Suggested Topics within your search.
Suggested Topics within your search.
-
961
Using Artificial Intelligence to Predict Customer Satisfaction with E-Payment Systems during the COVID-19 Pandemic
Published 2022-01-01“…Descriptive analytical approach of a sample of 1,025 people living in Saudi Arabia was used to answer the study questions and test its hypotheses. …”
Get full text
Article -
962
Improving Transformer Performance for French Clinical Notes Classification Using Mixture of Experts on a Limited Dataset
Published 2025-01-01“…The MoE-Transformer addresses the dual challenges of effective training with limited data and low-resource computation suitable for in-house hospital use. …”
Get full text
Article -
963
Insights From Art Therapists on Using AI-Generated Art in Art Therapy: Mixed Methods Study
Published 2024-12-01“…MethodsUsing a co-design approach, 10 art therapists affiliated with the American Art Therapy Association participated in this study. …”
Get full text
Article -
964
A Non-Invertible Secure Template Generation Using AES Encrypted MCC and Random Triangle Projection
Published 2025-01-01“…In recent years, due to the exponential growth in the applicability of biometric authentication systems, it has become essential to address the privacy and security concerns of user biometric information. …”
Get full text
Article -
965
Real-Time Acoustic Scene Recognition for Elderly Daily Routines Using Edge-Based Deep Learning
Published 2025-03-01“…Traditional acoustic scene monitoring systems that rely on cloud computing are limited by data transmission delays and privacy concerns. Hence, this study proposes an acoustic scene recognition system that integrates edge computing with deep learning to enable real-time monitoring of elderly individuals’ daily activities. …”
Get full text
Article -
966
A Reference Model of GaaP Readiness Indexes Using Systematic Review and Meta-Synthesis Method
Published 2025-03-01“…This is a qualitative study and a systematic review of the literature in which the meta-synthesis method is used to analyze and analyze the data extracted from selected sources. …”
Get full text
Article -
967
The Ways of Using Social Media for Health Promotion Among Adolescents: Qualitative Interview and Focus Group Study
Published 2025-06-01“…In addition, 5 individual interviews with boys were carried out to balance gender representation, as boys were less vocal in group settings. Data were analyzed using content analysis with a combined deductive-inductive coding approach in MAXQDA software, achieving high intercoder reliability (Cohen κ=0.93). …”
Get full text
Article -
968
Investigating Sensitive Issues in Class Through Randomized Response Polling
Published 2024-10-01“…This article provides an introduction to randomized response polling, a technique which was designed to allow for questioning on sensitive issues while protecting the respondent’s privacy and avoiding social desirability bias. It is described in terms that are suitable for presentation and use in any classroom environment. …”
Get full text
Article -
969
Acceptability of and Willingness to Use Virtual Reality Exergames for Weight Loss Among Young Adults With Overweight or Obesity in China: Qualitative Study
Published 2025-05-01“…ResultsFour main themes and 8 subthemes emerged from the data. The main themes included perception of previous weight loss measures (regarded exercise and diet as the main measures for weight loss and difficulties in holding on to the weight loss methods), acceptability of virtual reality exergames (increasing opportunities for exercise, a powerful means for propelling doing exercise, positive impact on psychological well-being, and more appealing to office workers than students), willingness to use virtual reality exergames, and concerns (weight loss effect and other concerns). …”
Get full text
Article -
970
Employing Ontology-Alignment and Locality-Sensitive Hashing to Improve Attribute Interoperability in Federated eID Systems
Published 2016-10-01“…In addition, the improvement obtained in the alignment process by combining the two assessment winners does not impact negatively the privacy of the user’s data, since no clear-text data is exchanged in the alignment process.…”
Get full text
Article -
971
Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain
Published 2025-05-01“…In this study, we applied the proposed simulation to the proposed hybrid framework, making use of deep learning to continue monitoring IoT data; we also used the blockchain association in the framework to log, tackle, manage, and document all of the IoT sensor’s data points. …”
Get full text
Article -
972
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01“…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
Get full text
Article -
973
Secure vehicular digital forensics system based on blockchain
Published 2020-06-01“…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
Get full text
Article -
974
Secure vehicular digital forensics system based on blockchain
Published 2020-06-01“…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
Get full text
Article -
975
‘Over Time Everyone’s Gonna Be Open to It’: User Attitudes Toward Security and Privacy in Continuous Authentication for Smart Homes
Published 2025-01-01“…Participants also envisioned CA systems that offer more granular permission controls over personal data. Our findings indicate the contextual dependencies in balancing usability with privacy and security concerns. …”
Get full text
Article -
976
Federated learning-based semantic segmentation framework for sustainable development
Published 2025-06-01“…Federated Learning protects user privacy by processing data locally on client devices rather than storing it centrally on a server. …”
Get full text
Article -
977
Evaluation of Adblock Software Usage
Published 2019-12-01“…The study was based on data obtained by a web questionnaire. The research was focused on evaluation of adblocking software usage factors in five categories: (1) gender, age, and education; (2) use of advertising and sources of knowledge about advertising; (3) technical and social reasons for blocking online advertisements; (4) usage of an adblock-wall; and (5) type of online advertisement. …”
Get full text
Article -
978
Trust and Privacy Concerns Among Cancer Survivors Who Did Not Visit a Research Website Offering Free Genetic Counseling Services for Families: Survey Study
Published 2025-05-01“…The survey was brief and contained 27 items, including recall of the invitation, interest in ovarian cancer information, benefits of using health websites, trust in health websites, and trust in university-based health research. …”
Get full text
Article -
979
LightLSB: a lightweight secure transmission mechanism for large-scale biometric images in computing limited environment
Published 2025-04-01“…The widespread use of biometric recognition has intensified social concerns about personal privacy disclosure. …”
Get full text
Article -
980
User Centric Android Application Permission Manager
Published 2021-12-01“…Like other systems, mobile devices are prune to different attacks that might invade user’s privacy and lead to private data leakage. Millions of Mobile application have been developed and used Worldwide, most of them are requiring permissions to work properly. …”
Get full text
Article