Suggested Topics within your search.
Suggested Topics within your search.
-
1461
Advancement in public health through machine learning: a narrative review of opportunities and ethical considerations
Published 2025-07-01“…Ethically, this review surfaces critical issues, including algorithmic bias, data privacy concerns in mental health analytics, and the interpretability of black-box models used in outbreak surveillance. …”
Get full text
Article -
1462
Confidential Intelligent Traffic Light Control System: Prevention of Unauthorized Traceability
Published 2025-06-01“…The technology of vehicular networks has been widely used to gather the traffic characteristics of competing traffic flows at signalized road intersections. …”
Get full text
Article -
1463
Hierarchical Service Composition via Blockchain-enabled Federated Learning
Published 2024-08-01“…The first selection layer enables each CSP to efficiently select services using a pre-trained model, while the second selection layer employs a blockchain-based QoS-aware mechanism for the final composition result, addressing privacy concerns. …”
Get full text
Article -
1464
Integrating blockchain technology for secure access control in smart home environments: A comprehensive review
Published 2025-01-01“…The decentralized and tamper-resistant nature of blockchain technology effectively solves important problems, including device authentication, data integrity, and access management, through the use of cryptography and distributed ledgers. …”
Get full text
Article -
1465
Digital Technologies and Trade Facilitation in Ethiopia: A Mixed-Methods Analysis of Blockchain, AI, and IoT Adoption
Published 2025-06-01“…Specifically, survey data revealed that only 10% of firms currently use AI, despite 67% recognizing its value for fraud detection. …”
Get full text
Article -
1466
SAFERIDES: Application of decentralized control edge-computing to ridesharing monitoring services
Published 2024-11-01“…The model also limits data transfer to the edge to avoid security and privacy risks. …”
Get full text
Article -
1467
Investigating the role of information technology system integration, user acceptance and information technology satisfaction and security on efficiency and accuracy of immigration...
Published 2025-01-01“…Research data analysis uses structural equation modeling (SEM). …”
Get full text
Article -
1468
-
1469
Deciphering the evolution of metaverse - A techno-functional perspective in digital marketing
Published 2024-11-01Get full text
Article -
1470
-
1471
The Impact of Operating System on Bandwidth in Open VPN Technology
Published 2016-03-01“…The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. …”
Get full text
Article -
1472
An empirical study on the usage behavior of mobile health management service systems for flight attendants in the digital Age
Published 2025-04-01“…This study deeply explores the use behavior and influencing factors of mobile health management service systems for flight attendants in the context of the "Digital age".MethodsThe study mainly adopted the questionnaire survey method, used SPSS24.0 and AMOS24.0 software for data analysis, and used statistical methods such as factor analysis, regression analysis, and path analysis to verify the effectiveness of the model and explore the relationship between key variables.Results(1) The usage rate of the health management service system among flight attendants is not as high as expected, but the use rate of sports health monitoring applications reached 66.5%, and the daily frequency of use was as high as 25.52%, (2) Perceived ease of use and perceived usefulness have a positive and significant impact on intention to use, (3) Privacy concerns have a positive impact on intention to use Significant negative impact.ConclusionThe study points out that ease of use and usefulness are key factors in attracting flight attendants to use mobile health management service systems. …”
Get full text
Article -
1473
Patient and wearable device authentication utilizing attribute-based credentials and permissioned blockchains in smart homes
Published 2023-06-01“…The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. …”
Get full text
Article -
1474
تطبیقات الهواتف الذکیة والخصوصیة المعلوماتیة : دراسة تحلیلیة مقارنة
Published 2020-09-01“…In recent years there has been alegislative response at different levels for the sake of this protection, and thejudiciary has followed it with a remarkable response in favour of the jurisprudenceof the private life of individuals that is of paramount importance to both theindividual and the community.This coincided with the increasing vulnerability of the right to privacy tothe digital environment through e-mail and chat sites Networks or communicationsites, which have become a hoot of the modern era and a wide electronic space,in which we put all the references about us and our lives, as well as our privacy.The purpose of this study is to diagnose the reality of the work of Google Playapplications that work on the smart phone environment, especially with regard togathering information or allowing access to personal data and users’ information,by identifying the nature of data and information collected or allowed access to,monitoring the nature of the risks of using these applications.To do so, the researcher studied and analyzed licensing agreements forthe use of 80 applications of smart phones in areas commonly used in the digitalenvironment, such as social networking applications, Online banks Applications,antivirus applications, web search applications, news and press applications,educational applications, web applications, travel and tourism applications. …”
Get full text
Article -
1475
Exploring Smart Health Wearable Adoption Among Singaporean Older Adults Based on Self-Determination Theory: Web-Based Survey Study
Published 2025-03-01“… Abstract BackgroundSmart health wearables offer significant benefits for older adults, enabling seamless health monitoring and personalized suggestions based on real-time data. Promoting adoption and sustained use among older adults is essential to empower autonomous health management, leading to better health outcomes, improved quality of life, and reduced strain on health care systems. …”
Get full text
Article -
1476
Federated Learning of Jamming Classifiers: From Global to Personalized Models
Published 2025-03-01“…Given the ubiquity of these signals, jamming mitigation and localization techniques are of crucial importance, and these techniques can be enhanced with accurate jammer classification methods. Although data-driven models have proven useful for detecting jamming signals, training these models using crowdsourced data requires sharing private data and may therefore compromise user privacy. …”
Get full text
Article -
1477
UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities
Published 2024-01-01“…Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. …”
Get full text
Article -
1478
An investigation of factors impacting the acceptance of telehealth in rural India
Published 2025-07-01“…The purposive sampling technique is used to collect the primary data through a structured questionnaire from rural participants and the data was analysed by employing structural equation method (SEM). …”
Get full text
Article -
1479
Design Hybrid Algorithm for Video Encoding
Published 2013-12-01“…Due to the fact that all the studies and researches that have been found were focused on the use of some of the ways of encrypting the texts like data encryption standard (DES) in encrypting video files ,and the fact that all the weakness points were related to the calculations, so in this research, many of these methods were connected with modification required to reduce the calculations and to obtain the speed of encrypting video files and give them a high privacy. …”
Get full text
Article -
1480
Implementasi Teknologi Blockchain dalam Digital Marketing
Published 2024-12-01“…Some respondents were concerned about their privacy on the use of digital marketing, especially the abuse of their privacy related to user data. …”
Get full text
Article