Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 1,881 - 1,900 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 1881

    Decentralized Distributed Sequential Neural Networks Inference on Low-Power Microcontrollers in Wireless Sensor Networks: A Predictive Maintenance Case Study by Yernazar Bolat, Iain Murray, Yifei Ren, Nasim Ferdosian

    Published 2025-07-01
    “…The growing adoption of IoT applications has led to increased use of low-power microcontroller units (MCUs) for energy-efficient, local data processing. …”
    Get full text
    Article
  2. 1882

    Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences by Mohamed H. Shahin, Srijib Goswami, Sebastian Lobentanzer, Brian W. Corrigan

    Published 2025-03-01
    “…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
    Get full text
    Article
  3. 1883

    Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers by Idham Qrida Nusa, Bambang Sugiri, Yuliati Yuliati, Faizin Sulistio

    Published 2025-06-01
    “…The analysis highlights the use of cloud storage as a media to store the proceeds of crime, in the form of data privacy. …”
    Get full text
    Article
  4. 1884

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى by د. مها أحمد ابراهیم

    Published 2019-10-01
    “…The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. …”
    Get full text
    Article
  5. 1885

    Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty by Yanchen Wang, Lisa Singh

    Published 2025-03-01
    “…One approach to improve trustworthiness and fairness in AI systems is to use bias mitigation algorithms. However, most bias mitigation algorithms require data sets that contain sensitive attribute values to assess the fairness of the algorithm. …”
    Get full text
    Article
  6. 1886

    Algorithms weighing lives and freedoms: The case of China’s health code by Ina Virtosu, Chen Li

    Published 2023-03-01
    “…Digital contact tracing has attracted enormous interest among academics and legislators since the outbreak of COVID-19, which resulted in several policy papers and research works, discussing issues, such as the effectiveness and accuracy of virus detection, as well concerns in regard to discrimination and data privacy. However, most of the articles refers to technologies and its implications in the West, and less to the peculiarities and problems related to the use of Chinese health code. …”
    Get full text
    Article
  7. 1887

    Bridging the Gap between Neuroarchitecture, Artificial Intelligence, and Sustainability: A Systematic Review of Mental Health in the Built Environment by Esraa Elazab, Ahmed ELtawil

    Published 2025-09-01
    “…Ethical considerations related to data privacy and consent are also discussed, providing a comprehensive understanding of the potential and challenges in designing AI-driven neuroarchitecture-sustainable adaptive designs.…”
    Get full text
    Article
  8. 1888

    Healthcare professionals and the public sentiment analysis of ChatGPT in clinical practice by Lizhen Lu, Yueli Zhu, Jiekai Yang, Yuting Yang, Junwei Ye, Shanshan Ai, Qi Zhou

    Published 2025-01-01
    “…This study was divided into five steps: data collection, data cleaning, validation of relevance, sentiment analysis, and content analysis using the K-means algorithm. …”
    Get full text
    Article
  9. 1889

    Investigating Online Psychotherapy in the Framework of Ethical Codes by Gamze Şen Pakyürek, Burcu Korkmaz Yayın

    Published 2023-04-01
    “…The ways people communicate and interact have been changing over time as a result of the increasingly widespread developments and changes in technology. The use of the Internet, which has become an inevitable part of human life, increasingly raises the question of whether psychotherapy can be performed over the Internet. …”
    Get full text
    Article
  10. 1890

    The Dynamics of Regional Head Elections in the Digital Era in Indonesia: The Perspective of First-Time Voters by Mulyadi Dedi, Putri Kayla Andini, Aulia Salsabila Hadi, Akbar Rivaldi Aka, Mawardi Muhamad Fahri, Garnita Camiliya Fakhriyah

    Published 2025-06-01
    “…However, on the other hand, the use of social media in political campaigns faces several challenges, including the spread of disinformation, manipulation of opinions by buzzers and influencers, and potential violations of user data privacy. …”
    Get full text
    Article
  11. 1891

    THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA by Kasim Tatić, Zijad Džafić, Mahir Haračić, Merima Haračić

