Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 2,181 - 2,200 results of 2,784 for search '(((( useddds OR usedddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.13s Refine Results
  1. 2181

    A Self-Sovereign Identity-Based Authentication and Reputation Protocol for IoV Applications by Victor Emanuel Farias da Costa Borges, Alvaro Sobrinho, Danilo F. S. Santos, Angelo Perkusich

    Published 2025-01-01
    “…Key innovations include a lightweight proof of reputation mechanism based on multi-party computation, enabling vehicles to collaboratively assess trustworthiness using recent spatiotemporal data without compromising privacy. …”
    Get full text
    Article
  2. 2182

    Comparison of Machine Learning Methods for Menstrual Cycle Analysis and Prediction by Mutiara Khairunisa, Desak Made Sidantya Amanda Putri, I Gusti Ngurah Lanang Wijayakusuma

    Published 2025-03-01
    “…The findings highlight the potential for improved accuracy in reproductive health tracking, with future research opportunities to incorporate additional variables such as hormonal history and lifestyle factors, as well as a focus on data privacy.…”
    Get full text
    Article
  3. 2183

    Application of Criminal Offenders Misuse of National Identification Numbers for Phone Card Registration in Makassar City by Sri Buyung, Marilang, Ashabul Kahfi

    Published 2024-03-01
    “…The findings indicate that despite the absence of specific laws on starter pack registration, Indonesian citizens are protected by constitutional, administrative, ITE (Information and Electronic Transactions), and personal data protection laws. However, obstacles exist in enforcing criminal offenses related to NIK misuse, including outlet registration by actors lacking buyer identities due to fierce competition and public preference for instant solutions without considering the consequences of using others' NIK for SIM card registration.…”
    Get full text
    Article
  4. 2184

    A Review of Asynchronous Byzantine Consensus Protocols by Zhenyan Ji, Xiao Zhang, Jianghao Hu, Yuan Lu, Jiqiang Liu

    Published 2024-12-01
    “…Blockchain technology can be used in the IoT to ensure the data privacy collected by sensors. …”
    Get full text
    Article
  5. 2185

    Consumption of boutique hotel experiences as revealed by electronic word-of-mouth by Carolina Fiuza Parolin, Ricardo Boeing

    Published 2019-07-01
    “…The research considered prior studies on experiential consumption, as well as publications focused on understanding postmodern individuals. Netnography was used to collect data on – and analyse – post-consumption behaviours boutique hotels. …”
    Get full text
    Article
  6. 2186

    A Comparative Analysis of Artificial Intelligence Regulatory Law in Asia, Europe, and America by Alfiani Francisca Romana Nanik, Santiago Faisal

    Published 2024-01-01
    “…The primary considerations in formulating these regulations include ethical principles, data privacy, algorithmic bias, transparency, explainability, and international collaboration. …”
    Get full text
    Article
  7. 2187

    Updatable Multi-User Dynamic Searchable Encryption Scheme with Bidirectional Verification by Zihao Ling, Bimei Wang

    Published 2025-06-01
    “…The scheme enables secure dynamic data sharing in multi-user scenarios by constructing an index structure using homomorphic message authentication codes and bitmaps. …”
    Get full text
    Article
  8. 2188

    Smart Safety Helmets with Integrated Vision Systems for Industrial Infrastructure Inspection: A Comprehensive Review of VSLAM-Enabled Technologies by Emmanuel A. Merchán-Cruz, Samuel Moveh, Oleksandr Pasha, Reinis Tocelovskis, Alexander Grakovski, Alexander Krainyukov, Nikita Ostrovenecs, Ivans Gercevs, Vladimirs Petrovs

    Published 2025-08-01
    “…This paper compiles numerous industrial use cases, from bridges and tunnels to plants and power facilities, demonstrating significant improvements in inspection efficiency, data quality, and worker safety. …”
    Get full text
    Article
  9. 2189

    LITERATURE REVIEW ON THE DOUBLE-EDGED SWORD OF AI IN MENTAL HEALTH: A DEEP DIVE INTO CHATGPT'S CAPABILITIES AND LIMITATIONS by Paul Arjanto, Feibry Feronika Wiwenly Senduk

    Published 2024-04-01
    “…Key ethical concerns include data privacy and accountability. Conclusion: The study recommends a balanced approach, suggesting ChatGPT as an adjunct rather than a replacement for conventional mental health services. …”
    Get full text
    Article
  10. 2190

    Electroencephalography-Based Brain-Computer Interfaces in Rehabilitation: A Bibliometric Analysis (2013–2023) by Ana Sophia Angulo Medina, Maria Isabel Aguilar Bonilla, Ingrid Daniela Rodríguez Giraldo, John Fernando Montenegro Palacios, Danilo Andrés Cáceres Gutiérrez, Yamil Liscano

