Showing 1,301 - 1,320 results of 2,784 for search '((((( usedds OR usedddds) OR usedddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.20s Refine Results
  1. 1301

    Tree-to-Me: Standards-Driven Traceability for Farm-Level Visibility by Ya Cho, Arbind Agrahari Baniya, Kieran Murphy

    Published 2025-04-01
    “…These systems also fail to standardise and integrate diverse data sources, ensure data privacy, and scale effectively to meet the demands of modern agriculture. …”
    Get full text
    Article
  2. 1302
  3. 1303

    A framework for systematically applying humanistic ethics when using AI as a design material by Kyle Dent, Richelle Dumond, Mike Kuniavsky

    Published 2019-07-01
    “…Because AI-supported and autonomous decision making has the potential for widespread negative personal, social, and environmental effects, we aim to take a proactive stance to uphold human rights, respect individuals’ privacy, protect personal data, and enable freedom of expression and equality. …”
    Get full text
    Article
  4. 1304

    Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks by Salah T. Alshammari, Muna Al-Razgan, Taha Alfakih, Khalid A. AlGhamdi

    Published 2024-01-01
    “…A significant concern in the field of cloud computing is the security and confidentiality of data. A cryptographic access control technique can be used to guarantee data privacy, which prevents unauthorized access and allows only authorized users to access the data. …”
    Get full text
    Article
  5. 1305

    SimProx: A Similarity-Based Aggregation in Federated Learning With Client Weight Optimization by Ayoub El-Niss, Ahmad Alzu'Bi, Abdelrahman Abuarqoub, Mohammad Hammoudeh, Ammar Muthanna

    Published 2024-01-01
    “…Federated Learning (FL) enables decentralized training of machine learning models across multiple clients, preserving data privacy by aggregating locally trained models without sharing raw data. …”
    Get full text
    Article
  6. 1306

    Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm by Zainab Abdullah Jasim, Ameer Kadhim Hadi

    Published 2025-01-01
    “…Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. …”
    Get full text
    Article
  7. 1307

    Analysis of MAXIM Application Service Quality on User Satisfaction using the E-Service Quality Method by Putri Wulandari, Nur Rachman Dzakiyullah, Asti Ratnasari, Dadang Heksaputra

    Published 2024-11-01
    “…Efficiency, fulfillment, system availability, privacy, responsiveness, compensation, and interaction are the seven factors used, while user satisfaction is the dependent variable. …”
    Get full text
    Article
  8. 1308

    Passive Sensing for Mental Health Monitoring Using Machine Learning With Wearables and Smartphones: Scoping Review by ShiYing Shen, Wenhao Qi, Jianwen Zeng, Sixie Li, Xin Liu, Xiaohong Zhu, Chaoqun Dong, Bin Wang, Yankai Shi, Jiani Yao, Bingsheng Wang, Xiajing Lou, Simin Gu, Pan Li, Jinghua Wang, Guowei Jiang, Shihua Cao

    Published 2025-08-01
    “…However, clinical translation requires standardized protocols, larger longitudinal studies (≥3 months), and ethical frameworks for data privacy. Future work should prioritize multimodal sensor fusion and explainable artificial intelligence to bridge the gap between technical performance and clinical deployability.…”
    Get full text
    Article
  9. 1309
  10. 1310

    Bioethical implications of the use of digital technologies for mental health research during the social distancing period of the COVID-19 pandemic by Liliana Mondragón-Barrios, Gabriela Martínez-Levy, Adriana Díaz-Anzaldúa, Miguel Ángel Caballero-Gutiérrez, Luis Moncayo-Samperio

    Published 2025-06-01
    “…The need to apply ethical principles to protocols for mental health research using digital technologies was a central concern of ethics committees during the COVID-19 pandemic, which sought to ensure a fair selection of participants, appropriate adaptation of the informed consent process, protection of participants’ privacy, secure management of research data, and assessment of risks and benefits. …”
    Get full text
    Article
  11. 1311

    Perceptions of Executive Decision Makers on Using Social Media in Effective Health Communication: Qualitative Study by Norah Abdullah Alanazi, Alia Mohammed Almoajel, Shabana Tharkar, Khalid Almutairi, Farha Nazir Ahmad Mohamad, Bader Saud Talak Almatairi

