Showing 1,181 - 1,200 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.18s Refine Results
  1. 1181

    Algorithmic fandom: how generative AI is reshaping sports marketing, fan engagement, and the integrity of sport by Hans Westerbeek

    Published 2025-05-01
    “…The integration of AI in gambling platforms and the commercialisation of fan data raise significant concerns around privacy, consent, and long-term wellbeing. …”
    Get full text
    Article
  2. 1182

    Emotional Design of Interior Spaces: Exploring Challenges and Opportunities by Liang Rui, Muhammad Firzan

    Published 2025-01-01
    “…For this purpose, the data is gathered in two phases. In phase I, semi-structured interviews were utilized to collect data from 5 interior designers. …”
    Get full text
    Article
  3. 1183

    Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing by Sijjad Ali, Shuaib Ahmed Wadho, Aun Yichiet, Ming Lee Gan, Chen Kang Lee

    Published 2024-09-01
    “…Cloud computing security and data protection are becoming increasingly critical as its use increases. …”
    Get full text
    Article
  4. 1184

    FOCC: A Synthetically Balanced Federated One-Class-Classification for Cyber Threat Intelligence in Software Defined Networking by Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar

    Published 2025-01-01
    “…Federated Learning offers a promising approach for building Cyber Threat Intelligence (CTI) by utilizing cross-domain data in Software Defined Networking (SDN) while addressing privacy concerns. …”
    Get full text
    Article
  5. 1185

    Equipment Fault Diagnosis Method Based on High-efficient Communication Federated Learning by LIU Jing, ZHAO Yichen, LIU Xinghua, WU Youxi, JI Haipeng

    Published 2025-04-01
    “…Federated learning achieves joint training modeling of fault data from various factories while protecting privacy. …”
    Get full text
    Article
  6. 1186

    New discrete memristive hyperchaotic map: modeling, dynamic analysis, and application in image encryption by Fei Yu, Yiya Wu, Xuqi Wang, Ting He, ShanKou Zhang, Jie Jin

    Published 2025-06-01
    “…With the rapid development of information technology, the demand for ensuring data security and privacy protection has become increasingly urgent. …”
    Get full text
    Article
  7. 1187
  8. 1188

    Heartbeat detection and personal authentication using a 60 GHz Doppler sensor by Takuma Asano, Shintaro Izumi, Hiroshi Kawaguchi

    Published 2025-08-01
    “…Unlike fingerprint and facial recognition systems, they offer authentication without physical contact or privacy concerns. This study focuses on non-contact seismocardiography using microwave Doppler sensors and aims to apply this technology for biometric authentication.MethodWe proposed a method for authenticating and identifying heartbeat signals through supervised learning using a conditional variational autoencoder (CVAE). …”
    Get full text
    Article
  9. 1189

    Emotion Estimation Using Noncontact Environmental Sensing with Machine and Deep Learning Models by Tsumugi Isogami, Nobuyoshi Komuro

    Published 2025-01-01
    “…This paper presents a method for estimating arousal and emotional valence levels using non-contact environmental sensing, addressing challenges such as discomfort from long-term device wear and privacy concerns associated with facial image analysis. …”
    Get full text
    Article
  10. 1190

    Using Digital Technology to Conduct COVID-19 Surveillance: A Systematic Review by Fitrisia Rahma, Fatmah Fatmah, Rachmadhi Purwana

    Published 2025-06-01
    “…Unique Contribution: This study emphasises the role of digital technologies in virus detection, monitoring, and prevention as a medium of infectious disease transmission, particularly in contact tracing, symptom monitoring, location tracking, and real-time data management. It highlights the challenges of privacy, data security, and public adoption issues. …”
    Get full text
    Article
  11. 1191

    Applications of blockchain technology in long-term care: use cases, potentials, and barriers by Beate Steurer, Birgit Trukeschitz, Ulrike Schneider

    Published 2024-10-01
    “…Abstract Background Digitalization in long-term care (LTC) is being discussed as a means of easing pressures on care service delivery, optimizing care coordination and planning processes, and improving service quality. With its advanced data protection and process automation features, blockchain technology could help solve data security and privacy issues, especially for the implementation of assistive technologies. …”
    Get full text
    Article
  12. 1192

    Teachers’ digital literacy competencies according to their age status and their level of use in classes by Gökbulut Burak, Yeniasır Mustafa, Gökbulut Özlem Dağlı

    Published 2024-01-01
    “…While the quantitative data collected was statistically analyzed and interpreted, the qualitative data was analyzed using the descriptive analysis technique. …”
    Get full text
    Article
  13. 1193

    Development of an intelligent intrusion detection system for IoT networks using deep learning by Haozhe Zhang

    Published 2025-07-01
    “…However, attack diversity, device heterogeneity, and traditional security limitations necessitate advanced data analysis. Researchers increasingly use deep learning, which excels in handling large-scale data, to develop robust intrusion detection systems. …”
    Get full text
    Article
  14. 1194

    The Use of ChatGPT in English Language Learning: A Systematic Literature Review by Nur Hidayati, Erna Andriyanti, Novasa Adiyani

    Published 2025-03-01
    “…Following PRISMA guidelines, this review analyzes data from Scopus, ERIC, and Google Scholar using thematic analysis to identify key themes. …”
    Get full text
    Article
  15. 1195

    Trends and pattern of contraceptive use among women attending a family planning clinic at a tertiary health facility in Ibadan, Nigeria by A. O. Atoyebi, S. O. Olaoye, M. A. Okunlola, M. E. Palamuleni, A. S. Adebowale

    Published 2025-06-01
    “…Data were analysed using a logistic regression model (α0.05), and thematic analysis was used for the qualitative part of the study. …”
    Get full text
    Article
  16. 1196

    High-fidelity steganography in EEG signals using advanced transform-based methods by Enes Efe

    Published 2025-05-01
    “…The increasing prevalence of digital health solutions and smart health devices (SHDs) ensures the continuity of personal biometric data while simultaneously raising concerns about their security and privacy. …”
    Get full text
    Article
  17. 1197

    Barriers and strategies for recruitment of pregnant women in contemporary longitudinal birth cohort studies by Slawa Rokicki, Amulya Gobburu, Melissa Weidner, Nashwah Azam, Michelle Jansen, Zorimar Rivera-Núñez, Adriana De Resende, Veenat Parmar, Gloria Bachmann, Nancy Reilly, Reynold Panettieri, Maria Gloria Dominguez-Bello, Daniel B. Horton, Martin J. Blaser, Emily S. Barrett

    Published 2025-04-01
    “…Five themes emerged: challenges in committing time and resources to a research study; utility of compensation and resources; fears that research procedures would negatively impact child; concerns regarding data privacy and children's consent; and benefits for their family, community, and society. …”
    Get full text
    Article
  18. 1198
  19. 1199
  20. 1200

    The use of micromobility riding simulators in road safety research: a systematic review by Charitha Dias, Qinaat Hussain, Muhammad Abdullah

    Published 2025-09-01
    “…Collecting real-world and field data involves numerous challenges due to ethical, privacy, and safety concerns. …”
    Get full text
    Article