Search alternatives:
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
Showing 2,501 - 2,520 results of 2,784 for search '((((( useds OR usedds) OR usedds) OR usedddds) privacy data ) OR ( use privacy data ))', query time: 0.23s Refine Results
  1. 2501

    Artificial intelligence in the tourism business: a systematic review by Alexandra Lorena López-Naranjo, Mariana Isabel Puente-Riofrio, Verónica Adriana Carrasco-Salazar, Juan Diego Erazo-Rodríguez, Pamela Alexandra Buñay-Guisñan

    Published 2025-07-01
    “…The aim of this re-search is to explore the application of AI in the tourism industry, identifying the main AI technologies used in the business, the specific areas or processes, their benefits, and challenges. …”
    Get full text
    Article
  2. 2502

    The level of male involvement and associated factors in the prevention of mother-to-child transmission of HIV in Lusaka, Zambia by Sheila Mukuni Mutondo, Joseph Lupenga, Chris Mweemba, Oliver Mweemba

    Published 2025-12-01
    “…A 10—item male partner involvement scale was used in the survey, and focus group discussions with both men and women and key informants were used to collect qualitative data. …”
    Get full text
    Article
  3. 2503

    New Image Crypto-Compression Scheme Based on Ecc and Chaos Theory for High-Speed and Reliable Transmission of Medical Images in the IOMT by Kinani Khadija El, Amounas Fatima, Bendaoud Salma, Azrour Mourade, Badiy Mohamed

    Published 2024-12-01
    “…Ensuring the security and privacy of medical data is crucial when integrating with smart and intelligent sensor devices within the hospital environment. …”
    Get full text
    Article
  4. 2504

    Insights from platelet donors in tertiary care hospitals by Swapna Yalamanchili, Vijayashree Raghavan, Femela Muniraj, V. Mythily

    Published 2025-04-01
    “…Statistical Analysis: Data were analyzed using descriptive statistics and percentage analysis with SPSS version 23. …”
    Get full text
    Article
  5. 2505

    Biometrically-independent fuzzy signatures: signing with biometrics without embedding them by Saki Otsuki, Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana, Hiroto Tamiya, Kenji Yasunaga

    Published 2025-06-01
    “…However, FS faces two significant privacy concerns. First, using biometric information as the signing key restricts users’ ability to manage multiple distinct keys for different applications. …”
    Get full text
    Article
  6. 2506

    Large Language Model and Traditional Machine Learning Scoring of Evolutionary Explanations: Benefits and Drawbacks by Yunlong Pan, Ross H. Nehm

    Published 2025-05-01
    “…Ethical concerns over data ownership, reliability, and replicability over time were LLM limitations. …”
    Get full text
    Article
  7. 2507

    Exploring the potential of GenAI for personalised English teaching: Learners' experiences and perceptions by Lucas Kohnke, Di Zou, Fan Su

    Published 2025-06-01
    “…Our results underscore the need for professional development for educators and the establishment of guidelines to address academic integrity and data privacy.…”
    Get full text
    Article
  8. 2508

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  9. 2509

    Analisa Sentimen Financial Technology Peer To Peer Lending Pada Aplikasi Koinworks by Rousyati Rousyati, Windu Gata, Dany Pratmanto, Nia Kusuma Wardhani

    Published 2022-12-01
    “…Reviews contained in the Google Play comments column can be used as a data source that can be shared with data mining. …”
    Get full text
    Article
  10. 2510
  11. 2511

    AI Impact on Hotel Guest Satisfaction via Tailor-Made Services: A Case Study of Serbia and Hungary by Ranko Makivić, Dragan Vukolić, Sonja Veljović, Minja Bolesnikov, Lóránt Dénes Dávid, Andrea Ivanišević, Mario Silić, Tamara Gajić