    Published 2020-05-01
    “… The effective use of cloud technology eliminates the barriers and potential IT obstacles that companies face by using a traditional way of developing a platform for the information systems, as a backbone of modern business. …”
    Get full text
    Article
  12. 1892

    Digital technologies in education: the view of medical students by A. G. Zabolotniy, M. E. Mirgorodskaya, A. O. Moskalenko, A. I. Loseva

    Published 2025-07-01
    “…Despite the overall positive perception, the study identified existing problems, such as a lack of practical skills, data privacy issues, and decreased concentration.Conclusion. …”
    Get full text
    Article
  13. 1893

    User and Provider Experiences With Health Education Chatbots: Qualitative Systematic Review by Кyung-Eun (Anna) Choi, Sebastian Fitzek

    Published 2025-06-01
    “…For RQ2, accessibility and ease of use emerged as facilitators, whereas trust deficits, technical glitches, and cultural misalignment were key barriers. …”
    Get full text
    Article
  14. 1894

    Digital insurance acceptance among older adults in the context of AI by Poorna Chandran K. R., Deepa Ittimani Tholath

    Published 2025-06-01
    “…This exploratory study employed the insights of the Technology Acceptance Model (TAM), the Information System Continuance Model (ISCM), and the Customer Satisfaction (C-SAT) method. Data were collected by conducting interviews in September 2024 with 20 older adults using AI-powered insurance services. …”
    Get full text
    Article
  15. 1895

    Micro, Small and Medium-sized Enterprises in the Digital Economy: Barriers to Digitalisation by Grażyna Węgrzyn

    Published 2025-06-01
    “…Implications / Recommendations: There is a need for education and support of digital competences, as well as to increase awareness among the owners of small firms as to the benefits digitalisation promises. At the same time, data and privacy must be protected in order to encourage entrepreneurs to safely implement digital solutions. …”
    Get full text
    Article
  16. 1896

    Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic by Ge Mengmeng, Feng Ruitao, Liu Likun, Yu Xiangzhan, Sachidananda Vinay, Xie Xiaofei, Liu Yang

    Published 2025-04-01
    “…The efficacy of our approach was evaluated using a substantial volume of real network traffic data. …”
    Get full text
    Article
  17. 1897

    Energy-aware federated learning for secure edge computing in 5G-enabled IoT networks by Milad Rahmati

    Published 2025-05-01
    “…Abstract The rapid expansion of 5G-enabled IoT networks has intensified the need for efficient, secure, and privacy-preserving machine learning models that can operate in decentralized edge environments. …”
    Get full text
    Article
  18. 1898

    A framework reforming personalized Internet of Things by federated meta-learning by Linlin You, Zihan Guo, Chau Yuen, Calvin Yu-Chian Chen, Yan Zhang, H. Vincent Poor

    Published 2025-04-01
    “…However, with the introduction of laws and regulations about data security and privacy protection, centralized solutions, which require data to be collected and processed directly on a central server, become impractical for personalized Internet of Things to train Artificial Intelligence models for a variety of domain-specific scenarios. …”
    Get full text
    Article
  19. 1899

    iScene: An interpretable framework with hierarchical edge services for scene risk identification in 6G internet of vehicles by Wuchang Zhong, Siming Wang, Rong Yu

    Published 2024-12-01
    “…However, the performance of existing risk identification approaches is heavily limited by the imbalanced historical data and the poor model interpretability. Meanwhile, the large processing delay and the potential privacy leakage threat also restrict their application. …”
    Get full text
    Article
  20. 1900

    Feasibility of a computerized clinical decision support system delivered via a socially assistive robot during grand rounds: A pilot study by Valentino Šafran, Urška Smrke, Bojan Ilijevec, Samo Horvat, Vojko Flis, Nejc Plohl, Izidor Mlakar

    Published 2025-04-01
    “…Background Adopting Clinical Decision Support Systems in healthcare faces challenges such as complexity, poor integration with workflows, and concerns about data privacy and quality. Issues such as too many alerts, confusing errors, and difficulty using the technology in front of patients make adoption challenging and prevent it from fitting into daily workflows. …”
    Get full text
    Article