Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1701
Hybrid pre trained model based feature extraction for enhanced indoor scene classification in federated learning environments
Published 2025-08-01“…This study proposes and implements a novel MultiData model, which integrates DL with Linear Discriminant Analysis (LDA) and Federated Learning (FL) to enhance classification performance while preserving data privacy. …”
Get full text
Article -
1702
FedRecSys: A Federated Learning-Based Recommender System for Concept Drift Adaptation
Published 2025-01-01“…A new field called deep learning can be used to handle large amounts of multidimensional data in different e-commerce platforms. …”
Get full text
Article -
1703
Integrating health equity in artificial intelligence for public health in Canada: a rapid narrative review
Published 2025-03-01“…After conducting title/abstract and full-text screening of articles, and consensus decision on study inclusion, the data extraction process proceeded using an extraction template. …”
Get full text
Article -
1704
Human activity recognition system based on low-cost IoT chip ESP32
Published 2023-06-01“…Human activity recognition widely exists in applications such as sports management and activity classification.The current human activity recognition applications are mainly divided into three types: camera-based, wearable device-based, and Wi-Fi awareness-based.Among them, the camera-based human activity recognition application has the risk of privacy leakage, and the wearable device-based human activity recognition application has problems such as short battery life and poor accuracy.Human activity recognition based on Wi-Fi sensing generally uses Wi-Fi network cards or software-defined radio devices to identify the rules of channel state information changes, so as to infer user activity.It does not have the problems of privacy leakage and short battery life.But Wi-Fi network cards need to rely on computers and software-defined radio platforms are expensive, which greatly limit the application scenarios of Wi-Fi sensing.Aiming at the above problems, a human activity recognition system based on the low-cost IoT chip ESP32 was proposed.Specifically, the Hampel filter and Gaussian filter were used to preprocess the channel state information obtained by ESP32.Then, the principal component analysis and discrete wavelet transform were utilized to reduce the dimension of the data.Finally, the K-nearest neighbor (KNN) algorithm was applied to classify data.The experimental results show that the system can achieve a recognition accuracy which close to the current mainstream Wi-Fi perception system (Intel 5300 network card) when only two ESP32 nodes are deployed, and the average accuracy rate for the six activities is 98.6%.…”
Get full text
Article -
1705
Internet of Things on Banking Processes in South Africa: A Systematic Reflection on Innovations, Opportunities and Challenges
Published 2025-06-01“…The study found that while the use of IoT in banking processes is still in its infancy, most banks have enhanced their customer experiences through IoT innovations, enhanced their security systems, and enhanced their data access ecosystem to improve their operational efficiency.Moreover, the banking sector is still experiencing some challenges regarding the use of IoT in its processes, such as a lack of privacy and proper storage of customer information, limited workflow management processes, and a lack of policy framework to guide the sector as far as adoption of IoT is concerned. …”
Get full text
Article -
1706
Perspectives of Hispanic and Latinx Community Members on AI-Enabled mHealth Tools: Qualitative Focus Group Study
Published 2025-02-01“…We identified the following seven themes: (1) mHealth is seen as beneficial for promoting health and peace of mind; (2) some are unaware of, unfamiliar with, or uncomfortable with technology and may benefit from individualized support; (3) financial barriers limit access to mHealth; (4) practical considerations create barriers to using mHealth in daily life; (5) mHealth raises concern for overreliance on technology; (6) automated mHealth features are perceived as valuable but fallible, requiring human input to ensure accuracy; and (7) data sharing is seen as valuable for limited uses but raises privacy concerns. …”
Get full text
Article -
1707
Healthcare professionals and the public sentiment analysis of ChatGPT in clinical practice
Published 2025-01-01“…This study was divided into five steps: data collection, data cleaning, validation of relevance, sentiment analysis, and content analysis using the K-means algorithm. …”
Get full text
Article -
1708
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic
Published 2025-04-01“…The efficacy of our approach was evaluated using a substantial volume of real network traffic data. …”
Get full text
Article -
1709
