Showing 1,941 - 1,960 results of 2,784 for search '((((( usedds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.24s Refine Results
  1. 1941

    Generative AI in AI-Based Digital Twins for Fault Diagnosis for Predictive Maintenance in Industry 4.0/5.0 by Emilia Mikołajewska, Dariusz Mikołajewski, Tadeusz Mikołajczyk, Tomasz Paczkowski

    Published 2025-03-01
    “…They create synthetic datasets that improve training quality while addressing data scarcity and data imbalance. The aim of this paper was to present the current state of the art and perspectives for using AI-based generative DTs for fault diagnosis for predictive maintenance in Industry 4.0/5.0. …”
    Get full text
    Article
  2. 1942

    Exploring the influence of cognitive factors among Chinese parents on the sustainability of children’s digital education by Tingyu Zhang, Qianling Jiang, Wenjing Zhang

    Published 2025-03-01
    “…Findings Perceived playability, usefulness, social influence, and satisfaction significantly predict continuance intention. …”
    Get full text
    Article
  3. 1943

    Language barriers and their consequences in healthcare: a qualitative case study of Nepali migrants in Finland by Shrwan Kumar Khanal

    Published 2025-04-01
    “…Methods This qualitative study employed semi-structured interviews with 27 working age Nepali migrants in Finland. The data was collected between February and August 2023 and was analysed thematically to identify barriers to healthcare use. …”
    Get full text
    Article
  4. 1944

    The daunting challenge of Artificial Intelligence in Education: a systematic literature review by Rubén Arriazu

    Published 2025-03-01
    “…Finally, there are also ethical and social challenges that address concerns about the privacy of student data, equity in access to advanced technologies, and the potential of AI to perpetuate existing biases. …”
    Get full text
    Article
  5. 1945

    CLOUD COMPUTING SECURITY by Ştefan IOVAN, Alina Anabela IOVAN

    Published 2016-05-01
    “…Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. …”
    Get full text
    Article
  6. 1946
  7. 1947

    Assessment of implementation challenges of electronic medical record in Yekatit 12 hospital medical college. by Abiyot Alemu Mamae, Ephrem Mamo

    Published 2025-01-01
    “…Descriptive statistics was employed to summarise the quantitative data. Qualitative data was thematically presented.…”
    Get full text
    Article
  8. 1948

    Ethics in Consumer Neuroscience: A Non-Exhaustive Presentation by Dănuț TRIFU

    Published 2025-04-01
    “…From this standpoint, large differences were found when analyzing research objectives, instruments, data disclosure, and findings dissemination and use as well as participants’ protection and data privacy rights. …”
    Get full text
    Article
  9. 1949

    From assistance to integrity: exploring the role of AI in academic communication across Russian and Turkish campuses by Olga V. Sergeeva, Marina R. Zheltukhina, Servet Demir

    Published 2025-05-01
    “…Turkish students exhibited a predominantly favorable outlook toward the collaborative capabilities of AI, but Russian students placed greater emphasis on apprehensions over privacy and data security.DiscussionThe study highlights the complex interplay between the benefits and challenges of AI in educational environments. …”
    Get full text
    Article
  10. 1950

    Acceptance of Digital Health Technologies in Palliative Care Patients by Stefan Wicki, Ian C. Clark, Manuel Amann, Sebastian M. Christ, Markus Schettle, Caroline Hertler, Gudrun Theile, David Blum

    Published 2024-10-01
    “…Methods: We used a 39-item questionnaire to evaluate acceptance and use of smartphone-based electronic patient report outcome measures, wearables, AI, data privacy, and virtual reality (VR) in 29 female and male PC inpatients. …”
    Get full text
    Article
  11. 1951

    Cloud Resilience: A Comprehensive Review of Infrastructure-as-a-Service Security Issues by Chopde Nitin, Raut Atul, Chaudhari Shrikant, Shelokar Yogesh, Yawale Pratik

    Published 2025-01-01
    “…The research paper examines IaaS security challenges, including shared responsibility models, data privacy, identity management, and multi-tenancy implications. …”
    Get full text
    Article
  12. 1952

    Electronic Records Management Practices and Academic Performance of Higher Institutions of Learning: A Case Study of Kabale University. by Tukahirwa, Elizabeth

    Published 2024
    “…A descriptive research design was used to collect both qualitative and quantitative data through purposive and simple random sampling techniques, with a sample size of 92 respondents. …”
    Get full text
    Thesis
  13. 1953

    Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain by Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG

    Published 2021-12-01
    “…To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and the evidence report were stored in the cloud server and the block chain respectively to realize the secure storage and sharing of the electronic evidence.The identity-based signcryption technology was used to ensure the confidentiality of data, and the proxy re-encryption technology was used to realize the sharing of electronic evidence of Internet of vehicles by insurance companies.The aggregation signature technique was introduced to reduce the computation cost of multi vehicle user signature verification.The reliability of electronic evidence was improved by using credibility incentive mechanism.Security analysis shows that the proposed scheme achieves data confidentiality, integrity, verifiability and unforgeability.Compared with the existing schemes, the proposed scheme has certain advantages in terms of computational overhead.…”
    Get full text
    Article
  14. 1954

    SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks by Jiajun Bu, Mingjian Yin, Daojing He, Feng Xia, Chun Chen

    Published 2011-07-01
    “…Large-scale wireless sensor networks follow the two-tiered architecture, where master nodes take charge of storing data and processing queries. However, if a master node is compromised, the information stored in it may be exposed, and query results can be juggled. …”
    Get full text
    Article
  15. 1955

    Generative AI as Third Agent: Large Language Models and the Transformation of the Clinician-Patient Relationship by Hugo de O Campos, Daniel Wolfe, Hongzhou Luan, Ida Sim

    Published 2025-08-01
    “…While affirming LLMs as a tool enabling the rise of the “AI patient,” we also explore concerns surrounding data privacy, algorithmic bias, moral injury, and the erosion of human connection. …”
    Get full text
    Article
  16. 1956

    Emerging and Pioneering AI Technologies in Aesthetic Dermatology: Sketching a Path Toward Personalized, Predictive, and Proactive Care by Diala Haykal

    Published 2024-11-01
    “…However, this manuscript also addresses significant challenges that practitioners face, such as technical constraints, data privacy concerns, algorithmic biases, and financial barriers, which impact the accessibility and efficacy of AI across diverse patient populations. …”
    Get full text
    Article
  17. 1957

    Current limitations in technology-based cognitive assessment for severe mental illnesses: a focus on feasibility, reliability, and ecological validity by Edoardo Caporusso, Antonio Melillo, Andrea Perrottelli, Luigi Giuliani, Francesco Flavio Marzocchi, Pasquale Pezzella, Giulia Maria Giordano

    Published 2025-04-01
    “…EMA may capture real-world functioning by increasing the number of evaluations throughout the day, but its use might be hindered by high participant burden and missing data. …”
    Get full text
    Article
  18. 1958

    A scoping review of the governance of federated learning in healthcare by Rebekah Eden, Ignatius Chukwudi, Chris Bain, Sebastiano Barbieri, Leonie Callaway, Susan de Jersey, Yasmeen George, Alain-Dominique Gorse, Michael Lawley, Peter Marendy, Steven M. McPhail, Anthony Nguyen, Mahnaz Samadbeik, Clair Sullivan

    Published 2025-07-01
    “…Abstract In healthcare, federated learning (FL) is emerging as a methodology to enable the analysis of large and disparate datasets while allowing custodians to retain sovereignty. While FL minimises data-sharing challenges, concerns surrounding ethics, privacy, maleficent use, and harm remain. …”
    Get full text
    Article
  19. 1959

    Congruent Learning for Self-Regulated Federated Learning in 6G by Jalil Taghia, Farnaz Moradi, Hannes Larsson, Xiaoyu Lan, Adam Orucu, Masoumeh Ebrahimi, Andreas Johnsson

    Published 2024-01-01
    “…Across four networking use cases on several tasks, reflecting different profiles of data heterogeneity and limited availability of data, it is shown that CFL greatly reduces overfitting and in nearly all cases improves the performance—a relative gain of about 21% averaged across all use cases.…”
    Get full text
    Article
  20. 1960

    Applications of UAV Technologies in Assessment of Transportation Infrastructure Systems by Ahmad Akib Uz Zaman, Ahmed Abdelaty, Mohamed S. Yamany

    Published 2025-06-01
    “…Respondents emphasize the need for longer flight times, better automation, and advanced data tools, underscoring growing adoption and highlighting the need to overcome technical, regulatory, and data privacy challenges for optimal UAV integration within transportation infrastructure systems management.…”
    Get full text
    Article