Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1921
SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
Published 2024-12-01“…Our research aims to improve data privacy and reduce communication costs. Furthermore, we also address weaknesses in decentralized learning systems, like Sybil and Model Poisoning attacks. …”
Get full text
Article -
1922
Mathematical Modeling of Multiattack Behavior Discrimination in the WSN Based on Incidence Matrix
Published 2022-01-01“…The WSN node model is used to collect relevant data and mark and map the disguised data, so as to determine the characteristics of multiattack behavior and establish the WSN multiattack behavior discrimination model based on the incidence matrix. …”
Get full text
Article -
1923
Studies on Artificial Intelligence’s Effect on the Employment Market in the Future
Published 2024-01-01“…At the same time, the application of AI also raises concerns about privacy, data security, and ethical issues, all of which need to be considered in the development of the job market. …”
Get full text
Article -
1924
Understanding customer loyalty in digital services: insights from food delivery in emerging markets
Published 2025-07-01“…Trustworthiness has emerged as particularly influential due to concerns over data privacy, while service quality and convenience are crucial in shaping user satisfaction and loyalty.…”
Get full text
Article -
1925
A Novel Raster Map Exchange Scheme Based on Visual Cryptography
Published 2021-01-01“…Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task. …”
Get full text
Article -
1926
Human-machine in the vortex of digital synergy
Published 2025-05-01“…Using data from 1232 respondents (aged 15+), collected via a quota-based online survey from April 8 to April 26, 2024, logistic regression analyses investigated two key questions: (1) Does increased use of virtual assistants correlate with a higher likelihood of ChatGPT adoption? …”
Get full text
Article -
1927
Antecedents of trust in online environment: A case of Pakistan
Published 2016-03-01“…SPSS was used to analyze the data and three techniques descriptive statistics, regression analysis and correlation analysis are applied. …”
Get full text
Article -
1928
A lightweight authentication and key agreement scheme for smart grid
Published 2017-02-01“…The security of advanced metering infrastructure is special importance for smart grid. In order to achieve data confidentiality, privacy, and authentication in advanced metering infrastructure, a lightweight authentication and key agreement scheme is proposed in this article. …”
Get full text
Article -
1929
The Potential for Large Language Models to Transform Cardiovascular Medicine (Russian Translation)
Published 2025-02-01“…Potential risks, such as loss of data privacy or potential diagnostic errors, should be addressed before use in clinical practice. …”
Get full text
Article -
1930
Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications
Published 2025-02-01“…The policymaker's and enterprises' focus and actionable intervention are necessary for developing mechanisms to solve the barriers of regulatory compliance, lack of skilled manpower, data security, privacy issues, and upfront investment for entrepreneurial success.…”
Get full text
Article -
1931
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection
Published 2025-01-01“…The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity theft, and potential legal liabilities. …”
Get full text
Article -
1932
Labor companionship utilization and healthcare providers perceptions in Gondar public health facilities: a mixed method study
Published 2025-08-01“…Data were transcribed, translated, and thematically analyzed by using open code software 4.03. …”
Get full text
Article -
1933
eHealth Technology: What Do We Know and What do We Need to Learn
Published 2021-06-01“…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
Get full text
Article -
1934
Federated Learning for Predicting Major Postoperative Complications
Published 2025-06-01“…To develop a robust model to accurately predict the risk of postoperative complications using clinical data from multiple institutions while ensuring data privacy. …”
Get full text
Article -
1935
Research Progress on Ambient Visual Information Analysis and Perception Measurement Methods for Motion Vision
Published 2025-05-01“…Despite the promising applications of machine learning in subjective perception research, challenges such as data annotation difficulties, context dependence, and privacy concerns still persist.ConclusionThe research demonstrates the advantages of using panoramic images in capturing comprehensive visual information in both static and dynamic environments, offering a more accurate representation of spatial relationships and overcoming traditional limitations. …”
Get full text
Article -
1936
Force majeure impact on citizen science: Perspective from an EU funded project [version 2; peer review: 1 approved, 2 approved with reservations]
Published 2025-05-01“…The acquisition of practical skills by these individuals enabled investigations of websites they visited and apps they used to record third-party cookies or third-party requests for personal data. …”
Get full text
Article -
1937
Force majeure impact on citizen science: Perspective from an EU funded project [version 1; peer review: 1 approved, 2 approved with reservations]
Published 2025-03-01“…The acquisition of practical skills by these individuals enabled investigations of websites they visited and apps they used to record third-party cookies or third-party requests for personal data. …”
Get full text
Article -
1938
Nurses’ perspectives on AI-Enabled wearable health technologies: opportunities and challenges in clinical practice
Published 2025-07-01“…However, concerns regarding data privacy, accuracy, cost, and reduced human interaction persist. …”
Get full text
Article -
1939
Health Information Exchange Usage in Japan: Content Analysis of Audit Logs
Published 2025-05-01“…ObjectiveThis study aimed to identify the types of medical data that are frequently viewed on demand using HIEs in Japan. …”
Get full text
Article -
1940
Decentralized Biobanking Apps for Patient Tracking of Biospecimen Research: Real-World Usability and Feasibility Study
Published 2025-04-01“… BackgroundBiobank privacy policies strip patient identifiers from donated specimens, undermining transparency, utility, and value for patients, scientists, and society. …”
Get full text
Article