Search alternatives:
usedddds » useddddds (Expand Search)
use » used (Expand Search)
Showing 941 - 960 results of 2,784 for search '(((( usedddds OR usedddds) OR usedddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.21s Refine Results
  1. 941
  2. 942

    Machine Learning and Data Science in Social Sciences: Methods, Applications, and Future Directions by Elias Dritsas, Maria Trigka

    Published 2025-01-01
    “…We review current strategies for responsible AI deployment, including regulatory frameworks, human-centered design principles, and privacy-preserving methods. By synthesizing methodological advances and cross-cutting challenges, this study provides a focused and interdisciplinary roadmap for the rigorous and equitable use of AI in social science research.…”
    Get full text
    Article
  3. 943

    Harnessing digital health data for suicide prevention and care: A rapid review by Laura Bennett-Poynter, Sridevi Kundurthi, Reena Besa, Dan W. Joyce, Andrey Kormilitzin, Nelson Shen, James Sunwoo, Patrycja Szkudlarek, Lydia Sequiera, Laura Sikstrom

    Published 2025-02-01
    “…The primary aim of this study is to identify considerations for the collection and use of digital health data for suicide prevention and care. …”
    Get full text
    Article
  4. 944

    Global trends of big data analytics in health research: a bibliometric study by Li Yao, Li Yao, Yan Liu, Tingrui Wang, Chunyan Han, Qiaoxing Li, Qinqin Li, Xiaoli You, Tingting Ren, Yinhua Wang

    Published 2025-07-01
    “…Co-occurrence word analysis identified six key research areas: (1) the application of big data analytics in health decision-making; (2) challenges in the technological management of health and medical big data; (3) integration of machine learning with health monitoring; (4) privacy and ethical issues in health and medical big data; (5) data integration in precision medicine; and (6) the use of big data in disease management and risk assessment. …”
    Get full text
    Article
  5. 945

    Data Mining Techniques for Predictive Maintenance in Manufacturing Industries a Comprehensive Review by Chinthamu Narender, Ashish, P Mathiyalagan, B Devananda Rao, S Kannadhasan, M Suganya

    Published 2025-01-01
    “…Predictive maintenance (PdM) is one of the major methods used in modern manufacturing to realize downtime minimization, lower the cost of maintenance and maximize machine service life by analyzing the collected data using data mining methodologies. …”
    Get full text
    Article
  6. 946

    Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives by Inam Ullah, Deepak Adhikari, Xin Su, Francesco Palmieri, Celimuge Wu, Chang Choi

    Published 2025-04-01
    “…Extensive insights into IoT data security, privacy, and challenges are visualized in the context of data science for IoT. …”
    Get full text
    Article
  7. 947

    CHALLENGES AND OPPORTUNITIES IN THE IMPLEMENTATION OF BIG DATA ANALYTICS IN MANAGEMENT INFORMATION SYSTEMS IN BANGLADESH by Golam Mustafa, MD. Nurullah Rabbani, Avishek Nath, Md Mehedi Hasan Emon

    Published 2023-11-01
    “…The findings reveal that organizations in Bangladesh encounter challenges related to limited technological infrastructure, data security and privacy concerns, skill shortages, and regulatory complexities. …”
    Get full text
    Article
  8. 948

    Big data applications in intelligent transport systems: a bibliometric analysis and review by Mahbub Hassan, Hridoy Deb Mahin, Abdullah Al Nafees, Arpita Paul, Saikat Sarkar Shraban

    Published 2025-03-01
    “…We found that ethical, privacy, and security concerns related to the use of Big Data in ITS have received limited attention. …”
    Get full text
    Article
  9. 949

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  10. 950

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  11. 951

    A collaborative data storage with incentive mechanism for blockchain-based IoV by Quan Shi, Lankai Wang, Chen Chen

    Published 2025-05-01
    “…As the volume of data in the Internet of Vehicles (IoV) continues to grow, challenges such as insufficient storage capacity and potential privacy breaches become more pronounced. …”
    Get full text
    Article
  12. 952

    Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images by Jiang-Yi Lin, Ching-Chun Chang, Chin-Chen Chang, Chin-Feng Lee

    Published 2025-01-01
    “…Reversible data hiding in encrypted images (RDHEI) is a technique that not only allows the cover images can be fully restored without any loss of information after the embedded data has been extracted but also ensures the confidentiality within the cover images. …”
    Get full text
    Article
  13. 953

    A smart grid data sharing scheme supporting policy update and traceability by Xiaodong Yang, Ke Yao, Songyu Li, Xiaoni Du, Caifen Wang

    Published 2025-07-01
    “…Finally, the analysis results show that this scheme can protect the privacy of smart grid data, verify the integrity of smart grid data, resist collusion attacks and track the identity of malicious users who leak private keys, and its efficiency is better than similar data sharing schemes.…”
    Get full text
    Article
  14. 954

    Gradual Geometry-Guided Knowledge Distillation for Source-Data-Free Domain Adaptation by Yangkuiyi Zhang, Song Tang

    Published 2025-04-01
    “…Due to access to the source data during the transfer phase, conventional domain adaptation works have recently raised safety and privacy concerns. …”
    Get full text
    Article
  15. 955

    Bibliometric mapping of data science in education: Trends, benefits, challenges, and future directions by Muhammad Aizri Fadillah, Syafrijon, Sulandari, Febry Azmiana Siregar, Usmeldi

    Published 2025-01-01
    “…Co-occurrence analysis reveals three main clusters: DS approaches, student interactions with learning, and data analysis techniques. This study identifies key research trends and challenges, including limited infrastructure, skills gaps among educators, and privacy concerns, while addressing gaps in the literature regarding the long-term impact and contextualization of DS in education. …”
    Get full text
    Article
  16. 956

    The Adoption of Virtual Fitting Rooms in Iranian Sportswear Industries: A Mixed-Methods Study Based on TAM Model by Seyyed Iman Ghaffarisadr, Farzad Nobakht Sareban

    Published 2024-02-01
    “…Structural equation modelling was used to test the hypotheses. SMART PLS and SPSS 23 software were used for data analysis.Findings: The results supported the positive effect of the factors perceived ease of use, perceived usefulness, perceived enjoyment, and fashion leadership, as well as the negative impact of technology anxiety on adopting this technology. …”
    Get full text
    Article
  17. 957

    Analysis of the Obstacles to Ethical Use of Artificial Intelligence by Abbas Shoul, Mohammad Amini, Fatemeh Arabpour

    Published 2025-05-01
    “…Results: The results show that among the 6 identified barriers (lack of accountability, lack of transparency, lack of legal regulations, possibility of bias and discrimination, violation of data privacy, and violation of social justice and livelihood of individuals), the barrier of lack of transparency, followed by the lack of legal regulations, are considered to be the most important and influential barriers to the ethical use of AI. …”
    Get full text
    Article
  18. 958

    The Use of Blockchain Technology in the Food Traceability System by Cecilia Rasetto

    Published 2025-07-01
    “…To make just a few examples, the more relevant legal issues are related to data validation, storage, cyber security, and privacy. …”
    Get full text
    Article
  19. 959

    Patients’ perspective about synchronous teleconsultation with a general practitioner: a mixed-method systematic literature review by Gabin F. Morillon, Marlène Guillon, Maude Laberge, Alphonse Sowanou, Thomas G. Poder

    Published 2025-08-01
    “…Patient characteristics, including age, socioeconomic status, and technology familiarity, impact acceptance. Privacy concerns, data security, and diagnostic accuracy remain significant barriers. …”
    Get full text
    Article
  20. 960

    Digital evidence and its use for criminal proceedings by Jakub Matis

    Published 2025-07-01
    “…By examining these aspects, the paper contributes to a deeper understanding of how digital evidence is utilized in criminal investigations and legal proceedings, advocating for legislative updates to address the growing importance of digital data in modern criminal cases. Furthermore, it underscores the need for careful consideration of privacy rights and proportionality when dealing with personal information obtained from digital devices and online platforms. …”
    Get full text
    Article