Search alternatives:
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
Showing 2,481 - 2,500 results of 2,784 for search '(((( useddddds OR usedddddds) OR usedddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 2481

    CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity by Ogobuchi Daniel Okey, Demostenes Zegarra Rodriguez, Frederico Gadelha Guimaraes, Joao Henrique Kleinschmidt

    Published 2025-01-01
    “…Federated learning has recently gained significant attention as a method for building machine learning models due to its ability to preserve data privacy while delivering improved performance. …”
    Get full text
    Article
  2. 2482

    Emergency department care experiences among 2SLGBTQQIA+ patients: a mixed methods study by Sidonie Chard, Sawyer Karabelas-Pittman, Kel Martin, Elliot Chapple, David Messenger, Susan A. Bartels, Melanie Walker

    Published 2025-05-01
    “…Participants were recruited from the Kingston Health Sciences Centre’s ED, Urgent Care Centre, and at community-based organisations. Quantitative data were analysed using chi-squared tests, while qualitative data underwent thematic analysis. …”
    Get full text
    Article
  3. 2483

    Harnessing artificial intelligence of things for cardiac sensing: current advances and network-based perspectives by Hao Ren, Hao Ren, Hao Ren, Fengshi Jing, Yongcong Ma, Ruining Wang, Chaocheng He, Yufan Wang, Jiandong Zhou, Yu Sun

    Published 2025-07-01
    “…Looking ahead, we anticipate that this field will increasingly prioritize data privacy protection, particularly in the era of large language models, to address emerging challenges and ensure sustainable growth. …”
    Get full text
    Article
  4. 2484

    Evaluation of ERP softwares with fuzzy AHP integrated TODIM method by A. Çağrı Tolga

    Published 2018-10-01
    “…Furthermore,the company's data privacy policy has been incorporated into the solutionprocedure with the fuzzy logic, which takes into account these drawbacks.Besides, it has been ensured that the cost criterion is integrated in adetailed manner. …”
    Get full text
    Article
  5. 2485

    Adoption of internet of things in residential smart homes: A structural equation modeling approach by Amir Mohammad Norouzzadeh, Seyed Pendar Toufighi, Jan Vang, Abolfazl Edalatipour

    Published 2025-06-01
    “…This study explores the behavioral factors influencing IoT adoption in residential smart buildings. Using a descriptive-survey method, data were collected from 97 companies involved in the smart home sector through structured questionnaires. …”
    Get full text
    Article
  6. 2486

    Patient and clinician perceptions of telehealth in musculoskeletal physiotherapy services - A systematic review of the evidence-base. by Anthony Smith, Sue Innes

    Published 2025-03-01
    “…Methodological quality was evaluated using the CASP, JBI and QuADS tools. Findings were evaluated via consensus and showed clear patient and clinician satisfaction with positive themes of reduced travel, reduced physical burden, flexibility/accessibility and negative themes of reduced physical contact, computer literacy and privacy infringements. …”
    Get full text
    Article
  7. 2487

    Leveraging Blockchain for Transparency: A Study on Organ Supply Chains and Transplant Processes by Rashmi Ranjan Panigrahi, Subhodeep Mukherjee, Zakir Hossen Shaikh, Naji Mansour Nomran

    Published 2025-01-01
    “…Structural equation modelling was used to test and validate the model. <i>Results</i>: The study’s findings indicate that social influence, trust, facilitating conditions, government support, performance expectancy, data security and privacy, and technology affinity positively impact blockchain adoption in organ transplants. …”
    Get full text
    Article
  8. 2488

    Enhancing reliability and security in cloud-based telesurgery systems leveraging swarm-evoked distributed federated learning framework to mitigate multiple attacks by S. Punitha, K. S. Preetha

    Published 2025-07-01
    “…To address these issues, a distributed framework based on federated learning is proposed, integrating Optimized Gated Transformer Networks (OGTN) with layered chaotic encryption schemes to mitigate multiple unknown cyberattacks while preserving data privacy and integrity. The framework was implemented using TensorFlow Federated Learning Libraries (FLL) and evaluated on the UNSW-NB15 dataset. …”
    Get full text
    Article
  9. 2489

    Advanced Monte Carlo for Acquisition Sampling in Bayesian Optimization by Javier Garcia-Barcos, Ruben Martinez-Cantin

    Published 2025-01-01
    “…Bayesian optimization (BO) has proved to be a suitable optimization method in these situations thanks to its sample efficiency and principled way of learning from previous data, but it typically requires that experiments are sequentially performed. …”
    Get full text
    Article
  10. 2490

    Comparative Performance Evaluation of Real-Time Webcam and HOG-Based Facial Recognition Systems for Children's Screen Time Management by Fatimah Alghamdi, Abdulrahman Alghamdi