    Published 2024-11-01
    “…This study examines the level of implementation of artificial intelligence (AI) in the personalization of hotel services and its impact on guest satisfaction through an analysis of tourists’ attitudes and behaviors The focus of the research is on how personalized recommendations for food and beverages, activities, and room services, delivered by trustworthy AI systems, digital experience, and the perception of privacy and data security, influence overall guest satisfaction. …”
    Get full text
    Article
  12. 2512

    Digital Twins for Smarter Iranian Cities: A Future Studies Perspective by Nader Zali, Ali Soltani, Peyman Najafi, Salima Ebadi Qajari, Mehrdad Mehrju

    Published 2024-12-01
    “…Policy implications suggest that governments should prioritise supportive policies, investments in digital infrastructure, and collaborative efforts to address data privacy, security, and ownership issues. By addressing these challenges, developing countries can leverage UDT technology to improve urban planning, resource management, and quality of life.…”
    Get full text
    Article
  13. 2513

    Influences of Human Presence on the Indoor Air Quality of Educational Institutions: Concurrent Multipollutant Sensing Approach by Rajib Das, Aritra Acharyya, Shubhankar Majumdar

    Published 2025-01-01
    “…PM findings were inconclusive because of concurrent inhalation effects. All occupancy data were privacy-preserving—images were processed on the device and never stored. …”
    Get full text
    Article
  14. 2514

    Internet-Based Mass Communication in Multi-Level Marketing Companies Operating in Poland by Nowotarska-Romaniak Beata, Szczepanik Sonia

    Published 2024-12-01
    “…This study examines the areas of Internet-based mass communication (websites, social media) utilized by multi-level marketing (MLM) companies operating in Poland, using methods including literature review, descriptive analysis, and statistical analysis of primary data. …”
    Get full text
    Article
  15. 2515
  16. 2516

    Application of Artificial Intelligence in Prosthodontics in the 21st century by Lavanya V, Keerthivasan MS, Venkatakrishnan CJ, Tamizhesai BV, Anandh V

    Published 2025-01-01
    “…Limitations include a lack of data privacy insufficient practitioner training high implementation costs ethical concerns and incomplete standardization of AI algorithms. …”
    Get full text
    Article
  17. 2517

    Large-scale long-tailed disease diagnosis on radiology images by Qiaoyu Zheng, Weike Zhao, Chaoyi Wu, Xiaoman Zhang, Lisong Dai, Hengyu Guan, Yuehua Li, Ya Zhang, Yanfeng Wang, Weidi Xie

    Published 2024-11-01
    “…In this paper, we introduce RadDiag, a foundational model supporting 2D and 3D inputs across various modalities and anatomies, using a transformer-based fusion module for comprehensive disease diagnosis. …”
    Get full text
    Article
  18. 2518

    Analyzing Visitor Behavior to Enhance Personalized Experiences in Smart Museums: A Systematic Literature Review by Rosen Ivanov, Victoria Velkova

    Published 2025-05-01
    “…The analysis reveals the primary methodologies applied and identifies the visitor behaviors that enable personalized content delivery. Statistical and Data Analysis is the predominant methodology in the reviewed publications. …”
    Get full text
    Article
  19. 2519

    AI in the Classroom: Insights from Educators on Usage, Challenges, and Mental Health by Julie A. Delello, Woonhee Sung, Kouider Mokhtari, Julie Hebert, Amy Bronson, Tonia De Giuseppe

    Published 2025-01-01
    “…This study highlights a gap in institutional AI policies, leading some educators to establish their own guidelines, particularly for matters such as data privacy and plagiarism. Furthermore, respondents identified a significant need for professional development focused on AI literacy and ethical considerations. …”
    Get full text
    Article
  20. 2520

    Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2 by SU Binting, FANG He, XU Li

    Published 2025-06-01
    “…A pseudo-identity authentication mechanism was integrated into the protocol to strengthen the protection of vehicle privacy information, effectively concealing vehicles’ real identities and operational data. …”
    Get full text
    Article