Suggested Topics within your search.
Suggested Topics within your search.
-
2141
A Non-Invasive Approach for Facial Action Unit Extraction and Its Application in Pain Detection
Published 2025-02-01“…A significant challenge that hinders advancements in medical research is the sensitive and confidential nature of patient data in available datasets. In particular, sharing patients’ facial images poses considerable privacy risks, especially with the rise of generative artificial intelligence (AI), which could misuse such data if accessed by unauthorized parties. …”
Get full text
Article -
2142
Availability and utilization of sexual and reproductive health services among adolescents of Godawari Municipality, Nepal: A cross-sectional study.
Published 2025-01-01“…Only 13.22% of them had ever used ASRH services, and the reasons for not using services were the lack of realization of the need for services (60.39%), while 14.55% of them felt that privacy was not maintained at all. …”
Get full text
Article -
2143
Exploring the potential of GenAI for personalised English teaching: Learners' experiences and perceptions
Published 2025-06-01“…Our results underscore the need for professional development for educators and the establishment of guidelines to address academic integrity and data privacy.…”
Get full text
Article -
2144
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
2145
kMoL: an open-source machine and federated learning library for drug discovery
Published 2025-02-01“…Graph Convolutional Network (GCN) models have proven especially promising due to their inherent ability to model molecular structures using graph-based representations. However, maximizing the potential of such models in practice is challenging, as companies prioritize data privacy and security over collaboration initiatives to improve model performance and robustness. kMoL is an open-source machine learning library with integrated federated learning capabilities developed to address such challenges. …”
Get full text
Article -
2146
Large Language Models in Medicine: Clinical Applications, Technical Challenges, and Ethical Considerations
Published 2025-04-01“…Ethical concerns involve algorithmic bias risking health inequities, threats to patient safety from inaccuracies, unclear accountability, data privacy, and impacts on clinician-patient interactions. …”
Get full text
Article -
2147
Evaluating the Ethical Practices in Developing AI and Ml Systems in Tanzania
Published 2024-09-01“…Artificial Intelligence (AI) and Machine Learning (ML) present transformative opportunities for sectors in developing countries like Tanzania that were previously hindered by manual processes and data inefficiencies. Despite these advancements, the ethical challenges of bias, fairness, transparency, privacy, and accountability are critical during AI and ML system design and deployment. …”
Get full text
Article -
2148
Hybrid Transformer-KAN Within Federated Learning Framework: A Novel Machine Learning Approach for Improved Short-Term Weather Forecasting
Published 2025-01-01“…Furthermore, federated learning is applied to the proposed method to exploit the spatio-temporal dependencies while protecting data privacy. As a result, a novel framework of Federated-Transformer-KAN is proposed to collaboratively forecast weather variables in a distributed manner, without sharing data that is collected by the intelligent sensors equipped at each weather station locally. …”
Get full text
Article -
2149
Advancing the Sensitivity Frontier in digital contact tracing: Comparative analysis of proposed methods toward maximized utility
Published 2025-01-01“…During the COVID-19 pandemic, many countries adopted Digital Contact Tracing (DCT) technology to control infections. However, the widely-used Bluetooth Low Energy (BLE)-based DCT requires both the infected individual and the contact to have the application activated to detect exposure. …”
Get full text
Article -
2150
Receptiveness to participating in cannabis research in pregnancy: a survey study at The Ottawa Hospital [version 1; peer review: 2 approved]
Published 2021-05-01“…In the design of new cohort studies to evaluate the patterns and outcomes of cannabis use in pregnancy, consideration must be given to the factors influencing participation, data sharing, and contribution of biological samples. …”
Get full text
Article -
2151
“Invisible wounds of childbirth”; women’s experiences of obstetric violence: a phenomenological qualitative study
Published 2025-08-01“…The interview data were transcribed and then subjected to qualitative content analysis in accordance with Standards for Qualitative Research Reporting (SRQR) using Graneheim and Lundman’s content analysis method. …”
Get full text
Article -
2152
Federated Online Learning for adaptive load forecasting across decentralized nodes
Published 2025-08-01“…The main drawbacks are twofold: (1) data sharing and transfer results in privacy and security risks, and (2) static models miss opportunities to learn from new data. …”
Get full text
Article -
2153
Barriers and facilitators to telemedicine contraception among patients that speak Spanish: a qualitative studyAJOG Global Reports at a Glance
Published 2025-02-01“…Two coders analyzed the data using thematic analysis. Results: The average age of the participants was 32.5 years old (range 19–45). …”
Get full text
Article -
2154
Measuring large-scale social networks with high resolution.
Published 2014-01-01“…Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1000 individuals, using state-of-the-art smartphones as social sensors. …”
Get full text
Article -
2155
ROBOTISATION AND SERVICE AUTOMATION IN THE TOURISM AND HOSPITALITY SECTOR: A META-STUDY (1993-2024)
Published 2024-09-01“…Analyses 310 publications published in the last 32 years processed using Google Scholar search engine. The data sets used for the observations consist primarily of key research works, predominantly appearing in peer-reviewed international journals. …”
Get full text
Article -
2156
A Survey on Hybrid-CNN and LLMs for Intrusion Detection Systems: Recent IoT Datasets
Published 2024-01-01“…Various IDS methodologies, including those using Machine Learning (ML), Deep Learning (DL) and Large Language Models (LLMs), are employed to identify intrusions within the data; however, improvements to the detection systems are still needed. …”
Get full text
Article -
2157
Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi.
Published 2025-01-01“…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. …”
Get full text
Article -
2158
Advancing Remote Monitoring for Patients With Alzheimer Disease and Related Dementias: Systematic Review
Published 2025-05-01“…The studies revealed a strong focus on various remote monitoring methods for capturing behavioral, physiological, and environmental data yet showed a gap in evaluating these methods for patient and caregiver needs, privacy, and usability. …”
Get full text
Article -
2159
The Application of Digital Intelligence Technology in the Management of Non-Hospitalized Patients with Rare Diseases
Published 2025-01-01“…Methods We designed the search strategy and used the words " rare diseases"" patient management"" non-hospitalized management"" community management"" digital intelligence"" big data"" telemedicine" as MESH terms or free words. …”
Get full text
Article -
2160
Internet of Medical Things Integrating IoT with Healthcare for Remote Monitoring and Diagnosis
Published 2025-01-01“…By leveraging edge computing, AI, and blockchain-based security, the framework improves data privacy, reduces latency, and increases energy efficiency. …”
Get full text
Article