Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 2,261 - 2,280 results of 2,784 for search '(((( useddds OR usedddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.18s Refine Results
  1. 2261

    Artificial intelligence in intelligent transportation systems by Leila Zemmouchi-Ghomari

    Published 2025-04-01
    “…Nonetheless, issues like data quality, real-time processing, security, public acceptability, and privacy concerns need resolution. …”
    Get full text
    Article
  2. 2262
  3. 2263

    Modern Trends in the Digitalization of Higher Physical Education in China by Chen RUI

    Published 2025-03-01
    “…Additionally, the study emphasizes the need for educator training and professional development, as many physical education teachers lack digital literacy or are resistant to new technologies. Data privacy and security issues are another significant challenge, particularly with the collection and use of personal and health data from wearable devices and online platforms. …”
    Get full text
    Article
  4. 2264

    AIoT: a taxonomy, review and future directions by Jiyi WU, Wenjuan LI, Jian CAO, Shiyou QIAN, Qifei ZHANG, Rajkumar BUYYA

    Published 2021-08-01
    “…AIoT (artificial intelligence of things) is an integrated product of artificial intelligence (AI) and internet of things (IoT).Currently, it has been widely used in smart cities, smart homes, smart manufacturing, and driverless.However, the research of AIoT is still in its infancy, facing with many problems and challenges.In order to clarify the concept and provide possible solutions, a comprehensive survey was carried out on AIoT.Firstly, a clear definition of AIoT was provided, along with the brief introduction on its background and application scenarios.And then a novel cloud-edge-end hybrid AIoT architecture for intelligent information processing was constructed.Based on the research framework of AIoT, the research status and solutions were discussed, including AI integrated IoT data acquisition, complex event processing and coordination, cloud-edge-end integration, AI-enhanced IoT security and privacy, and AI-based applications, etc.Finally, it identified the open challenges and offers future research directions.…”
    Get full text
    Article
  5. 2265

    Considering the ethical aspects of artificial intelligence application from the consumer perspective by Jovanka Vukmirović, Lola Maričić, Selena Stanojevic, Aleksandra Vukmirović, Ivan Mandić

    Published 2025-01-01
    “…Artificial intelligence (AI) uses large datasets to "train" algorithms that make autonomous decisions, leading to significant changes across fields, including digital marketing and personalized advertising. …”
    Get full text
    Article
  6. 2266

    Doctrina: Blockchain 5.0 for Artificial Intelligence by Khikmatullo Tulkinbekov, Deok-Hwan Kim

    Published 2025-05-01
    “…Compared to the existing approaches, Doctrina allows sharing and using AI services in a fully distributed and privacy-preserved manner.…”
    Get full text
    Article
  7. 2267

    Current Status, Key Issues and Development Trends of DeFi by Wang Jianrui

    Published 2025-01-01
    “…Decentralized Finance (DeFi) has become a transformative force in the financial sector, using blockchain technology to create open, permissionless financial services. …”
    Get full text
    Article
  8. 2268

    Human-centred SME factories: the future of work in SMEs under industry 5.0 by Philani Nduna Zincume, Maria Maier

    Published 2025-06-01
    “…These include regional challenges like data privacy in Europe and skills deficits in South Africa. …”
    Get full text
    Article
  9. 2269

    Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital by Daniel, Nabimanya, Sembatya, Richard, Ambrose, Atuhaire, Phelix, Businge Mbabazi

    Published 2021
    “…The researcher interviewed fifty (50) Interviewees and data was analyzed using NVIVO version 11.The findings revealed that 88% of the total interviewees express the need for their information to be kept secret from untrusted parties while 12% of the total interviewees didn’t express the need for their information secrecy from untrusted parties. …”
    Get full text
    Article
  10. 2270

    Effects of Virtual Care on Patient and Provider Experience of the Clinical Encounter: Qualitative Hermeneutic Study by Graham McCaffrey, Erin Wilson, Lela V Zimmer, Anurag Singh, Steinunn Jonatansdottir, Peter Zimmer, David Snadden, Ian D Graham, Martha MacLeod

    Published 2024-11-01
    “…A total of 17 patients and 10 providers from various disciplines were interviewed by phone as part of a study on health care implementation in the context of a kidney care service in northern British Columbia, Canada. The interview data were analyzed using a hermeneutic approach, which emphasizes careful attention to reported experiences in relation to the relationships and contexts of care. …”
    Get full text
    Article
  11. 2271