    Published 2024-11-01
    “…Ethical considerations, including data privacy, transparency, and equitable access to BCI technologies, must be prioritized to ensure the inclusive development and use of these technologies across diverse socioeconomic groups.…”
    Get full text
    Article
  11. 2191

    Electronic health record in military healthcare systems: A systematic review. by Amir Torab-Miandoab, Mahdi Basiri, Arasb Dabbagh-Moghaddam, Leila Gholamhosseini

    Published 2025-01-01
    “…Current literature on EHR use in military healthcare is lacking and disjointed. …”
    Get full text
    Article
  12. 2192
  13. 2193

    Predictors of Women’s Satisfaction with Hospital-Based Intrapartum Care in Asmara Public Hospitals, Eritrea by Meron Mehari Kifle, Filmon Abraham Ghirmai, Soliana Amanuel Berhe, Winta Sium Tesfay, Yodit Teklemariam Weldegebriel, Zebib Tesfamariam Gebrehiwet

    Published 2017-01-01
    “…The key predictors of satisfaction with intrapartum care were provision of clean bed and beddings (AOR = 18.87, 2.33–15.75), privacy during examinations (AOR = 10.22, 4.86–21.48), using understandable language (AOR = 8.72, 3.57–21.27), showing how to summon for help (AOR = 8.16, 4.30–15.48), showing baby immediately after birth (AOR = 8.14, 2.87–23.07), control of the delivery room (AOR = 6.86, 2.65–17.75), receiving back massage (AOR = 6.43, 3.23–12.81), toilet access and cleanliness (AOR = 6.09, 3.25–11.42), availability of chairs for relatives (AOR = 5.96, 3.14–11.30), allowing parents to stay during labour (AOR = 3.52, 1.299–9.56), and request for permission before any procedure (AOR = 2.39, 1.28–4.46). …”
    Get full text
    Article
  14. 2194

    Integrating Machine Learning and IoT for Effective Plant Disease Management by Bhoi Manjulata, Dubey Ahilya

    Published 2025-01-01
    “…Further, the framework is structured for privacy of data and security using strong encryption and secure access protocols. …”
    Get full text
    Article
  15. 2195

    Advancing sustainability: The impact of emerging technologies in agriculture by Ashoka Gamage, Ruchira Gangahagedara, Shyamantha Subasinghe, Jeewan Gamage, Chamini Guruge, Sera Senaratne, Thevin Randika, Chamila Rathnayake, Zammil Hameed, Terrence Madhujith, Othmane Merah

    Published 2024-12-01
    “…However, it is important to carefully address ethical and socio-economic considerations, including accessibility and data privacy, to manage these effects effectively. …”
    Get full text
    Article
  16. 2196

    The State of Artificial Intelligence and its Prospects in Pakistan's Medical Sector by Rohail Akhtar Habib, Yumna Sattar Khan

    Published 2024-12-01
    “…The rising integration of AI in Pakistani medicine necessitates the evolution of regulatory frameworks to guarantee patient safety, data privacy, and ethical application of AI technologies. …”
    Get full text
    Article
  17. 2197

    Deep Learning dengan Teknik Early Stopping untuk Mendeteksi Malware pada Perangkat IoT by Iwang Moeslem Andika Surya, Triawan Adi Cahyanto, Lutfi Ali Muharom

    Published 2025-02-01
    “…This approach utilizes machine learning techniques and intense learning to identify and mitigate cyber threats. The use of Convolutional Neural Network (CNN) in classifying the IoT-23 dataset with the SMOTE (Synthetic Minority Oversampling Technique) data balancing technique and the Early Stopping function shows high results. …”
    Get full text
    Article
  18. 2198

    Decentralized multi-agent federated and reinforcement learning for smart water management and disaster response by H. Mancy, Naglaa E. Ghannam, Amr Abozeid, Ahmed I. Taloba

    Published 2025-07-01
    “…IoT devices are adopted for sensing and data acquisition, adaptive learning for decision-making, and optimization of energy use among the agents in the system through metaheuristic algorithms. …”
    Get full text
    Article
  19. 2199

    Federated learning for crop yield prediction: A comprehensive review of techniques and applications by Vani Hiremani, Raghavendra M. Devadas, Preethi, R. Sapna, T. Sowmya, Praveen Gujjar, N. Shobha Rani, K.R. Bhavya

    Published 2025-06-01
    “…Federated Learning (FL) as a decentralized approach to machine learning facilitates collaborative model training on different data sources while maintaining privacy—making it highly applicable technology for sensitive agricultural data. …”
    Get full text
    Article
  20. 2200

    Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem by Saša Malešević, Michael Lustenberger, Florian Spychiger

    Published 2020-12-01
    “…Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. …”
    Get full text
    Article