Suggested Topics within your search.
Suggested Topics within your search.
-
1421
Realizing the potential of Internet of Things (IoT) in Industrial applications
Published 2025-04-01“…However, challenges like data privacy, interoperability, and scalability remain critical barriers to widespread adoption. …”
Get full text
Article -
1422
Blockchain Applications in the Military Domain: A Systematic Review
Published 2025-01-01“…It addresses many problems related to data security, privacy, communication, and supply chain management. …”
Get full text
Article -
1423
The Impact of AI-Driven Application Programming Interfaces (APIs) on Educational Information Management
Published 2025-06-01“…In today’s digitalized educational landscape, the intelligent use of information is essential for personalizing learning, improving assessment accuracy, and supporting data-driven pedagogical decisions. …”
Get full text
Article -
1424
Metaheuristic-Based Cepstral Sensing Technique for Prolonging Network Lifetime and Mitigating Primary User Emulation Attacks in Cognitive Radio Sensor Network
Published 2025-01-01“…Extensive simulations are used to analyze the proposed algorithm, incorporating important performance parameters including error probability, energy efficiency, residual energy, data gathering efficiency, network longevity, and throughput. …”
Get full text
Article -
1425
Industry 4.0 in commercial airlines: a bibliometric analysis
Published 2025-08-01“…Commercial airlines face numerous challenges related to operational inefficiencies, poor maintenance practices, overcrowding of airports, supply chain complexity, lack of seamless customer experience, safety issues, data privacy and security issues, increasing fuel prices, and sustainability issues; however, Industry 4.0 technologies are widely regarded as a transformative solution, offering advanced tools and methodologies to address these challenges effectively. …”
Get full text
Article -
1426
FedDrip: Federated Learning With Diffusion-Generated Synthetic Image
Published 2025-01-01“…In the realm of machine learning in healthcare, federated learning (FL) is often recognized as a practical solution for addressing issues related to data privacy and data distribution. However, many real-world datasets are not identically and independently distributed (non-IID). …”
Get full text
Article -
1427
Synthetic Patient–Physician Conversations Simulated by Large Language Models: A Multi-Dimensional Evaluation
Published 2025-07-01“…Background: Data accessibility remains a significant barrier in healthcare AI due to privacy constraints and logistical challenges. …”
Get full text
Article -
1428
AI optimization algorithms enhance higher education management and personalized teaching through empirical analysis
Published 2025-03-01“…The research also identifies challenges and limitations, including data privacy issues, algorithmic bias, and the need for human-AI interaction. …”
Get full text
Article -
1429
Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users
Published 2025-06-01“…The proliferation of the Internet of Things (IoT) has led to an abundance of data streams and real-time dashboards in domains such as smart cities, healthcare, manufacturing, and agriculture. …”
Get full text
Article -
1430
A Survey on Anti-Money Laundering Techniques in Blockchain Systems
Published 2025-04-01“…Furthermore, this study discusses the practical applications of these techniques and reviews commonly used datasets that support AML research. Looking ahead, the advancement of AML technologies in blockchain systems necessitates progress in several critical areas: the construction of AML datasets capable of addressing data imbalance and annotation uncertainty, development of trusted AML algorithms, design of detection mechanisms for covert financial activities, and formulation of privacy-preserving yet regulation-compliant AML solutions. …”
Get full text
Article -
1431
"I don't see a reason why we should be hidden from view": Views of a convenience sample of people living with HIV on sharing HIV status data in routinely collected health and care...
Published 2025-01-01“…The overarching theme was around trust, both the loss of trust experienced by participants due to previous negative or discriminatory experiences, and the need to slowly build trust in data-sharing initiatives. Further themes showed that participants were supportive of data being used for research and health care improvements, but needed a guarantee that their privacy would be protected. …”
Get full text
Article -
1432
Advanced intrusion detection technique (AIDT) for secure communication among devices in internet of medical things (IoMT)
Published 2025-05-01“…Considering the aforementioned, this study suggests an advanced intrusion detection technology (AIDT) to guarantee safe data exchange amongst IoMT devices. The model uses a probabilistic neural network (PNN) to classify whether intrusions are present or not, and particle swarm optimization (PSO) for feature extraction. …”
Get full text
Article -
1433
Building a Digital Health Research Platform to Enable Recruitment, Enrollment, Data Collection, and Follow-Up for a Highly Diverse Longitudinal US Cohort of 1 Million People in the...
Published 2025-01-01“…Digital research platforms can be used to increase participant access, improve study engagement, streamline data collection, and increase data quality; however, the efficacy and sustainability of digitally enabled studies rely heavily on the design, implementation, and management of the digital platform being used. …”
Get full text
Article -
1434
Artificial Intelligence in Healthcare: Innovation and Impact in Medical Practice
Published 2025-05-01“…Furthermore, federated learning and domain adaptation techniques may help address data privacy concerns and improve model robustness across diverse populations. …”
Get full text
Article -
1435
Employing combined spatial and frequency domain image features for machine learning-based malware detection
Published 2024-07-01“…The ubiquitous adoption of Android devices has unfortunately brought a surge in malware threats, compromising user data, privacy concerns, and financial and device integrity, to name a few. …”
Get full text
Article -
1436
Deep convolutional neural network based archimedes optimization algorithm for heart disease prediction based on secured IoT enabled health care monitoring system
Published 2025-07-01“…The existing studies in healthcare IoT met a few shortcomings in terms of privacy, security, higher data dimensionality, higher cost, larger execution time, and so on. …”
Get full text
Article -
1437
A Distributed Machine Learning-Based Scheme for Real-Time Highway Traffic Flow Prediction in Internet of Vehicles
Published 2025-03-01“…Centralized machine learning methods face a number of challenges due to the sheer volume of traffic data that needs to be processed in real-time. Thus, it is not scalable and lacks fault tolerance and data privacy. …”
Get full text
Article -
1438
NLP-based removal of personally identifiable information from Hungarian electronic health records
Published 2025-05-01“…IntroductionElectronic health records (EHR) in text format serve as crucial resources for data-driven medical research. To safeguard patient confidentiality, under the General Data Protection Regulation (GDPR), strict measures are required to ensure personal data is anonymized or pseudonymized to protect individual privacy. …”
Get full text
Article -
1439
Enhancing Autism Spectrum Disorder Classification with Lightweight Quantized CNNs and Federated Learning on ABIDE-1 Dataset
Published 2024-09-01“…This study aims to improve ASD classification using advanced deep learning techniques applied to neuroimaging data. …”
Get full text
Article -
1440
A quantum-resilient lattice-based security framework for internet of medical things in healthcare systems
Published 2025-07-01“…Furthermore, the solution relies on zero-knowledge proofs, homomorphic encryption as well and attribute-based access control to guarantee strong security and privacy. Using the AVISPA tool, the framework is formally verified, showing its resistance against classical and quantum adversaries. …”
Get full text
Article