Showing 2,361 - 2,380 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.28s Refine Results
  1. 2361
  2. 2362

    Views on the incorporation of Geolocation Devices in Field Trips by Marta Magallón, Cristina Mercader

    Published 2022-01-01
    “…Geolocation in field trips has great potential, but it is an understudied field that needs more research and discussion to ensure data privacy.…”
    Get full text
    Article
  3. 2363

    Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem by Saša Malešević, Michael Lustenberger, Florian Spychiger

    Published 2020-12-01
    “…Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. …”
    Get full text
    Article
  4. 2364

    An intelligent conversational agent for querying satellite manoeuvre detections: a case study by Wathsala Karunarathne, David P Shorten, Matthew Roughan

    Published 2025-06-01
    “…Moreover, our system can handle sensitive and confidential data without breaching privacy. This paper presents the results of deploying SatChat in conjunction with a particle filter based manoeuvre detection system.…”
    Get full text
    Article
  5. 2365

    IoT-driven smart grid monitoring with enhanced energy routing and advanced encryption techniques by K. Perachi, S. Balaji

    Published 2025-11-01
    “…The proposed work incorporates Improved Paillier Homomorphic (IPH) based encryption scheme, which assures integrity and confidentiality of data transmitted. The outcomes of proposed smart grid system using MATLAB and FPGA controller demonstrate significant improvements by providing enhanced security and optimal routing. …”
    Get full text
    Article
  6. 2366

    Revolutionizing Midwifery Education : A Scoping Review of Artificial Intelligence Methods by Harridhil Silmi, Ari Indra Susanti

    Published 2025-04-01
    “…Despite these advancements, challenges such as ethical concerns (algorithmic bias, privacy issues), poor data quality, limited AI expertise among educators, and resistance to change in traditional learning environments were noted. …”
    Get full text
    Article
  7. 2367

    DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems by Yucong Duan, Zhendong Guo

    Published 2025-07-01
    “…The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. …”
    Get full text
    Article
  8. 2368

    Deep Learning dengan Teknik Early Stopping untuk Mendeteksi Malware pada Perangkat IoT by Iwang Moeslem Andika Surya, Triawan Adi Cahyanto, Lutfi Ali Muharom

    Published 2025-02-01
    “…This approach utilizes machine learning techniques and intense learning to identify and mitigate cyber threats. The use of Convolutional Neural Network (CNN) in classifying the IoT-23 dataset with the SMOTE (Synthetic Minority Oversampling Technique) data balancing technique and the Early Stopping function shows high results. …”
    Get full text
    Article
  9. 2369

    Analisis Pengaruh Kualitas Layanan Terhadap Kepuasan Pelanggan dan Loyalitas Pengguna Aplikasi Jenius Menggunakan Model E-S- Qual dan E- Recs- QUal (Studi Kasus: Pengguna Aplikasi... by Alfansya Achmad Mulyadi, Satrio Hadi Wijoyo, Hanifah Muslimah Az-Zahra

    Published 2022-12-01
    “…This study involved 100 samples of Jenius application users in Malang City. This research uses purposive sampling as a sampling technique and multiple and simple linear regression analysis as a technique in data analysis. …”
    Get full text
    Article
  10. 2370

    An AI-Based Telerehabilitation Solution to Improve Mobility in People With Multiple Sclerosis (the PLATINUMS Project): Protocol for an Implementation and Evaluation Study by Lars Hvid, Susan Coote, Massimiliano Pau, Alon Kalron

    Published 2025-07-01
    “…WP3 comprises a validity study (n=60) to evaluate remote mobility tests via the system, such as the Short Physical Performance Battery (SPPB), functional reach, and sit-to-stand tests, to ensure their reliability for use in WP4, the feasibility multicenter randomized controlled trial (RCT). …”
    Get full text
    Article
  11. 2371

    A Bibliometric Analysis of Publications on Surveillance and New Media Concepts in The Web of Science Database by Anıl Durmuşahmet

    Published 2025-06-01
    “…To this end, a bibliometric analysis based on quantitative data is conducted using the Web of Science (WoS) database as of June 23, 2024. …”
    Get full text
    Article
  12. 2372

    Blockchain enhanced smart healthcare management for chronic diseases by Shruti Saxena, Shivani Saxena, Nikunj Tahilramani, Panem Charanarur

    Published 2025-06-01
    “…Abstract Chronic diseases affect millions of people worldwide, making it a significant issue for the efficient and secure management of patient data. Most traditional chronic disease management systems fail to manage data in real time and struggle with interoperability and security issues. …”
    Get full text
    Article
  13. 2373

    The Analysis of the Effective Factors on Urban Blight in District 3, Region 12, Tehran City by Hossein Mansourian, Ahmad Pour Ahmad, Hasan Ashouri

    Published 2019-09-01
    “…Materials and Methods This study is mostly based on the initial data resulted from surveying the households using a researcher-made questionnaire; however, the tools of the interview, observation, and the results obtained from the public censuses of population and housing are also used to achieve the required data and information. …”
    Get full text
    Article
  14. 2374

    Hybrid-CID: Securing IoT with Mongoose Optimization by S. Merlin Sheeba, R. S. Shaji

    Published 2025-03-01
    “…After preprocessing, the Hybrid-CID framework develops a hybrid optimization algorithm to identify the intrusions from the traffic data which ensures data privacy by maintaining the reliability and integrity of IoT deployments. …”
    Get full text
    Article
  15. 2375

    A Comprehensive Survey of Electric Vehicle Charging Demand Forecasting Techniques by Mamunur Rashid, Tarek Elfouly, Nan Chen

    Published 2024-01-01
    “…Meanwhile, emerging machine learning techniques bring promising prospects, yet exhibit suboptimal performance with insufficient data. Additionally, existing studies often overlook several critical areas such as overcoming data scarcity, security and privacy concerns, managing the inherent stochasticity of demand data, selecting forecasting methods for a specific feature, and developing standardized performance metrics. …”
    Get full text
    Article
  16. 2376
  17. 2377

    Reinforcement Learning With Deep Features: A Dynamic Approach for Intrusion Detection in IoT Networks by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…As IoT devices continue to advance, securing interconnected systems against malicious attacks is essential to ensure data privacy, system integrity, and user safety. …”
    Get full text
    Article
  18. 2378

    Towards AI-Powered Applications: The Development of a Personalised LLM for HRI and HCI by Khashayar Ghamati, Maryam Banitalebi Dehkordi, Abolfazl Zaraki

    Published 2025-03-01
    “…Furthermore, this study engages with the broader ethical dimensions of PLLM, critically discussing issues of generalisability and data privacy concerns in AI research. Our findings demonstrate the usability of using the PLLM in a human–robot interaction scenario in real-world settings, highlighting its applicability across diverse domains, including healthcare, education, and assistive technologies. …”
    Get full text
    Article
  19. 2379

    Dynamics of Robo-Advisory Financial Services in Saudi Arabia by Heba Gazzaz

    Published 2025-06-01
    “…The key limitations of adopting Robo-advisory services include algorithmic bias, a lack of trust and transparency, legal and regulatory issues, privacy and data security concerns, and limited financial literacy. …”
    Get full text
    Article
  20. 2380

    Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Han-Chieh Chao

    Published 2024-11-01
    “…Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.…”
    Get full text
    Article