Showing 1,741 - 1,760 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.15s Refine Results
  1. 1741

    The promise and challenges of Artificial Intelligence-Large Language Models (AI-LLMs) in obstetric and gynecology by Khanisyah Erza Gumilar, Ming Tan

    Published 2024-07-01
    “…The article also discusses the ethical issues linked to AI, emphasizing the need for cooperation among different stakeholders to use AI responsibly in medicine, focusing on protecting data privacy and minimizing reliance on technology.   …”
    Get full text
    Article
  2. 1742

    Knowledge and Attitudes Related to Telemedicine among Nursing Staff at the Selected Tertiary Care Hospital, Karnataka, India by Gavi Salimath, Shubham Dayanand Narayankar, Sanjeev Chougule

    Published 2025-04-01
    “…Methodology: The cross-sectional study was conducted among 201 staff nurses. The data were collected using a self-structured questionnaire after thorough review of the literature. …”
    Get full text
    Article
  3. 1743

    FedDL: personalized federated deep learning for enhanced detection and classification of diabetic retinopathy by Dasari Bhulakshmi, Dharmendra Singh Rajput

    Published 2024-12-01
    “…Our primary goal is to develop a system that can monitor various medical facilities while ensuring privacy during the training of DL models. This is made possible through federated learning (FL), which allows for the sharing of parameters instead of actual data, employing a decentralized training approach. …”
    Get full text
    Article
  4. 1744

    INNOVATION OF THE EDUCATION PROCESS TOWARDS IMPLEMENTING AI TOOLS by Petra Mikulcová, Kristína Medeková, Drahoslav Lančarič, Radovan Savov

    Published 2024-12-01
    “…Our paper examines students' perceptions of AI and maps how they utilize AI tools, highlighting their role in meeting the challenges of today's educational and professional life. By analysing data collected through a structured questionnaire, we identified key themes, including the usefulness, ease of use, attitudes, and concerns surrounding AI. …”
    Article
  5. 1745

    Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD by Mustafa Khairallah

    Published 2025-03-01
    “… Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a committing AEAD scheme into a succinctly committing AEAD scheme. …”
    Get full text
    Article
  6. 1746

    New forgery attack on the authenticated cipher SCREAM and iSCREAM by Yu-dan TIAN, Yong-zhuang WEI

    Published 2016-01-01
    “…Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. …”
    Get full text
    Article
  7. 1747

    Multimodal Detection of Agitation in People With Dementia in Clinical Settings: Observational Pilot Study by Abeer Badawi, Somayya Elmoghazy, Samira Choudhury, Sara Elgazzar, Khalid Elgazzar, Amer M Burhan

    Published 2025-07-01
    “…ObjectiveThis study proposes a novel, multimodal system for predicting AA episodes in individuals with severe dementia, integrating wearable sensor data and privacy-preserving video analytics. …”
    Get full text
    Article
  8. 1748

    Multiscale network alignment model based on convolution of homogeneous multilayer graphs by CUI Jiahao, JIANG Tao, XU Mengyao

    Published 2024-12-01
    “…In terms of node characteristics, the K-nearest neighbor algorithm was used to aggregate node neighborhood information to model the deep network structure, so as to enhance the data. …”
    Get full text
    Article
  9. 1749

    Generative adversarial networks (GANS) for generating face images by Dolly Indra, Muh Wahyu Hidayat, Fitriyani Umar

    Published 2025-07-01
    “…However, the use of public facial datasets such as CelebA and FFHQ faces limitations in representing global demographic diversity and raises privacy concerns. …”
    Get full text
    Article
  10. 1750

    Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things by P. S. Klimushyn

    Published 2025-06-01
    “…It is noted that the analysis of the security of IoT communication technologies using specialised communication protocols across networks with different topologies, communication ranges and bandwidths is a pressing issue, as the number of security and privacy breaches in the IoT ecosystem is growing, which is constantly expanding in various sectors of the economy and human life with the introduction of billions of heterogeneous smart devices. …”
    Get full text
    Article
  11. 1751

