Search alternatives:
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 1,321 - 1,340 results of 2,784 for search '(((( usedddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.18s Refine Results
  1. 1321
  2. 1322

    Intrusion Detection Using Machine Learning for Risk Mitigation in IoT-Enabled Smart Irrigation in Smart Farming by Abhishek Raghuvanshi, Umesh Kumar Singh, Guna Sekhar Sajja, Harikumar Pallathadka, Evans Asenso, Mustafa Kamal, Abha Singh, Khongdet Phasinam

    Published 2022-01-01
    “…In this framework, the NSL KDD data set is used as an input data set. In the preprocessing of the NSL-KDD data set, first all symbolic features are converted to numeric features. …”
    Get full text
    Article
  3. 1323

    Hypothetical Preferences and Concerns for Long-Acting Injectable HIV PrEP Use Among Female Barmaids in Ubungo, Dar Es Salaam, Tanzania by Akyoo WO, Mosha IH, Mpembeni RM, Jahn A

    Published 2025-08-01
    “…Interviews were conducted using a guide with semi-structured questions. We adopted an inductive approach for analyzing data.Findings: The majority of PrEP non-users expressed no preference for any form of PrEP, while oral PrEP-users preferred LAI PrEP. …”
    Get full text
    Article
  4. 1324

    Fall Detection Using Federated Lightweight CNN Models: A Comparison of Decentralized vs. Centralized Learning by Qasim Mahdi Haref, Jun Long, Zhan Yang

    Published 2025-07-01
    “…The models were trained using three random seeds to ensure result robustness and stability across varying data partitions. …”
    Get full text
    Article
  5. 1325

    The relevance of implementing the employee digital profile as an element of the employer’s HR policy by O. V. Shcherbakova

    Published 2025-06-01
    “…At the same time, the lack of normative methodologies for the creation and operation of employee digital profiles and comprehensive scientific research predetermine increasing risks of violation of personal data of employees, privacy of employees, as well as discrimination in making legally significant decisions. …”
    Get full text
    Article
  6. 1326

    xFedCAV: Cyberattacks on Leader and Followers in Automated Vehicles With Cooperative Platoons Using Federated Agents by Guanyu Lin, Sean Qian, Zulqarnain H. Khattak

    Published 2025-01-01
    “…Our framework leverages federated learning to enhance privacy and security, using Shapley Additive exPlanations (SHAP) for interpretable detection. …”
    Get full text
    Article
  7. 1327

    Analysis of Service Quality on the Starbucks Indonesia Application Using E-SERVQUAL and Importance Performance Analysis (IPA) by Palmarosa Ardianti Putri Hardhika, Minto Waluyo

    Published 2025-08-01
    “…This study aims to evaluate the app’s service quality using E-ServQual method, which assesses seven dimensions: efficiency, reliability, fulfillment, privacy, responsiveness, compensation, and contact. …”
    Get full text
    Article
  8. 1328

    Tabular transformer generative adversarial network for heterogeneous distribution in healthcare by Ha Ye Jin Kang, Minsam Ko, Kwang Sun Ryu

    Published 2025-03-01
    “…However, privacy concerns have hindered their widespread use. …”
    Get full text
    Article
  9. 1329

    Crypto management: a novel organizational management model based on blockchain by Juanjuan LI, Ge WANG, Xiao WANG, Junqing LI, Yong YUAN, Fei-Yue WANG

    Published 2022-06-01
    “…Aim to deal with the problem of data, trust and timeliness asymmetry faced by modern organizational management from the root, a novel organizational management model towards Web 3.0 namely crypto management was proposed.It was enabled by blockchain technology and smart contracts based on it, supported by the federated data, organized in the form of DAO (decentralized autonomous organization), and driven by the incentive mechanism with NFT (non-fungible token) as the core.The primary goal of crypto management was to realize trustable, reliable and usable real-time management decision-making under the premise of data security and privacy protection.The framework of crypto management was formulated, its core components and implementation mode were discussed, and its operation process using the example of personnel performance management was also introduced.Towards the end, the potential future works in this emerging new area were discussed.…”
    Get full text
    Article
  10. 1330

    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map by Adel R. Alharbi, Jawad Ahmad, null Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, William J Buchanan

