Suggested Topics within your search.
Suggested Topics within your search.
-
2181
SCRHM: A Secure Continuous Remote Health Monitoring System
Published 2015-12-01“…With this scheme, remote health monitoring service provider is able to detect outliers over encrypted health parameters. Using analysis, we prove the correctness and security of the proposed scheme on privacy protection of users’ health data. …”
Get full text
Article -
2182
FLavourite: Horizontal and Vertical Federated Learning Setting Comparison
Published 2025-01-01“…We assess the classification of Alzheimer’s disease using non-independent and identically distributed (non-i.i.d.) 3D images and tabular data. …”
Get full text
Article -
2183
AML-Based Multi-Dimensional Co-Evolution Approach Supported by Blockchain: Architecture Design and Case Study on Intelligent Production Lines for Industry 4.0
Published 2025-03-01“…As a transparent decentralized network, blockchain’s compatibility with the challenges of AML collaboration processes, data security, and privacy is not ideal. This paper proposes a new method to enhance the collaborative evolution of IPLs. …”
Get full text
Article -
2184
Access to information in the context of virtual space in the legal system of Iran and United States
Published 2025-03-01“…In Iran, restrictions on access to information may reduce the spread of ideas and thoughts, ban potentially useful information, and cause problems in cultural development. …”
Get full text
Article -
2185
Advances in Infant Cry Paralinguistic Classification—Methods, Implementation, and Applications: Systematic Review
Published 2025-04-01“…ConclusionsThe evolution of infant cry classification methods has progressed from traditional classical statistical methods to machine learning models but with minimal considerations of data privacy, confidentiality, and ultimate deployment to practical use. …”
Get full text
Article -
2186
IOT based wearable sensor system architecture for classifying human activity
Published 2025-06-01“…The proposed system follows a structured workflow: (i) channel state information (CSI) is extracted from ESP32 modules, (ii) data preprocessing is performed using Hampel and Gaussian filters for noise and outlier removal, (iii) dimensionality reduction is achieved through Principal Component Analysis (PCA) and Discrete Wavelet Transform (DWT), and (iv) activity classification is conducted using Dynamic Time Warping (DTW) and the K-Nearest Neighbors (KNN) algorithm. …”
Get full text
Article -
2187
A Self-Sovereign Identity-Based Authentication and Reputation Protocol for IoV Applications
Published 2025-01-01“…Key innovations include a lightweight proof of reputation mechanism based on multi-party computation, enabling vehicles to collaboratively assess trustworthiness using recent spatiotemporal data without compromising privacy. …”
Get full text
Article -
2188
Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi.
Published 2025-01-01“…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. …”
Get full text
Article -
2189
Leveraging large language models for the deidentification and temporal normalization of sensitive health information in electronic health records
Published 2025-08-01“…Abstract Secondary use of electronic health record notes enhances clinical outcomes and personalized medicine, but risks sensitive health information (SHI) exposure. …”
Get full text
Article -
2190
Influencing Factors and Correlations of User Satisfaction with Mobile Health Applications
Published 2025-01-01“…Using the grounded theory, the study extracted factors influencing user satisfaction with mobile health applications by coding the review data. …”
Get full text
Article -
2191
Revolutionising Educational Management with AI and Wireless Networks: A Framework for Smart Resource Allocation and Decision-Making
Published 2025-05-01“…By leveraging data-driven insights enabled by reliable wireless connectivity, institutions can make more informed decisions, use resources more effectively, and automate routine tasks. …”
Get full text
Article -
2192
Emerging technologies and applications in multimodality imaging for ischemic heart disease: current state and future of artificial intelligence
Published 2024-11-01“…Addressing regulatory and ethical challenges, such as data privacy and algorithm transparency, is crucial for the broader adoption of these advanced technologies. …”
Get full text
Article -
2193
A Review of Multimodal Interaction in Remote Education: Technologies, Applications, and Challenges
Published 2025-04-01“…Though multimodal communication may bring a historical improvement to the mode of online education, the platform still faces many issues, such as media synchronization, higher computational demand, physical adaptability, and privacy concerns. These problems demand further research in the fields of algorithm optimization, access to technology guidance, and the ethical use of big data. …”
Get full text
Article -
2194
Comparison of Machine Learning Methods for Menstrual Cycle Analysis and Prediction
Published 2025-03-01“…The findings highlight the potential for improved accuracy in reproductive health tracking, with future research opportunities to incorporate additional variables such as hormonal history and lifestyle factors, as well as a focus on data privacy.…”
Get full text
Article -
2195
Application of Criminal Offenders Misuse of National Identification Numbers for Phone Card Registration in Makassar City
Published 2024-03-01“…The findings indicate that despite the absence of specific laws on starter pack registration, Indonesian citizens are protected by constitutional, administrative, ITE (Information and Electronic Transactions), and personal data protection laws. However, obstacles exist in enforcing criminal offenses related to NIK misuse, including outlet registration by actors lacking buyer identities due to fierce competition and public preference for instant solutions without considering the consequences of using others' NIK for SIM card registration.…”
Get full text
Article -
2196
A Comparative Analysis of Artificial Intelligence Regulatory Law in Asia, Europe, and America
Published 2024-01-01“…The study employs normative research, which in this context focuses on analyzing legal frameworks, principles, and regulations governing AI. Data collection techniques include the study of legal documents such as laws and regulations, along with a qualitative analysis using comparative methods. …”
Get full text
Article -
2197
Emerging role of generative AI in renewable energy forecasting and system optimization
Published 2025-12-01“…For sustainable implementation, future developments must address challenges in model explainability, data privacy, and scalability. These findings support the journal’s scope by highlighting AI-driven advancements for the reliable, efficient, and sustainable transformation of energy systems.…”
Get full text
Article -
2198
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Published 2025-01-01“…However, the lack of transparency in obfuscated code raises significant ethical concerns, including the potential for harmful or unethical uses such as hidden data collection, malicious features, back doors, and concealed vulnerabilities. …”
Get full text
Article -
2199
Exploring Therapists’ Approaches to Treating Eating Disorders to Inform User-Centric App Design: Web-Based Interview Study
Published 2025-05-01“…Barriers to recommendation include patient safety, data privacy, and a perception that they may not be effective. …”
Get full text
Article -
2200
AI in dermatology: a comprehensive review into skin cancer detection
Published 2024-12-01“…However, several challenges remain, such as concerns over data privacy, complexities in integrating AI systems into existing workflows, and the need for large, high-quality datasets. …”
Get full text
Article