    Mobile robot navigation path algorithm in 3d industrial internet of thing (iot) environment based on 5g mobile communication by Pei Ping, Yu. N. Petrenko

    Published 2019-07-01
    “…Each of industrial IoT as service domains has its own communication requirements that are measured differently in both such as reliability, Quality of service (QoS), and privacy. According to the development of industrial automation, the industrial Internet of things (IoT) is widely used in smart factories to capture the data and manage the production. …”
    Get full text
    Article
  12. 1752

    A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning by Sun Rui

    Published 2025-01-01
    “…FL facilitates decentralized training of models using local data, ensuring privacy, crucial for handling sensitive financial data. …”
    Get full text
    Article
  13. 1753

    Biometrics and the metaphysics of personal identity by Amy Kind

    Published 2023-05-01
    “…Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. …”
    Get full text
    Article
  14. 1754

    Backdoor Attack Against Dataset Distillation in Natural Language Processing by Yuhao Chen, Weida Xu, Sicong Zhang, Yang Xu

    Published 2024-12-01
    “…We introduce malicious triggers into synthetic data during the distillation phase to execute a backdoor attack on downstream models trained with these data. …”
    Get full text
    Article
  15. 1755

    Promoting mental health in the age of new digital tools: balancing challenges and opportunities of social media, chatbots, and wearables by Julien Coelho, Julien Coelho, Florian Pécune, Jean-Arthur Micoulaud-Franchi, Jean-Arthur Micoulaud-Franchi, Bernard Bioulac, Pierre Philip, Pierre Philip

    Published 2025-03-01
    “…Nonetheless, these technologies introduce challenges including privacy issues, data security, and equitable access to digital resources, raising a new class of rights to protect mental privacy, guard against algorithm bias, and prevent personality-changing manipulations. …”
    Get full text
    Article
  16. 1756

    Understanding older adults' adoption of facial recognition payment: An integrated model of TAM and UXT. by Mingzhou Liu, Caixia Wang, Jing Hu

    Published 2025-01-01
    “…By incorporating both cognitive and affective dimensions, the proposed model systematically investigates key determinants of FRP acceptance. Data were collected through a questionnaire survey of 387 older adults in China, and hypotheses were tested using structural equation modeling (SEM). …”
    Get full text
    Article
  17. 1757

    Providers' perceptions of implementing standardized postpartum family planning: a qualitative study of midwives and nurses in GhanaAJOG Global Reports at a Glance by Sarita Sonalkar, Ernest Maya, Chris Guure, Arden McAllister, Dzifa Adimle Puplampu, Roseline Dansowaa Doe, Mary Eluned Gaffield, James Kiarie

    Published 2025-05-01
    “…We interpreted data using thematic analysis. Results: Providers indicated that use of one-on-one counseling and the mobile application in hospital-based postpartum care delivery was acceptable, feasible, and appropriate. …”
    Get full text
    Article
  18. 1758

    A fiber-optic traffic monitoring network trained with video inputs by Khen Cohen, Liav Hen, Ariel Lellouch

    Published 2025-08-01
    “…We use YOLO-derived vehicle location and classification from video inputs as labeled data to train a detection and classification neural network that uses DAS data only. …”
    Get full text
    Article
  19. 1759

    Interaction of Customer Satisfaction and Digital Service Retention: Evidence of PLS from Indonesian Islamic Banking by Muhammad Alfarizi

    Published 2023-01-01
    “…This study uncovered the effect of ease of use, efficiency, interoperability, privacy security, responsiveness, reliability, service cost, and service portfolio on ISBC customer satisfaction. …”
    Get full text
    Article
  20. 1760

    Algerian Efl Students’ Perspectives And Practices On Ai-enabled Learning At The University Of Medea by Oussama Boukhelkhal

    Published 2025-05-01
    “…However, students identified several drawbacks, namely excessive reliance on AI, negative impact on their critical thinking, and the problem of unreliable AI-generated data. They also faced some challenges, such as limited access to advanced AI tools, privacy and security issues, and a lack of guidance on how to use AI thoughtfully and responsibly. …”
    Get full text
    Article