Showing 2,341 - 2,360 results of 2,784 for search '((((( usedds OR usedds) OR usedddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.16s Refine Results
  1. 2341

    Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi. by Christi J Guerrini, Louiza Kalokairinou, Jill O Robinson, Whitney Bash Brooks, Stephanie M Fullerton, Sara Huston, Jacklyn Dahlquist, Diana Madden, Norah Crossnohere, Nicola Campoamor, John F P Bridges, Amy L McGuire

    Published 2025-01-01
    “…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. …”
    Get full text
    Article
  2. 2342

    SparseBatch: Communication-efficient Federated Learning with Partially Homomorphic Encryption by Chong Wang, Jing Wang, Zheng Lou, Linghai Kong, WeiSong Tao, Yun Wang

    Published 2025-01-01
    “…It operates by aggregating local gradient updates contributed by participating clients, all the while safeguarding the privacy of sensitive data. Industrial FL frameworks employ additively homomorphic encryption (HE) to ensure that local gradient updates are masked during aggregation, guaranteeing no update is revealed. …”
    Get full text
    Article
  3. 2343

    Exploring the promising role of internet of things in urban water systems: a comprehensive global analysis of insights, trends, and research priorities by Shaher Zyoud

    Published 2025-03-01
    “…Most explored areas include water quality monitoring, leak detection, smart metering, and demand management, while challenges in the future lie in data security, privacy, and interoperability. Despite growing research interests, gaps remain in standardization, community engagement, and developing robust IoT architectures. …”
    Get full text
    Article
  4. 2344

    Cross-Room CO<sub>2</sub>-Based Presence Detection for Occupancy Profiling by Jelle Vanhaeverbeke, Emiel Deprost, Steven Verstockt, Sofie van Hoecke

    Published 2025-01-01
    “…The first contribution involves the development of a presence detection model based on CO2 data, which is easy to measure and non-privacy intrusive. …”
    Get full text
    Article
  5. 2345

    Unlocking potential of open source model training in decentralized federated learning environment by Ekaterina Pavlova, Grigorii Melnikov, Yury Yanovich, Alexey Frolov

    Published 2025-06-01
    “…Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. …”
    Get full text
    Article
  6. 2346

    Parents’ understanding and attitudes toward the application of AI in pediatric healthcare: a cross-sectional survey study by Yan-Dan Huang, Shu-Long Zeng, Jie Lin, Zhi-Peng Mao, Qi-Liang Zhang, Gao-Zhong Feng, Qiong-Xia Ou

    Published 2025-08-01
    “…Most participants (91.1%) believed that AI cannot replace doctors in the future.ConclusionAlthough most parents were aware of the use of AI in pediatric healthcare and recognized its convenience and efficiency, they expressed concerns about accuracy, accountability, and data privacy. …”
    Get full text
    Article
  7. 2347

    Looking Back on Digital Medical Education Over the Last 25 Years and Looking to the Future: Narrative Review by Oluwadamilola Ogundiya, Thahmina Jasmine Rahman, Ioan Valnarov-Boulter, Tim Michael Young

    Published 2024-12-01
    “…The rapid evolution and use of web-based and digital techniques have been significantly transforming this field since the beginning of the new millennium. …”
    Get full text
    Article
  8. 2348

    Blockchain-Enhanced Security for 5G Edge Computing in IoT by Manuel J. C. S. Reis

    Published 2025-04-01
    “…The rapid expansion of 5G networks and edge computing has amplified security challenges in Internet of Things (IoT) environments, including unauthorized access, data tampering, and DDoS attacks. This paper introduces EdgeChainGuard, a hybrid blockchain-based authentication framework designed to secure 5G-enabled IoT systems through decentralized identity management, smart contract-based access control, and AI-driven anomaly detection. …”
    Get full text
    Article
  9. 2349

    Why We Disclose on Social Media? Towards a Dual-Pathway Model by Qiyu Bai, Qi Dan, Yumin Choi, Siyang Luo

    Published 2025-04-01
    “…A moderated mediation model was proposed and tested using cross-sectional survey data collected from 1519 Chinese netizens. …”
    Get full text
    Article
  10. 2350

    A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions by Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman

    Published 2025-03-01
    “…This study aims to identify gaps and propose future research directions to develop robust authentication frameworks that protect user privacy and data integrity.…”
    Get full text
    Article
  11. 2351

