Showing 2,441 - 2,460 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.22s Refine Results
  1. 2441

    Source-Free Domain Adaptation for Cross-Modality Abdominal Multi-Organ Segmentation Challenges by Xiyu Zhang, Xu Chen, Yang Wang, Dongliang Liu, Yifeng Hong

    Published 2025-05-01
    “…While unsupervised domain adaptation (UDA) has shown promise in addressing these issues by transferring knowledge from a different modality (source domain), its reliance on both source and target data during training presents a practical challenge in many clinical settings due to data privacy concerns. …”
    Get full text
    Article
  2. 2442

    SensorsConnect Framework: World-Wide Web for Internet of Things by Abdelrahman Elewah, Khalid Elgazzar

    Published 2024-01-01
    “…A motivating scenario illustrates its potential impact in real-life situations, such as finding a drive-thru coffee shop or crossing a country border. Using real-time road status and service occupancy data, SensorsConnect enhances Google Maps service recommendations, not only minimizing customer wait times but also distributing workload more evenly across service points. …”
    Get full text
    Article
  3. 2443

    5G-MobiCare: A Secure 5G Assisted Remote Mobile Health Monitoring Platform by Hemangi Goswami, Tarun Pandey, Hiten Choudhury

    Published 2025-01-01
    “…This setup generates vast amounts of real-time data, making secure device authentication essential to ensure data privacy and security. …”
    Get full text
    Article
  4. 2444

    A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security by Junjun Li, Yanyan Ma, Jiahui Bai, Congming Chen, Tingting Xu, Chi Ding

    Published 2025-07-01
    “…Experimental evaluation on the CAN-Hacking dataset shows that the proposed intrusion detection system achieves more than 99% F1 score with only 1.11 MB of memory and 81,863 trainable parameters, while maintaining low computational overheads and ensuring data privacy, which is very suitable for edge device deployment.…”
    Get full text
    Article
  5. 2445

    TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache, Carlos T. Calafate

    Published 2025-07-01
    “…This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. …”
    Get full text
    Article
  6. 2446

    Advanced Applications of Artificial Intelligence in Pharmacovigilance: Current Trends and Future Perspectives by Yogesh S Ahire, Jayesh H Patil, Harshita N Chordiya, Rashmi A Deore, Vinod A Bairagi

    Published 2024-03-01
    “…The ethical and legal implications of patient privacy, data security, and regulatory compliance underscore the necessity of cautious artificial intelligence deployment in order to maintain public trust and protect patient rights. …”
    Get full text
    Article
  7. 2447

    Artificial Intelligence in Bronchopulmonary Dysplasia: A Review of the Literature by Tony Jha, Sana Suhail, Janet Northcote, Alvaro G. Moreira

    Published 2025-03-01
    “…Addressing ethical considerations, such as data privacy and demographic representation, as well as other practical considerations will be essential to ensure the proper implementation of AI clinical tools. …”
    Get full text
    Article
  8. 2448

    Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks by Muzun Althunayyan, Amir Javed, Omer Rana, Theodoros Spyridopoulos

    Published 2024-12-01
    “…To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL). …”
    Get full text
    Article
  9. 2449

    Quality of Breast Cancer Information on the Internet by African Organizations: An Appraisal by Cynthia Pomaa Akuoko

    Published 2017-01-01
    “…The identified websites were assessed using European Commission (EC) quality criteria for health-related websites, which comprises different assessment areas including, completeness, transparency and honesty, authority, privacy and data protection, updating of information, accountability, and accessibility. …”
    Get full text
    Article
  10. 2450

    Detecting Learning Behavior in Programming Assignments by Analyzing Versioned Repositories by John Chen, Serena Lau, Juho Leinonen, Valerio Terragni, Nasser Giacaman

    Published 2024-01-01
    “…The Polivr ecosystem comprises three key modules: Polivr Anonymiser, which ensures data privacy by anonymising student identities; Polivr Core, which mines learning metrics from Git repositories; and Polivr Web Viewer, which transforms the raw metrics into insightful visualisations for educators. …”
    Get full text
    Article
  11. 2451

    The Emergence of AI-Driven Virtual Hospitals: Redefining Patient Care Beyond Physical Boundaries by Ifrah Hameed, Hafiz Muhammad Haseeb Khaliq

    Published 2025-04-01
    “…Because rigorous monitoring is essential for the management of chronic diseases and post-surgery care. With the use of Internet of Things (IoT) technology, portable healthcare devices, and AI-based data analytics, rigorous monitoring of patient’s vitals and detection of anomalies in real-time has become easier. …”
    Get full text
    Article
  12. 2452

    A qualitative study on the unmet sexual needs of older women by Farzaneh Saadatmand, Mitra Savabi-Esfahani, Zahra Heidari, Marjan Beigi

    Published 2025-05-01
    “…Data were analyzed using the Graneheim and Lundman approach. …”
    Get full text
    Article
  13. 2453

