Suggested Topics within your search.
Suggested Topics within your search.
-
2041
Emerging and Pioneering AI Technologies in Aesthetic Dermatology: Sketching a Path Toward Personalized, Predictive, and Proactive Care
Published 2024-11-01“…Conclusions: While AI holds significant potential to enhance aesthetic dermatology, its responsible integration requires addressing these challenges through clinician training, ethical guidelines, and robust data security measures. Effective use of AI will depend on collaboration between technology developers, clinicians, and regulatory bodies. …”
Get full text
Article -
2042
Current limitations in technology-based cognitive assessment for severe mental illnesses: a focus on feasibility, reliability, and ecological validity
Published 2025-04-01“…EMA may capture real-world functioning by increasing the number of evaluations throughout the day, but its use might be hindered by high participant burden and missing data. …”
Get full text
Article -
2043
SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
Published 2024-12-01“…We leverage the blockchain-based Self-Sovereign Identity (SSI) model to handle client authentication and secure communication. Additionally, we use the Trimmed Mean method to aggregate data. This helps reduce the effect of unusual or malicious inputs when creating the overall model. …”
Get full text
Article -
2044
The application of artificial intelligence in insomnia, anxiety, and depression: A bibliometric analysis
Published 2025-03-01“…However, challenges around data privacy, ethical concerns, and the interpretability of AI models need to be addressed. …”
Get full text
Article -
2045
Congruent Learning for Self-Regulated Federated Learning in 6G
Published 2024-01-01“…Across four networking use cases on several tasks, reflecting different profiles of data heterogeneity and limited availability of data, it is shown that CFL greatly reduces overfitting and in nearly all cases improves the performance—a relative gain of about 21% averaged across all use cases.…”
Get full text
Article -
2046
Applications of UAV Technologies in Assessment of Transportation Infrastructure Systems
Published 2025-06-01“…Respondents emphasize the need for longer flight times, better automation, and advanced data tools, underscoring growing adoption and highlighting the need to overcome technical, regulatory, and data privacy challenges for optimal UAV integration within transportation infrastructure systems management.…”
Get full text
Article -
2047
Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review
Published 2025-03-01“…These gaps include design requirements, software and firmware updates, physical security, the use of big data to detect vulnerabilities, user data privacy, and inconsistencies in machine learning algorithms. …”
Get full text
Article -
2048
Making temporary homes
Published 2024-06-01“…The interviews were analysed with Interpretative Phenomenological Analysis, and the visual data (photos made by the interviewees and sometimes the researcher, and drawings made by the researcher) was used to place the content of the interviews in a physical context. …”
Get full text
Article -
2049
Enabling All In-Edge Deep Learning: A Literature Review
Published 2023-01-01“…Moreover, most of the time central cloud servers are used for such computation, thus opening up other significant challenges, such as high latency, increased communication costs, and privacy concerns. …”
Get full text
Article -
2050
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01“…Our approach prioritizes data privacy by processing data locally, thereby avoiding the need for central data collection, while enhancing detection efficiency. …”
Get full text
Article -
2051
Understanding customer loyalty in digital services: insights from food delivery in emerging markets
Published 2025-07-01“…Grounded in the Commitment-Trust Theory and the SERVQUAL model, this study examines how these factors collectively influence consumer behavior in an emerging market. Data were collected via survey questionnaires from 324 Cambodian respondents and analyzed using partial least squares–structural equation modeling (PLS–SEM). …”
Get full text
Article -
2052
Mental Health Apps Available in App Stores for Indian Users: Protocol for a Systematic Review
Published 2025-04-01“…Additionally, the apps will be reviewed for quality using the Mobile Application Rating Scale. The data analysis and synthesis strategy will incorporate descriptive statistics based on quality evaluation using the Mobile Application Rating Scale and examining the content of the apps for generating descriptive information. …”
Get full text
Article -
2053
Comparing remote and in-person interpretation experiences for clinicians and Spanish-speaking patients with limited English proficiency: a mixed methods study
Published 2025-05-01“…In regression analyses of patient experience survey data, no evidence of an association between the interpreter method used and patient-reported experiences of clinician communication or interpreter support was found. …”
Get full text
Article -
2054
Assessing user preferences and competitive strategies of Gojek and Grab in ASEAN’s ride-hailing market
Published 2024-12-01“…This study aims to determine the criteria, sub-criteria, and alternatives influencing users in choosing ride-hailing and map Gojek and Grab’s grand strategy to compete in the ASEAN market, especially in Indonesia, Thailand, Vietnam, and Singapore. This research uses a questionnaire to collect data, with 377 Gojek and Grab users as participants. …”
Get full text
Article -
2055
Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks
Published 2017-01-01“…The proposed protocol includes steps for secure RO and handover management, where mutual authentication, key exchange, perfect forward secrecy, and privacy are supported. The correctness of the proposed protocol is formally analyzed using BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). …”
Get full text
Article -
2056
A mixed-method study to inform the design of a video observed therapy app to monitor individuals with TB in the Dominican Republic
Published 2025-06-01“…Data integration was achieved by comparing convergent and divergent results.ResultsParticipants expressed a positive attitude towards using DAT to facilitate communication with health personnel to support treatment adherence. …”
Get full text
Article -
2057
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection
Published 2025-01-01“…The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity theft, and potential legal liabilities. …”
Get full text
Article -
2058
eHealth Technology: What Do We Know and What do We Need to Learn
Published 2021-06-01“…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
Get full text
Article -
2059
GLOBE Observer: A Case Study in Advancing Earth System Knowledge with AI-Powered Citizen Science
Published 2024-12-01“…GLOBE citizen science data has been used to develop automated data classification routines that enable information discovery of mosquito larvae and land cover labels. …”
Get full text
Article -
2060
Federated Learning for Predicting Major Postoperative Complications
Published 2025-06-01“…To develop a robust model to accurately predict the risk of postoperative complications using clinical data from multiple institutions while ensuring data privacy. …”
Get full text
Article