Showing 2,521 - 2,540 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.21s Refine Results
  1. 2521

    SparseBatch: Communication-efficient Federated Learning with Partially Homomorphic Encryption by Chong Wang, Jing Wang, Zheng Lou, Linghai Kong, WeiSong Tao, Yun Wang

    Published 2025-01-01
    “…It operates by aggregating local gradient updates contributed by participating clients, all the while safeguarding the privacy of sensitive data. Industrial FL frameworks employ additively homomorphic encryption (HE) to ensure that local gradient updates are masked during aggregation, guaranteeing no update is revealed. …”
    Get full text
    Article
  2. 2522

    Exploring the promising role of internet of things in urban water systems: a comprehensive global analysis of insights, trends, and research priorities by Shaher Zyoud

    Published 2025-03-01
    “…Most explored areas include water quality monitoring, leak detection, smart metering, and demand management, while challenges in the future lie in data security, privacy, and interoperability. Despite growing research interests, gaps remain in standardization, community engagement, and developing robust IoT architectures. …”
    Get full text
    Article
  3. 2523

    Cross-Room CO<sub>2</sub>-Based Presence Detection for Occupancy Profiling by Jelle Vanhaeverbeke, Emiel Deprost, Steven Verstockt, Sofie van Hoecke

    Published 2025-01-01
    “…The first contribution involves the development of a presence detection model based on CO2 data, which is easy to measure and non-privacy intrusive. …”
    Get full text
    Article
  4. 2524

    Unlocking potential of open source model training in decentralized federated learning environment by Ekaterina Pavlova, Grigorii Melnikov, Yury Yanovich, Alexey Frolov

    Published 2025-06-01
    “…Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. …”
    Get full text
    Article
  5. 2525

    Benchmarking Federated Few-Shot Learning for Video-Based Action Recognition by Nguyen Anh Tu, Nartay Aikyn, Nursultan Makhanov, Assanali Abu, Kok-Seng Wong, Min-Ho Lee

    Published 2024-01-01
    “…This learning approach is particularly useful but challenging due to the limited availability of labeled video data in practice. …”
    Get full text
    Article
  6. 2526

    Knowledge and Views of Patients With Cardiovascular Disease Toward Pharmacogenomics in The United Arab Emirates by Maram O. Abbas, Azhar T. Rahma, Iffat Elbarazi, Bassam R. Ali, George P. Patrinos, Farah Nagy, Alya Osman, Reem K. Alneyadi, Anwar S. Alshamsi, Mohamed Alraqabani, Zeina Al‐Mahayri, Fatma Al‐Maskari

    Published 2025-08-01
    “…Participants were invited via phone calls or in‐person contact at clinics. Data analysis was conducted using SPSS V.29, incorporating descriptive statistics and multivariable logistic regression. …”
    Get full text
    Article
  7. 2527

    Transformation of Dependent Rights In The Digital Era A Study In Electronic Implementation by Waradatun Nafi’ah, Arofa, Andianita Nur Ilahiyah, Moh Basri, Ahmad Musadad

    Published 2025-03-01
    “…However, in its implementation, there are still various obstacles, such as limited technological infrastructure, low public digital literacy, and challenges in maintaining data security and user privacy. This study uses normative juridical methods, utilizing legal and conceptual approaches to examine the effectiveness of regulations regarding electronic liens. …”
    Get full text
    Article
  8. 2528

    Blockchain-Enhanced Security for 5G Edge Computing in IoT by Manuel J. C. S. Reis

    Published 2025-04-01
    “…By combining permissioned and permissionless blockchain layers with Layer-2 scaling solutions and adaptive consensus mechanisms, the framework enhances both security and scalability while maintaining computational efficiency. Using synthetic datasets that simulate real-world adversarial behaviour, our evaluation shows an average authentication latency of 172.50 s and a 50% reduction in gas fees compared to traditional Ethereum-based implementations. …”
    Get full text
    Article
  9. 2529

    Why We Disclose on Social Media? Towards a Dual-Pathway Model by Qiyu Bai, Qi Dan, Yumin Choi, Siyang Luo

    Published 2025-04-01
    “…A moderated mediation model was proposed and tested using cross-sectional survey data collected from 1519 Chinese netizens. …”
    Get full text
    Article
  10. 2530

    Future perspectives on internet of vehicles resource management: digital twin-enabled edge computing frameworks by Jihong Xie, Gui Wu, Xiang Zhou, Shanshan Deng

    Published 2025-07-01
    “…Existing approaches are then discussed and compared using clustering, matching, and offloading approaches. …”
    Get full text
    Article
  11. 2531