    Published 2022-01-01
    “…To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. …”
    Get full text
    Article
  11. 1331

    Problem of Harmonization of Legal Norms with the Needs of Police Investigations by Using High-Tech Instruments for Searching Information by Yu. V. Hnusov, V. M. Strukov, O. O. Mozhayev

    Published 2021-03-01
    “…The problem of harmonization of legal norms with the needs of police investigations with the use of high-tech data search tools has been analyzed. …”
    Get full text
    Article
  12. 1332

    Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning by Mohd Anjum, Naoufel Kraiem, Hong Min, Ashit Kumar Dutta, Yousef Ibrahim Daradkeh, Sana Shahab

    Published 2025-03-01
    “…These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads. However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. …”
    Get full text
    Article
  13. 1333

    Using Inertial Measurement Units and Machine Learning to Classify Body Positions of Adults in a Hospital Bed by Eliza Becker, Siavash Khaksar, Harry Booker, Kylie Hill, Yifei Ren, Tele Tan, Carol Watson, Ethan Wordsworth, Meg Harrold

    Published 2025-01-01
    “…Movement data were captured using five IMU Xsens DOTs attached to the forehead, wrists and ankles. …”
    Get full text
    Article
  14. 1334

    Assessing the practicality of using freely available AI-based GPT tools for coach learning and athlete development by Katherine A. O'Brien, Sarah Prentice

    Published 2025-07-01
    “…Despite the strengths, there were also associated risks and pitfalls when using this process such as the strength and robustness of the applicable statistical outcomes and tensions between keeping the input data within the context and ensuring that the context did not breach privacy issues. …”
    Get full text
    Article
  15. 1335
  16. 1336

    Value of Artificial Intelligence for Enhancing Suspicion of Cardiac Amyloidosis Using Electrocardiography and Echocardiography: A Narrative Review by Martha Grogan, Francisco Lopez‐Jimenez, Spencer Guthrie, Nisith Kumar, Reuben Langevin, Isabelle Lousada, Ronald Witteles, Ajay Royyuru, Michael Rosenzweig, Sarah Cairns‐Smith, David Ouyang

    Published 2025-04-01
    “…Thirteen studies met inclusion criteria with sample sizes ranging from 50 to 2451 patients. Four studies used ECG data, 8 used echocardiography data, and 1 used both. …”
    Get full text
    Article
  17. 1337

    Public Health Using Social Network Analysis During the COVID-19 Era: A Systematic Review by Stanislava Gardasevic, Aditi Jaiswal, Manika Lamba, Jena Funakoshi, Kar-Hai Chu, Aekta Shah, Yinan Sun, Pallav Pokhrel, Peter Washington

    Published 2024-11-01
    “…We highlight the ethical concerns related to the use of social media data, such as privacy and consent, underscoring the potential of integrating ethical SNA with more inclusive, human-centered practices to enhance the effectiveness and community buy-in of emerging computational public health efforts.…”
    Get full text
    Article
  18. 1338

    Quantum proof biometric authentication framework using binary lattices and homomorphic encryption for secure cancelable templates by S. Aarthi, K. Geetha, N. Sasikaladevi

    Published 2025-06-01
    “…The genuine and impostor distributions in the extensive data sets were used to validate the above authentication thresholds that were chosen through empirical testing. …”
    Get full text
    Article
  19. 1339

    The Impact of Artificial Intelligence on Personalized Learning in Higher Education: A Systematic Review by Carlos Merino-Campos

    Published 2025-03-01
    “…The risk of bias was assessed using a standardized ranking system. This systematic review follows the PRISMA guidelines to ensure transparency in study selection, data extraction, and synthesis. …”
    Get full text
    Article
  20. 1340

    Advanced Machine Learning and Deep Learning Approaches for Estimating the Remaining Life of EV Batteries—A Review by Daniel H. de la Iglesia, Carlos Chinchilla Corbacho, Jorge Zakour Dib, Vidal Alonso-Secades, Alfonso J. López Rivero

    Published 2025-01-01
    “…This systematic review presents a critical analysis of advanced machine learning (ML) and deep learning (DL) approaches for predicting the remaining useful life (RUL) of electric vehicle (EV) batteries. …”
    Get full text
    Article