Energy-aware federated learning for secure edge computing in 5G-enabled IoT networks
Published 2025-05-01“…Abstract The rapid expansion of 5G-enabled IoT networks has intensified the need for efficient, secure, and privacy-preserving machine learning models that can operate in decentralized edge environments. …”
Get full text
Article -
1710
A framework reforming personalized Internet of Things by federated meta-learning
Published 2025-04-01“…However, with the introduction of laws and regulations about data security and privacy protection, centralized solutions, which require data to be collected and processed directly on a central server, become impractical for personalized Internet of Things to train Artificial Intelligence models for a variety of domain-specific scenarios. …”
Get full text
Article -
1711
iScene: An interpretable framework with hierarchical edge services for scene risk identification in 6G internet of vehicles
Published 2024-12-01“…However, the performance of existing risk identification approaches is heavily limited by the imbalanced historical data and the poor model interpretability. Meanwhile, the large processing delay and the potential privacy leakage threat also restrict their application. …”
Get full text
Article -
1712
Enhanced Federated Learning Framework based on Deep Learning and Neutrosophic Set for Android Malware Classification
Published 2025-05-01“…Due to the requirement for massive volumes of data aggregation, traditional centralized machine learning (ML) techniques for malware detection face challenges with data sharing, computational complexity, and privacy. …”
Get full text
Article -
1713
Promoting mental health in the age of new digital tools: balancing challenges and opportunities of social media, chatbots, and wearables
Published 2025-03-01“…Nonetheless, these technologies introduce challenges including privacy issues, data security, and equitable access to digital resources, raising a new class of rights to protect mental privacy, guard against algorithm bias, and prevent personality-changing manipulations. …”
Get full text
Article -
1714
Research on health information avoidance behavior and influencing factors of cancer patients—an empirical analysis based on structural equation modeling
Published 2024-12-01“…Methods A face-to-face electronic questionnaire was used to collect data. Applying a chi-square test and multivariate logistic regression model to analyze the role of different socio-demographic factors in influencing health information avoidance behavior of cancer patients; applying structural equation modeling to analyze the role mechanism of health information avoidance behavior of cancer patients. …”
Get full text
Article -
1715
Appling A Hybrid Encryption Algorithm in Cloud Computing
Published 2024-06-01“…The rapid digital development has led to a steady increase in the use of cloud storage as a primary means of saving and sharing data and files. …”
Get full text
Article -
1716
Leveraging AI to Investigate Child Maltreatment Text Narratives: Promising Benefits and Addressable Risks
Published 2025-07-01“…However, when applying such methods, it is useful to have a framework on which to base approaches to the data. …”
Get full text
Article -
1717
AI-Enhanced Disaster Management: A Modular OSINT System for Rapid Automated Reporting
Published 2024-11-01“…Through our case studies on Hurricane Harvey and the 2023 Turkey earthquake, we show how complex tasks can be quickly broken down with ODET while achieving a score of up to 89% using the AlignScore metric. ODET enables compliance with Berkeley protocol requirements by ensuring data privacy and using privacy-preserving processing methods. …”
Get full text
Article -
1718
Legal regulation of the application of information management technologies (on the example of the transport industry)
Published 2023-11-01“…This article discusses the importance of legal regulation in the use of management information technologies. It examines the current legal framework for the use of these technologies and highlights the need for further regulation to protect privacy and security. …”
Get full text
Article -
1719
The role of artificial intelligence in education among college instructors: Palestine Technical University Kadoorie as a case study
Published 2025-05-01“…A phenomenological approach as well was conducted to gather information for the qualitative data. Semi-structured interviews with 17 participants were performed with college instructors who use AI in their teaching. …”
Get full text
Article -
1720
Explainable Video Topics for Content Taxonomy: A Multimodal Retrieval Approach to Industry-Compliant Contextual Advertising
Published 2025-01-01“…To this end, transformer-based architectures, specifically BERTopic, computer vision techniques, and large language models were used to extract sets of topics from visual and textual video data automatically and systematically. …”
Get full text
Article