Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
2301
The Impact of Artificial Intelligence (AI) on Students’ Academic Development
Published 2025-03-01“…However, challenges such as over-reliance on AI, diminished critical thinking skills, data privacy risks, and academic dishonesty were also identified. …”
Get full text
Article -
2302
Application progress of artificial intelligence in managing thyroid disease
Published 2025-06-01“…Despite the broad prospects of AI applications, challenges related to data privacy, model interpretability, and clinical applicability remain. …”
Get full text
Article -
2303
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
Published 2025-03-01“…Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. …”
Get full text
Article -
2304
Mapping the landscape of machine learning in chronic disease management: A comprehensive bibliometric study
Published 2025-07-01“…Conclusion ML is rapidly integrating into personalized medicine, real-time monitoring, and multimodal data fusion. However, challenges such as limited collaboration, weak model generalization, and data privacy persist. …”
Get full text
Article -
2305
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
Published 2025-02-01“…IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. …”
Get full text
Article -
2306
Machine learning for post-diploma educational and career guidance: a scoping review in AI-driven decision support systems
Published 2025-05-01“…This scoping review maps the application of ML in post-diploma guidance by examining the types of models used, data sources, reported outcomes, and ethical considerations related to fairness, privacy, and transparency. …”
Get full text
Article -
2307
The Application of Artificial Intelligence in Medical Diagnostics: Implications for Sports Medicine
Published 2025-05-01“…However, their integration into healthcare raises critical ethical concerns related to data privacy, algorithmic bias, and transparency. …”
Get full text
Article -
2308
FedDyH: A Multi-Policy with GA Optimization Framework for Dynamic Heterogeneous Federated Learning
Published 2025-03-01“…Federated learning (FL) is a distributed learning technique that ensures data privacy and has shown significant potential in cross-institutional image analysis. …”
Get full text
Article -
2309
Trusted execution environments for quantum computers
Published 2025-06-01“…The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both. …”
Get full text
Article -
2310
Integrating artificial intelligence in drug discovery and early drug development: a transformative approach
Published 2025-03-01“…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
Get full text
Article -
2311
Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring
Published 2025-02-01“…Unlike complex machine learning models, it offers parsimony in transparency, efficiency, and reproducibility, making it ideal for clinical settings where explainable, data-driven decisions are essential. Methods: A logistic regression model was developed using R to analyze biometric and demographic data from a cross-sectional dataset, including real-world data from public institucions. …”
Get full text
Article -
2312
Federated Online Learning for adaptive load forecasting across decentralized nodes
Published 2025-08-01“…The main drawbacks are twofold: (1) data sharing and transfer results in privacy and security risks, and (2) static models miss opportunities to learn from new data. …”
Get full text
Article -
2313
Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach
Published 2025-07-01“…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
Get full text
Article -
2314
Advances in Infant Cry Paralinguistic Classification—Methods, Implementation, and Applications: Systematic Review
Published 2025-04-01“…ConclusionsThe evolution of infant cry classification methods has progressed from traditional classical statistical methods to machine learning models but with minimal considerations of data privacy, confidentiality, and ultimate deployment to practical use. …”
Get full text
Article -
2315
Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective
Published 2025-06-01“…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
Get full text
Article -
2316
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
Get full text
Article -
2317
The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs):
Published 2025“…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
Get full text
Article -
2318
Leveraging large language models for the deidentification and temporal normalization of sensitive health information in electronic health records
Published 2025-08-01“…Abstract Secondary use of electronic health record notes enhances clinical outcomes and personalized medicine, but risks sensitive health information (SHI) exposure. …”
Get full text
Article -
2319
Influencing Factors and Correlations of User Satisfaction with Mobile Health Applications
Published 2025-01-01“…Using the grounded theory, the study extracted factors influencing user satisfaction with mobile health applications by coding the review data. …”
Get full text
Article -
2320
Revolutionizing Sports: The Role of Wearable Technology and AI in Training and Performance Analysis
Published 2025-03-01“…Additionally, AI-driven wearables raise concerns over data security, ethical handling, and equitable access, as high costs limit their use in amateur sports. …”
Get full text
Article