Showing 1,841 - 1,860 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.17s Refine Results
  1. 1841

    Efficient GPT-4V level multimodal large language model for deployment on edge devices by Yuan Yao, Tianyu Yu, Ao Zhang, Chongyi Wang, Junbo Cui, Hongji Zhu, Tianchi Cai, Chi Chen, Haoyu Li, Weilin Zhao, Zhihui He, Qianyu Chen, Ronghua Zhou, Zhensheng Zou, Haoye Zhang, Shengding Hu, Zhi Zheng, Jie Zhou, Jie Cai, Xu Han, Guoyang Zeng, Dahai Li, Zhiyuan Liu, Maosong Sun

    Published 2025-07-01
    “…However, their large sizes and high computational costs restrict deployment to cloud servers, limiting use in mobile, offline, energy-sensitive, or privacy-critical scenarios. …”
    Get full text
    Article
  2. 1842

    Internet and female victimization by Žunić Natalija, Vilić Vida

    Published 2018-01-01
    “…The data indicates that in the digital world, the privacy of women is significantly compromised and associated with new and terrifying forms of on-line violence. …”
    Get full text
    Article
  3. 1843

    A Structural equation modeling analysis of generative AI chatbots adoption among students and educators in higher education by Afef Saihi, Mohamed Ben-Daya, Moncer Hariga, Rami As'ad

    Published 2024-12-01
    “…Employing a Structural Equation Modeling (SEM) approach, the research focuses on developing and validating a comprehensive model to understand the multifaceted factors impacting the acceptance and use of these chatbots. The methodology integrates an extensive literature review, construction of a theoretical model, administration of a detailed questionnaire to a representative sample from the higher education sector, coupled with advanced SEM techniques for data analysis and interpretation. …”
    Get full text
    Article
  4. 1844

    A CAE model-based secure deduplication method by Chunbo Wang, Guoying Zhang, Hui Qi, Bin Chen

    Published 2025-07-01
    “…Abstract Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. …”
    Get full text
    Article
  5. 1845

    Alternatives to continuous positive airway pressure treatment in sleep apnoeas and hypopnoeas syndrome related to myofunctional and postural reeducation therapy: protocol for a sys... by Montserrat Solera-Martínez, Blanca Notario-Pacheco, Rocio Palomo-Carrión, Marta Maria Guijarro-Herráiz, Natalia María Arias-Palencia, Lidia Lucas- de la Cruz, Beatriz Guijarro-Herráiz, Jose Luis García-Klepzig

    Published 2021-12-01
    “…Finally, several patient-related outcomes, namely sleep quality, quality of life and sleep Apnoeas and Hypoapnoeas Index, will be examined.Ethics and dissemination In this case, ethical approval is not necessary. The data used in the review will be exclusively obtained from published studies, implying there are no privacy concerns. …”
    Get full text
    Article
  6. 1846

    Platform framework for blockchain-enhanced healthcare AIoT systems by Minhee Jun

    Published 2025-04-01
    “…Theoretical analysis demonstrates that the use of a sharding blockchain significantly enhances memory efficiency and reduces data retrieval time in healthcare AIoT applications. …”
    Get full text
    Article
  7. 1847

    GenAI and effective reading among university students: Prospects, challenges, and future directions by George Matto, Jaffar Msafiri Ponera, Valeria Kyumana

    Published 2025-04-01
    “…The system can also lead to breach of data privacy and it is resources intensive.  Most of the limitations are, however, manageable. …”
    Get full text
    Article
  8. 1848

    Human Behavior Analysis: A Comprehensive Survey on Techniques, Applications, Challenges, and Future Directions by Siham Essahraui, Ismail Lamaakal, Yassine Maleh, Khalid El Makkaoui, Mouncef Filali Bouami, Ibrahim Ouahbi, Ahmed A. Abd El-Latif, May Almousa, Joel J. P. C. Rodrigues

    Published 2025-01-01
    “…The survey also delves into data sources and methodologies used in HBA, such as sensor data, social media data, physiological signals, and multimodal analysis. …”
    Get full text
    Article
  9. 1849

    Application of Artificial Intelligence in the Tourism Sector: Benefits and Challenges of AI-Based Digital Tools in Tourism Organizations of Lithuania, Latvia, and Sweden by Gita Šakytė-Statnickė, Laurencija Budrytė-Ausiejienė

    Published 2025-04-01
    “…Tourism organizations implementing or already using artificial intelligence in their activities are usually faced with the challenge of ensuring data privacy and security, the high costs of implementing artificial intelligence systems, etc.…”
    Get full text
    Article
  10. 1850

    Blockchain Enabled Federated Learning for Detection of Malicious Internet of Things Nodes by Rachid Alami, Anjanava Biswas, Varun Shinde, Ahmad Almogren, Ateeq Ur Rehman, Tahseen Shaikh

    Published 2024-01-01
    “…This will not only enhance the accuracy of the unified federated learning model but also preserve the privacy of each cluster because no actual data is sent to fog layer for central model training. …”
    Get full text
    Article
  11. 1851

