Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\\"uses » \\"useds (Expand Search), \\"used (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\\"uses » \\"useds (Expand Search), \\"used (Expand Search)
-
2481
A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks
Published 2025-07-01“…The major components of the proposed model: (1) Data-Collection and Pre-processing (2) Feature Extraction using MSV-GRU (3) FKA-DLN model for the better classification. …”
Get full text
Article -
2482
Enhancing Incentive Schemes in Edge Computing through Hierarchical Reinforcement Learning
Published 2025-04-01“… Edge learning is a distributed approach for training machine learning models using data from edge devices. It preserves privacy by avoiding direct data sharing. …”
Get full text
Article -
2483
Multimodal dataset for sensor fusion in fall detection
Published 2025-04-01“…This dataset was compiled from simulations of ten different fall types by ten participants, ensuring a wide array of scenarios. Data were collected using four types of sensors: a mobile phone equipped with a single-channel, three-dimensional accelerometer; a far infrared (FIR) thermal camera; an $8×8$ LIDAR; and a 60–64 GHz radar. …”
Get full text
Article -
2484
Client Selection for Generalization in Accelerated Federated Learning: A Multi-Armed Bandit Approach
Published 2025-01-01“…Federated learning (FL) is an emerging machine learning (ML) paradigm used to train models across multiple nodes (i.e., clients) holding local data sets, without explicitly exchanging the data. …”
Get full text
Article -
2485
A clinically accessible small multimodal radiology model and evaluation metric for chest X-ray findings
Published 2025-04-01“…Abstract Large foundation models show promise in biomedicine but face challenges in clinical use due to performance gaps, accessibility, cost, and lack of scalable evaluation. …”
Get full text
Article -
2486
AI-Driven Advancements in Orthodontics for Precision and Patient Outcomes
Published 2025-04-01“…While AI offers tremendous potential, challenges remain in areas such as data privacy, algorithmic bias, and the cost of adopting AI technologies. …”
Get full text
Article -
2487
Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks
Published 2025-08-01“…The training model defines the convolutional layer's structure, sliding window size, neuron connection weights, and outputs using the improved data. The training period is used for attack detection, and the weights are calculated from trained and real-time data. …”
Get full text
Article -
2488
Survey Influencing Factors on Prenatal Care in mothers referring to health care centers in Rasht city in 2008
Published 2009-10-01“…‎ Conclusion: In existence of prenatal care in health centers, almost half of women do not use these ‎care provided. Among barriers to utilization of care were not knowing the manner and number of ‎prenatal care, compliance with the women's privacy in time of providing care and providers manner ‎of communication in health centers. …”
Get full text
Article -
2489
Fighting Fire with Fire: Reclaiming Social Media to Promote Healthy Eating Behaviors among Children
Published 2024-09-01“…The paper emphasizes the importance of ethical considerations in implementing social media interventions for children, addressing privacy concerns, data security, and the need for age-appropriate, culturally sensitive content. …”
Get full text
Article -
2490
A Web-Based Interface That Leverages Machine Learning to Assess an Individual’s Vulnerability to Brain Stroke
Published 2025-01-01“…To bridge the gap between complex predictive models and end-users, we deploy this model in an intuitive web interface (built with Streamlit) that non-technical individuals and healthcare providers can easily use. This interface requires no specialized knowledge, preserves user privacy by avoiding any data storage, and provides clear explanations of results. …”
Get full text
Article -
2491
Exploring the barriers and facilities migrants face in accessing COVID-19 vaccines in Malaysia: A qualitative study.
Published 2025-01-01“…Digital appointment systems excluded many migrants due to language and literacy barriers, data privacy concerns, and the need for identity documents. …”
Get full text
Article -
2492
Barriers and facilitators of the electronic medical record adoption among healthcare providers in Addis Ababa, Ethiopia
Published 2024-12-01“…Methods A descriptive-phenomenological approach was used. Data were collected from one hospital and three health centers from 5–13 June, 2023, that implemented the EMR. …”
Get full text
Article -
2493
Digital technologies for the Sustainable Development Goals
Published 2025-07-01“…This study is motivated by the growing significance of DTs in addressing sustainability challenges and their critical contribution to achieving the SDGs while identifying barriers to their adoption. Using a systematic review, this review examines the contributions of various DTs, i.e., AI, IoT, blockchain, cloud computing, big data analytics, remote sensing, and GIS in addressing SDGs. …”
Get full text
Article -
2494
Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning
Published 2024-01-01“…The rapid evaluation of smart cities has revolutionized the research and development field to a very extensive level which presents challenges in handling massive amounts of data. However, the integration of IoT into various aspects of life has introduced various challenges related to the security and privacy of IoT systems. …”
Get full text
Article -
2495
A comprehensive survey on AI-enabled secure social industrial Internet of Things in the agri-food supply chain
Published 2025-08-01“…The findings indicate that AI-driven security solutions significantly enhance trust management, anomaly detection, and data privacy in SIIoT networks. The proposed taxonomy categorizes AI-enabled security mechanisms into five distinct areas, offering a structured reference for future research and practical implementations. …”
Get full text
Article -
2496
Advancing Healthcare: Intelligent Speech Technology for Transcription, Disease Diagnosis, and Interactive Control of Medical Equipment in Smart Hospitals
Published 2024-11-01“…The federated learning framework enabled collaborative model training across multiple hospital sites, preserving patient privacy by avoiding raw data exchange. This distributed approach allowed the model to learn from diverse, real-world data while ensuring compliance with strict data protection standards. …”
Get full text
Article -
2497
Developing an artificial intelligence-based progressive growing GAN for high-quality facial profile generation and evaluation through turing test and aesthetic analysis
Published 2025-07-01“…This approach offers valuable applications in orthodontic education, treatment simulation, and data augmentation, particularly where patient privacy and dataset balance are critical. …”
Get full text
Article -
2498
Exploring Respectful Maternity Care and its determinants: a mixed methods cross-sectional study from a rural area in central India
Published 2025-08-01“…Descriptive data is presented in frequency tables. Quantitative data were analyzed using logistic regression and qualitative data through thematic analysis. …”
Get full text
Article -
2499
Attitude and Practice towards Pre-exposure Prophylaxis (PrEP) for HIV Prevention among Female Sex Workers in Kicukiro District, Rwanda
Published 2024-11-01“…Primary data was collected using a structured questionnaire, at 10 health centers. …”
Get full text
Article -
2500
Exploring mHealth app utilization for diabetes self-management: survey insights from a northern district in Malaysia
Published 2024-12-01“…Users perceived the mHealth app as useful (97.5%), yet faced challenges over the app initiation, charges and data security. …”
Get full text
Article