Search alternatives:
useddds » usedddds (Expand Search)
useddddddddds » usedddddddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
Showing 2,621 - 2,640 results of 2,784 for search '(((( useddds OR useddddddddds) OR usedds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.16s Refine Results
  1. 2621

    Rapid Whole-Genome Sequencing in Critically Ill Infants and Children with Suspected, Undiagnosed Genetic Diseases: Evolution to a First-Tier Clinical Laboratory Test in the Era of... by Rina Kansal

    Published 2025-03-01
    “…Factors that will help to develop rWGS as a clinical test in critically ill infants and the limitations are briefly discussed, including an evaluation of the clinical utility and accessibility of genetic testing, education for parents and providers, cost-effectiveness, ethical challenges, consent issues, secondary findings, data privacy concerns, false-positive and false-negative results, challenges in variant interpretation, costs and reimbursement, the limited availability of genetic counselors, and the development of evidence-based guidelines, which would all need to be addressed to facilitate the implementation of pediatric genomic sequencing in an effective widespread manner in the era of precision medicine.…”
    Get full text
    Article
  2. 2622

    The Impact of AI-Personalized Recommendations on Clicking Intentions: Evidence from Chinese E-Commerce by Jiwang Yin, Xiaodong Qiu, Ya Wang

    Published 2025-02-01
    “…AI-personalized recommendation technology offers more accurate and diverse choices to consumers and increases click-through rates and sales on e-commerce platforms. Yet, data on consumers’ experiences of AI-personalized recommendations and their impact path on clicking intention are scarce. …”
    Get full text
    Article
  3. 2623

    The Role of Evidence-Based Design in Enhancing Architectural Design Process of Healthcare Buildings: A Case Study of General Hospitals in Sulaimani City by Zhekaf Sulaiman Mustafa Hassan 1, a, *, Dr. Fouad Jalal Mahmood 2, a

    Published 2025-04-01
    “…The research utilizes a mixed method in a systematic, multi-phased approach for data collection. This includes qualitative phone interviews, structured questionnaires, and interviews to gather subjective insights from architects working in three offices in Sulaimani City. …”
    Get full text
    Article
  4. 2624

    Transformations in academic work and faculty perceptions of artificial intelligence in higher education by Jorge Buele, Leonel Llerena-Aguirre

    Published 2025-07-01
    “…Additionally, ethical debates are emerging around algorithmic transparency, data privacy, and institutional responsibility. Effective integration in higher education demands not only technical proficiency but also ethical grounding, regulatory support, and critical pedagogical development. …”
    Get full text
    Article
  5. 2625

    FedHSP: A Robust Federated Learning Framework Coherently Addressing Heterogeneity, Security, and Performance Challenges by Divya G. Nair, C. V. Aswartha Narayana, K. Jaideep Reddy, Jyothisha J. Nair

    Published 2025-01-01
    “…Federated Learning (FL) is a machine learning training method that leverages local model gradients instead of accessing private data from individual clients, ensuring privacy. However, the practical implementation of FL faces significant challenges. …”
    Get full text
    Article
  6. 2626

    Integrating Artificial Intelligence into Service Innovation, Business Development, and Legal Compliance: Insights from the Hainan Free Trade Port Era by Yincheng Li, Shumin Wang, Muhammad Bilawal Khaskheli

    Published 2024-10-01
    “…Hypothesis 3 state that HFTP enterprises comply with these laws while systemically assuring, in theory, and practice, the legal risks of artificial intelligence and its implications for legal regulation, which is a significant aspect of research, addressing legal risks related to data privacy, security, and algorithmic bias with many strategies being proposed. …”
    Get full text
    Article
  7. 2627

    Class-Hidden Client-Side Watermarking in Federated Learning by Weitong Chen, Chi Zhang, Wei Zhang, Jie Cai

    Published 2025-01-01
    “…Federated learning consists of a central aggregator and multiple clients, forming a distributed structure that effectively protects data privacy. However, since all participants can access the global model, the risk of model leakage increases, especially when unreliable participants are involved. …”
    Get full text
    Article
  8. 2628

    Machine Learning for Resilient and Sustainable Cities: A Bibliometric Analysis of Smart Urban Technologies by Bin Luan, Xinqun Feng

    Published 2025-03-01
    “…A hotspot analysis revealed that research topics are increasingly diverse and dynamically evolving. Issues such as data privacy, cybersecurity, sustainable development, and intelligent transportation have gradually become focal points, reflecting the dual demand of smart city development for technological innovation and green growth. …”
    Get full text
    Article
  9. 2629

    Multimodal Cancellable Biometric Template Protection and Person Verification in Transformed Domain by Devendra Reddy Rachapalli, Venkatesulu Dondeti, Hemantha Kumar Kalluri

    Published 2024-01-01
    “…Combining biometric features increases system reliability, safety, and user privacy. We used a colorization technique to generate three separate colors Quick Response (QR) codes from a user-defined Red, Green, Blue (RGB) tuple random seed, which we then combined to create a one-way cancellable template. …”
    Get full text
    Article
  10. 2630

