Showing 981 - 1,000 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.19s Refine Results
  1. 981

    Deconstructing Bentham’s Panopticon: The New Metaphors of Surveillance in the Web 2.0 Environment by Manuela Farinosi

    Published 2011-02-01
    “…This article reflects on the meaning of the words “control” and “privacy” in light of the intensive diffusion of user generated content on the web. …”
    Get full text
    Article
  2. 982

    Big data transfer service architecture for cloud data centers: problems, methods, applications, and future trends by Muhammad Umar Majigi, Ismaila Idris, Shafi’i Muhammad Abdulhamid, Richard A. Ikuesan

    Published 2025-08-01
    “…After thoroughly screening selected peer-reviewed articles, the primary open issues are: incorporating a data placement module in the data transfer service, providing end-to-end safeguards for packet delivery, improving data transfer time and speed, minimizing costs and implementation overhead, ensuring secure data transfer between servers in the cloud, demonstrating effective big data transfer architectures, considering topology-specific extensions to reduce the busty nature of data centers, and enhancing data transfer services using machine learning algorithms during upload and download operations. …”
    Get full text
    Article
  3. 983
  4. 984

    Calibrated optional randomized response techniques for efficient and robust estimation of quantitative sensitive variables by Ahmed Audu, Mojeed Abiodun Yunusa, Maggie Aphane, Maria Lekganyane

    Published 2025-05-01
    “…Numerical applications using both real and simulated data supported the theoretical findings, demonstrating that the C-ORRT models exhibited lower biases, reduced variances, higher relative efficiency, enhanced privacy levels, and a better combined metric of variance and privacy. …”
    Get full text
    Article
  5. 985

    Ethical and regulatory challenges in machine learning-based healthcare systems: A review of implementation barriers and future directions by Shehu Mohammed, Neha Malhotra

    Published 2025-03-01
    “…Key issues concern patient data privacy, algorithmic bias, absence of transparency, and ambiguous legal liability. …”
    Get full text
    Article
  6. 986
  7. 987

    Design of an Improved Model for Smart Grid Pricing Using ST-GNN-PNet and MAD-RL-StackelNet by Jalit S. A., Warkad S. B., Rane P. R., Bonde S. V.

    Published 2025-01-01
    “…However, current pricing models fail to capture spatio-temporal load behavior, consumer heterogeneity, and externalities like emissions. Privacy constraints also hinder granular data collection, causing revenue loss. …”
    Get full text
    Article
  8. 988
  9. 989

    Artificial Intelligence Use in Daily and Professional Life among Pediatric Surgeons in India: A Roadmap for Adoption Based on Online Survey Results by Ankur Mandelia, Vinayak S. Rengan, Alish Rajesh Mehta, Aseesh Varma Vankam, Ramesh Babu, Sumitra Kumar Biswas, Vikesh Agrawal

    Published 2025-05-01
    “…Addressing barriers such as ethical concerns, data privacy, and cost could catalyze AI’s potential to revolutionize pediatric surgical care. …”
    Get full text
    Article
  10. 990

    Automated Digital Safety Planning Interventions for Young Adults: Qualitative Study Using Online Co-design Methods by Jonah Meyerhoff, Sarah A Popowski, Tanvi Lakhtakia, Emily Tack, Rachel Kornfield, Kaylee P Kruzan, Charles J Krause, Theresa Nguyen, Kevin Rushton, Anthony R Pisani, Madhu Reddy, Kimberly A Van Orden, David C Mohr

    Published 2025-02-01
    “…Young adult participants also shared 3 key technological needs of an automated intervention: (1) transparency about how the intervention functions, the kinds of actions it does and does not take, the limits of confidentiality, and the role of human oversight within the program; (2) strong privacy practices—data security around how content within the intervention and how private data created by the intervention would be maintained and used was extremely important to young adult participants given the sensitive nature of suicide-related data; and (3) usability, convenience, and accessibility were particularly important to participants—this includes having an approachable and engaging message tone, customizable message delivery options (eg, length, number, content focus), and straightforward menu navigation. …”
    Get full text
    Article
  11. 991
  12. 992

    Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach by Khalid Kadhim Jabbar, Fahmi Ghozzi, Ahmed Fakhfakh

    Published 2023-12-01
    “…On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. …”
    Get full text
    Article
  13. 993
  14. 994
  15. 995

    A Denoising Diffusion Probabilistic Model-Based Human Respiration Monitoring Method Using a UWB Radar by Ping Wang, Haoran Liu, Xiusheng Liang, Zhenya Zhang

    Published 2025-01-01
    “…This paper proposes a denoising diffusion probabilistic model (DDPM)-based human respiration monitoring method using an ultra-wideband (UWB) radar, where the localization calculation of the target based on the respiration-motion energy ratio, maximum ratio combining (MRC), and principal component analysis (PCA) are included for data enhancement. …”
    Get full text
    Article
  16. 996

    Using telemedicine to support care for people with type 2 diabetes mellitus: a qualitative analysis of patients’ perspectives by Jun Yang Lee, Carina Ka Yee Chan, Siew Siang Chua, Thomas Paraidathathu, Kenneth Kwing-Chin Lee, Christina San San Tan, Nazrila Nasir, Shaun Wen Huey Lee

    Published 2019-10-01
    “…Four themes emerged from the analysis: (1) generational difference; (2) independence and convenience, (3) sharing of health data and privacy and (4) concerns and challenges. …”
    Get full text
    Article
  17. 997
  18. 998
  19. 999

    Synthetic data production for biomedical research by Yun Gyeong Lee, Mi-Sook Kwak, Jeong Eun Kim, Min Sun Kim, Dong Un No, Hee Youl Chai

    Published 2025-04-01
    “…Synthetic data, generated using advanced artificial intelligence (AI) techniques, replicates the statistical properties of real-world datasets while excluding identifiable information. …”
    Get full text
    Article
  20. 1000

    Women’s hospital birth experiences in Harar, eastern Ethiopia: a qualitative study using Roy’s Adaptation Model by Roseanne C Schuster, Nega Assefa, Maleda Tefera, Kedir Teji Roba, Letta Gedefa, Alex Brewis

    Published 2022-07-01
    “…Interviews were audio-recorded and transcribed on the spot and the interviews were analysed using a deductive content analysis approach. Data were analysed using the four components of Roy’s Adaptation Model (RAM) as a guiding framework of women’s experiences: physiological, self-concept, role and function, and interdependence.Results Various behaviours were identified: under physiological mode, common behaviours identified included labour pain, fatigue, surgical site pain and anaesthesia-related complication. …”
    Get full text
    Article