Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1121
Utilizing Artificial neural networks (ANN) to regulate Smart cities for sustainable Urban Development and Safeguarding Citizen rights
Published 2024-12-01“…However, as cities become increasingly interconnected and data-dependent, concerns related to data privacy and security, as well as citizen participation and representation, have surfaced. …”
Get full text
Article -
1122
Controlled quantum authentication confidential communication protocol for smart healthcare
Published 2025-05-01“…In this process, it is essential to ensure the legal identity of both parties to the communication and to protect patient privacy data from unlawful interception and tampering. …”
Get full text
Article -
1123
A scoping review
Published 2024-11-01“…However, challenges such as data privacy concerns, algorithmic biases, and the need for greater transparency are also noted. …”
Get full text
Article -
1124
This Person Does Exist
Published 2021-07-01“…Finally, I argue that this artistic practice is a legitimate way of opening up a larger public discourse, although artists working with human data must be aware of ethical issues and responsibilities regarding privacy and consent. …”
Get full text
Article -
1125
Challenges in Adopting Artificial Intelligence Technologies in Supply Chain Management in Romanian Companies
Published 2025-03-01“…Key challenges identified include high implementation costs, data quality issues, and ethical concerns related to data privacy and algorithmic transparency. …”
Get full text
Article -
1126
The impact of artificial intelligence on research efficiency
Published 2025-06-01“…However, challenges such as bias in algorithms, concerns about data privacy, and deficiencies in the infrastructure impede wide-scale application. …”
Get full text
Article -
1127
Artificial Intelligence in Thoracic Surgery: Transforming Diagnostics, Treatment, and Patient Outcomes
Published 2025-07-01“…AI-based tools can be employed in medicine, and by extracting useful information from big data, they allow for the early diagnosis of diseases like lung cancer. …”
Get full text
Article -
1128
Medical Photography in Dermatology: Quality and Safety in the Referral Process to Secondary Healthcare
Published 2025-06-01“…<b>Background:</b> Medical photography is widely used in dermatology referrals to secondary healthcare, yet concerns exist regarding image quality and data security. …”
Get full text
Article -
1129
Edge-Assisted Label-Flipping Attack Detection in Federated Learning
Published 2024-01-01“…Federated Learning (FL) has transformed machine learning by facilitating decentralized, privacy-focused data processing. Despite its advantages, FL remains vulnerable to data poisoning attacks, particularly Label-Flipping Attacks (LFA). …”
Get full text
Article -
1130
How do we measure the costs, benefits, and harms of sharing data from biomedical studies? A protocol for a scoping review [version 2; peer review: 2 approved]
Published 2025-01-01“…In this scoping review, we will identify and summarize existing evidence on the positive and negative impacts and costs of data sharing and how they are measured. Methods and analysis Eligible studies will report on qualitative or quantitative approaches for measuring the cost of data sharing or its impact on participant privacy, individual or public health, researcher’s careers, clinical or public health practice, or research or development. …”
Get full text
Article -
1131
Revolutionizing Education: Harnessing Machine Learning and Deep Learning for Digital Examination Transformation
Published 2023-12-01“…Furthermore, substantial concerns revolve around data security and privacy. The digital examination process entails the collection and secure storage of sensitive student data, raising worries about potential data security breaches and violations of privacy. …”
Get full text
Article -
1132
Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence
Published 2024-07-01“…Technical risks include data security vulnerabilities and model bias, while ethical risks focus on the issues surrounding user privacy, misinformation, and intellectual property rights. …”
Get full text
Article -
1133
Enhancing retinal disease diagnosis through AI: Evaluating performance, ethical considerations, and clinical implementation
Published 2024-09-01“…However, several studies highlighted concerns about algorithmic bias, data privacy, and the need for diverse and representative datasets to ensure generalizability across different populations. …”
Get full text
Article -
1134
CogTrack: A Proof of Concept for Cognition Tracker
Published 2024-01-01“…Additionally, we discuss how CogTrack may be advanced in the future and reflect on critical issues related to data privacy, confidentiality, ethics, scalability, and socio-medical factors which influence CogTrack adoption and acceptability. …”
Get full text
Article -
1135
Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ
Published 2024-12-01“… This study aims to analyze and evaluate the vulnerability of Insecure Direct Object Reference (IDOR) in the thesis registration web application at XYZ University, as well as to provide improvement recommendations to enhance the security of students' personal data. The IDOR vulnerability allows unauthorized access to students' personal documents, which can jeopardize privacy and information security. …”
Get full text
Article -
1136
Machine Learning for Human Activity Recognition: State-of-the-Art Techniques and Emerging Trends
Published 2025-03-01Get full text
Article -
1137
Tree-to-Me: Standards-Driven Traceability for Farm-Level Visibility
Published 2025-04-01“…These systems also fail to standardise and integrate diverse data sources, ensure data privacy, and scale effectively to meet the demands of modern agriculture. …”
Get full text
Article -
1138
Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks
Published 2024-01-01“…A significant concern in the field of cloud computing is the security and confidentiality of data. A cryptographic access control technique can be used to guarantee data privacy, which prevents unauthorized access and allows only authorized users to access the data. …”
Get full text
Article -
1139
SimProx: A Similarity-Based Aggregation in Federated Learning With Client Weight Optimization
Published 2024-01-01“…Federated Learning (FL) enables decentralized training of machine learning models across multiple clients, preserving data privacy by aggregating locally trained models without sharing raw data. …”
Get full text
Article -
1140