Suggested Topics within your search.
Suggested Topics within your search.
-
1841
Efficient GPT-4V level multimodal large language model for deployment on edge devices
Published 2025-07-01“…However, their large sizes and high computational costs restrict deployment to cloud servers, limiting use in mobile, offline, energy-sensitive, or privacy-critical scenarios. …”
Get full text
Article -
1842
Internet and female victimization
Published 2018-01-01“…The data indicates that in the digital world, the privacy of women is significantly compromised and associated with new and terrifying forms of on-line violence. …”
Get full text
Article -
1843
A Structural equation modeling analysis of generative AI chatbots adoption among students and educators in higher education
Published 2024-12-01“…Employing a Structural Equation Modeling (SEM) approach, the research focuses on developing and validating a comprehensive model to understand the multifaceted factors impacting the acceptance and use of these chatbots. The methodology integrates an extensive literature review, construction of a theoretical model, administration of a detailed questionnaire to a representative sample from the higher education sector, coupled with advanced SEM techniques for data analysis and interpretation. …”
Get full text
Article -
1844
A CAE model-based secure deduplication method
Published 2025-07-01“…Abstract Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. …”
Get full text
Article -
1845
Alternatives to continuous positive airway pressure treatment in sleep apnoeas and hypopnoeas syndrome related to myofunctional and postural reeducation therapy: protocol for a sys...
Published 2021-12-01“…Finally, several patient-related outcomes, namely sleep quality, quality of life and sleep Apnoeas and Hypoapnoeas Index, will be examined.Ethics and dissemination In this case, ethical approval is not necessary. The data used in the review will be exclusively obtained from published studies, implying there are no privacy concerns. …”
Get full text
Article -
1846
Platform framework for blockchain-enhanced healthcare AIoT systems
Published 2025-04-01“…Theoretical analysis demonstrates that the use of a sharding blockchain significantly enhances memory efficiency and reduces data retrieval time in healthcare AIoT applications. …”
Get full text
Article -
1847
GenAI and effective reading among university students: Prospects, challenges, and future directions
Published 2025-04-01“…The system can also lead to breach of data privacy and it is resources intensive. Most of the limitations are, however, manageable. …”
Get full text
Article -
1848
Human Behavior Analysis: A Comprehensive Survey on Techniques, Applications, Challenges, and Future Directions
Published 2025-01-01“…The survey also delves into data sources and methodologies used in HBA, such as sensor data, social media data, physiological signals, and multimodal analysis. …”
Get full text
Article -
1849
Application of Artificial Intelligence in the Tourism Sector: Benefits and Challenges of AI-Based Digital Tools in Tourism Organizations of Lithuania, Latvia, and Sweden
Published 2025-04-01“…Tourism organizations implementing or already using artificial intelligence in their activities are usually faced with the challenge of ensuring data privacy and security, the high costs of implementing artificial intelligence systems, etc.…”
Get full text
Article -
1850
Blockchain Enabled Federated Learning for Detection of Malicious Internet of Things Nodes
Published 2024-01-01“…This will not only enhance the accuracy of the unified federated learning model but also preserve the privacy of each cluster because no actual data is sent to fog layer for central model training. …”
Get full text
Article -
1851
"If my husband was in the labor ward with me, my baby wouldn't have died"; experiences on birth companionship from a tertiary health facility, Tanzania.
Published 2025-01-01“…Braun and Clarke's six-step thematic analysis approach was used to analyze the data.<h4>Results</h4>Three major themes emerged: "Bonding and Learning with Spouse/Partner," "Assurance of Maternal Safety," and "Fear of Blame and Breach of Confidentiality." …”
Get full text
Article -
1852
Federated learning for crop yield prediction: A comprehensive review of techniques and applications
Published 2025-06-01“…This paper offers a systematic overview of the recent knowledge on the application of FL towards the prediction of crop yield and other agricultural uses. We discussed the mathematical basis of FL, the variety of machine learning models used, the types of used agricultural data, and the major performance metrics. …”
Get full text
Article -
1853
Progress in the integration of ChatGPT in Higher Education: an examination of applications, advantages, and challenges
Published 2025-02-01“…Nonetheless, the deployment of ChatGPT has obstacles, including maintaining objectivity in automated assessments and safeguarding student data privacy. Addressing these difficulties necessitates stringent validation of model performance and the establishment of explicit data privacy regulations. …”
Get full text
Article -
1854
Multiparty Homomorphic Encryption for IoV Based on Span Program and Conjugate Search Problem
Published 2025-06-01“…The scheme ensures efficient computation of data while preserving the privacy of each party’s data. …”
Get full text
Article -
1855
Advancements of Deep Learning Model-Based Rehabilitation Training System
Published 2025-01-01“…The experimental results show that there is still room for the development of rehabilitation training assessment systems in terms of privacy, interpretation ability, and application scenarios, and that researchers can address the above issues by using federated learning, developing an expert system, and using transfer learning domain adaptation, respectively.…”
Get full text
Article -
1856
Assessment of The Potential Interference and Conflict of Artificial Intelligence With Human Rights and Citizenship: Challenges and Solutions
Published 2025-03-01“…Therefore, it is necessary to devise solutions to address these challenges, which may include diversifying data, ensuring operational transparency, establishing legal and ethical frameworks, government commitments to balance the use of artificial intelligence with the fulfillment and enforcement of the right to work, data protection, respect for privacy, reducing discrimination, collaborating with stakeholders, establishing international legal standards, and fostering international cooperation for the safe development of artificial intelligence. …”
Get full text
Article -
1857
SortAlign: a score-based aggregation technique for neural networks in one-round federated learning
Published 2024-12-01“…In recent years, the growth of data generated on a daily basis in critical domains, such as industrial processes, where data privacy plays a key role, has led to the strong development of Federated Learning. …”
Get full text
Article -
1858
Digital Health Interventions for Depression and Anxiety in Low- and Middle-Income Countries: Rapid Scoping Review
Published 2025-08-01“…Challenges pertained to the technological system, engagement issues, structural barriers, and concerns regarding privacy and confidentiality. Facilitators included widespread mobile phone use, built-in supervision and training features, and convenience. …”
Get full text
Article -
1859
VANET Vulnerabilities Classification and Countermeasures: A Review
Published 2022-09-01“…Many protocols, techniques, and approaches have been developed to secure and protect data. To enhance current security and privacy measures and develop and model new ones, the ideas of machine learning (ML), deep learning (DL), and artificial intelligence are being applied. …”
Get full text
Article -
1860
A Trusted Federated Learning Method Based on Consortium Blockchain
Published 2024-12-01“…Federated learning (FL) has gained significant attention in distributed machine learning due to its ability to protect data privacy while enabling model training across decentralized data sources. …”
Get full text
Article