Showing 941 - 960 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.24s Refine Results
  1. 941

    Rich Data Versus Quantity of Data in Code Generation AI: A Paradigm Shift for Healthcare by Muthu Ramachandran, Steven Fouracre

    Published 2025-06-01
    “…Using Self-Evolving Software (SES) as a case study, the research contrasts outcomes from both paradigms and proposes a weighted matrix for data selection in Code Gen AI systems. …”
    Get full text
    Article
  2. 942

    Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment by Wonyoung Jang, Sun-Young Lee

    Published 2020-03-01
    “…This article proposes a method for partially encrypting private information in images using FF1 and FF3-1. The proposed method encrypts private information without increasing the data size, solving the problem of wasted storage space. …”
    Get full text
    Article
  3. 943

    Federated Learning-Based State of Charge Estimation in Electric Vehicles Using Federated Adaptive Client Momentum by Metin Yilmaz, Eyup Cinar, Ahmet Yazici

    Published 2025-01-01
    “…The proposed method is initially validated via experimental results using the collected data from Musoshi L5 type EV. …”
    Get full text
    Article
  4. 944

    A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks by Min Yoon, Miyoung Jang, Hyeong-Il Kim, Jae-Woo Chang

    Published 2014-01-01
    “…To support privacy-preserving data aggregation and integrity checking, our technique makes use of the additive property of complex numbers. …”
    Get full text
    Article
  5. 945

    Intrusion Detection Using Machine Learning for Risk Mitigation in IoT-Enabled Smart Irrigation in Smart Farming by Abhishek Raghuvanshi, Umesh Kumar Singh, Guna Sekhar Sajja, Harikumar Pallathadka, Evans Asenso, Mustafa Kamal, Abha Singh, Khongdet Phasinam

    Published 2022-01-01
    “…In this framework, the NSL KDD data set is used as an input data set. In the preprocessing of the NSL-KDD data set, first all symbolic features are converted to numeric features. …”
    Get full text
    Article
  6. 946

    Fall Detection Using Federated Lightweight CNN Models: A Comparison of Decentralized vs. Centralized Learning by Qasim Mahdi Haref, Jun Long, Zhan Yang

    Published 2025-07-01
    “…The pipeline begins with data acquisition, in which annotated video-based fall-detection datasets formatted in YOLO are used to extract image crops of human subjects. …”
    Get full text
    Article
  7. 947

    xFedCAV: Cyberattacks on Leader and Followers in Automated Vehicles With Cooperative Platoons Using Federated Agents by Guanyu Lin, Sean Qian, Zulqarnain H. Khattak

    Published 2025-01-01
    “…Our framework leverages federated learning to enhance privacy and security, using Shapley Additive exPlanations (SHAP) for interpretable detection. …”
    Get full text
    Article
  8. 948

    Analysis of Service Quality on the Starbucks Indonesia Application Using E-SERVQUAL and Importance Performance Analysis (IPA) by Palmarosa Ardianti Putri Hardhika, Minto Waluyo

    Published 2025-08-01
    “…This study aims to evaluate the app’s service quality using E-ServQual method, which assesses seven dimensions: efficiency, reliability, fulfillment, privacy, responsiveness, compensation, and contact. …”
    Get full text
    Article
  9. 949

    Provider Perspectives on the Use of Mental Health Apps, and the BritePath App in Particular, With Adolescents at Risk for Suicidal Behavior: Qualitative Study by Frances Lynch, Julie Cavese, Lucy Fulton, Nancy Vuckovic, David Brent

    Published 2025-02-01
    “…Analyses identified 4 key themes related to mental health apps: (1) almost all providers viewed mental health apps as an adjunct to, rather than a replacement for, psychotherapy visits; (2) most providers were concerned about the cost of apps and youth access to them; (3) providers noted the challenge of maintaining patient engagement with apps over time; and (4) providers were concerned about patient privacy, in terms of both data shared with app developers and data privacy within families. …”
    Get full text
    Article
  10. 950

    Advanced Machine Learning and Deep Learning Approaches for Estimating the Remaining Life of EV Batteries—A Review by Daniel H. de la Iglesia, Carlos Chinchilla Corbacho, Jorge Zakour Dib, Vidal Alonso-Secades, Alfonso J. López Rivero

