Search alternatives:
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 1,901 - 1,920 results of 2,784 for search '(((( useddddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 1901

    AI-Enhanced Disaster Management: A Modular OSINT System for Rapid Automated Reporting by Klaus Schwarz, Kendrick Bollens, Daniel Arias Aranda, Michael Hartmann

    Published 2024-11-01
    “…Through our case studies on Hurricane Harvey and the 2023 Turkey earthquake, we show how complex tasks can be quickly broken down with ODET while achieving a score of up to 89% using the AlignScore metric. ODET enables compliance with Berkeley protocol requirements by ensuring data privacy and using privacy-preserving processing methods. …”
    Get full text
    Article
  2. 1902

    Patient-Centric Approach to Personalized Electronic Medical Records via QR Code in Japan by Yoshihiko Izumida, Takashi Omura, Masahiro Fujiwara, Shoko Nukaya, Akio Yoneyama, Sow Boubacar, Shinichiro Yabe, Rika Noguchi, Shima Nakayama, Wataru Muraoka, Yuki Okuno, Sho Miyashita, Yurika Ishihara, Yuto Moriwaki, Ryoji Otani, Junichiro Adachi, Kenichiro Tanabe, Yoshihisa Yamano, Yasushi Takai, Masaru Honjo

    Published 2024-12-01
    “… Government policies in the United States and the European Union promote standardization and value creation in the use of FAIR (findability, accessibility, interoperability, and reusability) data, which can enhance trust in digital health systems and is crucial for their success. …”
    Get full text
    Article
  3. 1903

    Federated Learning Based on an Internet of Medical Things Framework for a Secure Brain Tumor Diagnostic System: A Capsule Networks Application by Roman Rodriguez-Aguilar, Jose-Antonio Marmolejo-Saucedo, Utku Köse

    Published 2025-07-01
    “…However, challenges related to performance and data privacy often arise when using medical data from patients and healthcare institutions. …”
    Get full text
    Article
  4. 1904

    Explainable Video Topics for Content Taxonomy: A Multimodal Retrieval Approach to Industry-Compliant Contextual Advertising by Waruna de Silva, Anil Fernando

    Published 2025-01-01
    “…To this end, transformer-based architectures, specifically BERTopic, computer vision techniques, and large language models were used to extract sets of topics from visual and textual video data automatically and systematically. …”
    Get full text
    Article
  5. 1905
  6. 1906
  7. 1907

    A Comprehensive Survey on Split-Fed Learning: Methods, Innovations, and Future Directions by Geetabai S. Hukkeri, R. H. Goudar, G. M. Dhananjaya, Vijayalaxmi N. Rathod, Shilpa Ankalaki

    Published 2025-01-01
    “…With organizations needing more and more to take advantage of decentralized data sources without compromising on security, the potential of using SFL becomes more apparent. …”
    Get full text
    Article
  8. 1908

    Occupational therapy in the space of artificial intelligence: Ethical considerations and human-centered efforts by Vera C. Kaelin, Ingeborg Nilsson, Helena Lindgren

    Published 2024-12-01
    “…One way to support future AI technology aligned with OT ethical principles may be through human-centered AI (HCAI), an emerging branch within AI research and developments with a notable overlap of OT values and beliefs.Objective To explore the risks and challenges of AI technology, and how the combined expertise, skills, and knowledge of OT and HCAI can contribute to harnessing its potential and shaping its future, from the perspective of OT’s ethical values and beliefs.Results Opportunities for OT and HCAI collaboration related to future AI technology include ensuring a focus on 1) occupational performance and participation, while taking client-centeredness into account; 2) occupational justice and respect for diversity, and 3) transparency and respect for the privacy of occupational performance and participation data.Conclusion and Significance There is need for OTs to engage and ensure that AI is applied in a way that serves OT and OT clients in a meaningful and ethical way through the use of HCAI.…”
    Get full text
    Article
  9. 1909

    Sybil Attack Detection Based on Signal Clustering in Vehicular Networks by Halit Bugra Tulay, Can Emre Koksal

    Published 2024-01-01
    “…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
    Get full text
    Article
  10. 1910

    Phenomena of Malaysian, and Japanese Languages from an Intercultural Communication Perspective by Machawan Arsyl Elensyah Rhema, Sanjaya Sonda, Zubbir Nadiah Binti

    Published 2024-01-01
    “…Employing a qualitative method, supplemented with an ethnographic approach tailored to how researchers gather data, this study examined Japanese language phenomena and language phenomena used in the Malayan Peninsula region (Singapore and Malaysia) over five days. …”
    Get full text
    Article
  11. 1911

    Leveraging AI-Generated Virtual Speakers to Enhance Multilingual E-Learning Experiences by Sergio Miranda, Rosa Vegliante

    Published 2025-02-01
    “…Future research should focus on addressing ethical considerations, such as data privacy and algorithmic bias, and expanding the user base to include more languages and proficiency levels.…”
    Get full text
    Article
  12. 1912

    AI-driven assistive technologies in inclusive education: benefits, challenges, and policy recommendations by Chokri Kooli, Rim Chakraoui

    Published 2025-12-01
    “…Additionally, the paper highlights limitations related to accuracy, infrastructure needs, educator readiness, and ethical concerns such as data privacy and algorithmic bias.To address these challenges, the study proposes policy recommendations and practical strategies for equitable and responsible AI adoption in education, including targeted educator training, funding for inclusive infrastructure, and development of ethical and technical standards. …”
    Get full text
    Article
  13. 1913

    Identifying latent mobility as a service preference segments among college students by Willy Kriswardhana, Domokos Esztergár-Kiss

    Published 2025-04-01
    “…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
    Get full text
    Article
  14. 1914

    Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks by Dheyaa Marjan Hussein Almuntifeky, Basim K. J. Al-shammari

    Published 2024-08-01
    “…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
    Get full text
    Article
  15. 1915

    Exploring the effects of artificial intelligence on student and academic well-being in higher education: a mini-review by Blanka Klimova, Marcel Pikhart

    Published 2025-02-01
    “…Furthermore, issues such as data privacy and job displacement emerge as AI technologies permeate educational environments. …”
    Get full text
    Article
  16. 1916

    Enhancing Public Service Delivery Efficiency through AI: Current Initiatives and Future Prospects in Bangladesh by Niaz Makhdum

    Published 2024-12-01
    “…Some major challenges are infrastructure deficits, data privacy breaches, lack of digital literacy, and unpreparedness of the workforce. …”
    Get full text
    Article
  17. 1917

    Leveraging Agent-Based Modeling and IoT for Enhanced E-Commerce Strategies by Mohamed Shili, Sajid Anwar

    Published 2024-10-01
    “…The effectiveness of this model is validated through simulations and case studies, demonstrating its capacity to handle large data volumes, ensure security and privacy, and maintain seamless interoperability among a variety of IoT devices and e-commerce platforms. …”
    Get full text
    Article
  18. 1918

    Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors by Emel Ay, Menekşe Nazlı Aker

    Published 2025-03-01
    “…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
    Get full text
    Article
  19. 1919

    Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications by Juan E. Tapia, Maximilian Russo, Christoph Busch

    Published 2025-01-01
    “…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
    Get full text
    Article
  20. 1920

    Encouraging gender-inclusive acceptance of multipurpose national-identity smart cards. by Yuen Yee Yen, P H P Yeow, Loo Wee Hong

    Published 2022-01-01
    “…The data was collected through five hundred questionnaires from Malaysia (the MNIS pioneer) and analyzed using structural equation modeling.…”
    Get full text
    Article