Suggested Topics within your search.
Suggested Topics within your search.
-
1401
A scoping review
Published 2024-11-01“…However, challenges such as data privacy concerns, algorithmic biases, and the need for greater transparency are also noted. …”
Get full text
Article -
1402
Challenges in Adopting Artificial Intelligence Technologies in Supply Chain Management in Romanian Companies
Published 2025-03-01“…Key challenges identified include high implementation costs, data quality issues, and ethical concerns related to data privacy and algorithmic transparency. …”
Get full text
Article -
1403
The impact of artificial intelligence on research efficiency
Published 2025-06-01“…From literature search to data analysis, to design experiments and manuscript writing, AI-powered tools using robotics, machine learning (ML), and natural language processing (NLP) go a long way in facilitating easy research. …”
Get full text
Article -
1404
Artificial Intelligence in Thoracic Surgery: Transforming Diagnostics, Treatment, and Patient Outcomes
Published 2025-07-01“…AI-based tools can be employed in medicine, and by extracting useful information from big data, they allow for the early diagnosis of diseases like lung cancer. …”
Get full text
Article -
1405
Edge-Assisted Label-Flipping Attack Detection in Federated Learning
Published 2024-01-01“…Federated Learning (FL) has transformed machine learning by facilitating decentralized, privacy-focused data processing. Despite its advantages, FL remains vulnerable to data poisoning attacks, particularly Label-Flipping Attacks (LFA). …”
Get full text
Article -
1406
How do we measure the costs, benefits, and harms of sharing data from biomedical studies? A protocol for a scoping review [version 2; peer review: 2 approved]
Published 2025-01-01“…In this scoping review, we will identify and summarize existing evidence on the positive and negative impacts and costs of data sharing and how they are measured. Methods and analysis Eligible studies will report on qualitative or quantitative approaches for measuring the cost of data sharing or its impact on participant privacy, individual or public health, researcher’s careers, clinical or public health practice, or research or development. …”
Get full text
Article -
1407
Revolutionizing Education: Harnessing Machine Learning and Deep Learning for Digital Examination Transformation
Published 2023-12-01“…Furthermore, substantial concerns revolve around data security and privacy. The digital examination process entails the collection and secure storage of sensitive student data, raising worries about potential data security breaches and violations of privacy. …”
Get full text
Article -
1408
Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence
Published 2024-07-01“…Technical risks include data security vulnerabilities and model bias, while ethical risks focus on the issues surrounding user privacy, misinformation, and intellectual property rights. …”
Get full text
Article -
1409
CogTrack: A Proof of Concept for Cognition Tracker
Published 2024-01-01“…Additionally, we discuss how CogTrack may be advanced in the future and reflect on critical issues related to data privacy, confidentiality, ethics, scalability, and socio-medical factors which influence CogTrack adoption and acceptability. …”
Get full text
Article -
1410
Machine Learning for Human Activity Recognition: State-of-the-Art Techniques and Emerging Trends
Published 2025-03-01Get full text
Article -
1411
Enhancing retinal disease diagnosis through AI: Evaluating performance, ethical considerations, and clinical implementation
Published 2024-09-01“…However, several studies highlighted concerns about algorithmic bias, data privacy, and the need for diverse and representative datasets to ensure generalizability across different populations. …”
Get full text
Article -
1412
Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks
Published 2024-01-01“…A significant concern in the field of cloud computing is the security and confidentiality of data. A cryptographic access control technique can be used to guarantee data privacy, which prevents unauthorized access and allows only authorized users to access the data. …”
Get full text
Article -
1413
Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ
Published 2024-12-01“… This study aims to analyze and evaluate the vulnerability of Insecure Direct Object Reference (IDOR) in the thesis registration web application at XYZ University, as well as to provide improvement recommendations to enhance the security of students' personal data. The IDOR vulnerability allows unauthorized access to students' personal documents, which can jeopardize privacy and information security. …”
Get full text
Article -
1414
Tree-to-Me: Standards-Driven Traceability for Farm-Level Visibility
Published 2025-04-01“…These systems also fail to standardise and integrate diverse data sources, ensure data privacy, and scale effectively to meet the demands of modern agriculture. …”
Get full text
Article -
1415
SimProx: A Similarity-Based Aggregation in Federated Learning With Client Weight Optimization
Published 2024-01-01“…Federated Learning (FL) enables decentralized training of machine learning models across multiple clients, preserving data privacy by aggregating locally trained models without sharing raw data. …”
Get full text
Article -
1416
-
1417
The relevance of implementing the employee digital profile as an element of the employer’s HR policy
Published 2025-06-01“…The most important risk today is the increasing release of labor force and mass cuts of jobs requiring average qualifications, as well as dismissal of employees due to failure to pass tests because of the lack of skills in digital tools.The purpose of the study was to substantiate the urgent character of the implementation of digital profile programs as a part of the employer's personnel policy to achieve the objectives set in the National Security Strategy of the Russian Federation dated 2021.The methodology of comprehensive research, including methods of document analysis, comparative analysis, secondary use of sociological and economic data were used.Main results. …”
Get full text
Article -
1418
Tabular transformer generative adversarial network for heterogeneous distribution in healthcare
Published 2025-03-01“…However, privacy concerns have hindered their widespread use. …”
Get full text
Article -
1419
Crypto management: a novel organizational management model based on blockchain
Published 2022-06-01“…Aim to deal with the problem of data, trust and timeliness asymmetry faced by modern organizational management from the root, a novel organizational management model towards Web 3.0 namely crypto management was proposed.It was enabled by blockchain technology and smart contracts based on it, supported by the federated data, organized in the form of DAO (decentralized autonomous organization), and driven by the incentive mechanism with NFT (non-fungible token) as the core.The primary goal of crypto management was to realize trustable, reliable and usable real-time management decision-making under the premise of data security and privacy protection.The framework of crypto management was formulated, its core components and implementation mode were discussed, and its operation process using the example of personnel performance management was also introduced.Towards the end, the potential future works in this emerging new area were discussed.…”
Get full text
Article -
1420
The Impact of Artificial Intelligence on Personalized Learning in Higher Education: A Systematic Review
Published 2025-03-01“…The risk of bias was assessed using a standardized ranking system. This systematic review follows the PRISMA guidelines to ensure transparency in study selection, data extraction, and synthesis. …”
Get full text
Article