Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1321
Artificial intelligence methods used in various aquaculture applications: A systematic literature review
Published 2025-02-01“…However, the review also uncovered substantial challenges that will continue limiting widespread adoption, including restricted access to representative data, prohibitive expenses, technical complexities, lack of social acceptance, and data privacy and security concerns. …”
Get full text
Article -
1322
Key challenges of launching national cryptocurrencies using extended FMEA under uncertainty environment
Published 2025-03-01Get full text
Article -
1323
Scientific Evidence for Clinical Text Summarization Using Large Language Models: Scoping Review
Published 2025-05-01“…ResultsA total of 30 original studies were included in the analysis. All used observational retrospective designs, mainly using real patient data (n=28, 93%). …”
Get full text
Article -
1324
Enhancing Internet of Things security in healthcare using a blockchain-driven lightweight hashing system
Published 2025-05-01Get full text
Article -
1325
Product Engagement Detection Using Multi-Camera 3D Skeleton Reconstruction and Gaze Estimation
Published 2025-05-01Get full text
Article -
1326
Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator
Published 2024-01-01“…Scalability, resource limitations, and privacy concerns are analyzed as IoT devices handle sensitive information, and the transparent and immutable nature of blockchain can raise data protection. …”
Get full text
Article -
1327
A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features
Published 2025-01-01“…The system dissects video inputs into frames to extract features comprehensively by using Multi Test Convolutional Networks (MTCNN). …”
Get full text
Article -
1328
Standardized patient profile review using large language models for case adjudication in observational research
Published 2025-01-01“…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
Get full text
Article -
1329
Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study
Published 2025-01-01“…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
Get full text
Article -
1330
Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing
Published 2025-01-01“…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
Get full text
Article -
1331
Client aware adaptive federated learning using UCB-based reinforcement for people re-identification
Published 2025-05-01“…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
Get full text
Article -
1332
Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method
Published 2019-05-01“…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
Get full text
Article -
1333
A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation
Published 2025-12-01“…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
Get full text
Article -
1334
Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain
Published 2025-07-01“…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
Get full text
Article -
1335
GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor
Published 2025-01-01“…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
Get full text
Article -
1336
Nuclei segmentation and classification from histopathology images using federated learning for end-edge platform.
Published 2025-01-01“…To protect data privacy, the framework employs a FedAvg-based federated learning scheme, enabling decentralized training without exposing sensitive data. …”
Get full text
Article -
1337
Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment
Published 2020-03-01“…This article proposes a method for partially encrypting private information in images using FF1 and FF3-1. The proposed method encrypts private information without increasing the data size, solving the problem of wasted storage space. …”
Get full text
Article -
1338
Federated Learning-Based State of Charge Estimation in Electric Vehicles Using Federated Adaptive Client Momentum
Published 2025-01-01“…The proposed method is initially validated via experimental results using the collected data from Musoshi L5 type EV. …”
Get full text
Article -
1339
Monitoring oral health remotely: ethical considerations when using AI among vulnerable populations
Published 2025-04-01Get full text
Article -
1340
A framework for systematically applying humanistic ethics when using AI as a design material
Published 2019-07-01“…Because AI-supported and autonomous decision making has the potential for widespread negative personal, social, and environmental effects, we aim to take a proactive stance to uphold human rights, respect individuals’ privacy, protect personal data, and enable freedom of expression and equality. …”
Get full text
Article