Showing 901 - 920 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.18s Refine Results
  1. 901
  2. 902

    MANAJEMEN PRIVASI KOMUNIKASI MEDIA SOSIAL TWITTER OLEH MAHASISWA UNY COMMUNICATION PRIVACY MANAGEMENT OF SOCIAL MEDIA TWITTER BY UNY COLLEGE STUDENT by Yoga Rinestu, Wuri Handayani

    Published 2023-03-01
    “…The process of collecting data using the interview method. Test the validity of the data using source triangulation techniques, as well as four stages of data analysis: collection, reduction, presentation, and drawing conclusions. …”
    Get full text
    Article
  3. 903

    An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems by Jiaoli Shi, Chao Hu, Shunli Zhang, Qing Zhou, Zhuolin Mei, Shimao Yao, Anyuan Deng

    Published 2024-09-01
    “…Access policies are uploaded to the cloud, stored, and downloaded in plain text, making them vulnerable to privacy breaches. When the access policy is completely hidden, users need to use their own attributes to try matching one by one, which is an inefficient process. …”
    Get full text
    Article
  4. 904
  5. 905

    Synthesis of electric vehicle charging data: A real-world data-driven approach by Zhi Li, Zilin Bian, Zhibin Chen, Kaan Ozbay, Minghui Zhong

    Published 2024-12-01
    “…In response, this study introduces an innovative methodology for generating large-scale and diverse EV charging data, mirroring real-world patterns for cost-efficient and privacy-compliant use. …”
    Get full text
    Article
  6. 906

    Mental Health Classification Using Machine Learning with PCA and Logistics Regression Approaches for Decision Making by Hendra Hendra, Mustafa Mat Deris, Ika Safitri Windiarti

    Published 2025-02-01
    “…Mental health statistics come with numerous challenges, beginning with data integrity. Ensuring data accuracy and reliability is essential, especially if these datasets are to be used for advanced analysis or research. …”
    Get full text
    Article
  7. 907
  8. 908
  9. 909

    The Risk of Linked Census Data to Transgender Youth by Abraham Flaxman, Os Keyes

    Published 2025-03-01
    “…Our simulation found that the TopDown configuration attains the maximum achievable level of privacy protection against such an attack. Our results demonstrate the importance of disclosure avoidance for census data and suggest that the TopDown approach used by the Census Bureau is a substantial improvement compared to the previous approach, achieving the maximum level of privacy protection possible against such a linkage attack. …”
    Get full text
    Article
  10. 910

    Personalized Federated Learning for Heterogeneous Residential Load Forecasting by Xiaodong Qu, Chengcheng Guan, Gang Xie, Zhiyi Tian, Keshav Sood, Chaoli Sun, Lei Cui

    Published 2023-12-01
    “…However, the deep prediction model requires users to provide a large amount of private electricity consumption data, which has potential privacy risks. Edge nodes can federally train a global model through aggregation using federated learning (FL). …”
    Get full text
    Article
  11. 911

    Relative Applicability of Diverse Automatic Speech Recognition Platforms for Transcription of Psychiatric Treatment Sessions by Rana Zeeshan, John Bogue, Mamoona Naveed Asghar

    Published 2025-01-01
    “…Although such models are good enough for most use cases, storing audio recordings in psychiatry complicates the data handling and adoption of ASR platforms in mental healthcare. …”
    Get full text
    Article
  12. 912

    Standardized patient profile review using large language models for case adjudication in observational research by Martijn J. Schuemie, Anna Ostropolets, Aleh Zhuk, Uladzislau Korsik, Seung In Seo, Marc A. Suchard, George Hripcsak, Patrick B. Ryan

    Published 2025-01-01
    “…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
    Get full text
    Article
  13. 913

    Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study by Muhammad Shah, Shimee Shahzadi, Shehzad Akbar Khan

    Published 2025-01-01
    “…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
    Get full text
    Article
  14. 914

    Sexting in young adults’ social networks in Brazil: an exploratory study on the circulation of nudes by Aroldo de Lara Cardoso Júnior, Liliana Liviano Wahba

    Published 2025-06-01
    “…Results A negative statistical correlation between Problematic Internet Use and body satisfaction was found, with 4 thematic categories emerging in qualitative data: (1) feeling of being pressured, (2) nudes as a condition for further social contact, (3) conformity to body standards and (4) fear of undue exposure and loss of control. …”
    Get full text
    Article
  15. 915

    Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing by Prashanth Choppara, S. Sudheer Mangalampalli

    Published 2025-01-01
    “…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
    Get full text
    Article
  16. 916

    Client aware adaptive federated learning using UCB-based reinforcement for people re-identification by Dinah Waref, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El Ghany, Mohammed A.-M. Salem

    Published 2025-05-01
    “…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
    Get full text
    Article
  17. 917

    Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method by Didik Sudyana, Nora Lizarti

    Published 2019-05-01
    “…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
    Get full text
    Article
  18. 918

    A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation by Denis Moser, Matthias Bender, Murat Sariyar

    Published 2025-12-01
    “…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
    Get full text
    Article
  19. 919

    Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain by Semra Tebrizcik, Süleyman Ersöz, Elvan Duman, Adnan Aktepe, Ahmet Kürşad Türker

    Published 2025-07-01
    “…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
    Get full text
    Article
  20. 920

    GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor by Hong Nhung Nguyen, Yong-Hwa Kim

    Published 2025-01-01
    “…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
    Get full text
    Article