    COVID-19 and the implications of social and hospital isolation for older adults by Renata Bezerra de Holanda Bessa, Karla Patrícia Martins Ferreira, Cynthia de Freitas Melo, Letícia Keroly Bezerra Alexandrino, Bianca de Sousa Nogueira

    Published 2025-08-01
    “…Method This is an exploratory, descriptive, and qualitative study conducted with 16 hospitalized older adults, who answered a sociodemographic questionnaire and a guiding question. Data were analyzed through textual analysis using the Interface de R pour les Analyses Multidimensionnelles de Textes et de Questionnaires (IRaMuTeQ) software. …”
    Get full text
    Article
  12. 2532

    Dispute Resolution in Islamic Economic Transactions: The Role and Function of Sharia Arbitration by Gunawan Widjaja

    Published 2025-02-01
    “…This study examines the function and role of Sharia-based arbitration, focusing on its alignment with the values of justice, efficiency, and confidentiality within Islamic law. Using a literature-based methodology, the research analyzes secondary data from legal sources and previous studies on Sharia arbitration in Indonesia, particularly the practices of the Sharia Arbitration Body (BASYARNAS-MUI). …”
    Get full text
    Article
  13. 2533

    The Role of Artificial Intelligence in Personalized Medicine: A Computer Science Perspective by Raul Mihai RADULESCU

    Published 2025-05-01
    “… This abstract investigates the role of AI in personalized medicine using a computer science lens that connects the underlying theories with their actual applications. …”
    Get full text
    Article
  14. 2534

    Artificial Intelligence in Religious Education: Ethical, Pedagogical, and Theological Perspectives by Christos Papakostas

    Published 2025-04-01
    “…Amid increasing digital transformation in education, theological institutions are exploring AI tools for teaching, assessment, and pastoral engagement. Using a critical literature review and analysis of institutional case studies, the paper examines the historical development of AI in education, current applications in general and theological contexts, and the ethical challenges it introduces, especially regarding decision making, data privacy, and bias as well as didactically grounded opportunities such as AI-mediated dialogic simulations. …”
    Get full text
    Article
  15. 2535

    Towards responsible artificial intelligence in education: a systematic review on identifying and mitigating ethical risks by Haotian Zhu, Yao Sun, Junfeng Yang

    Published 2025-07-01
    “…In the technology dimension, risks include privacy invasion, data leakage, algorithmic bias, the black box algorithm, and algorithmic error. …”
    Get full text
    Article
  16. 2536

    Artificial intelligence and machine learning in production efficiency enhancement and sustainable development: a comprehensive bibliometric review by Aristidis Bitzenis, Nikos Koutsoupias, Marios Nosios

    Published 2025-01-01
    “…Despite the promising advancements, the review identifies gaps in ethical considerations, especially in data privacy and labor market implications, and suggests avenues for future research, including the implementation of AI and ML in developing economies and Small and Medium Enterprises (SMEs).…”
    Get full text
    Article
  17. 2537

    A comprehensive analysis of model poisoning attacks in federated learning for autonomous vehicles: A benchmark study by Suzan Almutairi, Ahmed Barnawi

    Published 2024-12-01
    “…Due to the increase in data regulations amid rising privacy concerns, the machine learning (ML) community has proposed a novel distributed training paradigm called federated learning (FL). …”
    Get full text
    Article
  18. 2538

    Syntactic Analysis of Spatial Structure Characteristics of Traditional Villages Along the Yellow River in Western Shanxi Province by Chenge GAO, Fang WANG

    Published 2025-05-01
    “…Villages with similar characteristics are classified into the same category, with the analysis of variance (ANOVA) being further used to explore the differences between these categories. …”
    Get full text
    Article
  19. 2539

    Providing a customer satisfaction model of non-attendance services in the social security organization by Hossein Barzgar, Vahid Sanavi Garoosiyan, ali hossein zadeh

    Published 2024-11-01
    “…The variable of customer satisfaction with non-attendance services includes 4 dimensions of infrastructures, culture building, reforming structures, and creativity and innovation.Research findingsSPSS software was used to analyze the data of this research, and Lisrel software was used to fit the conceptual model of the research. …”
    Get full text
    Article
  20. 2540

    Echoes From the Void: Detecting DNS Tunneling With Blackhole Features in Encrypted Scenarios With High Accuracy by Wafa S. Alorainy

    Published 2025-01-01
    “…Experiments were conducted using the GraphTunnel data set (2,975,353 records) and the CIC-Bell-DNS-EXF-2021 (1,019,318 records). …”
    Get full text
    Article