Showing 2,441 - 2,460 results of 2,784 for search '(((( uses OR useddddds) OR used) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.27s Refine Results
  1. 2441

    Society 5.0: Shaping the future of e-commerce by Arturs Bernovskis, Deniss Sceulovs, Agnis Stibe

    Published 2024-12-01
    “…While acknowledging the limitations of relying solely on secondary literature, the paper underscores the need for future research to include empirical studies and address challenges like data privacy, the digital divide, and evolving regulatory frameworks within the e-commerce landscape.…”
    Get full text
    Article
  2. 2442

    Unleashing the Potential of Blockchain and Machine Learning: Insights and Emerging Trends From Bibliometric Analysis by Nouhaila El Akrami, Mohamed Hanine, Emmanuel Soriano Flores, Daniel Gavilanes Aray, Imran Ashraf

    Published 2023-01-01
    “…Alternatively, ML is a sub-field of artificial intelligence (AI) that empowers systems to enhance their performance by learning from data. The integration of these data-driven paradigms holds the potential to reinforce data privacy and security, improve data analysis accuracy, and automate complex processes. …”
    Get full text
    Article
  3. 2443

    Federated deep reinforcement learning-based urban traffic signal optimal control by Mi Li, Xiaolong Pan, Chuhui Liu, Zirui Li

    Published 2025-04-01
    “…The proposed method improves the model generalization ability of different local models during global cross-region distributed joint training under the premise of ensuring information security and data privacy, solves the problem of non-independent and homogeneous distribution of environmental data faced by different agents in real intersection scenarios, and significantly accelerates the convergence speed of the model training phase. …”
    Get full text
    Article
  4. 2444

    Parents’ understanding and attitudes toward the application of AI in pediatric healthcare: a cross-sectional survey study by Yan-Dan Huang, Shu-Long Zeng, Jie Lin, Zhi-Peng Mao, Qi-Liang Zhang, Gao-Zhong Feng, Qiong-Xia Ou

    Published 2025-08-01
    “…Most participants (91.1%) believed that AI cannot replace doctors in the future.ConclusionAlthough most parents were aware of the use of AI in pediatric healthcare and recognized its convenience and efficiency, they expressed concerns about accuracy, accountability, and data privacy. …”
    Get full text
    Article
  5. 2445

    Comparison of medical history documentation efficiency and quality based on GPT-4o: a study on the comparison between residents and artificial intelligence by Xiaojing Lu, Xinqi Gao, Xinyi Wang, Zhenye Gong, Jie Cheng, Weiguo Hu, Shaun Wu, Rong Wang, Xiaoyang Li

    Published 2025-05-01
    “…Medical history quality was evaluated by two attending physicians with over 10 years of clinical experience using ten case content criteria. Data were analyzed using paired t-tests and Wilcoxon signed-rank tests, with Kappa coefficients used to assess scoring consistency. …”
    Get full text
    Article
  6. 2446

    Unsupervised person re‐identification based on adaptive information supplementation and foreground enhancement by Qiang Wang, Zhihong Huang, Huijie Fan, Shengpeng Fu, Yandong Tang

    Published 2024-12-01
    “…Abstract Unsupervised person re‐identification has attracted vital interest because of its ability to protect privacy, significantly lower the expense of manual annotation, and eliminate the need for data labels. …”
    Get full text
    Article
  7. 2447

    Audio–Visual Synchronization and Lip Movement Analysis for Real-Time Deepfake Detection by Muhammad Javed, Zhaohui Zhang, Fida Hussain Dahri, Asif Ali Laghari, Martin Krajčík, Ahmad Almadhor

    Published 2025-07-01
    “…By integrating visual and audio features using multimodal fusion techniques, AVSFF aims to distinguish between authentic and manipulated media. …”
    Get full text
    Article
  8. 2448

    SparseBatch: Communication-efficient Federated Learning with Partially Homomorphic Encryption by Chong Wang, Jing Wang, Zheng Lou, Linghai Kong, WeiSong Tao, Yun Wang

    Published 2025-01-01
    “…It operates by aggregating local gradient updates contributed by participating clients, all the while safeguarding the privacy of sensitive data. Industrial FL frameworks employ additively homomorphic encryption (HE) to ensure that local gradient updates are masked during aggregation, guaranteeing no update is revealed. …”
    Get full text
    Article
  9. 2449

    Exploring the promising role of internet of things in urban water systems: a comprehensive global analysis of insights, trends, and research priorities by Shaher Zyoud

    Published 2025-03-01
    “…Most explored areas include water quality monitoring, leak detection, smart metering, and demand management, while challenges in the future lie in data security, privacy, and interoperability. Despite growing research interests, gaps remain in standardization, community engagement, and developing robust IoT architectures. …”
    Get full text
    Article
  10. 2450

    Cross-Room CO<sub>2</sub>-Based Presence Detection for Occupancy Profiling by Jelle Vanhaeverbeke, Emiel Deprost, Steven Verstockt, Sofie van Hoecke

