Showing 2,401 - 2,420 results of 2,784 for search '(((( useddddds OR useddddds) OR useddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.14s Refine Results
  1. 2401

    Sybil Attack Detection Based on Signal Clustering in Vehicular Networks by Halit Bugra Tulay, Can Emre Koksal

    Published 2024-01-01
    “…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
    Get full text
    Article
  2. 2402

    The daunting challenge of Artificial Intelligence in Education: a systematic literature review by Rubén Arriazu

    Published 2025-03-01
    “…Finally, there are also ethical and social challenges that address concerns about the privacy of student data, equity in access to advanced technologies, and the potential of AI to perpetuate existing biases. …”
    Get full text
    Article
  3. 2403

    Identifying latent mobility as a service preference segments among college students by Willy Kriswardhana, Domokos Esztergár-Kiss

    Published 2025-04-01
    “…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
    Get full text
    Article
  4. 2404

    Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks by Dheyaa Marjan Hussein Almuntifeky, Basim K. J. Al-shammari

    Published 2024-08-01
    “…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
    Get full text
    Article
  5. 2405

    CLOUD COMPUTING SECURITY by Ştefan IOVAN, Alina Anabela IOVAN

    Published 2016-05-01
    “…Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. …”
    Get full text
    Article
  6. 2406

    Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors by Emel Ay, Menekşe Nazlı Aker

    Published 2025-03-01
    “…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
    Get full text
    Article
  7. 2407

    Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications by Juan E. Tapia, Maximilian Russo, Christoph Busch

    Published 2025-01-01
    “…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
    Get full text
    Article
  8. 2408

    Comparison of medical history documentation efficiency and quality based on GPT-4o: a study on the comparison between residents and artificial intelligence by Xiaojing Lu, Xinqi Gao, Xinyi Wang, Zhenye Gong, Jie Cheng, Weiguo Hu, Shaun Wu, Rong Wang, Xiaoyang Li

    Published 2025-05-01
    “…Despite these positive results, practical considerations such as data preprocessing, data security, and privacy protection must be addressed in real-world applications. …”
    Get full text
    Article
  9. 2409

    Occupational therapy in the space of artificial intelligence: Ethical considerations and human-centered efforts by Vera C. Kaelin, Ingeborg Nilsson, Helena Lindgren

    Published 2024-12-01
    “…One way to support future AI technology aligned with OT ethical principles may be through human-centered AI (HCAI), an emerging branch within AI research and developments with a notable overlap of OT values and beliefs.Objective To explore the risks and challenges of AI technology, and how the combined expertise, skills, and knowledge of OT and HCAI can contribute to harnessing its potential and shaping its future, from the perspective of OT’s ethical values and beliefs.Results Opportunities for OT and HCAI collaboration related to future AI technology include ensuring a focus on 1) occupational performance and participation, while taking client-centeredness into account; 2) occupational justice and respect for diversity, and 3) transparency and respect for the privacy of occupational performance and participation data.Conclusion and Significance There is need for OTs to engage and ensure that AI is applied in a way that serves OT and OT clients in a meaningful and ethical way through the use of HCAI.…”
    Get full text
    Article
  10. 2410

    Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing by Yuqi Xie, Ruwei Huang, Junbin Qiu

    Published 2025-04-01
    “…Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. …”
    Get full text
    Article
  11. 2411

    AI-driven assistive technologies in inclusive education: benefits, challenges, and policy recommendations by Chokri Kooli, Rim Chakraoui

    Published 2025-12-01
    “…Additionally, the paper highlights limitations related to accuracy, infrastructure needs, educator readiness, and ethical concerns such as data privacy and algorithmic bias.To address these challenges, the study proposes policy recommendations and practical strategies for equitable and responsible AI adoption in education, including targeted educator training, funding for inclusive infrastructure, and development of ethical and technical standards. …”
    Get full text
    Article
  12. 2412

    Leveraging Blockchain Technology for Secure 5G Offloading Processes by Cristina Regueiro, Santiago de Diego, Borja Urkizu

    Published 2025-04-01
    “…This paper proposes a Blockchain-based marketplace using Hyperledger Fabric to optimize resource allocation and enhance security. …”
    Get full text
    Article
  13. 2413

    Exploring the effects of artificial intelligence on student and academic well-being in higher education: a mini-review by Blanka Klimova, Marcel Pikhart

    Published 2025-02-01
    “…Furthermore, issues such as data privacy and job displacement emerge as AI technologies permeate educational environments. …”
    Get full text
    Article
  14. 2414

    Enhancing Public Service Delivery Efficiency through AI: Current Initiatives and Future Prospects in Bangladesh by Niaz Makhdum

    Published 2024-12-01
    “…Some major challenges are infrastructure deficits, data privacy breaches, lack of digital literacy, and unpreparedness of the workforce. …”
    Get full text
    Article
  15. 2415

    Leveraging Agent-Based Modeling and IoT for Enhanced E-Commerce Strategies by Mohamed Shili, Sajid Anwar

    Published 2024-10-01
    “…The effectiveness of this model is validated through simulations and case studies, demonstrating its capacity to handle large data volumes, ensure security and privacy, and maintain seamless interoperability among a variety of IoT devices and e-commerce platforms. …”
    Get full text
    Article
  16. 2416

    Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger by Assiya Akli, Khalid Chougdali 

    Published 2025-07-01
    “…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
    Get full text
    Article
  17. 2417

    Regulating AI in the Energy Sector: A Scoping Review of EU Laws, Challenges, and Global Perspectives by Bo Nørregaard Jørgensen, Zheng Grace Ma

    Published 2025-05-01
    “…It identifies key regulatory barriers such as stringent risk assessments, cybersecurity obligations, and data access restrictions, along with enablers like regulatory sandboxes and harmonized compliance frameworks. …”
    Get full text
    Article
  18. 2418

    Teenage Motherhood and its Effect on the Social Welfare of The Victims: A Case Study of Kabale Municipality. by Kwesiga, Siifa

    Published 2024
    “…Hence the study offers an in-depth analysis of the relative contribution of some socio¬demographic factors in explaining adolescent pregnancy in Kabale Municipality. Using primary data collected from different parts of the district, a sample of 30 female adolescents in the age range of 10-19 years was studied. …”
    Get full text
    Thesis
  19. 2419
  20. 2420

    The Applications of Large Language Models in Mental Health: Scoping Review by Yu Jin, Jiayi Liu, Pan Li, Baosen Wang, Yangxinyu Yan, Huilin Zhang, Chenhao Ni, Jing Wang, Yi Li, Yajun Bu, Yuanyuan Wang

    Published 2025-05-01
    “…Relevant information on application details and performance metrics was extracted during the data charting of eligible articles. ResultsA total of 95 articles were drawn from 4859 studies using LLMs for mental health tasks. …”
    Get full text
    Article