    Published 2025-05-01
    “…We included 13 participants from government and private health care sectors in the Al-Qassim region of Saudi Arabia, who were key players and decision makers in health care programs and reforms. Data were recorded, transcribed verbatim, and analyzed using thematic analysis to identify key themes and patterns. …”
    Get full text
    Article
  12. 1312

    User Intent to Use DeepSeek for Health Care Purposes and Their Trust in the Large Language Model: Multinational Survey Study by Avishek Choudhury, Yeganeh Shahsavar, Hamid Shamszare

    Published 2025-05-01
    “…It was then distributed on the web to users in India, the United Kingdom, and the United States who had used DeepSeek within the past 2 weeks. Data analysis involved descriptive frequency assessments and Partial Least Squares Structural Equation Modeling. …”
    Get full text
    Article
  13. 1313

    Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment by Wonyoung Jang, Sun-Young Lee

    Published 2020-03-01
    “…This article proposes a method for partially encrypting private information in images using FF1 and FF3-1. The proposed method encrypts private information without increasing the data size, solving the problem of wasted storage space. …”
    Get full text
    Article
  14. 1314

    Federated Learning-Based State of Charge Estimation in Electric Vehicles Using Federated Adaptive Client Momentum by Metin Yilmaz, Eyup Cinar, Ahmet Yazici

    Published 2025-01-01
    “…Centralized machine learning methods are used to improve SoC estimation. Both privacy and high bandwidth requirements are the main disadvantages during the implementation. …”
    Get full text
    Article
  15. 1315

    Intrusion Detection Using Machine Learning for Risk Mitigation in IoT-Enabled Smart Irrigation in Smart Farming by Abhishek Raghuvanshi, Umesh Kumar Singh, Guna Sekhar Sajja, Harikumar Pallathadka, Evans Asenso, Mustafa Kamal, Abha Singh, Khongdet Phasinam

    Published 2022-01-01
    “…In this framework, the NSL KDD data set is used as an input data set. In the preprocessing of the NSL-KDD data set, first all symbolic features are converted to numeric features. …”
    Get full text
    Article
  16. 1316
  17. 1317

    Fall Detection Using Federated Lightweight CNN Models: A Comparison of Decentralized vs. Centralized Learning by Qasim Mahdi Haref, Jun Long, Zhan Yang

    Published 2025-07-01
    “…This study proposes a privacy-preserving and scalable fall-detection framework that integrates federated learning (FL) with transfer learning (TL) to train deep learning models across decentralized data sources without compromising user privacy. …”
    Get full text
    Article
  18. 1318

    Provider Perspectives on the Use of Mental Health Apps, and the BritePath App in Particular, With Adolescents at Risk for Suicidal Behavior: Qualitative Study by Frances Lynch, Julie Cavese, Lucy Fulton, Nancy Vuckovic, David Brent

    Published 2025-02-01
    “…Analyses identified 4 key themes related to mental health apps: (1) almost all providers viewed mental health apps as an adjunct to, rather than a replacement for, psychotherapy visits; (2) most providers were concerned about the cost of apps and youth access to them; (3) providers noted the challenge of maintaining patient engagement with apps over time; and (4) providers were concerned about patient privacy, in terms of both data shared with app developers and data privacy within families. …”
    Get full text
    Article
  19. 1319

    xFedCAV: Cyberattacks on Leader and Followers in Automated Vehicles With Cooperative Platoons Using Federated Agents by Guanyu Lin, Sean Qian, Zulqarnain H. Khattak

    Published 2025-01-01
    “…Our framework leverages federated learning to enhance privacy and security, using Shapley Additive exPlanations (SHAP) for interpretable detection. …”
    Get full text
    Article
  20. 1320

    Analysis of Service Quality on the Starbucks Indonesia Application Using E-SERVQUAL and Importance Performance Analysis (IPA) by Palmarosa Ardianti Putri Hardhika, Minto Waluyo

    Published 2025-08-01
    “…This study aims to evaluate the app’s service quality using E-ServQual method, which assesses seven dimensions: efficiency, reliability, fulfillment, privacy, responsiveness, compensation, and contact. …”
    Get full text
    Article