Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
1161
Consumer opinion on the use of machine learning in healthcare settings: A qualitative systematic review
Published 2025-01-01“…The meta-synthesis identified four overarching themes across the included studies: (1) Trust, fear, and uncertainty; (2) Data privacy and ML governance; (3) Impact on healthcare delivery and access; and (4) Consumers want to be engaged. …”
Get full text
Article -
1162
Assessing the Guidelines on the Use of Generative Artificial Intelligence Tools in Universities: A Survey of the World’s Top 50 Universities
Published 2024-12-01“…These instructions encompassed securing instructor consent before utilization, identifying appropriate and inappropriate instances for deployment, employing suitable strategies in classroom settings and assessment, appropriately integrating results, acknowledging and crediting GenAI tools, and adhering to data privacy and security measures. However, our study found that only a small number of the retrieved guidelines offered instructions on the AI algorithm (understanding how it works), the documentation of prompts and outputs, AI detection tools, and mechanisms for reporting misconduct. …”
Get full text
Article -
1163
Policy guidelines and recommendations on AI use in teaching and learning: A meta-synthesis study
Published 2025-01-01“…Under the theme of policies and guidelines, notable subthemes include ethical AI use, AI literacy, and inclusivity and equity. In terms of implementation strategies, the synthesis identifies crucial areas such as student orientation and professional development, enhanced teaching tools and data-driven insights, improved student learning outcomes and engagement, and streamlined administrative processes. …”
Get full text
Article -
1164
Private information in public spaces: Facial recognition in the times of smart urban governance
Published 2021-02-01“…Prior work: In order to accomplish so, this article analyzes this phenomenon from a capitalism surveillance framework perspective, in light of international data protection standards and with a primary focus on the analysis of the processing of citizens' data in the provision of public services Approach: The main approaches used are literature review and case studies. …”
Get full text
Article -
1165
ChatGPT and Artificial Intelligence in Hospital Level Research: Potential, Precautions, and Prospects
Published 2023-11-01“…Furthermore, the review discusses the ethical considerations that arise with AI use in health care, including data privacy, AI interpretability, and the risk of AI-induced disparities. …”
Get full text
Article -
1166
Integration of smart sensors and IOT in precision agriculture: trends, challenges and future prospectives
Published 2025-05-01“…Precision agriculture presents a viable solution by optimizing resource use, enhancing efficiency, and fostering sustainable practices through data-driven decision-making supported by advanced sensors and Internet of Things (IoT) technologies. …”
Get full text
Article -
1167
Opportunities, challenges, and interventions for agriculture 4.0 adoption
Published 2025-08-01“…Major obstacles include high initial investment costs, fragmented land holdings, diverse cropping systems, limited farmer awareness, lack of technical skills, inadequate digital literacy, complex AI algorithms, unreliable infrastructure, insufficient high-quality training data, poor internet connectivity, data privacy concerns, and a lack of supportive government policies. …”
Get full text
Article -
1168
Anonymization in web auctions using Zero-Knowledge Proof in Blockchain technology
Published 2025-06-01“…However, the centralized nature of traditional e-commerce platforms raises concerns about data control, privacy, and potential single points of failure. …”
Get full text
Article -
1169
Balancing risks and benefits: clinicians’ perspectives on the use of generative AI chatbots in mental healthcare
Published 2025-05-01“…However, they also identified risks, including the lack of regulation, data and privacy concerns, chatbots' limited understanding of client backgrounds, potential for client over-reliance on chatbots, incorrect treatment recommendations, and the inability to detect subtle communication cues, such as tone and eye contact. …”
Get full text
Article -
1170
What patients and caregivers want to know when consenting to the use of digital behavioral markers
Published 2024-12-01“…We observed seven key domains (in order of salience) in stakeholders’ informational needs: (1) clinical utility and value; (2) evidence, explainability, evaluation and contestation; (3) accuracy and trustworthiness; (4) data security, privacy, and misuse; (5) patient consent, control, and autonomy; (6) physician-patient relationship; and (7) patient safety, well-being, and dignity. …”
Get full text
Article -
1171
Fingernail analysis management system using microscopy sensor and blockchain technology
Published 2018-03-01“…This work uses the highly anonymous blockchain technology to effectively protect data privacy and manage each user’s data through the blockchain, in which any change or manipulation can be recorded and tracked, and the data security is improved. …”
Get full text
Article -
1172
Local large language model‐assisted literature mining for on‐surface reactions
Published 2025-03-01“…Herein, we introduce a method for extracting scientific data from unstructured texts using a local LLM, exemplifying its applications to scientific literatures on the topic of on‐surface reactions. …”
Get full text
Article -
1173
Blockchain-enabled cross-border insurance: from legal issues, solution design, to implementation
Published 2024-05-01“…However, when it comes to cross-border insurance service, current solutions fall short in effectively navigating the legal and compliance complexities inherent in cross-border insurance service delivery. When transmitting data across borders, it is essential to adhere to the legal requirements of cross-border laws and regulations, especially considering the variations in regional data protection and privacy legislation. …”
Get full text
Article -
1174
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
1175
Application of artificial intelligence in triage in emergencies and disasters: a systematic review
Published 2024-11-01“…Implementing intelligent triage systems faced challenges such as trust issues, training needs, equipment shortages, and data privacy concerns. Conclusion Developing assessment systems using artificial intelligence enables timely treatment and better resuscitation services for people injured in disasters. …”
Get full text
Article -
1176
Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector
Published 2025-06-01“…Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple platforms. …”
Get full text
Article -
1177
Personalization in Mobile Activity Recognition System Using -Medoids Clustering Algorithm
Published 2013-07-01Get full text
Article -
1178
-
1179
Binary Classification of Customer’s Online Purchasing Behavior Using Machine Learning
Published 2023-06-01“…The workflow is simple, adaptable, and suitable for UK banks, demonstrating the potential for practical implementation and data privacy. Future work will extend our approach to UK banks, reformulate the problem as a multi-class classification, and introduce pre-training automated steps for data analysis and transformation. …”
Get full text
Article -
1180
A Multi-Image Cryptosystem Using Quantum Walks and Chebyshev Map
Published 2021-01-01Get full text
Article