Suggested Topics within your search.
Suggested Topics within your search.
-
1881
Co-similar malware infection patterns as a predictor of future risk.
Published 2021-01-01“…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
Get full text
Article -
1882
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things
Published 2025-05-01“…This article presents a blockchain-assisted safe data-sharing mechanism that provides security requirements in the industry using IoT. …”
Get full text
Article -
1883
Advanced Hydro-Informatic Modeling Through Feedforward Neural Network, Federated Learning, and Explainable AI for Enhancing Flood Prediction
Published 2025-01-01“…This approach promotes data privacy and allows collaborative learning while working under cross-border data-sharing constraints, therefore improving the accuracy of prediction. …”
Get full text
Article -
1884
The daunting challenge of Artificial Intelligence in Education: a systematic literature review
Published 2025-03-01“…Finally, there are also ethical and social challenges that address concerns about the privacy of student data, equity in access to advanced technologies, and the potential of AI to perpetuate existing biases. …”
Get full text
Article -
1885
CLOUD COMPUTING SECURITY
Published 2016-05-01“…There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. …”
Get full text
Article -
1886
Association between sedentary behaviour and chronic pelvic pain in women: a protocol for systematic review and meta-analysis
Published 2025-05-01“…The research team will ensure data privacy and participant confidentiality through anonymised data processing and strict compliance with relevant regulations. …”
Get full text
Article -
1887
Enabling All In-Edge Deep Learning: A Literature Review
Published 2023-01-01“…Moreover, most of the time central cloud servers are used for such computation, thus opening up other significant challenges, such as high latency, increased communication costs, and privacy concerns. …”
Get full text
Article -
1888
Design of an intelligent AI-based multi-layer optimization framework for grid-tied solar PV-fuel cell hybrid energy systems
Published 2025-12-01“…With this, we now have a scalable and real-time energy-efficient solution for future smart grid systems. • Integrated Intelligence Stack: Combines RL-ENN, T-STFREP, FL-DEO, GNNHSCO, and Q-GAN-ESO into a unified architecture for real-time control, forecasting, decentralized optimization, network routing, and synthetic scenario generation. • Real-Time, Scalable, and Privacy-Preserving: Enables adaptive energy dispatch, federated optimization without compromising data privacy, and graph-based power routing, making it suitable for large-scale, smart grid deployments. • Proven Long-Term Performance: Achieved significant improvements over traditional methods (GA, PSO) with 27.5 % lower NPC, 18.2 % reduction in COE, and 30.2 % increase in battery life, validated using 30 years of meteorological data.…”
Get full text
Article -
1889
Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection
Published 2025-07-01“…Detecting such evolving threats is especially challenging in decentralized environments where raw traffic data cannot be aggregated due to privacy or policy constraints. …”
Get full text
Article -
1890
Factors that affect clinical youth engagement in digital mental health research: a qualitative sub-study nested within a prospective cohort study
Published 2025-04-01“…Methods Semi-structured interviews were conducted with a purposive sample of participants from the 3S-YP study. Interview data was analysed using codebook thematic analysis. …”
Get full text
Article -
1891
Wireless Body Area Network (WBAN) based Health Care Monitoring: A Comprehensive Review
Published 2023-12-01“…Using multiple WBAN techniques, we aim to identify which techniques are giving better results in data transmission, storing, and maintaining patient data privacy and also identify the best performance using multiple techniques based on the two most important parameters such as ‘throughput’, and ‘delay’. …”
Get full text
Article -
1892
Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration
Published 2024-10-01“…Federated learning offers a framework for developing local models across institutions while safeguarding sensitive data. This paper introduces a novel approach for heart disease prediction using the TabNet model, which combines the strengths of tree-based models and deep neural networks. …”
Get full text
Article -
1893
Electroencephalography-Based Brain-Computer Interfaces in Rehabilitation: A Bibliometric Analysis (2013–2023)
Published 2024-11-01“…Ethical considerations, including data privacy, transparency, and equitable access to BCI technologies, must be prioritized to ensure the inclusive development and use of these technologies across diverse socioeconomic groups.…”
Get full text
Article -
1894
Evaluation of Government Programmes on Enhancing the Lives of the Elderly: A Case Study of Social Assistance Grant for Empowerment in Mitooma District.
Published 2024“…Different data collection tools like interview guide, and questionnaire were used. …”
Get full text
Thesis -
1895
Looking Back on Digital Medical Education Over the Last 25 Years and Looking to the Future: Narrative Review
Published 2024-12-01“…The rapid evolution and use of web-based and digital techniques have been significantly transforming this field since the beginning of the new millennium. …”
Get full text
Article -
1896
Acceptability of an online peer support group as a strategy to improve antiretroviral therapy adherence among young people in Kampala district, Uganda: qualitative findings
Published 2025-04-01“…In implementing online support groups, due consideration should be given to software tools with high privacy standards and zero-rated data use for new apps. …”
Get full text
Article -
1897
The Impact of Personalized Office Spaces on Faculty Productivity, Performance, and Satisfaction in Universities’ Educational Facilities: Case Study of Al Yamamah University, Riyadh...
Published 2025-07-01“…Data were analyzed using thematic analysis for qualitative insights, focusing on environmental aspects (such as: natural lighting, ventilation, noise control, etc.), psychological factors (such as: privacy, aesthetic appeal, etc.), and architectural settings (such as: area, space layout, materials, etc.). …”
Get full text
Article -
1898
From assistance to integrity: exploring the role of AI in academic communication across Russian and Turkish campuses
Published 2025-05-01“…Turkish students exhibited a predominantly favorable outlook toward the collaborative capabilities of AI, but Russian students placed greater emphasis on apprehensions over privacy and data security.DiscussionThe study highlights the complex interplay between the benefits and challenges of AI in educational environments. …”
Get full text
Article -
1899
An Intelligent Client Selection Algorithm of Federated Learning for Class-imbalance
Published 2024-04-01“…This algorithm does not use any auxiliary data set. Under the premise of ensuring the privacy of the client ′ s local data invisible to the server it uses the Tanimoto coefficient to measure the difference between the local data distribution and the target distribution. …”
Get full text
Article -
1900
eHealth Technology: What Do We Know and What do We Need to Learn
Published 2021-06-01“…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
Get full text
Article