Showing 2,601 - 2,620 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.18s Refine Results
  1. 2601

    Advanced Monte Carlo for Acquisition Sampling in Bayesian Optimization by Javier Garcia-Barcos, Ruben Martinez-Cantin

    Published 2025-01-01
    “…Bayesian optimization (BO) has proved to be a suitable optimization method in these situations thanks to its sample efficiency and principled way of learning from previous data, but it typically requires that experiments are sequentially performed. …”
    Get full text
    Article
  2. 2602

    Comparative Performance Evaluation of Real-Time Webcam and HOG-Based Facial Recognition Systems for Children's Screen Time Management by Fatimah Alghamdi, Abdulrahman Alghamdi

    Published 2025-06-01
    “…It highlights critical security and privacy considerations, particularly the responsible handling of facial data in environments accessible to minors. …”
    Get full text
    Article
  3. 2603

    A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service by Hwankuk Kim, Jongin Lim, Kyungho Lee

    Published 2015-09-01
    “…Since existing studies mainly focus on simple statistical analysis of the K-ISMS assessment results, analysis on the cause of certification assessment fault based on past data analysis is insufficient. As a method of managing the certification inspection quality, in this paper, we analyze the association among the fault items of the K-ISMS certification assessment results using association rule mining which involves identifying an association rule among items in the database.…”
    Get full text
    Article
  4. 2604

    A Fully Distributed Power Flow Algorithm with Exponentially Fast Convergence by Changzheng GAO, Bo YAN, Jiarui WANG, Xuefei CHANG, Yue SUN

    Published 2019-10-01
    “…In order to meet the data privacy requirements for interconnected power system power flow calculations, a fully distributed power flow algorithm is proposed. …”
    Get full text
    Article
  5. 2605

    A Multi-Criteria Decision-Making Framework for Evaluating Emerging Digital Technologies in Supply Chain Optimization by Nabil M. AbdelAziz, Dina Mohamed, Hasnaa Soliman

    Published 2025-07-01
    “…Ten critical attributes covering technical, economic, and environmental dimensions were identified through expert consultation and a review of relevant literature, including scalability, integration ease, performance benefit, costeffectiveness, environmental and social sustainability, data privacy, and supply chain resilience. The evaluation framework combines the Entropy method for determining objective attribute weights with the TOPSIS method for ranking alternatives. …”
    Get full text
    Article
  6. 2606

    Performance Evaluation of Decentralized Federated Learning: Impact of Fully and K-Connected Topologies, Heterogeneous Computing Resources, and Communication Bandwidth by Vo van Truong, Pham Khanh Quan, Dong-Hwan Park, Taehong Kim

    Published 2025-01-01
    “…Decentralized federated learning (DFL) enables collaborative model training across distributed devices while preserving data privacy. Despite this, the performance of DFL in real-world scenarios, characterized by varying network topologies, heterogeneous client resources, and communication bandwidth, remains underexplored. …”
    Get full text
    Article
  7. 2607

    A Systematic Literature Review on Sustainability Integration and Marketing Intelligence in the Era of Artificial Intelligence by Md Mehedi Hasan Emon, Tahsina Khan

    Published 2024-12-01
    “…The conversation delves into the difficulties and moral aspects involved in using AI in marketing, such as issues related to data privacy, algorithmic bias, and the importance of a strategic framework that focuses on sustainable development goals. …”
    Get full text
    Article
  8. 2608

    Exploring unsupervised feature extraction algorithms: tackling high dimensionality in small datasets by Hongqi Niu, Gabrielle B. McCallum, Anne B. Chang, Khalid Khan, Sami Azam

    Published 2025-07-01
    “…Abstract Small datasets are common in many fields due to factors such as limited data collection opportunities or privacy concerns. …”
    Get full text
    Article
  9. 2609

    Establishing a Collaborative Genomic Repository for Adult Burn Survivors: A Burn Model System Feasibility Study by Stephen Sibbett, Jamie Oh, Gretchen Carrougher, Lara Muffley, Nathaniel Ashford, Maiya Pacleb, Samuel Mandell, Jeffrey Schneider, Steven Wolf, Barclay Stewart, Nicole S. Gibran

    Published 2024-11-01
    “…We set out two primary objectives, namely (1) to develop standard operating procedures for genetic sample collection and storage, DNA isolation, and data integration into an existing multicenter database; and (2) to demonstrate the feasibility of correlating genetic variation to functional outcomes in a pilot study, using the catechol-O-methyltransferase (COMT) gene. …”
    Get full text
    Article
  10. 2610

    A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture by Rui Lu, Lei Shi, Yinlong Liu, Zhongkai Dang

    Published 2025-05-01
    “…This study designs a progressive solution by (1) building a crowdsourced data collection network, using mobile terminals equipped with GPS technology to automatically collect device signal features, replacing inefficient manual drive tests; (2) developing a progressive signal update algorithm that integrates real-time crowdsourced data and historical signals to optimize the signal fingerprint database in dynamic environments; (3) establishing an edge service architecture to offload signal matching and trajectory estimation tasks to MEC nodes, using lightweight computing engines to reduce the load on the core network. …”
    Get full text
    Article
  11. 2611

    Retracted: An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks by Pratima Upadhyay, Venkatadri Marriboina, Shiv Kumar, Sunil Kumar, Mohd Asif Shah

