Showing 1,121 - 1,140 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.23s Refine Results
  1. 1121

    Artificial Intelligence (AI) in Neurofeedback Therapy Using Electroencephalography (EEG), Heart Rate Variability (HRV), and Galvanic Skin Response (GSR): A Review by Teddy Marcus Zakaria, Armein Zainal R. Langi, Muhamad Sophian Nazaruddin, Isa Anshori

    Published 2025-01-01
    “…Additionally, the general adoption of this technology is restricted by concerns regarding patient security and data privacy. The paper emphasizes the role of artificial intelligence in preprocessing data, feature extraction, and AI model analysis by integrating current research findings. …”
    Get full text
    Article
  2. 1122

    Securing IoT devices with zero day intrusion detection system using binary snake optimization and attention based bidirectional gated recurrent classifier by Ali Saeed Almuflih, Ilyos Abdullayev, Sergey Bakhvalov, Rustem Shichiyakh, Bibhuti Bhusan Dash, K. B. V. Brahma Rao, Kritika Bansal

    Published 2024-11-01
    “…Intrusion detection systems (IDS) are generally focused on exact attacks to defend the use of IoT. However, the attacks were unidentified, for IDS still signifies tasks and concerns about consumers’ data privacy and safety. …”
    Get full text
    Article
  3. 1123

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. …”
    Get full text
    Article
  4. 1124

    Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms by Manal Abdullah Alohali, Sultan Alahmari, Mohammed Aljebreen, Mashael M. Asiri, Achraf Ben Miled, Sami Saad Albouq, Othman Alrusaini, Ali Alqazzaz

    Published 2025-07-01
    “…As part of intellectual transportation, IoV is a hot topic for researchers because it faces numerous unresolved challenges, particularly regarding privacy and security. The development of recent malicious software with the expanding use of digital services has increased the likelihood of stealing data, corrupting data, or other cybercrimes by malware threats. …”
    Get full text
    Article
  5. 1125

    An intelligent assessment of factors affecting new generations in the era of the internet and new media using intuitionistic hesitant fuzzy sugeno-weber aggregation operators by Yuxin Li, Yao Liu, Dan Zhao

    Published 2025-07-01
    “…There are many benefits and drawbacks to using the Internet, including issues with human health, education and learning habits, communication and relationships, and privacy and security. …”
    Get full text
    Article
  6. 1126

    Improved Private Data Protection Scheme for Blockchain Smart Contracts by Sheng Hu

    Published 2023-01-01
    “…To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. …”
    Get full text
    Article
  7. 1127

    Reasons for maternal near-miss in Bahir Dar city administration, northwest Ethiopia: a qualitative interview approach using socio-ecological model by Yinager Workineh, Getu Degu Alene, Gedefaw Abeje Fekadu

    Published 2025-04-01
    “…Participants were purposively selected until information saturation was reached, after interviewing twenty-five individuals. Data were collected using open-ended interview guides, with audio recordings and field notes. …”
    Get full text
    Article
  8. 1128

    Revolutionizing Data Exchange Through Intelligent Automation: Insights and Trends by Yeison Nolberto Cardona-Álvarez, Andrés Marino Álvarez-Meza, German Castellanos-Dominguez

    Published 2025-05-01
    “…Furthermore, it underscores the urgent need for robust ethical frameworks to guide the responsible use of AI and to protect data privacy. In addressing these challenges, the paper calls for innovative research aimed at overcoming current limitations in scalability and security. …”
    Get full text
    Article
  9. 1129

    Fingerprint-Based Deduplication for Renewable Energy Data On-Site Analyzing by Zeng Zeng, Liyuan Gao, Hongyue Ma, Wenjing Li

    Published 2025-01-01
    “…By studying fine-grained data fingerprinting and neural network-based renewable energy data edge-analysis technologies, we have enabled edge processing of data, reducing latency and privacy issues, and enhancing the system’s real-time processing capabilities and responsiveness.…”
    Get full text
    Article
  10. 1130

    Synthetic data distillation enables the extraction of clinical information at scale by Elizabeth Geena Woo, Michael C. Burkhart, Emily Alsentzer, Brett K. Beaulieu-Jones

    Published 2025-05-01
    “…Abstract Large-language models (LLMs) show promise for clinical note information extraction, but deployment challenges include high computational costs and privacy concerns. We used synthetic data distillation to fine-tune smaller, open-source LLMs to achieve performance comparable to larger models while enabling local hardware deployment or reduced cloud costs. …”
    Get full text
    Article
  11. 1131

    BioGAN: Enhancing Transcriptomic Data Generation with Biological Knowledge by Francesca Pia Panaccione, Sofia Mongardi, Marco Masseroli, Pietro Pinoli

    Published 2025-06-01
    “…The advancement of computational genomics has significantly enhanced the use of data-driven solutions in disease prediction and precision medicine. …”
    Get full text
    Article
  12. 1132
  13. 1133

    Bringing it All Together: Data from Everywhere to Build Dashboards by David Schuster

    Published 2023-12-01
    “…Using Power BI, Power Automate and a Microsoft gateway, we can see the power of easy access to data without knowing all of the disparate systems. …”
    Get full text
    Article
  14. 1134

    Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security by Xiaolu Chu, Ke Cheng, Anxiao Song, Jiaxuan Fu

    Published 2025-01-01
    “…Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). …”
    Get full text
    Article
  15. 1135

    Cardiac disease diagnosis based on GAN in case of missing data. by Xing Chen, Na Zhang, Xiaohui Yang, Chunyan Wang, Qi Na, Tianyun Luan, Wendi Zhu, Chenjie Zhang, Chao Yang

    Published 2024-01-01
    “…In daily life, two common algorithms are used for collecting medical disease data: data integration of medical institutions and questionnaires. …”
    Get full text
    Article
  16. 1136

    Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications by Milos Simic, Jovana Dedeic, Milan Stojkov, Ivan Prokic

    Published 2025-01-01
    “…By extending the existing virtual clouds model, we introduce a new dataspaces layer and protocols for data discovery using the concept of hierarchical namespaces and transforming non-shareable resources, such as files and folders, into collaborative resources. …”
    Get full text
    Article
  17. 1137

    Legal paternalism’s influence on the balancing data protection and fundamental rights by I. Patricheev

    Published 2025-03-01
    “…Soft paternalism, on the other hand, can be seen in EU lawmakers’ attempts to nudge data subjects into using their data carefully and reasonably in digital environments without heavily restricting their data autonomy. …”
    Get full text
    Article
  18. 1138
  19. 1139

    Recognition of Human Activities Based on Ambient Audio and Vibration Data by Marcel Koch, Thomas Pfitzinger, Fabian Schlenke, Fabian Kohlmorgen, Roland Groll, Hendrik Wohrle

    Published 2024-01-01
    “…The data obtained by the AMSNs is classified using two distinct neural networks. …”
    Get full text
    Article
  20. 1140