Suggested Topics within your search.
Suggested Topics within your search.
-
941
Rich Data Versus Quantity of Data in Code Generation AI: A Paradigm Shift for Healthcare
Published 2025-06-01“…Using Self-Evolving Software (SES) as a case study, the research contrasts outcomes from both paradigms and proposes a weighted matrix for data selection in Code Gen AI systems. …”
Get full text
Article -
942
Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment
Published 2020-03-01“…This article proposes a method for partially encrypting private information in images using FF1 and FF3-1. The proposed method encrypts private information without increasing the data size, solving the problem of wasted storage space. …”
Get full text
Article -
943
Federated Learning-Based State of Charge Estimation in Electric Vehicles Using Federated Adaptive Client Momentum
Published 2025-01-01“…The proposed method is initially validated via experimental results using the collected data from Musoshi L5 type EV. …”
Get full text
Article -
944
A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks
Published 2014-01-01“…To support privacy-preserving data aggregation and integrity checking, our technique makes use of the additive property of complex numbers. …”
Get full text
Article -
945
Intrusion Detection Using Machine Learning for Risk Mitigation in IoT-Enabled Smart Irrigation in Smart Farming
Published 2022-01-01“…In this framework, the NSL KDD data set is used as an input data set. In the preprocessing of the NSL-KDD data set, first all symbolic features are converted to numeric features. …”
Get full text
Article -
946
Fall Detection Using Federated Lightweight CNN Models: A Comparison of Decentralized vs. Centralized Learning
Published 2025-07-01“…The pipeline begins with data acquisition, in which annotated video-based fall-detection datasets formatted in YOLO are used to extract image crops of human subjects. …”
Get full text
Article -
947
xFedCAV: Cyberattacks on Leader and Followers in Automated Vehicles With Cooperative Platoons Using Federated Agents
Published 2025-01-01“…Our framework leverages federated learning to enhance privacy and security, using Shapley Additive exPlanations (SHAP) for interpretable detection. …”
Get full text
Article -
948
Analysis of Service Quality on the Starbucks Indonesia Application Using E-SERVQUAL and Importance Performance Analysis (IPA)
Published 2025-08-01“…This study aims to evaluate the app’s service quality using E-ServQual method, which assesses seven dimensions: efficiency, reliability, fulfillment, privacy, responsiveness, compensation, and contact. …”
Get full text
Article -
949
Provider Perspectives on the Use of Mental Health Apps, and the BritePath App in Particular, With Adolescents at Risk for Suicidal Behavior: Qualitative Study
Published 2025-02-01“…Analyses identified 4 key themes related to mental health apps: (1) almost all providers viewed mental health apps as an adjunct to, rather than a replacement for, psychotherapy visits; (2) most providers were concerned about the cost of apps and youth access to them; (3) providers noted the challenge of maintaining patient engagement with apps over time; and (4) providers were concerned about patient privacy, in terms of both data shared with app developers and data privacy within families. …”
Get full text
Article -
950
Advanced Machine Learning and Deep Learning Approaches for Estimating the Remaining Life of EV Batteries—A Review
Published 2025-01-01“…This systematic review presents a critical analysis of advanced machine learning (ML) and deep learning (DL) approaches for predicting the remaining useful life (RUL) of electric vehicle (EV) batteries. …”
Get full text
Article -
951
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map
Published 2022-01-01“…To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. …”
Get full text
Article -
952
Problem of Harmonization of Legal Norms with the Needs of Police Investigations by Using High-Tech Instruments for Searching Information
Published 2021-03-01“…The problem of harmonization of legal norms with the needs of police investigations with the use of high-tech data search tools has been analyzed. …”
Get full text
Article -
953
Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning
Published 2025-03-01“…These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads. However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. …”
Get full text
Article -
954
Using Inertial Measurement Units and Machine Learning to Classify Body Positions of Adults in a Hospital Bed
Published 2025-01-01“…Movement data were captured using five IMU Xsens DOTs attached to the forehead, wrists and ankles. …”
Get full text
Article -
955
Assessing the practicality of using freely available AI-based GPT tools for coach learning and athlete development
Published 2025-07-01“…Despite the strengths, there were also associated risks and pitfalls when using this process such as the strength and robustness of the applicable statistical outcomes and tensions between keeping the input data within the context and ensuring that the context did not breach privacy issues. …”
Get full text
Article -
956
Movement Direction Classification Using Low-Resolution ToF Sensor and LSTM-Based Neural Network
Published 2025-06-01Get full text
Article -
957
Value of Artificial Intelligence for Enhancing Suspicion of Cardiac Amyloidosis Using Electrocardiography and Echocardiography: A Narrative Review
Published 2025-04-01“…Thirteen studies met inclusion criteria with sample sizes ranging from 50 to 2451 patients. Four studies used ECG data, 8 used echocardiography data, and 1 used both. …”
Get full text
Article -
958
Public Health Using Social Network Analysis During the COVID-19 Era: A Systematic Review
Published 2024-11-01“…We highlight the ethical concerns related to the use of social media data, such as privacy and consent, underscoring the potential of integrating ethical SNA with more inclusive, human-centered practices to enhance the effectiveness and community buy-in of emerging computational public health efforts.…”
Get full text
Article -
959
Quantum proof biometric authentication framework using binary lattices and homomorphic encryption for secure cancelable templates
Published 2025-06-01“…Three benchmark data sets, ORL, CASIA-Face V5 and deep funneled LFW, were used for security and performance evaluations, resulting in Error Equal Rates of 0.000714, 0.000438, and 0.006330, respectively. …”
Get full text
Article -
960
Acceptance and perceived usefulness of digital health services in the management of chronic urticaria: a survey of patients and physicians
Published 2025-07-01“…Key barriers to adoption were identified, including concerns over data privacy, limitations in technical infrastructure, and a lack of awareness of available digital health solutions. …”
Get full text
Article