Suggested Topics within your search.
Suggested Topics within your search.
-
2401
Integrating artificial intelligence in drug discovery and early drug development: a transformative approach
Published 2025-03-01“…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
Get full text
Article -
2402
Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring
Published 2025-02-01“…Unlike complex machine learning models, it offers parsimony in transparency, efficiency, and reproducibility, making it ideal for clinical settings where explainable, data-driven decisions are essential. Methods: A logistic regression model was developed using R to analyze biometric and demographic data from a cross-sectional dataset, including real-world data from public institucions. …”
Get full text
Article -
2403
Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach
Published 2025-07-01“…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
Get full text
Article -
2404
The State of Artificial Intelligence and its Prospects in Pakistan's Medical Sector
Published 2024-12-01“…The rising integration of AI in Pakistani medicine necessitates the evolution of regulatory frameworks to guarantee patient safety, data privacy, and ethical application of AI technologies. …”
Get full text
Article -
2405
Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective
Published 2025-06-01“…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
Get full text
Article -
2406
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
Get full text
Article -
2407
The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs):
Published 2025“…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
Get full text
Article -
2408
The Analysis of the Effective Factors on Urban Blight in District 3, Region 12, Tehran City
Published 2019-09-01“…Materials and Methods This study is mostly based on the initial data resulted from surveying the households using a researcher-made questionnaire; however, the tools of the interview, observation, and the results obtained from the public censuses of population and housing are also used to achieve the required data and information. …”
Get full text
Article -
2409
Identification of Factors Affecting the Selection of Women's Gyms
Published 2021-06-01“…The data were analyzed by SPSS26 software using Exploratory Factor Analysis test.Results: The results showed that 44 final characteristics affecting the selection of the gym were factorized into 8 factors by factor analysis and these factors explain 67% of the total variance.Conclusion: Factors influencing the selection of women's gymnasiums in order of priority include Physical Evidence, process, Place, price, product, People, Promotion and Privacy.…”
Get full text
Article -
2410
Revolutionizing Sports: The Role of Wearable Technology and AI in Training and Performance Analysis
Published 2025-03-01“…Additionally, AI-driven wearables raise concerns over data security, ethical handling, and equitable access, as high costs limit their use in amateur sports. …”
Get full text
Article -
2411
Evaluating new technologies and organizational structures
Published 2024-12-01“…Co-authors Knut Wenig and Xiaoyao Han are examining the findability of data deposited in data repositories that are using DDI metadata standards. …”
Get full text
Article -
2412
Pre-class learning assessment on integrating artificial intelligence into evidence-based medicine curriculum
Published 2025-05-01“…Differences between master’s and doctoral students were analyzed using the Mann-Whitney U test.Results A total of 46 students participated in the survey (34 Masters and below, and 12 PhDs). …”
Get full text
Article -
2413
Exploring Perceived Barriers in the Assessment and Management of Female Sexual Dysfunction: An Integrated Qualitative and Quantitative Study among Trainee Residents
Published 2025-01-01“…A total of 92 trainee residents from related medical specialties of psychiatry, gynecology, dermatology, and urology, who provided informed consent, participated in the study. Data were collected using a validated questionnaire regarding perceived barriers related to residents’ knowledge and attitudes toward assessing FSD and a case vignette. …”
Get full text
Article -
2414
Preferences and Willingness to Pay for Health App Assessments Among Health Care Stakeholders: Discrete Choice Experiment
Published 2025-05-01“… BackgroundThe adoption of high-quality health apps has been slow, despite the myriad benefits associated with their use. This is partly due to concerns regarding the effectiveness, safety, and data privacy of such apps. …”
Get full text
Article -
2415
Analisa Sentimen Financial Technology Peer To Peer Lending Pada Aplikasi Koinworks
Published 2022-12-01“…Reviews contained in the Google Play comments column can be used as a data source that can be shared with data mining. …”
Get full text
Article -
2416
Evaluating Factors Affecting Interior Architectural Space Quality to Enhance Spatial Resilience and Human Productivity: An Application of Maslow’s Hierarchy of Needs
Published 2025-06-01“…Data collection continued until the point of data saturation, at which no new theme was identified. …”
Get full text
Article -
2417
Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection
Published 2024-11-01“…Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. …”
Get full text
Article -
2418
Advancing Hematopoietic Stem Cell Transplantation Typing: Harnessing Hyperledger Fabric’s Blockchain Architecture
Published 2024-01-01“…This innovative approach optimizes user experience, maintains data integrity, and ensures privacy. Future integration with existing databases could enable secure data sharing among healthcare institutions, allowing rapid verification of data ownership and unified authentication. …”
Get full text
Article -
2419
Penerapan Metode E-Service Quality Terhadap Pengukuran Tingkat Kepuasan Penggunaan Marketplace
Published 2022-10-01“…The processed data was obtained from distributing questionnaires by using the google form. …”
Get full text
Article -
2420
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article