brain-computer interfaces (BCIs) holds immense potential across various fields, particularly in Human-Robot Interaction, where invasive BCIs offer precise and direct communication between the human brain and robotic devices. However, the use of invasive BCIs raises significant ethical, safety, and security concerns that must be addressed to ensure their responsible deployment. …”
    Get full text
    Article
  8. 2248

    Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure by Anas Motii, Mahmoud El Hamlaoui, Robert Basmadjian

    Published 2024-11-01
    “…This interconnection raises concerns about security, privacy, and the expanding risk of cyber-attacks within the electric vehicle landscape. …”
    Get full text
    Article
  9. 2249

    Beijing’s urbanization reflected in apartment layouts: a computer vision and isovist analysis (1970–2020) by Yanhua Yao, Ashutosh Kumar, Martina Mazzarello, Fábio Duarte, Lei Shao, Limin Song, Carlo Ratti

    Published 2025-05-01
    “…Our findings show a trend in the isovist intensity of living rooms, dining rooms, and kitchens, indicative of shifts toward privacy and mixed-use spaces, shaped by household occupancy patterns. …”
    Get full text
    Article
  10. 2250

    Parents’ understanding and attitudes toward the application of AI in pediatric healthcare: a cross-sectional survey study by Yan-Dan Huang, Shu-Long Zeng, Jie Lin, Zhi-Peng Mao, Qi-Liang Zhang, Gao-Zhong Feng, Qiong-Xia Ou

    Published 2025-08-01
    “…Most participants (91.1%) believed that AI cannot replace doctors in the future.ConclusionAlthough most parents were aware of the use of AI in pediatric healthcare and recognized its convenience and efficiency, they expressed concerns about accuracy, accountability, and data privacy. …”
    Get full text
    Article
  11. 2251

    Asynchronous blockchain‐based federated learning for tokenized smart power contract of heterogeneous networked microgrid system by Desh Deepak Sharma

    Published 2024-12-01
    “…For simulation purposes, MATLAB and python programming have been used with real‐time data of microgrids.…”
    Get full text
    Article
  12. 2252

    A Survey on the Effectiveness of Existing Smart Home Cyber Attacks Detection Solution: A Broadband Service Providers’ Perspective by Md Mizanur Rahman, Faycal Bouhafs, Frank den Hartog

    Published 2025-01-01
    “…We also discuss future research directions, emphasising scalable and data-efficient methods to reduce storage requirements, costs, and privacy concerns, which will enable BSPs to manage millions of customer networks more effectively.…”
    Get full text
    Article
  13. 2253
  14. 2254

    Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3 by Merryana Lestari, Hindriyanto Dwi Purnomo, Irwan Sembiring

    Published 2021-10-01
    “…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
    Get full text
    Article
  15. 2255

    Role of digital technology in epidemic control: a scoping review on COVID-19 and Ebola by Amanuel Adugna, Gossa Fetene Abebe, Desalegn Girma, Melsew Setegn Alie, Tewodros Yosef, Daniel Asmelash, Dorka Dessalegn

    Published 2025-01-01
    “…Five main themes emerged: digital epidemiological surveillance (using data visualisation tools and online sources for early disease detection), rapid case identification, community transmission prevention (via digital contact tracing and assessing interventions with mobility data), public education messages and clinical care. …”
    Get full text
    Article
  16. 2256

    Understanding customer loyalty in digital services: insights from food delivery in emerging markets by Bora Ly

    Published 2025-07-01
    “…Grounded in the Commitment-Trust Theory and the SERVQUAL model, this study examines how these factors collectively influence consumer behavior in an emerging market. Data were collected via survey questionnaires from 324 Cambodian respondents and analyzed using partial least squares–structural equation modeling (PLS–SEM). …”
    Get full text
    Article
  17. 2257

    Federated Learning for Decentralized DDoS Attack Detection in IoT Networks by Yaser Alhasawi, Salem Alghamdi

    Published 2024-01-01
    “…Our approach prioritizes data privacy by processing data locally, thereby avoiding the need for central data collection, while enhancing detection efficiency. …”
    Get full text
    Article
  18. 2258

    Membangun Kepercayaan yang Berkelanjutan di Era Disruptif Komunikasi: Perspektif Media dan Komunikasi Digital by Agung Dharmajaya, Harmonis Minangkabawi

    Published 2024-04-01
    “… The purpose of this research is to find out the factors that can build sustainable trust in the field of disruptive communication from the perspective of digital media and communication. This research uses qualitative research methods. The data collection technique in this research is done by literature study by exploring journals, books and other information relevant to the research. …”
    Get full text
    Article
  19. 2259

    Revolutionizing e-health: the transformative role of AI-powered hybrid chatbots in healthcare solutions by Jack Ng Kok Wah

    Published 2025-02-01
    “…After screening 116 studies, 29 met the criteria for inclusion. Data was extracted using a structured template, capturing study objectives, methodologies, findings, and challenges. …”
    Get full text
    Article
  20. 2260

    Contrastive Self-Supervised Learning for Sensor-Based Human Activity Recognition: A Review by Hui Chen, Charles Gouin-Vallerand, Kevin Bouchard, Sebastien Gaboury, Melanie Couture, Nathalie Bier, Sylvain Giroux

    Published 2024-01-01
    “…Next, we comprehensively review data augmentation methods for sensor data and commonly used benchmark datasets for activity recognition. …”
    Get full text
    Article