Showing 1,881 - 1,900 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.23s Refine Results
  1. 1881

    Co-similar malware infection patterns as a predictor of future risk. by Amir Yavneh, Roy Lothan, Dan Yamin

    Published 2021-01-01
    “…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
    Get full text
    Article
  2. 1882

    A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things by Sasikumar Asaithambi, Senthilkumar Nallusamy, Jing Yang, Sunil Prajapat, Gyanendra Kumar, Pramod Singh Rathore

    Published 2025-05-01
    “…This article presents a blockchain-assisted safe data-sharing mechanism that provides security requirements in the industry using IoT. …”
    Get full text
    Article
  3. 1883

    Advanced Hydro-Informatic Modeling Through Feedforward Neural Network, Federated Learning, and Explainable AI for Enhancing Flood Prediction by Shahariar Hossain Mahir, Md Tanjum An Tashrif, Md Ahsan Karim, Dipanjali Kundu, Anichur Rahman, Md. Amir Hamza, Fahmid Al Farid, Abu Saleh Musa Miah, Sarina Mansor

    Published 2025-01-01
    “…This approach promotes data privacy and allows collaborative learning while working under cross-border data-sharing constraints, therefore improving the accuracy of prediction. …”
    Get full text
    Article
  4. 1884

    The daunting challenge of Artificial Intelligence in Education: a systematic literature review by Rubén Arriazu

    Published 2025-03-01
    “…Finally, there are also ethical and social challenges that address concerns about the privacy of student data, equity in access to advanced technologies, and the potential of AI to perpetuate existing biases. …”
    Get full text
    Article
  5. 1885

    CLOUD COMPUTING SECURITY by Ştefan IOVAN, Alina Anabela IOVAN

    Published 2016-05-01
    “…There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. …”
    Get full text
    Article
  6. 1886

    Association between sedentary behaviour and chronic pelvic pain in women: a protocol for systematic review and meta-analysis by Lei Tang, Guohua Wang, Yangyan Guo

    Published 2025-05-01
    “…The research team will ensure data privacy and participant confidentiality through anonymised data processing and strict compliance with relevant regulations. …”
    Get full text
    Article
  7. 1887

    Enabling All In-Edge Deep Learning: A Literature Review by Praveen Joshi, Mohammed Hasanuzzaman, Chandra Thapa, Haithem Afli, Ted Scully

    Published 2023-01-01
    “…Moreover, most of the time central cloud servers are used for such computation, thus opening up other significant challenges, such as high latency, increased communication costs, and privacy concerns. …”
    Get full text
    Article
  8. 1888

    Design of an intelligent AI-based multi-layer optimization framework for grid-tied solar PV-fuel cell hybrid energy systems by Prashant Nene, Dolly Thankachan

    Published 2025-12-01
    “…With this, we now have a scalable and real-time energy-efficient solution for future smart grid systems. • Integrated Intelligence Stack: Combines RL-ENN, T-STFREP, FL-DEO, GNNHSCO, and Q-GAN-ESO into a unified architecture for real-time control, forecasting, decentralized optimization, network routing, and synthetic scenario generation. • Real-Time, Scalable, and Privacy-Preserving: Enables adaptive energy dispatch, federated optimization without compromising data privacy, and graph-based power routing, making it suitable for large-scale, smart grid deployments. • Proven Long-Term Performance: Achieved significant improvements over traditional methods (GA, PSO) with 27.5 % lower NPC, 18.2 % reduction in COE, and 30.2 % increase in battery life, validated using 30 years of meteorological data.…”
    Get full text
    Article
  9. 1889

    Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection by Ma Viet Duc, Pham Minh Dang, Tran Thu Phuong, Truong Duc Truong, Vu Hai, Nguyen Huu Thanh

    Published 2025-07-01
    “…Detecting such evolving threats is especially challenging in decentralized environments where raw traffic data cannot be aggregated due to privacy or policy constraints. …”
    Get full text
    Article
  10. 1890