    Published 2025-06-01
    “…It highlights critical security and privacy considerations, particularly the responsible handling of facial data in environments accessible to minors. …”
    Get full text
    Article
  11. 2491

    A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service by Hwankuk Kim, Jongin Lim, Kyungho Lee

    Published 2015-09-01
    “…Since existing studies mainly focus on simple statistical analysis of the K-ISMS assessment results, analysis on the cause of certification assessment fault based on past data analysis is insufficient. As a method of managing the certification inspection quality, in this paper, we analyze the association among the fault items of the K-ISMS certification assessment results using association rule mining which involves identifying an association rule among items in the database.…”
    Get full text
    Article
  12. 2492

    A Fully Distributed Power Flow Algorithm with Exponentially Fast Convergence by Changzheng GAO, Bo YAN, Jiarui WANG, Xuefei CHANG, Yue SUN

    Published 2019-10-01
    “…In order to meet the data privacy requirements for interconnected power system power flow calculations, a fully distributed power flow algorithm is proposed. …”
    Get full text
    Article
  13. 2493

    A Multi-Criteria Decision-Making Framework for Evaluating Emerging Digital Technologies in Supply Chain Optimization by Nabil M. AbdelAziz, Dina Mohamed, Hasnaa Soliman

    Published 2025-07-01
    “…Ten critical attributes covering technical, economic, and environmental dimensions were identified through expert consultation and a review of relevant literature, including scalability, integration ease, performance benefit, costeffectiveness, environmental and social sustainability, data privacy, and supply chain resilience. The evaluation framework combines the Entropy method for determining objective attribute weights with the TOPSIS method for ranking alternatives. …”
    Get full text
    Article
  14. 2494

    Performance Evaluation of Decentralized Federated Learning: Impact of Fully and K-Connected Topologies, Heterogeneous Computing Resources, and Communication Bandwidth by Vo van Truong, Pham Khanh Quan, Dong-Hwan Park, Taehong Kim

    Published 2025-01-01
    “…Decentralized federated learning (DFL) enables collaborative model training across distributed devices while preserving data privacy. Despite this, the performance of DFL in real-world scenarios, characterized by varying network topologies, heterogeneous client resources, and communication bandwidth, remains underexplored. …”
    Get full text
    Article
  15. 2495

    A Systematic Literature Review on Sustainability Integration and Marketing Intelligence in the Era of Artificial Intelligence by Md Mehedi Hasan Emon, Tahsina Khan

    Published 2024-12-01
    “…The conversation delves into the difficulties and moral aspects involved in using AI in marketing, such as issues related to data privacy, algorithmic bias, and the importance of a strategic framework that focuses on sustainable development goals. …”
    Get full text
    Article
  16. 2496

    Asynchronous blockchain‐based federated learning for tokenized smart power contract of heterogeneous networked microgrid system by Desh Deepak Sharma

    Published 2024-12-01
    “…For simulation purposes, MATLAB and python programming have been used with real‐time data of microgrids.…”
    Get full text
    Article
  17. 2497

    A Survey on the Effectiveness of Existing Smart Home Cyber Attacks Detection Solution: A Broadband Service Providers&#x2019; Perspective by Md Mizanur Rahman, Faycal Bouhafs, Frank den Hartog

    Published 2025-01-01
    “…We also discuss future research directions, emphasising scalable and data-efficient methods to reduce storage requirements, costs, and privacy concerns, which will enable BSPs to manage millions of customer networks more effectively.…”
    Get full text
    Article
  18. 2498

    Integrating population-based biobanks: Catalyst for advances in precision health by Jui-Chu Lin, Yi-Lien Liu, Wesley Wei-Wen Hsiao, Chien-Te Fan

    Published 2024-12-01
    “…Challenges in integrating different biobanks include data format consistency, privacy concerns, and legal constraints. …”
    Get full text
    Article
  19. 2499

    Swachh Bharat Mission Gramin: Uptake and challenges in rural Coimbatore by Iswarya Natarajan, Kathiravan Rajendran, Seetharaman Narayanan, Jeevithan Shanmugam

    Published 2024-10-01
    “…Quantitative data were analysed using Statistical Package for the Social Sciences (SPSS) v23 and qualitative data using manual thematic content analysis. …”
    Get full text
    Article
  20. 2500

    Exploring unsupervised feature extraction algorithms: tackling high dimensionality in small datasets by Hongqi Niu, Gabrielle B. McCallum, Anne B. Chang, Khalid Khan, Sami Azam

    Published 2025-07-01
    “…Abstract Small datasets are common in many fields due to factors such as limited data collection opportunities or privacy concerns. …”
    Get full text
    Article