    Published 2025-01-01
    “…This systematic review presents a critical analysis of advanced machine learning (ML) and deep learning (DL) approaches for predicting the remaining useful life (RUL) of electric vehicle (EV) batteries. …”
    Get full text
    Article
  11. 951

    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map by Adel R. Alharbi, Jawad Ahmad, null Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, William J Buchanan

    Published 2022-01-01
    “…To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. …”
    Get full text
    Article
  12. 952

    Problem of Harmonization of Legal Norms with the Needs of Police Investigations by Using High-Tech Instruments for Searching Information by Yu. V. Hnusov, V. M. Strukov, O. O. Mozhayev

    Published 2021-03-01
    “…The problem of harmonization of legal norms with the needs of police investigations with the use of high-tech data search tools has been analyzed. …”
    Get full text
    Article
  13. 953

    Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning by Mohd Anjum, Naoufel Kraiem, Hong Min, Ashit Kumar Dutta, Yousef Ibrahim Daradkeh, Sana Shahab

    Published 2025-03-01
    “…These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads. However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. …”
    Get full text
    Article
  14. 954

    Using Inertial Measurement Units and Machine Learning to Classify Body Positions of Adults in a Hospital Bed by Eliza Becker, Siavash Khaksar, Harry Booker, Kylie Hill, Yifei Ren, Tele Tan, Carol Watson, Ethan Wordsworth, Meg Harrold

    Published 2025-01-01
    “…Movement data were captured using five IMU Xsens DOTs attached to the forehead, wrists and ankles. …”
    Get full text
    Article
  15. 955

    Assessing the practicality of using freely available AI-based GPT tools for coach learning and athlete development by Katherine A. O'Brien, Sarah Prentice

    Published 2025-07-01
    “…Despite the strengths, there were also associated risks and pitfalls when using this process such as the strength and robustness of the applicable statistical outcomes and tensions between keeping the input data within the context and ensuring that the context did not breach privacy issues. …”
    Get full text
    Article
  16. 956
  17. 957

    Value of Artificial Intelligence for Enhancing Suspicion of Cardiac Amyloidosis Using Electrocardiography and Echocardiography: A Narrative Review by Martha Grogan, Francisco Lopez‐Jimenez, Spencer Guthrie, Nisith Kumar, Reuben Langevin, Isabelle Lousada, Ronald Witteles, Ajay Royyuru, Michael Rosenzweig, Sarah Cairns‐Smith, David Ouyang

    Published 2025-04-01
    “…Thirteen studies met inclusion criteria with sample sizes ranging from 50 to 2451 patients. Four studies used ECG data, 8 used echocardiography data, and 1 used both. …”
    Get full text
    Article
  18. 958

    Public Health Using Social Network Analysis During the COVID-19 Era: A Systematic Review by Stanislava Gardasevic, Aditi Jaiswal, Manika Lamba, Jena Funakoshi, Kar-Hai Chu, Aekta Shah, Yinan Sun, Pallav Pokhrel, Peter Washington

    Published 2024-11-01
    “…We highlight the ethical concerns related to the use of social media data, such as privacy and consent, underscoring the potential of integrating ethical SNA with more inclusive, human-centered practices to enhance the effectiveness and community buy-in of emerging computational public health efforts.…”
    Get full text
    Article
  19. 959

    Quantum proof biometric authentication framework using binary lattices and homomorphic encryption for secure cancelable templates by S. Aarthi, K. Geetha, N. Sasikaladevi

    Published 2025-06-01
    “…Three benchmark data sets, ORL, CASIA-Face V5 and deep funneled LFW, were used for security and performance evaluations, resulting in Error Equal Rates of 0.000714, 0.000438, and 0.006330, respectively. …”
    Get full text
    Article
  20. 960

    Acceptance and perceived usefulness of digital health services in the management of chronic urticaria: a survey of patients and physicians by Michael Hindelang, Alexander Zink, Johannes Knitza, Robert Darkow, Martin Welcker, Tilo Biedermann, Susann May, Felix Muehlensiepen

    Published 2025-07-01
    “…Key barriers to adoption were identified, including concerns over data privacy, limitations in technical infrastructure, and a lack of awareness of available digital health solutions. …”
    Get full text
    Article