    Published 2022-01-01
    “…Also, the safety messages are modified or discarded by the attacker or any other node and it may lead to the loss of privacy, integrity, confidentiality, and authentication of the data.So to enhance the security of VANETs, it is very much essential to invent a secure communication protocol, to protect the infrastructure of the network and the confidentiality of the data. …”
    Get full text
    Article
  12. 2612

    Potential of Internet of Medical Things (IoMT) applications in building a smart healthcare system: A systematic review by Ruby Dwivedi, Divya Mehrotra, Shaleen Chandra

    Published 2022-03-01
    “…However mass adoption seems challenging due to factors like privacy and security of data, management of large amount of data, scalability and upgradation etc. …”
    Get full text
    Article
  13. 2613

    A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks by M. Saritha, Saidireddy Malgireddy

    Published 2025-07-01
    “…The major components of the proposed model: (1) Data-Collection and Pre-processing (2) Feature Extraction using MSV-GRU (3) FKA-DLN model for the better classification. …”
    Get full text
    Article
  14. 2614

    Enhancing Incentive Schemes in Edge Computing through Hierarchical Reinforcement Learning by Gowtham R, Vatsala Anand, Yadati Vijaya Suresh, Kasetty Lakshmi Narasimha, R. Anil Kumar, V. Saraswathi

    Published 2025-04-01
    “… Edge learning is a distributed approach for training machine learning models using data from edge devices. It preserves privacy by avoiding direct data sharing. …”
    Get full text
    Article
  15. 2615

    Multimodal dataset for sensor fusion in fall detection by Carla Taramasco, Miguel Pineiro, Pablo Ormeño-Arriagada, Diego Robles, David Araya

    Published 2025-04-01
    “…This dataset was compiled from simulations of ten different fall types by ten participants, ensuring a wide array of scenarios. Data were collected using four types of sensors: a mobile phone equipped with a single-channel, three-dimensional accelerometer; a far infrared (FIR) thermal camera; an $8×8$ LIDAR; and a 60–64 GHz radar. …”
    Get full text
    Article
  16. 2616

    Comparative effectiveness of missed dose protocols of opioid agonist treatment in British Columbia, Canada: protocol for a population-based target trial emulation by Paul Gustafson, Robert W Platt, Bohdan Nosyk, Jeong Eun Min, Md Belal Hossain, Mohammad Ehsanul Karim, Shaun Seaman, Paxton Bach, Megan Kurz, Maria Eugenia Socías, Momenul Haque Mondol, Michelle Zanette

    Published 2025-07-01
    “…A range of sensitivity analyses will assess the robustness of our results, including cohort and timeline restriction, alternative definitions of exposure and outcome and alternative estimation strategies.Ethics and dissemination The protocol, cohort creation and analysis plan have been classified and approved as a quality improvement initiative by Providence Health Care Research Institute and the Simon Fraser University Office of Research Ethics. All data are deidentified, securely stored and accessed in accordance with provincial privacy regulations. …”
    Get full text
    Article
  17. 2617

    Reproductive health problem among youths and associated factors in Dilla town, southern Ethiopia by Seblewongel Gebretsadik Sertsewold, Getachew Assefa Zenebe, Amanuel Yosef Gebrekidan

    Published 2025-04-01
    “…A survey of houses with young people was followed by the use of a systematic sampling technique. Data was gathered using pretested and structured questionnaires. …”
    Get full text
    Article
  18. 2618

    Experiences and Views of Older Adults of South Asian, Black African, and Caribbean Backgrounds About the Digitalization of Primary Care Services Since the COVID-19 Pandemic: Qualit... by Nisar Ahmed, Alex Hall, Brenda Poku, Jane McDermott, Jayne Astbury, Chris Todd

    Published 2024-12-01
    “…Patient and public involvement and engagement were sought through collaboration with community organizations for focus group recruitment and feedback on the topic guide. Data were analyzed using framework analysis. …”
    Get full text
    Article
  19. 2619

    Pragmatic, double-blind, randomised trial evaluating the impact of red blood cell donor sex on recipient mortality in an academic hospital population: the innovative Trial Assessin... by Dean A Fergusson, Alan J Forster, Alan Tinmouth, Kednapa Thavorn, Steven Hawken, Kumanan Wilson, Michaël Chasse, Shane English, Nadine Shehata, Jason P Acker, Angie Tuttle, Iris Perelman, Nancy Cober, Heather Maddison, Melanie Tokessy

    Published 2021-02-01
    “…An intent-to-treat analysis will be applied using all randomised and transfused patients. The principal analysis will be a survival analysis comparing the time from randomisation to death between patients allocated to male donor red blood cells (RBCs) and female donor RBCs.Ethics and dissemination Approval has been obtained from research ethics boards of all involved institutions, as well as from privacy offices of Canadian Blood Services, Institute for Clinical Evaluative Science and The Ottawa Hospital Data Warehouse. …”
    Get full text
    Article
  20. 2620

    Exploring Respectful Maternity Care and its determinants: a mixed methods cross-sectional study from a rural area in central India by Chullithala Athira, Anindo Majumdar, Roshan F. Sutar, Bharti Singh, Parvathy Thampy, Ashlesh Rupani, Deepti Dabar

    Published 2025-08-01
    “…Descriptive data is presented in frequency tables. Quantitative data were analyzed using logistic regression and qualitative data through thematic analysis. …”
    Get full text
    Article