Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
2081
Advancements in artificial intelligence for atopic dermatitis: diagnosis, treatment, and patient management
Published 2025-12-01“…Despite challenges in data privacy and model transparency, the potential of artificial intelligence in advancing AD care is enormous, bringing the future to precision medicine and improving patient outcomes. …”
Get full text
Article -
2082
Analysis of Modernization Movements in Housing During the Early Republican Period: Karabük, Türkiye
Published 2025-04-01“…In this study, the idea that houses are not only structural products, but the structures that have become homes for humans, is approached and discussed through concepts such as spatial organization, relationality, accessibility, visibility, density of use, depth, privacy, and belonging. The Yenişehir district in Karabük province, which is thought to have been transformed into design by considering these concepts, also constitutes the focus area of the study idea in this sense. …”
Get full text
Article -
2083
Motivated by Design: A Codesign Study to Promote Challenging Misinformation on Social Media
Published 2024-01-01“…We applied the unified theory of acceptance and use of technology (UTAUT) as a theoretical framework and analysed our data based on the core constructs of this framework: performance expectancy, effort expectancy, social influence, and facilitating conditions. …”
Get full text
Article -
2084
The Interdependence of Competition Policy, Consumer Policy and Regulation in Introducing and Safeguarding Effective Competition in the EU Telecommunications Market
Published 2017-05-01“…In the case of telecommunications, several initiatives of the European Commission and of national regulatory authorities to falls in prices and forced operators to implement customer friendly rules and to protect customer data and privacy. The authors consider that the European Commission has tried to establish and harmonise rules across all member states in order to protect the interests and rights of consumers on the telecommunication market. …”
Get full text
Article -
2085
The Transformative Impact of Artificial Intelligence in Healthcare: Innovations, applications, and future prospects
Published 2024-01-01“…At the same time, the application of AI in healthcare poses a number of challenges, such as data privacy, algorithmic bias, and ethics. This study also explores the role of AI in global health, the need for policies and regulations, and the long-term impact of AI on future healthcare systems. …”
Get full text
Article -
2086
Views on the incorporation of Geolocation Devices in Field Trips
Published 2022-01-01“…Geolocation in field trips has great potential, but it is an understudied field that needs more research and discussion to ensure data privacy.…”
Get full text
Article -
2087
Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem
Published 2020-12-01“…Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. …”
Get full text
Article -
2088
An intelligent conversational agent for querying satellite manoeuvre detections: a case study
Published 2025-06-01“…Moreover, our system can handle sensitive and confidential data without breaching privacy. This paper presents the results of deploying SatChat in conjunction with a particle filter based manoeuvre detection system.…”
Get full text
Article -
2089
IoT-driven smart grid monitoring with enhanced energy routing and advanced encryption techniques
Published 2025-11-01“…The proposed work incorporates Improved Paillier Homomorphic (IPH) based encryption scheme, which assures integrity and confidentiality of data transmitted. The outcomes of proposed smart grid system using MATLAB and FPGA controller demonstrate significant improvements by providing enhanced security and optimal routing. …”
Get full text
Article -
2090
Revolutionizing Midwifery Education : A Scoping Review of Artificial Intelligence Methods
Published 2025-04-01“…Despite these advancements, challenges such as ethical concerns (algorithmic bias, privacy issues), poor data quality, limited AI expertise among educators, and resistance to change in traditional learning environments were noted. …”
Get full text
Article -
2091
DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems
Published 2025-07-01“…The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. …”
Get full text
Article -
2092
Criminal Law Challenged by Crossing into Virtual Reality
Published 2025-03-01“…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
Get full text
Article -
2093
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things
Published 2025-05-01“…This article presents a blockchain-assisted safe data-sharing mechanism that provides security requirements in the industry using IoT. …”
Get full text
Article -
2094
Analisis Pengaruh Kualitas Layanan Terhadap Kepuasan Pelanggan dan Loyalitas Pengguna Aplikasi Jenius Menggunakan Model E-S- Qual dan E- Recs- QUal (Studi Kasus: Pengguna Aplikasi...
Published 2022-12-01“…This study involved 100 samples of Jenius application users in Malang City. This research uses purposive sampling as a sampling technique and multiple and simple linear regression analysis as a technique in data analysis. …”
Get full text
Article -
2095
Federated Learning Enhanced MLP–LSTM Modeling in an Integrated Deep Learning Pipeline for Stock Market Prediction
Published 2024-10-01“…A global model is created and updated through repeated training and totaling of parameters while preserving privacy of the data going to each node. In the performance evaluation, quantitative measures like Root-Mean-Square Error (RMSE), and accuracy are seven used. …”
Get full text
Article -
2096
Blockchain enhanced smart healthcare management for chronic diseases
Published 2025-06-01“…Abstract Chronic diseases affect millions of people worldwide, making it a significant issue for the efficient and secure management of patient data. Most traditional chronic disease management systems fail to manage data in real time and struggle with interoperability and security issues. …”
Get full text
Article -
2097
Hybrid-CID: Securing IoT with Mongoose Optimization
Published 2025-03-01“…After preprocessing, the Hybrid-CID framework develops a hybrid optimization algorithm to identify the intrusions from the traffic data which ensures data privacy by maintaining the reliability and integrity of IoT deployments. …”
Get full text
Article -
2098
A Comprehensive Survey of Electric Vehicle Charging Demand Forecasting Techniques
Published 2024-01-01“…Meanwhile, emerging machine learning techniques bring promising prospects, yet exhibit suboptimal performance with insufficient data. Additionally, existing studies often overlook several critical areas such as overcoming data scarcity, security and privacy concerns, managing the inherent stochasticity of demand data, selecting forecasting methods for a specific feature, and developing standardized performance metrics. …”
Get full text
Article -
2099
A CAE model-based secure deduplication method
Published 2025-07-01“…Abstract Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. …”
Get full text
Article -
2100
A Bibliometric Analysis of Publications on Surveillance and New Media Concepts in The Web of Science Database
Published 2025-06-01“…To this end, a bibliometric analysis based on quantitative data is conducted using the Web of Science (WoS) database as of June 23, 2024. …”
Get full text
Article