    Published 2025-01-01
    “…The first contribution involves the development of a presence detection model based on CO2 data, which is easy to measure and non-privacy intrusive. …”
    Get full text
    Article
  11. 2451

    Unlocking potential of open source model training in decentralized federated learning environment by Ekaterina Pavlova, Grigorii Melnikov, Yury Yanovich, Alexey Frolov

    Published 2025-06-01
    “…Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. …”
    Get full text
    Article
  12. 2452

    Benchmarking Federated Few-Shot Learning for Video-Based Action Recognition by Nguyen Anh Tu, Nartay Aikyn, Nursultan Makhanov, Assanali Abu, Kok-Seng Wong, Min-Ho Lee

    Published 2024-01-01
    “…This learning approach is particularly useful but challenging due to the limited availability of labeled video data in practice. …”
    Get full text
    Article
  13. 2453

    Knowledge and Views of Patients With Cardiovascular Disease Toward Pharmacogenomics in The United Arab Emirates by Maram O. Abbas, Azhar T. Rahma, Iffat Elbarazi, Bassam R. Ali, George P. Patrinos, Farah Nagy, Alya Osman, Reem K. Alneyadi, Anwar S. Alshamsi, Mohamed Alraqabani, Zeina Al‐Mahayri, Fatma Al‐Maskari

    Published 2025-08-01
    “…Participants were invited via phone calls or in‐person contact at clinics. Data analysis was conducted using SPSS V.29, incorporating descriptive statistics and multivariable logistic regression. …”
    Get full text
    Article
  14. 2454

    Receptiveness to participating in cannabis research in pregnancy: a survey study at The Ottawa Hospital [version 1; peer review: 2 approved] by Kira Bombay, Amy McGee, Christina Cantin, Kathryn M Denize, Malia SQ Murphy, Daniel J Corsi, Mark C Walker, Shi Wu Wen, Ruth Rennicks White

    Published 2021-05-01
    “…In the design of new cohort studies to evaluate the patterns and outcomes of cannabis use in pregnancy, consideration must be given to the factors influencing participation, data sharing, and contribution of biological samples. …”
    Get full text
    Article
  15. 2455

    Blockchain-Enhanced Security for 5G Edge Computing in IoT by Manuel J. C. S. Reis

    Published 2025-04-01
    “…The rapid expansion of 5G networks and edge computing has amplified security challenges in Internet of Things (IoT) environments, including unauthorized access, data tampering, and DDoS attacks. This paper introduces EdgeChainGuard, a hybrid blockchain-based authentication framework designed to secure 5G-enabled IoT systems through decentralized identity management, smart contract-based access control, and AI-driven anomaly detection. …”
    Get full text
    Article
  16. 2456

    Why We Disclose on Social Media? Towards a Dual-Pathway Model by Qiyu Bai, Qi Dan, Yumin Choi, Siyang Luo

    Published 2025-04-01
    “…A moderated mediation model was proposed and tested using cross-sectional survey data collected from 1519 Chinese netizens. …”
    Get full text
    Article
  17. 2457

    Future perspectives on internet of vehicles resource management: digital twin-enabled edge computing frameworks by Jihong Xie, Gui Wu, Xiang Zhou, Shanshan Deng

    Published 2025-07-01
    “…Existing approaches are then discussed and compared using clustering, matching, and offloading approaches. …”
    Get full text
    Article
  18. 2458

    COVID-19 and the implications of social and hospital isolation for older adults by Renata Bezerra de Holanda Bessa, Karla Patrícia Martins Ferreira, Cynthia de Freitas Melo, Letícia Keroly Bezerra Alexandrino, Bianca de Sousa Nogueira

    Published 2025-08-01
    “…Method This is an exploratory, descriptive, and qualitative study conducted with 16 hospitalized older adults, who answered a sociodemographic questionnaire and a guiding question. Data were analyzed through textual analysis using the Interface de R pour les Analyses Multidimensionnelles de Textes et de Questionnaires (IRaMuTeQ) software. …”
    Get full text
    Article
  19. 2459

    Dispute Resolution in Islamic Economic Transactions: The Role and Function of Sharia Arbitration by Gunawan Widjaja

    Published 2025-02-01
    “…This study examines the function and role of Sharia-based arbitration, focusing on its alignment with the values of justice, efficiency, and confidentiality within Islamic law. Using a literature-based methodology, the research analyzes secondary data from legal sources and previous studies on Sharia arbitration in Indonesia, particularly the practices of the Sharia Arbitration Body (BASYARNAS-MUI). …”
    Get full text
    Article
  20. 2460

    The Role of Artificial Intelligence in Personalized Medicine: A Computer Science Perspective by Raul Mihai RADULESCU

    Published 2025-05-01
    “… This abstract investigates the role of AI in personalized medicine using a computer science lens that connects the underlying theories with their actual applications. …”
    Get full text
    Article