Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 2,141 - 2,160 results of 2,784 for search '(((( useddds OR usedddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.14s Refine Results
  1. 2141

    Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies by Abraham Romero, Roberto Hernandez

    Published 2024-09-01
    “…The validation phase demonstrated the model’s efficiency in reducing data redundancy and ensuring the consistency and integrity of policy information. …”
    Get full text
    Article
  2. 2142
  3. 2143

    Revolutionizing Sports: The Role of Wearable Technology and AI in Training and Performance Analysis by Stanisław Dudek, Weronika Koziak, Michalina Makieła, Aleksandra Bętkowska, Agata Kornacka, Wojciech Dudek, Kamila Szostak, Rafał Tomaka, Anna Byra

    Published 2025-03-01
    “…Additionally, AI-driven wearables raise concerns over data security, ethical handling, and equitable access, as high costs limit their use in amateur sports. …”
    Get full text
    Article
  4. 2144

    Advances in Infant Cry Paralinguistic Classification—Methods, Implementation, and Applications: Systematic Review by Geofrey Owino, Bernard Shibwabo

    Published 2025-04-01
    “…ConclusionsThe evolution of infant cry classification methods has progressed from traditional classical statistical methods to machine learning models but with minimal considerations of data privacy, confidentiality, and ultimate deployment to practical use. …”
    Get full text
    Article
  5. 2145

    Influencing Factors and Correlations of User Satisfaction with Mobile Health Applications by SHI Qin, XIE Jing, WU Shang

    Published 2025-01-01
    “…Using the grounded theory, the study extracted factors influencing user satisfaction with mobile health applications by coding the review data. …”
    Get full text
    Article
  6. 2146

    Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting by Bernhard Axmann, Sanket Pujar

    Published 2025-01-01
    “…This research applies a systematic methodology for assessing such software, considering usability, adaptability, cost-effectiveness, and data privacy compliance, specifically tailored to automotive reporting and gives recommendation for software tools.…”
    Get full text
    Article
  7. 2147

    BSLISE directory: innovating global mapping and organization of LIS schools by Tiago Emmanuel Nunes Braga, Josir Cardoso Gomes, Nathaly Cristine Leite Rocha, Fatih Oguz, Chris Cunningham

    Published 2025-03-01
    “…Evolving from the MAP project, the BSLISE directory consolidates and adapts data into a new framework using open-source software. …”
    Get full text
    Article
  8. 2148

    Alternatives to continuous positive airway pressure treatment in sleep apnoeas and hypopnoeas syndrome related to myofunctional and postural reeducation therapy: protocol for a sys... by Montserrat Solera-Martínez, Blanca Notario-Pacheco, Rocio Palomo-Carrión, Marta Maria Guijarro-Herráiz, Natalia María Arias-Palencia, Lidia Lucas- de la Cruz, Beatriz Guijarro-Herráiz, Jose Luis García-Klepzig

    Published 2021-12-01
    “…Finally, several patient-related outcomes, namely sleep quality, quality of life and sleep Apnoeas and Hypoapnoeas Index, will be examined.Ethics and dissemination In this case, ethical approval is not necessary. The data used in the review will be exclusively obtained from published studies, implying there are no privacy concerns. …”
    Get full text
    Article
  9. 2149

    Information Technology in Nursing Practice: A Scoping Review of Assessment Tools for Evaluating Nurses’ Competencies by Cachata D, Costa M, Magalhães T, Lucas P, Gaspar F

    Published 2025-05-01
    “…This has driven the need to develop specific competencies and maintain a balance between ethical aspects, social and legal challenges related to privacy and data security, as well as the challenge of ensuring person-centered care practice. …”
    Get full text
    Article
  10. 2150

    New secure distributed secret sharing scheme of n product by Zhen-hua CHEN, Shun-dong LI, Bao-cang WANG, Ji-liang LI, Xin LIU

    Published 2014-11-01
    “…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
    Get full text
    Article
  11. 2151

    The Impact of Digital Technologies on the Development of Payment Services by A. Y. Chentsov

    Published 2020-10-01
    “…The problems and ways of protecting user identification, data privacy and money safety when using electronic payment services are investigated. …”
    Get full text
    Article
  12. 2152

    Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review by Y Greeshma Vani, Suma B. Chalapathy, Pallavi Pandey, Shailendra K. Sahu, A Ramesh, Jayashree Sajjanar

    Published 2024-12-01
    “…However, issues such as data privacy, dental professional job displacement, and the necessity for thorough validation and regulation to ensure safety and efficacy remain significant concerns.…”
    Get full text
    Article
  13. 2153

    Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption by Min Hou, Yue Wu

    Published 2025-01-01
    “…The participants’ private data are encoded as single photons, which are encrypted using a rotational encryption method. …”
    Get full text
    Article
  14. 2154

    Verifiable Key-Aggregate Searchable Encryption Scheme for Fog-Based Internet of Autonomous Vehicles by Sultan Basudan, Abdulrahman Alamer

    Published 2025-03-01
    “…The fog-based Internet of Autonomous Vehicles (FB-IAV) collects extensive sensing data to enhance its understanding of the environment. …”
    Get full text
    Article
  15. 2155

    AI in Structural Health Monitoring for Infrastructure Maintenance and Safety by Vagelis Plevris, George Papazafeiropoulos

    Published 2024-12-01
    “…We examine seven core areas where AI significantly advances SHM capabilities: (1) data acquisition and sensor networks, highlighting improvements in sensor technology and data collection; (2) data processing and signal analysis, where AI techniques enhance feature extraction and noise reduction; (3) anomaly detection and damage identification using machine learning (ML) and deep learning (DL) for precise diagnostics; (4) predictive maintenance, using AI to optimize maintenance scheduling and prevent failures; (5) reliability and risk assessment, integrating diverse datasets for real-time risk analysis; (6) visual inspection and remote monitoring, showcasing the role of AI-powered drones and imaging systems; and (7) resilient and adaptive infrastructure, where AI enables systems to respond dynamically to changing conditions. …”
    Get full text
    Article
  16. 2156

    Generative AI in higher education: A global perspective of institutional adoption policies and guidelines by Yueqiao Jin, Lixiang Yan, Vanessa Echeverria, Dragan Gašević, Roberto Martinez-Maldonado

    Published 2025-06-01
    “…Despite these efforts, gaps remain in comprehensive policy frameworks, particularly in addressing data privacy concerns and ensuring equitable access to GAI tools. …”
    Get full text
    Article
  17. 2157

    Development of a Digital Platform: A Perspective to Advance Space Telepharmacy by Marlise A dos Santos, Juliana Herbert, Ilaria Cinelli, Jose Antonio L Burmann, Vinicius V Soares, Thais Russomano

    Published 2023-01-01
    “…It has specific service protocols for service standardization, including artificial intelligence, to allow agility in services and escalation. All data is protected by privacy and professional ethics guidelines. …”
    Get full text
    Article
  18. 2158

    Community perceptions of ethics and professionalism of community health workers: a qualitative exploration by Vijayaprasad Gopichandran, Sudharshini Subramaniam, Balasubramanian Palanisamy, Priyadarshini Chidambaram

    Published 2025-04-01
    “…Results The CHWs ensure good quality of services by effective use of mobile phones and by going beyond the call of duty. …”
    Get full text
    Article
  19. 2159

    BACP-LRS: Blockchain and IPFS-based Land Record System by Insaf Boumezbeur, Abdelhalim Benoughidene, Imane Harkat, Farah Boutouatou, Dounia Keddari, Karim Zarour

    Published 2025-01-01
    “…Objective: The purpose of the present work is to propose an architecture for blockchain-based access control for distribution, ensuring information privacy. We take advantage of the benefits of blockchain technology in improving land record management while granting access to electronic data through user permissions. …”
    Get full text
    Article
  20. 2160

    THE IMPACT OF AI ON FUNDAMENTAL HUMAN RIGHTS IN EU COUNTRIES. EXAMINATION OF ACADEMIC STUDIES AND THE POSITIONS OF NON-GOVERNMENTAL ORGANIZATIONS REGARDING THE ETHICAL AND AI LEGAL... by Doina Ljungholm POPESCU, Carmina-Elena TOLBARU

    Published 2025-05-01
    “…In the European Union, the development and use of AI pose significant challenges regarding the protection of fundamental human rights, such as the right to privacy, equality, and access to justice. …”
    Get full text
    Article