Showing 821 - 840 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.18s Refine Results
  1. 821

    Building occupancy estimation using single channel CW radar and deep learning by Sourav Kumar Pramanik, Md. Shafkat Hossain, Shekh Md. Mahmudul Islam

    Published 2025-04-01
    “…Abstract Counting the number of people in a room is crucial for optimizing smart buildings, enhancing energy efficiency, and ensuring security while preserving privacy. This study introduces a novel radar-based occupancy estimation method leveraging a 24-GHz Continuous Wave (CW) radar system integrated with time-frequency mapping techniques using Continuous Wavelet Transform (CWT) and power spectrum analysis. …”
    Get full text
    Article
  2. 822

    Assessing the Guidelines on the Use of Generative Artificial Intelligence Tools in Universities: A Survey of the World’s Top 50 Universities by Midrar Ullah, Salman Bin Naeem, Maged N. Kamel Boulos

    Published 2024-12-01
    “…These instructions encompassed securing instructor consent before utilization, identifying appropriate and inappropriate instances for deployment, employing suitable strategies in classroom settings and assessment, appropriately integrating results, acknowledging and crediting GenAI tools, and adhering to data privacy and security measures. However, our study found that only a small number of the retrieved guidelines offered instructions on the AI algorithm (understanding how it works), the documentation of prompts and outputs, AI detection tools, and mechanisms for reporting misconduct. …”
    Get full text
    Article
  3. 823

    Blockchain framework with IoT device using federated learning for sustainable healthcare systems by B. Bhasker, P. Muralidhara Rao, P. Saraswathi, S. Gopal Krishna Patro, Javed Khan Bhutto, Saiful Islam, Mohammed Kareemullah, Addisu Frinjo Emma

    Published 2025-07-01
    “…The proposed method achieves data privacy and security by 98.73%, intrusion detection efficiency by 97.16%, disease detection accuracy by 96.425, proactive healthcare management by 98.37%, and interoperability by 96.74%.…”
    Get full text
    Article
  4. 824

    Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR by Oliver M. Tuazon, Bart Custers, Gerrit-Jan Zwenne

    Published 2025-12-01
    “…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
    Get full text
    Article
  5. 825

    Unobtrusive stress detection using wearables: application and challenges in a university setting by Peter Neigel, Andrew Vargo, Benjamin Tag, Koichi Kise

    Published 2025-08-01
    “…Advances in sensing accuracy and utility design in wearables might make this feasible; however, real-world adoption faces challenges, as users often fail to wear or use these devices consistently and correctly. Additionally, institutional monitoring raises privacy concerns.MethodsIn this study, we analyze real-world data from a cohort of 103 Japanese university students to identify periods of cyclical stress while ensuring individual privacy through aggregation. …”
    Get full text
    Article
  6. 826

    Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method by Shumin Han, Yue Li, Derong Shen, Chuang Wang

    Published 2024-11-01
    “…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
    Get full text
    Article
  7. 827
  8. 828
  9. 829

    Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning by Yu-Hsiu Lin, Yung-Yao Chen, Shih-Hao Wei

    Published 2025-01-01
    “…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
    Get full text
    Article
  10. 830

    Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia by Betül Önay Doğan, Nihal Kocabay Şener, Selçuk Kıran, Hasrina Mustafa

    Published 2022-12-01
    “…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
    Get full text
    Article
  11. 831
  12. 832

    Heartbeat detection and personal authentication using a 60 GHz Doppler sensor by Takuma Asano, Shintaro Izumi, Hiroshi Kawaguchi

    Published 2025-08-01
    “…Unlike fingerprint and facial recognition systems, they offer authentication without physical contact or privacy concerns. This study focuses on non-contact seismocardiography using microwave Doppler sensors and aims to apply this technology for biometric authentication.MethodWe proposed a method for authenticating and identifying heartbeat signals through supervised learning using a conditional variational autoencoder (CVAE). …”
    Get full text
    Article
  13. 833

    Emotion Estimation Using Noncontact Environmental Sensing with Machine and Deep Learning Models by Tsumugi Isogami, Nobuyoshi Komuro

    Published 2025-01-01
    “…This paper presents a method for estimating arousal and emotional valence levels using non-contact environmental sensing, addressing challenges such as discomfort from long-term device wear and privacy concerns associated with facial image analysis. …”
    Get full text
    Article
  14. 834

    Using Digital Technology to Conduct COVID-19 Surveillance: A Systematic Review by Fitrisia Rahma, Fatmah Fatmah, Rachmadhi Purwana

    Published 2025-06-01
    “…Unique Contribution: This study emphasises the role of digital technologies in virus detection, monitoring, and prevention as a medium of infectious disease transmission, particularly in contact tracing, symptom monitoring, location tracking, and real-time data management. It highlights the challenges of privacy, data security, and public adoption issues. …”
    Get full text
    Article
  15. 835

    Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study by Yi Xie, Yi Xie, Xinmeng Wang, Huiwen Yang, Huiwen Yang, Jiayao Zhang, Honglin Wang, Zineng Yan, Jiaming Yang, Zhiyuan Yan, Zhiwei Hao, Pengran Liu, Yijie Kuang, Zhewei Ye, Zhewei Ye

    Published 2025-07-01
    “…Based on the architecture, a privacy-preserving SL system was established, and we further validated the performance of the model in external verification sets and clinical use. …”
    Get full text
    Article
  16. 836

    Development of an intelligent intrusion detection system for IoT networks using deep learning by Haozhe Zhang

    Published 2025-07-01
    “…However, attack diversity, device heterogeneity, and traditional security limitations necessitate advanced data analysis. Researchers increasingly use deep learning, which excels in handling large-scale data, to develop robust intrusion detection systems. …”
    Get full text
    Article
  17. 837

    High-fidelity steganography in EEG signals using advanced transform-based methods by Enes Efe

    Published 2025-05-01
    “…The increasing prevalence of digital health solutions and smart health devices (SHDs) ensures the continuity of personal biometric data while simultaneously raising concerns about their security and privacy. …”
    Get full text
    Article
  18. 838
  19. 839
  20. 840

    Reporting the potential risk of using AI in higher Education: Subjective perspectives of educators by Marcel Pikhart, Liqaa Habeb Al-Obaydi

    Published 2025-05-01
    “…The findings reveal significant concerns about privacy risks, academic integrity, and the validity of AI-generated data. …”
    Get full text
    Article