Showing 1 - 20 results of 45 for search 'context ((perception algorithm) OR (encryption algorithm))', query time: 0.17s Refine Results
  1. 1
  2. 2
  3. 3

    Generative AI and Journalism: Content, Journalistic Perceptions, and Audience Experiences by T.J. Thomson (9015119)

    Published 2025
    “…These biases exist because of human biases embedded in training data and/or the conscious or unconscious biases of those who develop AI algorithms and models. Attempts to algorithmically “force” output diversity by default have failed, sometimes dramatically. …”
  4. 4

    <b>External attribution to economic inequality increases algorithm preference</b> by Xuyao Wu (17257993)

    Published 2025
    “…Future research should attend to potential backfire effects of algorithmic interventions, particularly the risk of undermining individuals’perceptions of fairness in unequal contexts.…”
  5. 5

    Ethics of algorithmic invasiveness in beauty apps: an online experimental survey of public perspectives by Yves Saint James Aquino (12311423)

    Published 2025
    “…In this study, we focus on the concept of algorithmic invasiveness – defined as the tendency of AI algorithms to increasingly influence and integrate into our daily lives. …”
  6. 6

    Number of Topics (Second Image). by Musab Wedyan (21212449)

    Published 2025
    “…Therefore, a critical question arises: can large language models (LLMs), such as GPT-4o, accurately reflect human perceptions of urban environments? This study aims to address this question by comparing GPT-4o's evaluations of visual urban scenes with human perceptions, specifically in the context of urban walkability. …”
  7. 7

    Research Methodology. by Musab Wedyan (21212449)

    Published 2025
    “…Therefore, a critical question arises: can large language models (LLMs), such as GPT-4o, accurately reflect human perceptions of urban environments? This study aims to address this question by comparing GPT-4o's evaluations of visual urban scenes with human perceptions, specifically in the context of urban walkability. …”
  8. 8

    Number of Topics (First Image). by Musab Wedyan (21212449)

    Published 2025
    “…Therefore, a critical question arises: can large language models (LLMs), such as GPT-4o, accurately reflect human perceptions of urban environments? This study aims to address this question by comparing GPT-4o's evaluations of visual urban scenes with human perceptions, specifically in the context of urban walkability. …”
  9. 9
  10. 10

    Comparison table of efficiency and safety. by Zhanfei Ma (12506951)

    Published 2025
    “…Its architectural optimization reduces the number of communication rounds by 40% and simplifies trust negotiation between heterogeneous layers without affecting the integrity of encryption mechanisms. To enhance runtime protection, the designed zero-trust-DRA mechanism also introduces context-aware, time-windowed based re-authentication techniques so as to efficiently defend against risks such as session hijacking and credential leakage. …”
  11. 11

    Comparison table of authentication delay. by Zhanfei Ma (12506951)

    Published 2025
    “…Its architectural optimization reduces the number of communication rounds by 40% and simplifies trust negotiation between heterogeneous layers without affecting the integrity of encryption mechanisms. To enhance runtime protection, the designed zero-trust-DRA mechanism also introduces context-aware, time-windowed based re-authentication techniques so as to efficiently defend against risks such as session hijacking and credential leakage. …”
  12. 12

    Comparison table of authentication delay. by Zhanfei Ma (12506951)

    Published 2025
    “…Its architectural optimization reduces the number of communication rounds by 40% and simplifies trust negotiation between heterogeneous layers without affecting the integrity of encryption mechanisms. To enhance runtime protection, the designed zero-trust-DRA mechanism also introduces context-aware, time-windowed based re-authentication techniques so as to efficiently defend against risks such as session hijacking and credential leakage. …”
  13. 13

    Comparison of total communication costs. by Zhanfei Ma (12506951)

    Published 2025
    “…Its architectural optimization reduces the number of communication rounds by 40% and simplifies trust negotiation between heterogeneous layers without affecting the integrity of encryption mechanisms. To enhance runtime protection, the designed zero-trust-DRA mechanism also introduces context-aware, time-windowed based re-authentication techniques so as to efficiently defend against risks such as session hijacking and credential leakage. …”
  14. 14

    Symbols and descriptions. by Zhanfei Ma (12506951)

    Published 2025
    “…Its architectural optimization reduces the number of communication rounds by 40% and simplifies trust negotiation between heterogeneous layers without affecting the integrity of encryption mechanisms. To enhance runtime protection, the designed zero-trust-DRA mechanism also introduces context-aware, time-windowed based re-authentication techniques so as to efficiently defend against risks such as session hijacking and credential leakage. …”
  15. 15

    The AVISPA model diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Its architectural optimization reduces the number of communication rounds by 40% and simplifies trust negotiation between heterogeneous layers without affecting the integrity of encryption mechanisms. To enhance runtime protection, the designed zero-trust-DRA mechanism also introduces context-aware, time-windowed based re-authentication techniques so as to efficiently defend against risks such as session hijacking and credential leakage. …”
  16. 16

    FMM and multi-layer security strategy diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Its architectural optimization reduces the number of communication rounds by 40% and simplifies trust negotiation between heterogeneous layers without affecting the integrity of encryption mechanisms. To enhance runtime protection, the designed zero-trust-DRA mechanism also introduces context-aware, time-windowed based re-authentication techniques so as to efficiently defend against risks such as session hijacking and credential leakage. …”
  17. 17

    Continuous message window authentication diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Its architectural optimization reduces the number of communication rounds by 40% and simplifies trust negotiation between heterogeneous layers without affecting the integrity of encryption mechanisms. To enhance runtime protection, the designed zero-trust-DRA mechanism also introduces context-aware, time-windowed based re-authentication techniques so as to efficiently defend against risks such as session hijacking and credential leakage. …”
  18. 18

    Vaccines, Public Health, and the Politics of Immunity: Safety, Debate, and Global Perspectives by Minehli Arakelians Gheshlagh (21983870)

    Published 2025
    “…</li><li><b>Social Media, Misinformation, and Public Behavior:</b><br>The essay emphasizes the role of digital platforms in shaping perceptions, showing how political amplification and algorithm-driven content can accelerate the spread of false claims. …”
  19. 19

    Inter-generational perspectives on taxpayer rights in the digitalised tax system by Juanita Venter (17586825)

    Published 2025
    “…Participants were asked about their experiences and perceptions of taxpayer rights in the context of digital tax systems, including eFiling, automated assessments, and online compliance tools.…”
  20. 20