Showing 2,321 - 2,340 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.18s Refine Results
  1. 2321

    Multicountry research on comprehensive abortion policy implementation in Latin America: a mixed-methods study protocol by Guillermo Carroli, Antonella Lavelanet, Silvina Ramos, Mariana Romero, Rodolfo Gomez Ponce de Leon, Berenise Carroli, Celina Gialdini, Agustina Ramón Michel, Mercedes Vila Ortiz

    Published 2024-01-01
    “…Informed consent will be obtained from participants. Data will be treated with careful attention to protecting privacy and confidentiality. …”
    Get full text
    Article
  2. 2322
  3. 2323
  4. 2324

    From lab to field with machine learning – Bridging the gap for movement analysis in real-world environments: A commentary by Carlo Dindorf, Fabian Horst, Djordje Slijepčević, Bernhard Dumphart, Jonas Dully, Matthias Zeppelzauer, Brian Horsak, Michael Fröhlich

    Published 2024-09-01
    “…Event detection (c) in time series data is the annotation of certain events that are used to extract useful and vital information or to remove unwanted and unnecessary data for further analysis. …”
    Get full text
    Article
  5. 2325

    Decentralized Distributed Sequential Neural Networks Inference on Low-Power Microcontrollers in Wireless Sensor Networks: A Predictive Maintenance Case Study by Yernazar Bolat, Iain Murray, Yifei Ren, Nasim Ferdosian

    Published 2025-07-01
    “…The growing adoption of IoT applications has led to increased use of low-power microcontroller units (MCUs) for energy-efficient, local data processing. …”
    Get full text
    Article
  6. 2326

    Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences by Mohamed H. Shahin, Srijib Goswami, Sebastian Lobentanzer, Brian W. Corrigan

    Published 2025-03-01
    “…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
    Get full text
    Article
  7. 2327

    Audio–Visual Synchronization and Lip Movement Analysis for Real-Time Deepfake Detection by Muhammad Javed, Zhaohui Zhang, Fida Hussain Dahri, Asif Ali Laghari, Martin Krajčík, Ahmad Almadhor

    Published 2025-07-01
    “…This study contributes to the field by providing a robust real-time solution for detecting deepfakes in audio–visual synthetic data, ensuring enhanced detection accuracy and effective generalization across various deepfake manipulations and demographic data.…”
    Get full text
    Article
  8. 2328

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى by د. مها أحمد ابراهیم

    Published 2019-10-01
    “…The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. …”
    Get full text
    Article
  9. 2329

    SparseBatch: Communication-efficient Federated Learning with Partially Homomorphic Encryption by Chong Wang, Jing Wang, Zheng Lou, Linghai Kong, WeiSong Tao, Yun Wang

    Published 2025-01-01
    “…It operates by aggregating local gradient updates contributed by participating clients, all the while safeguarding the privacy of sensitive data. Industrial FL frameworks employ additively homomorphic encryption (HE) to ensure that local gradient updates are masked during aggregation, guaranteeing no update is revealed. …”
    Get full text
    Article
  10. 2330

    Exploring the promising role of internet of things in urban water systems: a comprehensive global analysis of insights, trends, and research priorities by Shaher Zyoud

    Published 2025-03-01
    “…Most explored areas include water quality monitoring, leak detection, smart metering, and demand management, while challenges in the future lie in data security, privacy, and interoperability. Despite growing research interests, gaps remain in standardization, community engagement, and developing robust IoT architectures. …”
    Get full text
    Article
  11. 2331

    Cross-Room CO<sub>2</sub>-Based Presence Detection for Occupancy Profiling by Jelle Vanhaeverbeke, Emiel Deprost, Steven Verstockt, Sofie van Hoecke

    Published 2025-01-01
    “…The first contribution involves the development of a presence detection model based on CO2 data, which is easy to measure and non-privacy intrusive. …”
    Get full text
    Article
  12. 2332

    Bridging the Gap between Neuroarchitecture, Artificial Intelligence, and Sustainability: A Systematic Review of Mental Health in the Built Environment by Esraa Elazab, Ahmed ELtawil

    Published 2025-09-01
    “…Ethical considerations related to data privacy and consent are also discussed, providing a comprehensive understanding of the potential and challenges in designing AI-driven neuroarchitecture-sustainable adaptive designs.…”
    Get full text
    Article
  13. 2333

    Unlocking potential of open source model training in decentralized federated learning environment by Ekaterina Pavlova, Grigorii Melnikov, Yury Yanovich, Alexey Frolov

    Published 2025-06-01
    “…Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. …”
    Get full text
    Article
  14. 2334

    Transformation of Dependent Rights In The Digital Era A Study In Electronic Implementation by Waradatun Nafi’ah, Arofa, Andianita Nur Ilahiyah, Moh Basri, Ahmad Musadad

    Published 2025-03-01
    “…However, in its implementation, there are still various obstacles, such as limited technological infrastructure, low public digital literacy, and challenges in maintaining data security and user privacy. This study uses normative juridical methods, utilizing legal and conceptual approaches to examine the effectiveness of regulations regarding electronic liens. …”
    Get full text
    Article
  15. 2335

    The potential of machine learning in diagnosing neurological and psychiatric diseases: a review by Claudia Ricetti, Luca Carrara, Davide La Torre

    Published 2025-06-01
    “…However, certain challenges persist, including concerns about data quality, patient privacy and the ethical implications of algorithmic decisions. …”
    Get full text
    Article
  16. 2336

    Generalization challenges in video deepfake detection: methods, obstacles, and technological advances by LI Junjie, WANG Jianzong, ZHANG Xulong, QU Xiaoyang

    Published 2025-01-01
    “…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
    Get full text
    Article
  17. 2337

    Blockchain-Enhanced Security for 5G Edge Computing in IoT by Manuel J. C. S. Reis

    Published 2025-04-01
    “…The rapid expansion of 5G networks and edge computing has amplified security challenges in Internet of Things (IoT) environments, including unauthorized access, data tampering, and DDoS attacks. This paper introduces EdgeChainGuard, a hybrid blockchain-based authentication framework designed to secure 5G-enabled IoT systems through decentralized identity management, smart contract-based access control, and AI-driven anomaly detection. …”
    Get full text
    Article
  18. 2338

    Why We Disclose on Social Media? Towards a Dual-Pathway Model by Qiyu Bai, Qi Dan, Yumin Choi, Siyang Luo

    Published 2025-04-01
    “…A moderated mediation model was proposed and tested using cross-sectional survey data collected from 1519 Chinese netizens. …”
    Get full text
    Article
  19. 2339

    Future perspectives on internet of vehicles resource management: digital twin-enabled edge computing frameworks by Jihong Xie, Gui Wu, Xiang Zhou, Shanshan Deng

    Published 2025-07-01
    “…With edge computing, processing data near the source, these technologies significantly lower response time and optimize system performance. …”
    Get full text
    Article
  20. 2340

    COVID-19 and the implications of social and hospital isolation for older adults by Renata Bezerra de Holanda Bessa, Karla Patrícia Martins Ferreira, Cynthia de Freitas Melo, Letícia Keroly Bezerra Alexandrino, Bianca de Sousa Nogueira

    Published 2025-08-01
    “…Method This is an exploratory, descriptive, and qualitative study conducted with 16 hospitalized older adults, who answered a sociodemographic questionnaire and a guiding question. Data were analyzed through textual analysis using the Interface de R pour les Analyses Multidimensionnelles de Textes et de Questionnaires (IRaMuTeQ) software. …”
    Get full text
    Article