Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
1301
Tree-to-Me: Standards-Driven Traceability for Farm-Level Visibility
Published 2025-04-01“…These systems also fail to standardise and integrate diverse data sources, ensure data privacy, and scale effectively to meet the demands of modern agriculture. …”
Get full text
Article -
1302
Monitoring oral health remotely: ethical considerations when using AI among vulnerable populations
Published 2025-04-01Get full text
Article -
1303
A framework for systematically applying humanistic ethics when using AI as a design material
Published 2019-07-01“…Because AI-supported and autonomous decision making has the potential for widespread negative personal, social, and environmental effects, we aim to take a proactive stance to uphold human rights, respect individuals’ privacy, protect personal data, and enable freedom of expression and equality. …”
Get full text
Article -
1304
Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks
Published 2024-01-01“…A significant concern in the field of cloud computing is the security and confidentiality of data. A cryptographic access control technique can be used to guarantee data privacy, which prevents unauthorized access and allows only authorized users to access the data. …”
Get full text
Article -
1305
SimProx: A Similarity-Based Aggregation in Federated Learning With Client Weight Optimization
Published 2024-01-01“…Federated Learning (FL) enables decentralized training of machine learning models across multiple clients, preserving data privacy by aggregating locally trained models without sharing raw data. …”
Get full text
Article -
1306
Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm
Published 2025-01-01“…Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. …”
Get full text
Article -
1307
Analysis of MAXIM Application Service Quality on User Satisfaction using the E-Service Quality Method
Published 2024-11-01“…Efficiency, fulfillment, system availability, privacy, responsiveness, compensation, and interaction are the seven factors used, while user satisfaction is the dependent variable. …”
Get full text
Article -
1308
Passive Sensing for Mental Health Monitoring Using Machine Learning With Wearables and Smartphones: Scoping Review
Published 2025-08-01“…However, clinical translation requires standardized protocols, larger longitudinal studies (≥3 months), and ethical frameworks for data privacy. Future work should prioritize multimodal sensor fusion and explainable artificial intelligence to bridge the gap between technical performance and clinical deployability.…”
Get full text
Article -
1309
Healthcare Professionals' Views on the Use of Passive Sensing and Machine Learning Approaches in Secondary Mental Healthcare: A Qualitative Study
Published 2024-12-01“…Interview data were analysed using reflexive thematic analysis. …”
Get full text
Article -
1310
Bioethical implications of the use of digital technologies for mental health research during the social distancing period of the COVID-19 pandemic
Published 2025-06-01“…The need to apply ethical principles to protocols for mental health research using digital technologies was a central concern of ethics committees during the COVID-19 pandemic, which sought to ensure a fair selection of participants, appropriate adaptation of the informed consent process, protection of participants’ privacy, secure management of research data, and assessment of risks and benefits. …”
Get full text
Article -
1311
Perceptions of Executive Decision Makers on Using Social Media in Effective Health Communication: Qualitative Study
Published 2025-05-01“…We included 13 participants from government and private health care sectors in the Al-Qassim region of Saudi Arabia, who were key players and decision makers in health care programs and reforms. Data were recorded, transcribed verbatim, and analyzed using thematic analysis to identify key themes and patterns. …”
Get full text
Article -
1312
User Intent to Use DeepSeek for Health Care Purposes and Their Trust in the Large Language Model: Multinational Survey Study
Published 2025-05-01“…It was then distributed on the web to users in India, the United Kingdom, and the United States who had used DeepSeek within the past 2 weeks. Data analysis involved descriptive frequency assessments and Partial Least Squares Structural Equation Modeling. …”
Get full text
Article -
1313
Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment
Published 2020-03-01“…This article proposes a method for partially encrypting private information in images using FF1 and FF3-1. The proposed method encrypts private information without increasing the data size, solving the problem of wasted storage space. …”
Get full text
Article -
1314
Federated Learning-Based State of Charge Estimation in Electric Vehicles Using Federated Adaptive Client Momentum
Published 2025-01-01“…Centralized machine learning methods are used to improve SoC estimation. Both privacy and high bandwidth requirements are the main disadvantages during the implementation. …”
Get full text
Article -
1315
Intrusion Detection Using Machine Learning for Risk Mitigation in IoT-Enabled Smart Irrigation in Smart Farming
Published 2022-01-01“…In this framework, the NSL KDD data set is used as an input data set. In the preprocessing of the NSL-KDD data set, first all symbolic features are converted to numeric features. …”
Get full text
Article -
1316
-
1317
Fall Detection Using Federated Lightweight CNN Models: A Comparison of Decentralized vs. Centralized Learning
Published 2025-07-01“…This study proposes a privacy-preserving and scalable fall-detection framework that integrates federated learning (FL) with transfer learning (TL) to train deep learning models across decentralized data sources without compromising user privacy. …”
Get full text
Article -
1318
Provider Perspectives on the Use of Mental Health Apps, and the BritePath App in Particular, With Adolescents at Risk for Suicidal Behavior: Qualitative Study
Published 2025-02-01“…Analyses identified 4 key themes related to mental health apps: (1) almost all providers viewed mental health apps as an adjunct to, rather than a replacement for, psychotherapy visits; (2) most providers were concerned about the cost of apps and youth access to them; (3) providers noted the challenge of maintaining patient engagement with apps over time; and (4) providers were concerned about patient privacy, in terms of both data shared with app developers and data privacy within families. …”
Get full text
Article -
1319
xFedCAV: Cyberattacks on Leader and Followers in Automated Vehicles With Cooperative Platoons Using Federated Agents
Published 2025-01-01“…Our framework leverages federated learning to enhance privacy and security, using Shapley Additive exPlanations (SHAP) for interpretable detection. …”
Get full text
Article -
1320
Analysis of Service Quality on the Starbucks Indonesia Application Using E-SERVQUAL and Importance Performance Analysis (IPA)
Published 2025-08-01“…This study aims to evaluate the app’s service quality using E-ServQual method, which assesses seven dimensions: efficiency, reliability, fulfillment, privacy, responsiveness, compensation, and contact. …”
Get full text
Article