Suggested Topics within your search.
Suggested Topics within your search.
-
2161
Electroencephalography-Based Brain-Computer Interfaces in Rehabilitation: A Bibliometric Analysis (2013–2023)
Published 2024-11-01“…Ethical considerations, including data privacy, transparency, and equitable access to BCI technologies, must be prioritized to ensure the inclusive development and use of these technologies across diverse socioeconomic groups.…”
Get full text
Article -
2162
Evaluation of Government Programmes on Enhancing the Lives of the Elderly: A Case Study of Social Assistance Grant for Empowerment in Mitooma District.
Published 2024“…Different data collection tools like interview guide, and questionnaire were used. …”
Get full text
Thesis -
2163
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
Published 2025-03-01“…This study aims to identify gaps and propose future research directions to develop robust authentication frameworks that protect user privacy and data integrity.…”
Get full text
Article -
2164
A Bibliometric Analysis on Federated Learning
Published 2024-12-01“…With the rapid advancement of technology and growing concerns about data privacy, federated learning (FL) has attracted considerable attention from the scientific community. …”
Get full text
Article -
2165
A Comprehensive Survey of Deep Learning Approaches in Image Processing
Published 2025-01-01“…Metrics used for rigorous model evaluation are also discussed, underscoring the importance of performance assessment in varied application contexts. …”
Get full text
Article -
2166
Assessing the transferability of BERT to patient safety: classifying multiple types of incident reports
Published 2025-08-01“…For ambiguous medium and low severity levels, the F-score improvements ranged from 3.6% to 19.7% across all test datasets.Discussion Fine-tuned BERT led to improved performance, particularly in identifying rare classes and generalising effectively to unseen data, compared with small CNNs.Conclusion Fine-tuned BERT may be useful for classification tasks in patient safety where data privacy, scarcity and imbalance are common challenges.…”
Get full text
Article -
2167
“Invisible wounds of childbirth”; women’s experiences of obstetric violence: a phenomenological qualitative study
Published 2025-08-01“…The aim of this study is to investigate the feelings, thoughts and experiences of women who reported being exposed to obstetric violence at any stage of labor. Methods Data were collected using a constructivist qualitative research design. …”
Get full text
Article -
2168
Access to information in the context of virtual space in the legal system of Iran and United States
Published 2025-03-01“…In Iran, restrictions on access to information may reduce the spread of ideas and thoughts, ban potentially useful information, and cause problems in cultural development. …”
Get full text
Article -
2169
Opportunities, challenges and development areas of chartered accountants in the Fourth Industrial Revolution
Published 2024-12-01“…Research approach/design and method: The research followed a qualitative approach to data collection and obtained the data through 14 semi-structured interviews. …”
Get full text
Article -
2170
Digital Newsroom Transformation: A Systematic Review of the Impact of Artificial Intelligence on Journalistic Practices, News Narratives, and Ethical Challenges
Published 2024-10-01“…The key findings show a significant increase in the use of AI for news writing automation (73% of news organizations), data analysis (68%), and content personalization (62%). …”
Get full text
Article -
2171
A Comparative Analysis of Blockchain-Smart Contracts-ERP Integration Strategies for Supply Network (SN) Collaboration
Published 2025-01-01“…After identifying main configuration dimensions of privacy setting (public/private/consortium), smart contract utilization for business logic implementation (full/none) and degree of transactional data decentralization (full/only critical data/none), 18 deployment scenarios are developed for advanced SN collaboration. …”
Get full text
Article -
2172
Generative AI for Industry 5.0: Analyzing the Impact of ChatGPT, DALLE, and Other Models
Published 2025-01-01“…The paper scrutinizes the multifaceted use-cases of GAI, emphasizing its instrumental function in amplifying operational efficiency, minimizing downtime, and fostering economic savings through predictive maintenance and acute real-time data analytics. …”
Get full text
Article -
2173
Treatment-emergent Affective Switch: A Case Series Study
Published 2024-07-01“…Managing antidepressant use in bipolar disorder is crucial due to the risk of the treatment-emergent affective switch (TEAS), where antidepressants can induce shifts from depression to mania or hypomania, a complex phenomenon influenced by genetics, neurobiology, and environment. …”
Get full text
Article -
2174
Unleashing the Power of Wireless Communication in Healthcare by Empowering Patient Care and Connectivity: A Comprehensive Survey
Published 2025-01-01“…These challenges and opportunities include data security and privacy issues, as well as the need for a robust communication infrastructure. …”
Get full text
Article -
2175
ROBOTISATION AND SERVICE AUTOMATION IN THE TOURISM AND HOSPITALITY SECTOR: A META-STUDY (1993-2024)
Published 2024-09-01“…Analyses 310 publications published in the last 32 years processed using Google Scholar search engine. The data sets used for the observations consist primarily of key research works, predominantly appearing in peer-reviewed international journals. …”
Get full text
Article -
2176
A Survey on Hybrid-CNN and LLMs for Intrusion Detection Systems: Recent IoT Datasets
Published 2024-01-01“…Various IDS methodologies, including those using Machine Learning (ML), Deep Learning (DL) and Large Language Models (LLMs), are employed to identify intrusions within the data; however, improvements to the detection systems are still needed. …”
Get full text
Article -
2177
SCRHM: A Secure Continuous Remote Health Monitoring System
Published 2015-12-01“…With this scheme, remote health monitoring service provider is able to detect outliers over encrypted health parameters. Using analysis, we prove the correctness and security of the proposed scheme on privacy protection of users’ health data. …”
Get full text
Article -
2178
FLavourite: Horizontal and Vertical Federated Learning Setting Comparison
Published 2025-01-01“…We assess the classification of Alzheimer’s disease using non-independent and identically distributed (non-i.i.d.) 3D images and tabular data. …”
Get full text
Article -
2179
AML-Based Multi-Dimensional Co-Evolution Approach Supported by Blockchain: Architecture Design and Case Study on Intelligent Production Lines for Industry 4.0
Published 2025-03-01“…As a transparent decentralized network, blockchain’s compatibility with the challenges of AML collaboration processes, data security, and privacy is not ideal. This paper proposes a new method to enhance the collaborative evolution of IPLs. …”
Get full text
Article -
2180
The Effect of Viral Promotional Advergames on the Behavioral Reactions
Published 2024-09-01“…This research used data from pre-measure and post-measure assessments within a real viral marketing campaign. …”
Get full text
Article