Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
1141
The impact of big data analytics on digital marketing decision-making: A comprehensive analysis
Published 2025-08-01“…An online questionnaire, delivered through SurveyMonkey, achieved a 92% response rate (n = 230), capturing data on tool usage, benefits, and problems. Data pre-processing includes duplicate removal and mean imputation, followed by K-means clustering and logistic regression analysis using Python (scikit-learn, pandas). …”
Get full text
Article -
1142
Sense (and) the city: From Internet of Things sensors and open data platforms to urban observatories
Published 2024-12-01“…Anyone can monitor from their fitness to the air quality of their immediate environment using everyday technologies. With caveats around privacy and accuracy, such data could even complement those collected by authorities at city‐scale, for validating or improving policies. …”
Get full text
Article -
1143
Optimising Data Analytics to Enhance Postgraduate Student Academic Achievement: A Systematic Review
Published 2024-11-01“…As such, this review aimed to identify data analytics approaches used by HEIs and explore challenges and best practices in their application. …”
Get full text
Article -
1144
Substation Inspection Safety Risk Identification Based on Synthetic Data and Spatiotemporal Action Detection
Published 2025-04-01“…Model training is conducted using three datasets: a real dataset, a synthetic dataset generated via a VWP, and a mixed dataset comprising both real and synthetic data. …”
Get full text
Article -
1145
SQUiD: ultra-secure storage and analysis of genetic data for the advancement of precision medicine
Published 2024-12-01“…Due to the sensitive nature of this data and varied laws and regulations, additional security measures are needed to ensure data privacy. …”
Get full text
Article -
1146
Data Sovereignty and Open Sharing: Reconceiving Benefit-Sharing and Governance of Digital Sequence Information
Published 2025-02-01“…Using the example of the COVID-19 pandemic, the tension between open science principles and data control rights is explained. …”
Get full text
Article -
1147
Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment
Published 2020-03-01“…This article proposes a method for partially encrypting private information in images using FF1 and FF3-1. The proposed method encrypts private information without increasing the data size, solving the problem of wasted storage space. …”
Get full text
Article -
1148
Multimodal Face Data Sets—A Survey of Technologies, Applications, and Contents
Published 2024-01-01“…Biometric verification for controlling access to digital devices has become ubiquitous for its ease-of-use but often relies on notoriously data-hungry supervised machine learning. …”
Get full text
Article -
1149
Federated Learning-Based State of Charge Estimation in Electric Vehicles Using Federated Adaptive Client Momentum
Published 2025-01-01“…Centralized machine learning methods are used to improve SoC estimation. Both privacy and high bandwidth requirements are the main disadvantages during the implementation. …”
Get full text
Article -
1150
Investigating the role of serious games on raising students’ awareness on safety and data protection on the Internet
Published 2025-08-01“…In this article, we present the results of an empirical study that utilized serious games for raising students’ awareness on safety and data protection on the Internet. Two questionnaires, that collected information regarding students’ knowledge and practices while using the Internet, were used for data collection. …”
Get full text
Article -
1151
Leveraging data analytics for detection and impact evaluation of fake news and deepfakes in social networks
Published 2025-07-01“…The rampant rise of deepfake technology poses huge risks to social trust and privacy issues, which impacts both individuals and society at large, and leveraging the effective use of data analytics, machine learning and AI techniques can help prevent irreparable damage and mitigate the negative impacts of deepfakes in social networks. …”
Get full text
Article -
1152
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“… In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. …”
Get full text
Article -
1153
Risk of AI Algorithmic Discrimination Embedded in Government Data Governance and Its Prevention and Control
Published 2024-05-01“…To address this issue, this study proposed a series of targeted prevention and control measures, including clarifying the principle of algorithmic fairness, formulating industry norms and standards, improving the accountability mechanism and regulatory system, and optimizing the data collection and processing environment, so as to effectively curb the phenomenon of algorithmic discrimination while making full use of the advantages of AI technology, so that AI technology in government data governance can truly benefit the people, and promote social fairness and justice.…”
Get full text
Article -
1154
Secure Delivery Method for Preserving Data Integrity of a Video Frame with Sensitive Objects
Published 2025-03-01“…The logger operates a cryptography hash function of a feature vector of a video data frame and an XOR encoding scheme used for hiding the privacy information of sensitive objects in the video data frame. …”
Get full text
Article -
1155
Verifiable Blockchain-Empowered Federated Learning for Secure Data Sharing in the Internet of Medical Things
Published 2025-01-01“…This paper proposes a verifiable blockchain-empowered federated learning framework to address privacy and aggregation verification challenges in data sharing. …”
Get full text
Article -
1156
Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks
Published 2015-08-01“…However, how to keep data security and data privacy in cloud-integrated body sensor network (C-BSN) is an important and challenging issue since the patients’ health-related data are quite sensitive. …”
Get full text
Article -
1157
Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions
Published 2025-01-01“…We note that while existing security frameworks such as security standards may be useful: they fail to deal with limitations in areas such as privacy, authentication, and secure transactions across multiple cloud platforms. …”
Get full text
Article -
1158
Analysis of Model Merging Methods for Continual Updating of Foundation Models in Distributed Data Settings
Published 2025-05-01“…To address these issues, we propose a novel framework that integrates model merging with federated learning to enable continual foundation model updates without centralizing sensitive data. In this framework, each client fine-tunes a local model, and the server merges these models using multiple merging strategies. …”
Get full text
Article -
1159
Adaptive integrated weight unsupervised multi-source domain adaptation without source data
Published 2025-04-01“…Existing methods assume that all source domain data can be accessed directly. However, such an assumption is unrealistic and causes data privacy concerns, especially when the source domain labels include personal information. …”
Get full text
Article -
1160
Big Data Meets Social Networks: A Survey of Analytical Strategies and Research Challenges
Published 2025-01-01“…In addition, it covers issues of scalability, data quality, privacy, and real-time analysis. SN analytics can be useful for researchers from across domains like business and marketing, healthcare and biomedicine, social sciences and psychology, politics and governance, cybersecurity and fraud detection, recommendation systems, crisis management, and disaster response to extract crucial information from vast datasets and formulate domain-specific strategies.…”
Get full text
Article