    Multicountry research on comprehensive abortion policy implementation in Latin America: a mixed-methods study protocol by Guillermo Carroli, Antonella Lavelanet, Silvina Ramos, Mariana Romero, Rodolfo Gomez Ponce de Leon, Berenise Carroli, Celina Gialdini, Agustina Ramón Michel, Mercedes Vila Ortiz

    Published 2024-01-01
    “…Informed consent will be obtained from participants. Data will be treated with careful attention to protecting privacy and confidentiality. …”
    Get full text
    Article
  12. 2272

    The application of artificial intelligence in insomnia, anxiety, and depression: A bibliometric analysis by Enshi Lu, Di Zhang, Mingguang Han, Shihua Wang, Liyun He

    Published 2025-03-01
    “…However, challenges around data privacy, ethical concerns, and the interpretability of AI models need to be addressed. …”
    Get full text
    Article
  13. 2273

    A Review of Deep Learning Techniques for Leukemia Cancer Classification Based on Blood Smear Images by Rakhmonalieva Farangis Oybek Kizi, Tagne Poupi Theodore Armand, Hee-Cheol Kim

    Published 2025-02-01
    “…Despite these advancements, challenges such as dataset limitations, the lack of model interpretability, and ethical concerns regarding data privacy and bias remain critical barriers to widespread adoption. …”
    Get full text
    Article
  14. 2274

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…This eliminates the need to transmit sensitive binary data, reducing the attack surface and bandwidth usage. …”
    Get full text
    Article
  15. 2275

    Bitcoin Mining in Turkey as an Example of Speculative Entrepreneurship by Ali Osman Uymaz, Ali Rıza Esmen

    Published 2022-10-01
    “…The collected data thus was analyzed and coded thorough thematic analysis. …”
    Get full text
    Article
  16. 2276

    Exploration of the Efficiency of SLM-Enabled Platforms for Everyday Tasks by Volodymyr Rusinov, Nikita Basenko

    Published 2025-04-01
    “…With growing concerns around data privacy and the resource-intensiveness of large models, SLMs present a promising solution for research and applications requiring fast, cost-effective, and locally deployable models. …”
    Get full text
    Article
  17. 2277

    Emotional Factor Recognition and Teaching Strategy Adjustment in Cultural Teaching Supported by Artificial Intelligence by Yu Xiaochen

    Published 2025-01-01
    “…Emotion recognition technology collects students’ facial expressions, speech features, and physiological data, and uses deep learning algorithms to analyze students’ emotional states in real time, providing accurate feedback support for teaching. …”
    Get full text
    Article
  18. 2278

    EXPLORING BIBLIOSHINY FOR MAPPING ARTIFICIAL INTELLIGENCE RESEARCH IN EDUCATION by Hanifah Indah Rahmawati, Zenita Sabitri, Mutiara Nabila Azmi, Danny Meirawan

    Published 2025-05-01
    “… This study critically analyzes the development of artificial intelligence (AI) research in education using a bibliometric approach, leveraging data from 191 Scopus-indexed documents during the 2015-2024 period. …”
    Get full text
    Article
  19. 2279

    Spiking Residual ShuffleNet-Based Intrusion Detection in IoT Environment by Sneha Leela Jacob, H. Parveen Sultana

    Published 2025-01-01
    “…The input data is normalized using Z-score normalization (ZN). …”
    Get full text
    Article
  20. 2280

    Learning analytics in immersive virtual learning environments: a systematic literature review by Lei Tao, Mutlu Cukurova, Yanjie Song

    Published 2025-07-01
    “…However, these areas remain unevenly explored; (2) research has predominantly examined desktop-based immersive VLEs, while fewer studies have explored immersive virtual reality settings such as head-mounted displaysand cave automatic virtual environments; (3) higher education students have been the most frequently studied participants, with fewer studies involving K-12 students and adult learners; (4) most studies have employed data-driven approaches to identify behavioural patterns, but explicit theoretical frameworks have been used less frequently to guide analysis and interpretation; (5) behaviour data remains the most commonly used data type; (6) statistical methods such as regression and ANOVA dominate the analytical approaches, with machine learning and deep learning techniques remaining underutilised; and (7) challenges including technical complexity, data interpretability, privacy concerns, and adoption barriers impact the effectiveness and scalability of LA applications in immersive VLEs. …”
    Get full text
    Article