    Federated learning based reference evapotranspiration estimation for distributed crop fields. by Muhammad Tausif, Muhammad Waseem Iqbal, Rab Nawaz Bashir, Bayan AlGhofaily, Alex Elyassih, Amjad Rehman Khan

    Published 2025-01-01
    “…The study intends to propose ETo estimation of multiple locations with distinct weather conditions using a federated learning approach. Traditional centralized approaches require aggregating all data in one place, which can be problematic due to privacy concerns and data transfer limitations. …”
    Get full text
    Article
  14. 2454

    Propagation routing for hybrid bandwidth allocation with reinforcement learning in VANET infrastructure analysis by G. Michael, A. Selvakumar, Ramesh Sundar, S. Manikandan, R. Gnanajeyaraman, U. Arul

    Published 2025-07-01
    “…The data are sent using reinforcement Q-learning techniques in conjunction with propagation routeing. …”
    Get full text
    Article
  15. 2455

    A STUDY OF PEOPLE’S PERCEPTION OF ARTIFICIAL INTELLIGENCE IN FINANCE AND SOCIETY by Dan MITRA, Ioana-Florina COITA

    Published 2025-07-01
    “…This paper investigates how people perceive artificial intelligence (AI), using both original survey data and insights from recent academic and policy literature. …”
    Get full text
    Article
  16. 2456

    AI in humanitarian healthcare: a game changer for crisis response by Diala Haykal, Mohamad Goldust, Hugues Cartier, Patrick Treacy

    Published 2025-07-01
    “…Ethical concerns such as data privacy, bias, and access inequities remain critical to responsible deployment. …”
    Get full text
    Article
  17. 2457

    Cooperative inference analysis based on DNN convolutional kernel partitioning by Jialin ZHI, Yinglei TENG, Xinyang ZHANG, Tao NIU, Mei SONG

    Published 2022-12-01
    “…With the popularity of intelligent chip in the application of edge terminal devices, a large number of AI applications will be deployed on the edge of networks closer to data sources in the future.The method based on DNN partition can realize deep learning model training and deployment on resource-constrained terminal devices, and solve the bottleneck problem of edge AI computing ability.Thekernel based partition method (KPM) was proposed as a new scheme on the basis of traditional workload based partition method (WPM).The quantitative analysis of inference performance was carried out from three aspects of computation FLOPS, memory consumption and communication cost respectively, and the qualitative analysis of the above two schemes was carried out from the perspective of flexibility, robustness and privacy of inference process.Finally, a software and hardware experimental platform was built, and AlexNet and VGG11 networks were implemented using PyTorch to further verify the performance advantages of the proposed scheme in terms of delay and energy consumption.It was concluded that, compared with the WPM scheme, the KPM scheme had better DNN reasoning acceleration effect in large-scale computing scenarios.And it has lower memory usage and energy consumption.…”
    Get full text
    Article
  18. 2458

    Student attendance and evaluation system : A review by Sura Falih, Yaseen Ismael

    Published 2025-06-01
    “…Previous studies have explored a variety of approaches and techniques to achieve these goals, such as using RFID for automatic attendance recording, Arduino systems for automated testing, and machine learning algorithms for analyzing academic performance. …”
    Get full text
    Article
  19. 2459

    Cooperative inference analysis based on DNN convolutional kernel partitioning by Jialin ZHI, Yinglei TENG, Xinyang ZHANG, Tao NIU, Mei SONG

    Published 2022-12-01
    “…With the popularity of intelligent chip in the application of edge terminal devices, a large number of AI applications will be deployed on the edge of networks closer to data sources in the future.The method based on DNN partition can realize deep learning model training and deployment on resource-constrained terminal devices, and solve the bottleneck problem of edge AI computing ability.Thekernel based partition method (KPM) was proposed as a new scheme on the basis of traditional workload based partition method (WPM).The quantitative analysis of inference performance was carried out from three aspects of computation FLOPS, memory consumption and communication cost respectively, and the qualitative analysis of the above two schemes was carried out from the perspective of flexibility, robustness and privacy of inference process.Finally, a software and hardware experimental platform was built, and AlexNet and VGG11 networks were implemented using PyTorch to further verify the performance advantages of the proposed scheme in terms of delay and energy consumption.It was concluded that, compared with the WPM scheme, the KPM scheme had better DNN reasoning acceleration effect in large-scale computing scenarios.And it has lower memory usage and energy consumption.…”
    Get full text
    Article
  20. 2460

    The Impact of Artificial Intelligence on Human Resource Management in the Era of Digitalization by PhD. Mugur TOLICI1, PhD. Daniela NICULESCU

    Published 2025-03-01
    “…This study examines AI-driven HR functions, including recruitment, performance evaluation, and learning and development, while addressing ethical and operational challenges such as bias, data privacy, and job displacement. Using a qualitative methodology, including a narrative literature review and case study analysis, the research explores AI’s integration within HRM through theoretical frameworks such as the Technology Acceptance Model (TAM), Resource-Based View (RBV), and Socio-Technical Systems Theory. …”
    Get full text
    Article