    "If my husband was in the labor ward with me, my baby wouldn't have died"; experiences on birth companionship from a tertiary health facility, Tanzania. by Michael Obed Mwakyusa, Ali Said, Shekha Selemani, Musa Kakiziba, Judica Christopher, Nathanael Shauri Sirili, Fadhlun M Alwy Al-Beity

    Published 2025-01-01
    “…Braun and Clarke's six-step thematic analysis approach was used to analyze the data.<h4>Results</h4>Three major themes emerged: "Bonding and Learning with Spouse/Partner," "Assurance of Maternal Safety," and "Fear of Blame and Breach of Confidentiality." …”
    Get full text
    Article
  12. 1852

    Federated learning for crop yield prediction: A comprehensive review of techniques and applications by Vani Hiremani, Raghavendra M. Devadas, Preethi, R. Sapna, T. Sowmya, Praveen Gujjar, N. Shobha Rani, K.R. Bhavya

    Published 2025-06-01
    “…This paper offers a systematic overview of the recent knowledge on the application of FL towards the prediction of crop yield and other agricultural uses. We discussed the mathematical basis of FL, the variety of machine learning models used, the types of used agricultural data, and the major performance metrics. …”
    Get full text
    Article
  13. 1853

    Progress in the integration of ChatGPT in Higher Education: an examination of applications, advantages, and challenges by Leopoldo Vinicio Venegas Loor, Paola v Moreira Aguayo, Alberto Rodríguez Rodríguez

    Published 2025-02-01
    “…Nonetheless, the deployment of ChatGPT has obstacles, including maintaining objectivity in automated assessments and safeguarding student data privacy. Addressing these difficulties necessitates stringent validation of model performance and the establishment of explicit data privacy regulations. …”
    Get full text
    Article
  14. 1854

    Multiparty Homomorphic Encryption for IoV Based on Span Program and Conjugate Search Problem by Bo Mi, Siyuan Zeng, Ran Zeng, Fuyuan Wang, Qi Zhou

    Published 2025-06-01
    “…The scheme ensures efficient computation of data while preserving the privacy of each party’s data. …”
    Get full text
    Article
  15. 1855

    Advancements of Deep Learning Model-Based Rehabilitation Training System by Xu Chiyu

    Published 2025-01-01
    “…The experimental results show that there is still room for the development of rehabilitation training assessment systems in terms of privacy, interpretation ability, and application scenarios, and that researchers can address the above issues by using federated learning, developing an expert system, and using transfer learning domain adaptation, respectively.…”
    Get full text
    Article
  16. 1856

    Assessment of The Potential Interference and Conflict of Artificial Intelligence With Human Rights and Citizenship: Challenges and Solutions by Hossein Khazaei, Mojtaba Hemmati

    Published 2025-03-01
    “…Therefore, it is necessary to devise solutions to address these challenges, which may include diversifying data, ensuring operational transparency, establishing legal and ethical frameworks, government commitments to balance the use of artificial intelligence with the fulfillment and enforcement of the right to work, data protection, respect for privacy, reducing discrimination, collaborating with stakeholders, establishing international legal standards, and fostering international cooperation for the safe development of artificial intelligence. …”
    Get full text
    Article
  17. 1857

    SortAlign: a score-based aggregation technique for neural networks in one-round federated learning by Antonio Nappa, Oihan Joyot, Izar Azpiroz, Juan Luis Ferrando Chacón, Mikel Sáez de Buruaga

    Published 2024-12-01
    “…In recent years, the growth of data generated on a daily basis in critical domains, such as industrial processes, where data privacy plays a key role, has led to the strong development of Federated Learning. …”
    Get full text
    Article
  18. 1858

    Digital Health Interventions for Depression and Anxiety in Low- and Middle-Income Countries: Rapid Scoping Review by Leena W Chau, Raymond W Lam, Harry Minas, Kanna Hayashi, Vu Cong Nguyen, John O'Neil

    Published 2025-08-01
    “…Challenges pertained to the technological system, engagement issues, structural barriers, and concerns regarding privacy and confidentiality. Facilitators included widespread mobile phone use, built-in supervision and training features, and convenience. …”
    Get full text
    Article
  19. 1859

    VANET Vulnerabilities Classification and Countermeasures: A Review by Vamshi Krishna K, Ganesh Reddy K

    Published 2022-09-01
    “…Many protocols, techniques, and approaches have been developed to secure and protect data. To enhance current security and privacy measures and develop and model new ones, the ideas of machine learning (ML), deep learning (DL), and artificial intelligence are being applied. …”
    Get full text
    Article
  20. 1860

    A Trusted Federated Learning Method Based on Consortium Blockchain by Xiaojun Yin, Xijun Wu, Xinming Zhang

    Published 2024-12-01
    “…Federated learning (FL) has gained significant attention in distributed machine learning due to its ability to protect data privacy while enabling model training across decentralized data sources. …”
    Get full text
    Article