    Factors that affect clinical youth engagement in digital mental health research: a qualitative sub-study nested within a prospective cohort study by Amanda Bye, Emma Wilson-Lemoine, Kylee Trevillion, Ben Carter, Rina Dutta

    Published 2025-04-01
    “…Methods Semi-structured interviews were conducted with a purposive sample of participants from the 3S-YP study. Interview data was analysed using codebook thematic analysis. …”
    Get full text
    Article
  11. 1891

    Wireless Body Area Network (WBAN) based Health Care Monitoring: A Comprehensive Review by Qaisar Ayyub

    Published 2023-12-01
    “…Using multiple WBAN techniques, we aim to identify which techniques are giving better results in data transmission, storing, and maintaining patient data privacy and also identify the best performance using multiple techniques based on the two most important parameters such as ‘throughput’, and ‘delay’. …”
    Get full text
    Article
  12. 1892

    Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration by Yazan Otoum, Chaosheng Hu, Eyad Haj Said, Amiya Nayak

    Published 2024-10-01
    “…Federated learning offers a framework for developing local models across institutions while safeguarding sensitive data. This paper introduces a novel approach for heart disease prediction using the TabNet model, which combines the strengths of tree-based models and deep neural networks. …”
    Get full text
    Article
  13. 1893

    Electroencephalography-Based Brain-Computer Interfaces in Rehabilitation: A Bibliometric Analysis (2013–2023) by Ana Sophia Angulo Medina, Maria Isabel Aguilar Bonilla, Ingrid Daniela Rodríguez Giraldo, John Fernando Montenegro Palacios, Danilo Andrés Cáceres Gutiérrez, Yamil Liscano

    Published 2024-11-01
    “…Ethical considerations, including data privacy, transparency, and equitable access to BCI technologies, must be prioritized to ensure the inclusive development and use of these technologies across diverse socioeconomic groups.…”
    Get full text
    Article
  14. 1894
  15. 1895

    Looking Back on Digital Medical Education Over the Last 25 Years and Looking to the Future: Narrative Review by Oluwadamilola Ogundiya, Thahmina Jasmine Rahman, Ioan Valnarov-Boulter, Tim Michael Young

    Published 2024-12-01
    “…The rapid evolution and use of web-based and digital techniques have been significantly transforming this field since the beginning of the new millennium. …”
    Get full text
    Article
  16. 1896
  17. 1897

    The Impact of Personalized Office Spaces on Faculty Productivity, Performance, and Satisfaction in Universities’ Educational Facilities: Case Study of Al Yamamah University, Riyadh... by Dalia Abdelfattah

    Published 2025-07-01
    “…Data were analyzed using thematic analysis for qualitative insights, focusing on environmental aspects (such as: natural lighting, ventilation, noise control, etc.), psychological factors (such as: privacy, aesthetic appeal, etc.), and architectural settings (such as: area, space layout, materials, etc.). …”
    Get full text
    Article
  18. 1898

    From assistance to integrity: exploring the role of AI in academic communication across Russian and Turkish campuses by Olga V. Sergeeva, Marina R. Zheltukhina, Servet Demir

    Published 2025-05-01
    “…Turkish students exhibited a predominantly favorable outlook toward the collaborative capabilities of AI, but Russian students placed greater emphasis on apprehensions over privacy and data security.DiscussionThe study highlights the complex interplay between the benefits and challenges of AI in educational environments. …”
    Get full text
    Article
  19. 1899

    An Intelligent Client Selection Algorithm of Federated Learning for Class-imbalance by ZHU Suxia, WANG Yunmeng, YAN Peisen, SUN Guanglu

    Published 2024-04-01
    “…This algorithm does not use any auxiliary data set. Under the premise of ensuring the privacy of the client ′ s local data invisible to the server it uses the Tanimoto coefficient to measure the difference between the local data distribution and the target distribution. …”
    Get full text
    Article
  20. 1900

    eHealth Technology: What Do We Know and What do We Need to Learn by Ramzi A. Haraty, Ola A Sukkarieh

    Published 2021-06-01
    “…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
    Get full text
    Article