    Image-based food monitoring and dietary management for patients living with diabetes: a scoping review of calorie counting applications by Asal Rouhafzay, Asal Rouhafzay, Ghazal Rouhafzay, Jalila Jbilou, Jalila Jbilou

    Published 2025-03-01
    “…However, challenges such as standardization, validation across diverse populations, and data privacy concerns need to be addressed. This review focuses on the role of computer science in dietary intake estimation, specifically food segmentation, classification, and volume estimation for calorie calculation. …”
    Get full text
    Article
  11. 2631

    Navigating the ethical terrain of AI in education: A systematic review on framing responsible human-centered AI practices by Yao Fu, Zhenjie Weng

    Published 2024-12-01
    “…Following the Preferred Reporting Items for Systematic Review and Meta-Analysis (PRISMA) guidelines, we searched Scopus and Web of Science and identified 40 empirical studies that satisfied our inclusion criteria. Specifically, we used four criteria for the screening process: (1) the study's full text was available in English; (2) the study was published before April 10th, 2024 in peer-reviewed journals or conference proceedings; (3) the study was primary research that collected original data and applied qualitative, quantitative, or mixed-methods as the study methodology; and (4) the study had a clear focus on ethical and/or responsible AI in one or multiple educational context(s). …”
    Get full text
    Article
  12. 2632

    A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption by Yuzhou Xi, Yu Ning, Jie Jin, Fei Yu

    Published 2024-12-01
    “…Cryptography ensures secure communication and data privacy, and it has been increasingly applied in healthcare and related areas. …”
    Get full text
    Article
  13. 2633
  14. 2634

    Adaptive Federated Learning With Reinforcement Learning-Based Client Selection for Heterogeneous Environments by Shamim Ahmed, M. Shamim Kaiser, Sudipto Chaki, A. B. M. Shawkat Ali

    Published 2025-01-01
    “…This study introduces an Adaptive Federated Learning (AFL) framework designed to address the challenges of data heterogeneity, resource imbalance, and communication constraints in decentralized learning environments. …”
    Get full text
    Article
  15. 2635

    Development of a Solar-Powered Edge Processing Perimeter Alert System with AI and LoRa/LoRaWAN Integration for Drone Detection and Enhanced Security by Mateo Mejia-Herrera, Juan Botero-Valencia, José Ortega, Ruber Hernández-García

    Published 2025-01-01
    “…The system is powered by a LiPo battery, which is recharged using solar energy. The perimeter alert system offers numerous advantages, including edge processing for enhanced data privacy and reduced latency, integrating multiple sensors for increased accuracy, and a decentralized approach to improving security. …”
    Get full text
    Article
  16. 2636

    Innovations and Technological Advances in Healthcare Remote Monitoring Systems for the Elderly and Vulnerable People: A Scoping Review by Diana Lizet González-Baldovinos, Luis Pastor Sánchez-Fernández, Jose Luis Cano-Rosas, Asdrúbal López-Chau, Pedro Guevara-López

    Published 2025-03-01
    “…To develop robust systems that provide equitable and high-quality healthcare, it is essential to address critical challenges such as data privacy, security, accessibility, and ethical considerations.…”
    Get full text
    Article
  17. 2637

    Accessible viral metagenomics for public health and clinical domains with Jovian by Dennis Schmitz, Florian Zwagemaker, Sam Nooij, Thierry K. S. Janssens, Jeroen Cremer, Robert Verhagen, Harry Vennema, Annelies Kroneman, Marion P. G. Koopmans, Jeroen F. J. Laros, Miranda de Graaf

    Published 2024-10-01
    “…Abstract The integration of next-generation sequencing into clinical diagnostics and surveillance initiatives is impeded by the lack of data analysis pipelines that align with privacy legislation and laboratory certification protocols. …”
    Get full text
    Article
  18. 2638

    Ethical and Legal Challenges of Implementing AI in Science and Math Education in Central Asia by Dilfuza M.Makhmudova, Xilola R. Sharipova, Nosirjon K. Hojiyev, Azamat E.Ergashev, Yulduzknon Kh.Satvaldieva, Khosiyat U.Mamatkulova, Egambergan M. Khudoynazarov

    Published 2025-08-01
    “…Additionally, 64% of respondents expressed serious concerns about student data privacy, while 71% supported the need for formal AI ethics training. …”
    Get full text
    Article
  19. 2639

    Investigating the impact of publicly announced information security breaches on corporate risk factor disclosure tendencies by Sandra J. Cereola, Joanna Dynowska

    Published 2019-01-01
    “…We pay particular attention to organizations that have suffered a data breach, as determined by the Privacy Rights Clearinghouse (PRC). …”
    Get full text
    Article
  20. 2640

    IP SafeGuard–An AI-Driven Malicious IP Detection Framework by Abdullah Al Siam, Moutaz Alazab, Albara Awajan, Md Rakibul Hasan, Areej Obeidat, Nuruzzaman Faruqui

    Published 2025-01-01
    “…The framework collects data from AbuseIPDB, VirusTotal, and other sources to compute a Dynamic Threat Score (DTS) for each IP address. …”
    Get full text
    Article