Suggested Topics within your search.
Suggested Topics within your search.
-
881
Adapting Classification Neural Network Architectures for Medical Image Segmentation Using Explainable AI
Published 2025-02-01“…Despite their effectiveness, these networks face significant challenges, including the need for extensive annotated patient data, time-consuming manual segmentation processes and restricted data access due to privacy concerns. …”
Get full text
Article -
882
Depth-Based Intervention Detection in the Neonatal Intensive Care Unit Using Vision Transformers
Published 2024-12-01“…An intervention detection method based solely on depth data was developed using a vision transformer (ViT) model utilizing real-world data from patients in the NICU. …”
Get full text
Article -
883
Adaptive Task Scheduling in Fog Computing Using Federated DQN and K-Means Clustering
Published 2025-01-01Get full text
Article -
884
Preliminary Electroencephalography-Based Assessment of Anxiety Using Machine Learning: A Pilot Study
Published 2025-05-01Get full text
Article -
885
Securing and optimizing optical transmission in quantum wells using OAM and advanced modulation techniques
Published 2025-08-01“…However, current optical transmission methods encounter challenges in efficiently transmitting data due to limited OAM mode generation, reduced transmission privacy, and high atmospheric turbulence. …”
Get full text
Article -
886
A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash
Published 2016-02-01“…Nonline of sight capability makes RFID systems much better choice than its contended systems (such as barcode, magnetic tape, etc.). Since the RFID uses wireless channel for communication with its associated devices, there should be some optimal encryption methods to secure the communicating data from adversaries. …”
Get full text
Article -
887
Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization
Published 2025-05-01“…The goal of the developed framework is to improve the detection of IDS without using centralized data to preserve privacy. Whereas it enhances the processing and detection capability of huge amounts of data generated from IoT devices. …”
Get full text
Article -
888
Decentralized federated learning using validation loss for model sharing in crop disease classification
Published 2025-12-01“…Several AI methods have been employed for this purpose, but despite achieving good results, many challenges remain, such as protecting farmers’ data, using machine learning on edge devices, and employing collaborative learning. …”
Get full text
Article -
889
How to Write Effective Prompts for Screening Biomedical Literature Using Large Language Models
Published 2025-03-01“…Finally, we explore emerging trends, including multi-stage screening pipelines and fine-tuning, while noting ethical considerations related to data privacy and transparency. By applying systematic prompt engineering and rigorous evaluation, researchers can optimize LLM-based screening processes, allowing for faster and more comprehensive evidence synthesis across biomedical disciplines.…”
Get full text
Article -
890
Key challenges of launching national cryptocurrencies using extended FMEA under uncertainty environment
Published 2025-03-01Get full text
Article -
891
Scientific Evidence for Clinical Text Summarization Using Large Language Models: Scoping Review
Published 2025-05-01“…ResultsA total of 30 original studies were included in the analysis. All used observational retrospective designs, mainly using real patient data (n=28, 93%). …”
Get full text
Article -
892
Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator
Published 2024-01-01“…Scalability, resource limitations, and privacy concerns are analyzed as IoT devices handle sensitive information, and the transparent and immutable nature of blockchain can raise data protection. …”
Get full text
Article -
893
Secure and Reversible Face De-Identification With Format-Preserving Encryption
Published 2025-01-01“…In conclusion, the proposed method provides a robust privacy-preserving solution for facial data in digital environments, balancing security and utility while supporting lawful restoration.…”
Get full text
Article -
894
A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features
Published 2025-01-01“…The system dissects video inputs into frames to extract features comprehensively by using Multi Test Convolutional Networks (MTCNN). …”
Get full text
Article -
895
Global Health care Professionals’ Perceptions of Large Language Model Use In Practice: Cross-Sectional Survey Study
Published 2025-05-01“…The majority of our participants found ChatGPT to be useful; however, there are concerns about patient privacy, data security, and its legal and ethical issues as well as the accuracy of its information. …”
Get full text
Article -
896
Ethical guidelines for journalistic use of GenAI. The main trends in the international debate and progress in self-regulation in Spain
Published 2025-03-01“…To deal with this situation, academics and the journalistic sector have been publishing different professional guidelines and codes in an attempt to guide the ethical use of this technology. Based on the systematic review of three sets of academic guidelines and 18 important professional publications, and including data from more than 60 countries, this study establishes a double objective: to identify the main trends determining the international ethical debate; and to examine the degree of correspondence between these trends and the first self-regulation initiatives launched by the Spanish media. …”
Get full text
Article -
897
Knowledge, Attitudes, and Perceptions of Chronic Patients in Saudi Arabia Regarding the Use of Artificial Intelligence to Improve Medication Adherence
Published 2025-06-01“…Safaa M Alsanosi,1 Asayel Q Aldajani,2 Hasnaa A Gheliwi,2 Manar M Alotibi,2 Ghadi S Bokhari,2 Orjuwan A Almatrafi,2 Abdulelah K Alqawlaq,3 Jakleen Z Abujamai,3 Mohammed Shaikhomer,4 Yosra Z Alhindi,1 Asim M Alshanberi3 1Department of Pharmacology and Toxicology, Faculty of Medicine, Umm Al Qura University, Makkah, Saudi Arabia; 2Faculty of Medicine, Umm Al-Qura University, Makkah, Saudi Arabia; 3General Medicine Program, Batterjee Medical College, Jeddah, Saudi Arabia; 4Department of Internal Medicine, Faculty of Medicine, King Abdulaziz University, Jeddah, Saudi ArabiaCorrespondence: Safaa M Alsanosi, Department of Pharmacology and Toxicology, Faculty of Medicine, Umm Al Qura University, Makkah, Saudi Arabia, Email smsanosi@uqu.edu.saBackground: Artificial intelligence (AI) is advancing healthcare globally and in Saudi Arabia, enhancing patient care, diagnostics, and administrative efficiency, despite challenges such as data privacy and regulation. This study explores knowledge, attitudes, and perceptions (KAP) regarding AI in medication adherence among chronic patients in Makkah region, Saudi Arabia.Methods: A cross-sectional study was conducted among patients with chronic diseases in the Makkah region, Saudi Arabia, from 1 July to 31 December 2024. …”
Get full text
Article -
898
Prevalence of adolescent dual tobacco use and its associated factors: findings from a cross-sectional study
Published 2025-07-01“…Objective To determine the prevalence and its associated factors of dual tobacco use among Malaysian adolescents in developing effective public health strategies.Design Cross-sectional study.Setting This study analysed data from the National Health and Morbidity Survey (NHMS) 2022: Adolescent Health Survey (AHS), a nationwide cross-sectional survey conducted among secondary school students across Malaysia.Participants This cross-sectional study used data from the NHMS 2022: AHS, which included a representative national sample of Malaysian adolescents between the ages of 13 and 17. …”
Get full text
Article -
899
Health Care Professionals’ Use of Digital Technology in the Secondary Prevention of Cardiovascular Disease in Austria: Online Survey Study
Published 2025-06-01“…Quantitative survey data were analyzed using descriptive statistics, group comparison tests, and association statistics. …”
Get full text
Article -
900
CPS-IIoT-P2Attention: Explainable Privacy-Preserving With Scaled Dot-Product Attention in Cyber-Physical System-Industrial IoT Network
Published 2025-01-01“…The findings revealed that the scaled dot product attention mechanism dramatically boosts model performance, while Pearson correlation and agglomerative clustering safeguard data privacy in CPS-IIoT, surpassing the performance of existing state-of-the-art (SOTA) models. …”
Get full text
Article