Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
981
Leveraging data analytics for detection and impact evaluation of fake news and deepfakes in social networks
Published 2025-07-01“…The rampant rise of deepfake technology poses huge risks to social trust and privacy issues, which impacts both individuals and society at large, and leveraging the effective use of data analytics, machine learning and AI techniques can help prevent irreparable damage and mitigate the negative impacts of deepfakes in social networks. …”
Get full text
Article -
982
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“… In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. …”
Get full text
Article -
983
Risk of AI Algorithmic Discrimination Embedded in Government Data Governance and Its Prevention and Control
Published 2024-05-01“…To address this issue, this study proposed a series of targeted prevention and control measures, including clarifying the principle of algorithmic fairness, formulating industry norms and standards, improving the accountability mechanism and regulatory system, and optimizing the data collection and processing environment, so as to effectively curb the phenomenon of algorithmic discrimination while making full use of the advantages of AI technology, so that AI technology in government data governance can truly benefit the people, and promote social fairness and justice.…”
Get full text
Article -
984
Empathy, bias, and data responsibility: evaluating AI chatbots for gender-based violence support
Published 2025-07-01Get full text
Article -
985
Secure Delivery Method for Preserving Data Integrity of a Video Frame with Sensitive Objects
Published 2025-03-01“…The logger operates a cryptography hash function of a feature vector of a video data frame and an XOR encoding scheme used for hiding the privacy information of sensitive objects in the video data frame. …”
Get full text
Article -
986
Verifiable Blockchain-Empowered Federated Learning for Secure Data Sharing in the Internet of Medical Things
Published 2025-01-01“…This paper proposes a verifiable blockchain-empowered federated learning framework to address privacy and aggregation verification challenges in data sharing. …”
Get full text
Article -
987
Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks
Published 2015-08-01“…However, how to keep data security and data privacy in cloud-integrated body sensor network (C-BSN) is an important and challenging issue since the patients’ health-related data are quite sensitive. …”
Get full text
Article -
988
Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions
Published 2025-01-01“…We note that while existing security frameworks such as security standards may be useful: they fail to deal with limitations in areas such as privacy, authentication, and secure transactions across multiple cloud platforms. …”
Get full text
Article -
989
Analysis of Model Merging Methods for Continual Updating of Foundation Models in Distributed Data Settings
Published 2025-05-01“…To address these issues, we propose a novel framework that integrates model merging with federated learning to enable continual foundation model updates without centralizing sensitive data. In this framework, each client fine-tunes a local model, and the server merges these models using multiple merging strategies. …”
Get full text
Article -
990
Adaptive integrated weight unsupervised multi-source domain adaptation without source data
Published 2025-04-01“…Existing methods assume that all source domain data can be accessed directly. However, such an assumption is unrealistic and causes data privacy concerns, especially when the source domain labels include personal information. …”
Get full text
Article -
991
Big Data Meets Social Networks: A Survey of Analytical Strategies and Research Challenges
Published 2025-01-01“…In addition, it covers issues of scalability, data quality, privacy, and real-time analysis. SN analytics can be useful for researchers from across domains like business and marketing, healthcare and biomedicine, social sciences and psychology, politics and governance, cybersecurity and fraud detection, recommendation systems, crisis management, and disaster response to extract crucial information from vast datasets and formulate domain-specific strategies.…”
Get full text
Article -
992
Health equity innovation in precision medicine: data stewardship and agency to expand representation in clinicogenomics
Published 2024-12-01“…Digital tools that preserve privacy, document provenance, and enable the management of data as intellectual property have great promise. …”
Get full text
Article -
993
Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
Published 2025-04-01“…In our research, we construct a cybersecurity knowledge graph (CKG) autonomously using heterogeneous data sources. We further enhance the CKG by applying logical rules and employing graph analytic algorithms. …”
Get full text
Article -
994
Perlindungan Data Pribadi Konsumen Oleh Penyelenggara Sistem Elektronik Dalam Transaksi Digital
Published 2024-03-01“…In the field of digital economic transactions, the significance of personal data is increasing, driven by the widespread use of big data. …”
Get full text
Article -
995
Big Data and AI Algorithms for Sustainable Development Goals: A Topic Modeling Analysis
Published 2024-01-01“…Using BERTopic modeling, a machine learning technique, this research systematically analyzes literature from 2013 to 2024, providing an overview of AI and big data applications mapped to SDGs which is a first. …”
Get full text
Article -
996
Big Data–Driven Health Portraits for Personalized Management in Noncommunicable Diseases: Scoping Review
Published 2025-06-01“…In terms of volume, structured data were widely used (64.29%-100% depending on portrait type), while unstructured data usage varied significantly (19.05%-93.33%). …”
Get full text
Article -
997
Contribution and legacy: a qualitative study of older people’s attitudes about sharing their routinely collected health data for research purposes in New Zealand
Published 2025-05-01“…Data were analysed using thematic analysis. Results Themes identified were: 1) Benefits: participants believed that there were benefits to sharing their health data such as helping others, improving health services, advancing scientific knowledge, and giving back to the health system; sharing health data was also seen as a reflection of good character, and people felt that their pre-existing views about whether they wished to share health data should be respected even if they were no longer able to consent. 2) Concerns: participants had concerns about sharing data with private companies, the use of inaccurate data, and the potential personal and societal consequences of sharing health data. 3) Expectations: participants encouraged collaboration between institutions in New Zealand, but expected data privacy to be maintained, processes to be transparent and cultural values around data to be respected; there was an expectation those sharing health data (patients or institutions) should benefit from any private sector gains. …”
Get full text
Article -
998
From intensive care monitors to cloud environments: a structured data pipeline for advanced clinical decision supportResearch in context
Published 2025-01-01“…The feasibility of the pipeline will be demonstrated with the available data through research and clinical use cases. Furthermore, privacy, safety, data quality, and environmental impact are carefully considered in the cloud storage transition. …”
Get full text
Article -
999
Barriers impeding research data sharing on chronic disease prevention among the older adults in low-and middle-income countries: a systematic review
Published 2024-11-01“…A PRISMA flow chart was used to map out the number of studies that were identified, included, and excluded.ResultsFive main barriers were consistently highlighted, including a lack of necessary resources (9, 69%), dealing with complex and sensitive research data (2,15%), lack of policies, procedures, guidelines (5,38%), medical big data processing and integration (2,15%), and inadequate ethical considerations, legal compliance, and privacy protection (6,46%). …”
Get full text
Article -
1000
Critical Factors in Young People’s Use and Non-Use of AI Technology for Emotion Regulation: A Pilot Study
Published 2025-07-01“…Data were collected through semi-structured face-to-face interviews and were analysed using NVivo 11 software. …”
Get full text
Article