Search alternatives:
useddds » usedddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
Showing 1,281 - 1,300 results of 2,784 for search '(((( useddds OR useddds) OR usedds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.18s Refine Results
  1. 1281

    Artificial intelligence methods used in various aquaculture applications: A systematic literature review by Thurein Aung, Rafiza Abdul Razak, Adibi Rahiman Bin Md Nor

    Published 2025-02-01
    “…However, the review also uncovered substantial challenges that will continue limiting widespread adoption, including restricted access to representative data, prohibitive expenses, technical complexities, lack of social acceptance, and data privacy and security concerns. …”
    Get full text
    Article
  2. 1282
  3. 1283

    Scientific Evidence for Clinical Text Summarization Using Large Language Models: Scoping Review by Lydie Bednarczyk, Daniel Reichenpfader, Christophe Gaudet-Blavignac, Amon Kenna Ette, Jamil Zaghir, Yuanyuan Zheng, Adel Bensahla, Mina Bjelogrlic, Christian Lovis

    Published 2025-05-01
    “…ResultsA total of 30 original studies were included in the analysis. All used observational retrospective designs, mainly using real patient data (n=28, 93%). …”
    Get full text
    Article
  4. 1284

    Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator by David Khoury, Samir Haddad, Patrick Sondi, Gaby Abou Haidar, David Semaan, Jinane Sayah

    Published 2024-01-01
    “…Scalability, resource limitations, and privacy concerns are analyzed as IoT devices handle sensitive information, and the transparent and immutable nature of blockchain can raise data protection. …”
    Get full text
    Article
  5. 1285

    A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features by Fazeel Zafar, Talha Ahmed Khan, Salas Akbar, Muhammad Talha Ubaid, Sameena Javaid, Kushsairy Abdul Kadir

    Published 2025-01-01
    “…The system dissects video inputs into frames to extract features comprehensively by using Multi Test Convolutional Networks (MTCNN). …”
    Get full text
    Article
  6. 1286

    Artificial Intelligence Use in Daily and Professional Life among Pediatric Surgeons in India: A Roadmap for Adoption Based on Online Survey Results by Ankur Mandelia, Vinayak S. Rengan, Alish Rajesh Mehta, Aseesh Varma Vankam, Ramesh Babu, Sumitra Kumar Biswas, Vikesh Agrawal

    Published 2025-05-01
    “…Addressing barriers such as ethical concerns, data privacy, and cost could catalyze AI’s potential to revolutionize pediatric surgical care. …”
    Get full text
    Article
  7. 1287

    How do we measure the costs, benefits, and harms of sharing data from biomedical studies? A protocol for a scoping review [version 2; peer review: 2 approved] by Lauren Maxwell, Ankur Krishnan, Priya Shreedhar

    Published 2025-01-01
    “…In this scoping review, we will identify and summarize existing evidence on the positive and negative impacts and costs of data sharing and how they are measured. Methods and analysis Eligible studies will report on qualitative or quantitative approaches for measuring the cost of data sharing or its impact on participant privacy, individual or public health, researcher’s careers, clinical or public health practice, or research or development. …”
    Get full text
    Article
  8. 1288

    Revolutionizing Education: Harnessing Machine Learning and Deep Learning for Digital Examination Transformation by Shilpi Gautam, Asadi Srinivasulu

    Published 2023-12-01
    “…Furthermore, substantial concerns revolve around data security and privacy. The digital examination process entails the collection and secure storage of sensitive student data, raising worries about potential data security breaches and violations of privacy. …”
    Get full text
    Article
  9. 1289
  10. 1290

    Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence by Jia LIU

    Published 2024-07-01
    “…Technical risks include data security vulnerabilities and model bias, while ethical risks focus on the issues surrounding user privacy, misinformation, and intellectual property rights. …”
    Get full text
    Article
  11. 1291

    Mental Health Classification Using Machine Learning with PCA and Logistics Regression Approaches for Decision Making by Hendra Hendra, Mustafa Mat Deris, Ika Safitri Windiarti

    Published 2025-02-01
    “…Mental health statistics come with numerous challenges, beginning with data integrity. Ensuring data accuracy and reliability is essential, especially if these datasets are to be used for advanced analysis or research. …”
    Get full text
    Article
  12. 1292
  13. 1293
  14. 1294

    CogTrack: A Proof of Concept for Cognition Tracker by Yesoda Bhargava, Kanthi Kumar Kattupalli, Veeky Baths

    Published 2024-01-01
    “…Additionally, we discuss how CogTrack may be advanced in the future and reflect on critical issues related to data privacy, confidentiality, ethics, scalability, and socio-medical factors which influence CogTrack adoption and acceptability. …”
    Get full text
    Article
  15. 1295

    Enhancing retinal disease diagnosis through AI: Evaluating performance, ethical considerations, and clinical implementation by Maryam Fatima, Praveen Pachauri, Wasim Akram, Mohd Parvez, Shadab Ahmad, Zeinebou Yahya

    Published 2024-09-01
    “…However, several studies highlighted concerns about algorithmic bias, data privacy, and the need for diverse and representative datasets to ensure generalizability across different populations. …”
    Get full text
    Article
  16. 1296

    A longitudinal study examining how self-injection social norms are associated with contraceptive self-injectable interest and use in rural Uganda by Erica Sedlander, Nitya Turaga, Catherine Birabwa, Ronald Wasswa, Beth Phillips, Dinah Amongin, Sneha Challa, Sylvie Nano, Betty Kyobe, Agnes Kayego, Peter Waiswa, Kelsey Holt

    Published 2025-06-01
    “…Methods We analyzed two waves of data from rural Uganda collected as part of the Innovations for Choice and Autonomy (ICAN) cohort study (n = 2,170 women of reproductive age who were not using self-injectable contraception at baseline). …”
    Get full text
    Article
  17. 1297

    Standardized patient profile review using large language models for case adjudication in observational research by Martijn J. Schuemie, Anna Ostropolets, Aleh Zhuk, Uladzislau Korsik, Seung In Seo, Marc A. Suchard, George Hripcsak, Patrick B. Ryan

    Published 2025-01-01
    “…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
    Get full text
    Article
  18. 1298

    Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study by Muhammad Shah, Shimee Shahzadi, Shehzad Akbar Khan

    Published 2025-01-01
    “…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
    Get full text
    Article
  19. 1299

    Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing by Prashanth Choppara, S. Sudheer Mangalampalli

    Published 2025-01-01
    “…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
    Get full text
    Article
  20. 1300

    Client aware adaptive federated learning using UCB-based reinforcement for people re-identification by Dinah Waref, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El Ghany, Mohammed A.-M. Salem

    Published 2025-05-01
    “…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
    Get full text
    Article