Suggested Topics within your search.
Suggested Topics within your search.
-
1741
The promise and challenges of Artificial Intelligence-Large Language Models (AI-LLMs) in obstetric and gynecology
Published 2024-07-01“…The article also discusses the ethical issues linked to AI, emphasizing the need for cooperation among different stakeholders to use AI responsibly in medicine, focusing on protecting data privacy and minimizing reliance on technology. …”
Get full text
Article -
1742
Knowledge and Attitudes Related to Telemedicine among Nursing Staff at the Selected Tertiary Care Hospital, Karnataka, India
Published 2025-04-01“…Methodology: The cross-sectional study was conducted among 201 staff nurses. The data were collected using a self-structured questionnaire after thorough review of the literature. …”
Get full text
Article -
1743
FedDL: personalized federated deep learning for enhanced detection and classification of diabetic retinopathy
Published 2024-12-01“…Our primary goal is to develop a system that can monitor various medical facilities while ensuring privacy during the training of DL models. This is made possible through federated learning (FL), which allows for the sharing of parameters instead of actual data, employing a decentralized training approach. …”
Get full text
Article -
1744
INNOVATION OF THE EDUCATION PROCESS TOWARDS IMPLEMENTING AI TOOLS
Published 2024-12-01“…Our paper examines students' perceptions of AI and maps how they utilize AI tools, highlighting their role in meeting the challenges of today's educational and professional life. By analysing data collected through a structured questionnaire, we identified key themes, including the usefulness, ease of use, attitudes, and concerns surrounding AI. …”
Article -
1745
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD
Published 2025-03-01“… Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a committing AEAD scheme into a succinctly committing AEAD scheme. …”
Get full text
Article -
1746
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01“…Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. …”
Get full text
Article -
1747
Multimodal Detection of Agitation in People With Dementia in Clinical Settings: Observational Pilot Study
Published 2025-07-01“…ObjectiveThis study proposes a novel, multimodal system for predicting AA episodes in individuals with severe dementia, integrating wearable sensor data and privacy-preserving video analytics. …”
Get full text
Article -
1748
Multiscale network alignment model based on convolution of homogeneous multilayer graphs
Published 2024-12-01“…In terms of node characteristics, the K-nearest neighbor algorithm was used to aggregate node neighborhood information to model the deep network structure, so as to enhance the data. …”
Get full text
Article -
1749
Generative adversarial networks (GANS) for generating face images
Published 2025-07-01“…However, the use of public facial datasets such as CelebA and FFHQ faces limitations in representing global demographic diversity and raises privacy concerns. …”
Get full text
Article -
1750
Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things
Published 2025-06-01“…It is noted that the analysis of the security of IoT communication technologies using specialised communication protocols across networks with different topologies, communication ranges and bandwidths is a pressing issue, as the number of security and privacy breaches in the IoT ecosystem is growing, which is constantly expanding in various sectors of the economy and human life with the introduction of billions of heterogeneous smart devices. …”
Get full text
Article -
1751
Mobile robot navigation path algorithm in 3d industrial internet of thing (iot) environment based on 5g mobile communication
Published 2019-07-01“…Each of industrial IoT as service domains has its own communication requirements that are measured differently in both such as reliability, Quality of service (QoS), and privacy. According to the development of industrial automation, the industrial Internet of things (IoT) is widely used in smart factories to capture the data and manage the production. …”
Get full text
Article -
1752
A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning
Published 2025-01-01“…FL facilitates decentralized training of models using local data, ensuring privacy, crucial for handling sensitive financial data. …”
Get full text
Article -
1753
Biometrics and the metaphysics of personal identity
Published 2023-05-01“…Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. …”
Get full text
Article -
1754
Backdoor Attack Against Dataset Distillation in Natural Language Processing
Published 2024-12-01“…We introduce malicious triggers into synthetic data during the distillation phase to execute a backdoor attack on downstream models trained with these data. …”
Get full text
Article -
1755
Promoting mental health in the age of new digital tools: balancing challenges and opportunities of social media, chatbots, and wearables
Published 2025-03-01“…Nonetheless, these technologies introduce challenges including privacy issues, data security, and equitable access to digital resources, raising a new class of rights to protect mental privacy, guard against algorithm bias, and prevent personality-changing manipulations. …”
Get full text
Article -
1756
Understanding older adults' adoption of facial recognition payment: An integrated model of TAM and UXT.
Published 2025-01-01“…By incorporating both cognitive and affective dimensions, the proposed model systematically investigates key determinants of FRP acceptance. Data were collected through a questionnaire survey of 387 older adults in China, and hypotheses were tested using structural equation modeling (SEM). …”
Get full text
Article -
1757
Providers' perceptions of implementing standardized postpartum family planning: a qualitative study of midwives and nurses in GhanaAJOG Global Reports at a Glance
Published 2025-05-01“…We interpreted data using thematic analysis. Results: Providers indicated that use of one-on-one counseling and the mobile application in hospital-based postpartum care delivery was acceptable, feasible, and appropriate. …”
Get full text
Article -
1758
A fiber-optic traffic monitoring network trained with video inputs
Published 2025-08-01“…We use YOLO-derived vehicle location and classification from video inputs as labeled data to train a detection and classification neural network that uses DAS data only. …”
Get full text
Article -
1759
Interaction of Customer Satisfaction and Digital Service Retention: Evidence of PLS from Indonesian Islamic Banking
Published 2023-01-01“…This study uncovered the effect of ease of use, efficiency, interoperability, privacy security, responsiveness, reliability, service cost, and service portfolio on ISBC customer satisfaction. …”
Get full text
Article -
1760
Algerian Efl Students’ Perspectives And Practices On Ai-enabled Learning At The University Of Medea
Published 2025-05-01“…However, students identified several drawbacks, namely excessive reliance on AI, negative impact on their critical thinking, and the problem of unreliable AI-generated data. They also faced some challenges, such as limited access to advanced AI tools, privacy and security issues, and a lack of guidance on how to use AI thoughtfully and responsibly. …”
Get full text
Article