Suggested Topics within your search.
Suggested Topics within your search.
-
2361
Decentralized electrochemical biosensors for biomedical applications: From lab to home
Published 2025-01-01“…However, potential risks such as data security vulnerabilities, privacy concerns, and regulatory challenges must be addressed to ensure safe and ethical deployment of these technologies. …”
Get full text
Article -
2362
Comprehensive Review and Future Research Directions on ICT Standardisation
Published 2024-11-01“…Standardisation also solves problems, such as the use of mobile devices, which requires travel abroad when out of range. …”
Get full text
Article -
2363
Ethical and Safety Challenges of Implantable Brain-Computer Interface
Published 2025-04-01“…The study of brain-computer interfaces (BCIs) holds immense potential across various fields, particularly in Human-Robot Interaction, where invasive BCIs offer precise and direct communication between the human brain and robotic devices. However, the use of invasive BCIs raises significant ethical, safety, and security concerns that must be addressed to ensure their responsible deployment. …”
Get full text
Article -
2364
Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure
Published 2024-11-01“…Moreover, as our formalization based on DSML is an iterative, continuous, and evolving process, this approach guarantees that our proposed framework adeptly tackles the evolving cyber threats confronting the EV industry. Specifically, we use the Object Constraint Language (OCL) for precise specification and verification of security threats as properties of a modeled system. …”
Get full text
Article -
2365
Beijing’s urbanization reflected in apartment layouts: a computer vision and isovist analysis (1970–2020)
Published 2025-05-01“…Our findings show a trend in the isovist intensity of living rooms, dining rooms, and kitchens, indicative of shifts toward privacy and mixed-use spaces, shaped by household occupancy patterns. …”
Get full text
Article -
2366
HELA-CMM: capability maturity model for adoption of learning analytics in higher education
Published 2025-04-01“…The proposed maturity model comprises 28 capabilities grouped into eight categories: (1) Teaching / Learning / Assessment, (2) Data Management and Analytics, (3) Ethics, Privacy, Legal Issues, (4) People Competences, (5) Management / Leadership, (6) Culture, (7) Infrastructure, and (8) Quality Assurance. …”
Get full text
Article -
2367
A Deep Learning-Based Ensemble Framework for Robust Android Malware Detection
Published 2025-01-01“…The exponential growth of Android applications has resulted in a surge of malware threats, posing severe risks to user privacy and data security. To address these challenges, this study introduces a novel malware detection approach utilizing an ensemble of Convolutional Neural Networks (CNNs) for enhanced classification accuracy. …”
Get full text
Article -
2368
Contrastive Self-Supervised Learning for Sensor-Based Human Activity Recognition: A Review
Published 2024-01-01“…Next, we comprehensively review data augmentation methods for sensor data and commonly used benchmark datasets for activity recognition. …”
Get full text
Article -
2369
Detecting Learning Behavior in Programming Assignments by Analyzing Versioned Repositories
Published 2024-01-01“…The Polivr ecosystem comprises three key modules: Polivr Anonymiser, which ensures data privacy by anonymising student identities; Polivr Core, which mines learning metrics from Git repositories; and Polivr Web Viewer, which transforms the raw metrics into insightful visualisations for educators. …”
Get full text
Article -
2370
Barriers and facilitators of the electronic medical record adoption among healthcare providers in Addis Ababa, Ethiopia
Published 2024-12-01“…Methods A descriptive-phenomenological approach was used. Data were collected from one hospital and three health centers from 5–13 June, 2023, that implemented the EMR. …”
Get full text
Article -
2371
Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning
Published 2024-01-01“…The rapid evaluation of smart cities has revolutionized the research and development field to a very extensive level which presents challenges in handling massive amounts of data. However, the integration of IoT into various aspects of life has introduced various challenges related to the security and privacy of IoT systems. …”
Get full text
Article -
2372
Multicountry research on comprehensive abortion policy implementation in Latin America: a mixed-methods study protocol
Published 2024-01-01“…Informed consent will be obtained from participants. Data will be treated with careful attention to protecting privacy and confidentiality. …”
Get full text
Article -
2373
Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks
Published 2025-08-01“…The training model defines the convolutional layer's structure, sliding window size, neuron connection weights, and outputs using the improved data. The training period is used for attack detection, and the weights are calculated from trained and real-time data. …”
Get full text
Article -
2374
A qualitative study on the unmet sexual needs of older women
Published 2025-05-01“…Data were analyzed using the Graneheim and Lundman approach. …”
Get full text
Article -
2375
Federated learning based reference evapotranspiration estimation for distributed crop fields.
Published 2025-01-01“…The study intends to propose ETo estimation of multiple locations with distinct weather conditions using a federated learning approach. Traditional centralized approaches require aggregating all data in one place, which can be problematic due to privacy concerns and data transfer limitations. …”
Get full text
Article -
2376
Application of Terminal Audio Mixing in Multi-Bandwidth End-to-End Encrypted Voice Conference
Published 2025-05-01“…It can be used in low-bandwidth scenarios such as satellite networks. …”
Get full text
Article -
2377
Analyzing Visitor Behavior to Enhance Personalized Experiences in Smart Museums: A Systematic Literature Review
Published 2025-05-01“…Behavioral Analytics Platforms and Mobile/Wearable Devices are the most used technologies (42.4%) for delivering personalized content. …”
Get full text
Article -
2378
Opportunities and challenges of social media for oral health literacy improvement: a qualitative investigation based on Iranian dentists’ perspectives
Published 2025-05-01“…Methods In the current qualitative investigation, a semi-structured interview was conducted with 24 dentists utilizing a purposive snowball sampling method. The analysis of the data was performed using thematic analysis in the MAXQDA 10 software. …”
Get full text
Article -
2379
A STUDY OF PEOPLE’S PERCEPTION OF ARTIFICIAL INTELLIGENCE IN FINANCE AND SOCIETY
Published 2025-07-01“…This paper investigates how people perceive artificial intelligence (AI), using both original survey data and insights from recent academic and policy literature. …”
Get full text
Article -
2380
AI in humanitarian healthcare: a game changer for crisis response
Published 2025-07-01“…Ethical concerns such as data privacy, bias, and access inequities remain critical to responsible deployment. …”
Get full text
Article