Suggested Topics within your search.
Suggested Topics within your search.
-
821
Building occupancy estimation using single channel CW radar and deep learning
Published 2025-04-01“…Abstract Counting the number of people in a room is crucial for optimizing smart buildings, enhancing energy efficiency, and ensuring security while preserving privacy. This study introduces a novel radar-based occupancy estimation method leveraging a 24-GHz Continuous Wave (CW) radar system integrated with time-frequency mapping techniques using Continuous Wavelet Transform (CWT) and power spectrum analysis. …”
Get full text
Article -
822
Assessing the Guidelines on the Use of Generative Artificial Intelligence Tools in Universities: A Survey of the World’s Top 50 Universities
Published 2024-12-01“…These instructions encompassed securing instructor consent before utilization, identifying appropriate and inappropriate instances for deployment, employing suitable strategies in classroom settings and assessment, appropriately integrating results, acknowledging and crediting GenAI tools, and adhering to data privacy and security measures. However, our study found that only a small number of the retrieved guidelines offered instructions on the AI algorithm (understanding how it works), the documentation of prompts and outputs, AI detection tools, and mechanisms for reporting misconduct. …”
Get full text
Article -
823
Blockchain framework with IoT device using federated learning for sustainable healthcare systems
Published 2025-07-01“…The proposed method achieves data privacy and security by 98.73%, intrusion detection efficiency by 97.16%, disease detection accuracy by 96.425, proactive healthcare management by 98.37%, and interoperability by 96.74%.…”
Get full text
Article -
824
Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR
Published 2025-12-01“…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
Get full text
Article -
825
Unobtrusive stress detection using wearables: application and challenges in a university setting
Published 2025-08-01“…Advances in sensing accuracy and utility design in wearables might make this feasible; however, real-world adoption faces challenges, as users often fail to wear or use these devices consistently and correctly. Additionally, institutional monitoring raises privacy concerns.MethodsIn this study, we analyze real-world data from a cohort of 103 Japanese university students to identify periods of cyclical stress while ensuring individual privacy through aggregation. …”
Get full text
Article -
826
Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method
Published 2024-11-01“…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
Get full text
Article -
827
Cancelable finger vein authentication using multidimensional scaling based on deep learning
Published 2025-06-01Get full text
Article -
828
-
829
Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning
Published 2025-01-01“…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
Get full text
Article -
830
Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia
Published 2022-12-01“…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
Get full text
Article -
831
Using social presence theory to predict online consumer engagement in the emerging markets
Published 2023-08-01Get full text
Article -
832
Heartbeat detection and personal authentication using a 60 GHz Doppler sensor
Published 2025-08-01“…Unlike fingerprint and facial recognition systems, they offer authentication without physical contact or privacy concerns. This study focuses on non-contact seismocardiography using microwave Doppler sensors and aims to apply this technology for biometric authentication.MethodWe proposed a method for authenticating and identifying heartbeat signals through supervised learning using a conditional variational autoencoder (CVAE). …”
Get full text
Article -
833
Emotion Estimation Using Noncontact Environmental Sensing with Machine and Deep Learning Models
Published 2025-01-01“…This paper presents a method for estimating arousal and emotional valence levels using non-contact environmental sensing, addressing challenges such as discomfort from long-term device wear and privacy concerns associated with facial image analysis. …”
Get full text
Article -
834
Using Digital Technology to Conduct COVID-19 Surveillance: A Systematic Review
Published 2025-06-01“…Unique Contribution: This study emphasises the role of digital technologies in virus detection, monitoring, and prevention as a medium of infectious disease transmission, particularly in contact tracing, symptom monitoring, location tracking, and real-time data management. It highlights the challenges of privacy, data security, and public adoption issues. …”
Get full text
Article -
835
Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study
Published 2025-07-01“…Based on the architecture, a privacy-preserving SL system was established, and we further validated the performance of the model in external verification sets and clinical use. …”
Get full text
Article -
836
Development of an intelligent intrusion detection system for IoT networks using deep learning
Published 2025-07-01“…However, attack diversity, device heterogeneity, and traditional security limitations necessitate advanced data analysis. Researchers increasingly use deep learning, which excels in handling large-scale data, to develop robust intrusion detection systems. …”
Get full text
Article -
837
High-fidelity steganography in EEG signals using advanced transform-based methods
Published 2025-05-01“…The increasing prevalence of digital health solutions and smart health devices (SHDs) ensures the continuity of personal biometric data while simultaneously raising concerns about their security and privacy. …”
Get full text
Article -
838
Security of medical images over insecure communication channels using zero-steganography
Published 2022-02-01Get full text
Article -
839
Privacy Matters: Experiences of Rural and Remote Emergency Department Patients – A Mixed-Methods Research Conducted in Newfoundland and Labrador, Canada
Published 2025-02-01“…Methods: This study used a mixed-methods design, gathering quantitative and qualitative data using a telephone survey and semi-structured interviews. …”
Get full text
Article -
840
Reporting the potential risk of using AI in higher Education: Subjective perspectives of educators
Published 2025-05-01“…The findings reveal significant concerns about privacy risks, academic integrity, and the validity of AI-generated data. …”
Get full text
Article