    A Bibliometric Analysis on Federated Learning by Ersin Namlı, Yusuf Sait Türkan, Mesut Ulu, Ömer Algorabi

    Published 2024-12-01
    “…With the rapid advancement of technology and growing concerns about data privacy, federated learning (FL) has attracted considerable attention from the scientific community. …”
    Get full text
    Article
  12. 2352

    Future perspectives on internet of vehicles resource management: digital twin-enabled edge computing frameworks by Jihong Xie, Gui Wu, Xiang Zhou, Shanshan Deng

    Published 2025-07-01
    “…With edge computing, processing data near the source, these technologies significantly lower response time and optimize system performance. …”
    Get full text
    Article
  13. 2353

    COVID-19 and the implications of social and hospital isolation for older adults by Renata Bezerra de Holanda Bessa, Karla Patrícia Martins Ferreira, Cynthia de Freitas Melo, Letícia Keroly Bezerra Alexandrino, Bianca de Sousa Nogueira

    Published 2025-08-01
    “…Method This is an exploratory, descriptive, and qualitative study conducted with 16 hospitalized older adults, who answered a sociodemographic questionnaire and a guiding question. Data were analyzed through textual analysis using the Interface de R pour les Analyses Multidimensionnelles de Textes et de Questionnaires (IRaMuTeQ) software. …”
    Get full text
    Article
  14. 2354

    Dispute Resolution in Islamic Economic Transactions: The Role and Function of Sharia Arbitration by Gunawan Widjaja

    Published 2025-02-01
    “…This study examines the function and role of Sharia-based arbitration, focusing on its alignment with the values of justice, efficiency, and confidentiality within Islamic law. Using a literature-based methodology, the research analyzes secondary data from legal sources and previous studies on Sharia arbitration in Indonesia, particularly the practices of the Sharia Arbitration Body (BASYARNAS-MUI). …”
    Get full text
    Article
  15. 2355

    A Comprehensive Survey of Deep Learning Approaches in Image Processing by Maria Trigka, Elias Dritsas

    Published 2025-01-01
    “…Metrics used for rigorous model evaluation are also discussed, underscoring the importance of performance assessment in varied application contexts. …”
    Get full text
    Article
  16. 2356

    The Role of Artificial Intelligence in Personalized Medicine: A Computer Science Perspective by Raul Mihai RADULESCU

    Published 2025-05-01
    “… This abstract investigates the role of AI in personalized medicine using a computer science lens that connects the underlying theories with their actual applications. …”
    Get full text
    Article
  17. 2357

    Artificial Intelligence in Religious Education: Ethical, Pedagogical, and Theological Perspectives by Christos Papakostas

    Published 2025-04-01
    “…Amid increasing digital transformation in education, theological institutions are exploring AI tools for teaching, assessment, and pastoral engagement. Using a critical literature review and analysis of institutional case studies, the paper examines the historical development of AI in education, current applications in general and theological contexts, and the ethical challenges it introduces, especially regarding decision making, data privacy, and bias as well as didactically grounded opportunities such as AI-mediated dialogic simulations. …”
    Get full text
    Article
  18. 2358

    Towards responsible artificial intelligence in education: a systematic review on identifying and mitigating ethical risks by Haotian Zhu, Yao Sun, Junfeng Yang

    Published 2025-07-01
    “…In the technology dimension, risks include privacy invasion, data leakage, algorithmic bias, the black box algorithm, and algorithmic error. …”
    Get full text
    Article
  19. 2359

    Artificial intelligence and machine learning in production efficiency enhancement and sustainable development: a comprehensive bibliometric review by Aristidis Bitzenis, Nikos Koutsoupias, Marios Nosios

    Published 2025-01-01
    “…Despite the promising advancements, the review identifies gaps in ethical considerations, especially in data privacy and labor market implications, and suggests avenues for future research, including the implementation of AI and ML in developing economies and Small and Medium Enterprises (SMEs).…”
    Get full text
    Article
  20. 2360

    Benchmarking Federated Few-Shot Learning for Video-Based Action Recognition by Nguyen Anh Tu, Nartay Aikyn, Nursultan Makhanov, Assanali Abu, Kok-Seng Wong, Min-Ho Lee

    Published 2024-01-01
    “…This learning approach is particularly useful but challenging due to the limited availability of labeled video data in practice. …”
    Get full text
    Article