Suggested Topics within your search.
Suggested Topics within your search.
-
2041
Energy-aware federated learning for secure edge computing in 5G-enabled IoT networks
Published 2025-05-01“…We evaluate the EAFL framework using benchmark IoT datasets and simulated 5G edge environments, demonstrating a 35.4% reduction in energy consumption while maintaining a high model accuracy of 91.8%. …”
Get full text
Article -
2042
A framework reforming personalized Internet of Things by federated meta-learning
Published 2025-04-01“…However, with the introduction of laws and regulations about data security and privacy protection, centralized solutions, which require data to be collected and processed directly on a central server, become impractical for personalized Internet of Things to train Artificial Intelligence models for a variety of domain-specific scenarios. …”
Get full text
Article -
2043
iScene: An interpretable framework with hierarchical edge services for scene risk identification in 6G internet of vehicles
Published 2024-12-01“…However, the performance of existing risk identification approaches is heavily limited by the imbalanced historical data and the poor model interpretability. Meanwhile, the large processing delay and the potential privacy leakage threat also restrict their application. …”
Get full text
Article -
2044
A Meta-Reinforcement Learning-Based Poisoning Attack Framework Against Federated Learning
Published 2025-01-01“…As a distributed machine learning paradigm, federated learning enables clients to collaboratively train a global model without sharing their raw data, thus preserving data privacy while still utilizing the data. …”
Get full text
Article -
2045
Federated Learning Based on an Internet of Medical Things Framework for a Secure Brain Tumor Diagnostic System: A Capsule Networks Application
Published 2025-07-01“…However, challenges related to performance and data privacy often arise when using medical data from patients and healthcare institutions. …”
Get full text
Article -
2046
Resilience in the Internet of Medical Things: A Review and Case Study
Published 2024-11-01“…Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. …”
Get full text
Article -
2047
Encouraging gender-inclusive acceptance of multipurpose national-identity smart cards.
Published 2022-01-01“…The data was collected through five hundred questionnaires from Malaysia (the MNIS pioneer) and analyzed using structural equation modeling.…”
Get full text
Article -
2048
A systematic review of consumers’ and healthcare professionals’ trust in digital healthcare
Published 2025-02-01“…Trust in digital healthcare is complex and, from a consumers’ perspective, can influence digital healthcare use, adoption, acceptance, and usefulness. Consumers’ trust can be affected by the degree of human interaction in automated interventions, perceived risks, privacy concerns, data accuracy, digital literacy, quality of the digital healthcare intervention, satisfaction, education, and income. …”
Get full text
Article -
2049
FedArtML: A Tool to Facilitate the Generation of Non-IID Datasets in a Controlled Way to Support Federated Learning Research
Published 2024-01-01“…We use the 2) Jensen-Shannon and Hellinger distances for quantifying the degree of IID data. …”
Get full text
Article -
2050
Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors
Published 2025-04-01“…This study explores the factors influencing college students’ acceptance and resistance toward generative AI technologies by integrating three theoretical frameworks: the Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Social Exchange Theory (SET). Using data from 407 respondents collected through a structured survey, the study employed Structural Equation Modeling (SEM) to examine how functional factors (perceived usefulness, ease of use, and reliability), risk factors (privacy concerns, data security, and ethical issues), and sociolegal factors (trust in governance and regulatory frameworks) impact user attitudes. …”
Get full text
Article -
2051
Artificial intelligence in the tourism business: a systematic review
Published 2025-07-01“…The aim of this re-search is to explore the application of AI in the tourism industry, identifying the main AI technologies used in the business, the specific areas or processes, their benefits, and challenges. …”
Get full text
Article -
2052
The level of male involvement and associated factors in the prevention of mother-to-child transmission of HIV in Lusaka, Zambia
Published 2025-12-01“…A 10—item male partner involvement scale was used in the survey, and focus group discussions with both men and women and key informants were used to collect qualitative data. …”
Get full text
Article -
2053
Sybil Attack Detection Based on Signal Clustering in Vehicular Networks
Published 2024-01-01“…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
Get full text
Article -
2054
Identifying latent mobility as a service preference segments among college students
Published 2025-04-01“…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
Get full text
Article -
2055
Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks
Published 2024-08-01“…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
Get full text
Article -
2056
Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors
Published 2025-03-01“…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
Get full text
Article -
2057
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
Published 2025-01-01“…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
Get full text
Article -
2058
Design of mTCN framework for disaster prediction a fusion of massive machine type communications and temporal convolutional networks
Published 2025-08-01“…The objective is to develop a scalable, secure, and efficient system for real-time disaster prediction using IoT data streams. Lightweight edge-based TCNs enable localized anomaly detection, while federated learning ensures privacy-preserving collaborative model training across edge devices. …”
Get full text
Article -
2059
Cybercrime Regulation through Laws and Strategies: a Glimpse into the Indian Experience
Published 2020-03-01“…This Act underwent amendment in 2008 to accommodate provisions essential to regulate cybercrimes as well as protect data and privacy on cyber space. In addition to the law, other strategies were designed and adopted to better regulate cyber offences including announcing cyber security policies, constituting institutions to take care of certain concerns including those relating to critical infrastructure information, etc. …”
Get full text
Article -
2060
A scaling law to model the effectiveness of identification techniques
Published 2025-01-01Get full text
Article