Suggested Topics within your search.
Suggested Topics within your search.
-
2541
Robust hierarchical federated learning with dual-layer filtering mechanism
Published 2025-03-01“…Hierarchical federated learning (HFL) is an effective “cloud-edge-device” distributed model training framework that protects data privacy. During HFL training, poisoning attacks on local data and transmitted models can affect the accuracy of the global model. …”
Get full text
Article -
2542
Distributed Ledger Technology Based Integrated Healthcare Solution for Bangladesh
Published 2023-01-01“…This application collects health data from each user in a systematic manner, which is useful for research institutes and healthcare-related organizations. …”
Get full text
Article -
2543
Generative AI/LLMs for Plain Language Medical Information for Patients, Caregivers and General Public: Opportunities, Risks and Ethics
Published 2025-07-01“…There are ethical concerns that overreliance/unsupervised reliance on gAI/LLMs could lead to the “humanizing” of these models and pose a risk to patient health equity, inclusiveness and data privacy. For these technologies to be truly transformative, they must become more transparent, have appropriate governance and monitoring, and incorporate feedback from healthcare professionals (HCPs), patients, and other experts. …”
Get full text
Article -
2544
Blockchain driven medical image encryption employing chaotic tent map in cloud computing
Published 2025-02-01“…To sum up, the BCTMES effectively addresses a number of prevalent risks to picture security and offers a complete solution that may be implemented in cloud-based settings where data integrity and privacy are crucial. This work suggests a promising path for further investigation and practical uses in secure image transmission.…”
Get full text
Article -
2545
A hybrid approach to time series forecasting: Integrating ARIMA and prophet for improved accuracy
Published 2025-09-01“…With the increasing volume of data generated by IoT devices, performing analytics at the edge offers significant advantages in terms of latency, bandwidth consumption, and privacy. …”
Get full text
Article -
2546
Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain
Published 2024-01-01“…The obtained raw data is pre-processed by using handling missing values and adaptive min-max normalization. …”
Get full text
Article -
2547
Investigating the Applications and Challenges of Metaverse in Education: A Systematic Review
Published 2024-11-01“…The research findings indicate that remote learning, immersion learning, collaborative learning, personalized learning, flipped learning, student-centered learning, experiential learning, hybrid learning, mobile learning, simulated learning, skill-based learning and Borderless and question-based learning are the most common uses of metaverse in education. However, the metaverse is associated with technical, ethical and social challenges such as the nascent nature of the technology, high cost of equipment, weak support infrastructure, inaccessibility to everyone, violation of privacy, data and network security, lack of legal guidelines and regulations. …”
Get full text
Article -
2548
Deep Learning–Based Precision Cropping of Eye Regions in Strabismus Photographs: Algorithm Development and Validation Study for Workflow Optimization
Published 2025-07-01“…ObjectiveThis study aimed to address these challenges using an advanced preprocessing algorithm to enhance the accuracy, efficiency, and standardization of eye region cropping for clinical workflows and AI data preprocessing. …”
Get full text
Article -
2549
Predicting and Preventing School Dropout with Business Intelligence: Insights from a Systematic Review
Published 2025-04-01“…We collected literature from the Google Scholar and Scopus databases using a comprehensive search strategy, incorporating keywords such as “business intelligence”, “machine learning”, and “big data”. …”
Get full text
Article -
2550
Birth companion satisfaction for the usage of Maathru Samman Pants while attending labor of their pregnant women as an initiative of respectful maternity care: A mixed method study
Published 2025-06-01“…The present study was conducted to study birth companion satisfaction, acceptability, and demand for using Maathru Samman Pants (MSP) while attending labor of pregnant women in tertiary care health facilities. …”
Get full text
Article -
2551
Workflow for Conflict and Reinforcement Identification Based on STPA and STRIDE
Published 2025-01-01“…First, requirements identification is generally made using methods of specific concern, e.g. safety, cybersecurity, data privacy, and business, and it does not consider concerns jointly. …”
Get full text
Article -
2552
Exploring nurse and patient perspectives on WeChat-based prenatal education in Chinese public hospitals: a qualitative inquiry
Published 2025-04-01“…Seventeen obstetric nurses and eight pregnant women participated in semi-structured interviews between March and August 2024. Data were analyzed using thematic analysis to identify commonalities and divergences between nurse-driven and patient-driven experiences. …”
Get full text
Article -
2553
Barriers to Institutional Childbirth in Rumbek North County, South Sudan: A Qualitative Study.
Published 2016-01-01“…Data were analysed using inductive content analysis.…”
Get full text
Article -
2554
Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings
Published 2024-09-01“…Our solution uses an unscented Kalman filter for target tracking over time and analyses features of movement to determine whether targets are human or not. …”
Get full text
Article -
2555
Descriptive Phenomenology from Instances of Dishonesty in Psychotherapy by Psychotherapists
Published 2024-11-01“…A total of 16 psychotherapists constituted the sample for this research, and data were collected using a five-axis semi-structured interview protocol focused on psychotherapy dishonesty. …”
Get full text
Article -
2556
Optimized summary-statistic-based single-cell eQTL meta-analysis
Published 2025-08-01“…These are however, complicated by privacy constraints due to sharing of genotype data and the measurement and technical variety across different scRNA-seq datasets as a result of differences in mRNA capture efficiency, experimental protocols, and sequencing strategies. …”
Get full text
Article -
2557
Digital Empowerment in Social Work: Leveraging AI to Enhance Educational Access in Developing Nations
Published 2024-12-01“…Data were analyzed using thematic analysis, examining cases and models where AI has expanded access to scholarly materials through automated translation services, enabled localized resources through virtual training simulations, and facilitated the incorporation of culturally aligned self-help tools such as AI chatbots and wellness applications. …”
Get full text
Article -
2558
The Influence of Fintech on the National Security System: Law, Economic Potential and Digital Defense Strategy
Published 2025-06-01“…Governments need to implement stringent regulations to safeguard Fintech user data and privacy and closely supervise Fintech operations to mitigate the risks of financial technology misuse. …”
Get full text
Article -
2559
Designing digital conversational agents for youth with multiple mental health conditions: Insights on key features from a youth-engaged qualitative descriptive study
Published 2025-03-01“…Results Four key themes were generated from the focus group data: (1) the importance of a customizable and flexible design for personalization; (2) confidentiality, privacy features and risk mitigation features; (3) the need for reliable, informative content that is user tested and validated; (4) a friendly and human-like interaction style. …”
Get full text
Article -
2560
De-identification of Emergency Medical Records in French: Survey and Comparison of State-of-the-Art Automated Systems
Published 2021-04-01“…For visits motivated by a traumatic event, information on the causes are stored in free-text clinical notes. To exploit these data, an automated de-identification system guaranteeing protection of privacy is required. …”
Get full text
Article