Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
1181
Using Machine Learning Algorithms in Intrusion Detection Systems: A Review
Published 2024-06-01Get full text
Article -
1182
AI, machine learning and deep learning in cyber risk management
Published 2025-05-01“…However, challenges persist in ensuring the accuracy of information, understanding the functionality of models, and protecting individuals’ data. Ethical use of personal information and safeguarding privacy remain critical, with researchers needing to prioritize accuracy, transparency in AI models, and fairness in decision-making. …”
Get full text
Article -
1183
Optimizing encrypted search in the cloud using autoencoder-based query approximation
Published 2024-12-01“…Our work provides a rigorous evaluation of autoencoder-based query approximation for encrypted cloud search using real-world datasets. The research implement a general framework agnostic to model type, data modality, and encryption scheme. …”
Get full text
Article -
1184
DKA Prediction in Children Using Artificial Intelligence: Improved Emergency Care
Published 2024-03-01Get full text
Article -
1185
Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation
Published 2025-01-01“…We collect data on DDoS attacks by generating real attack traffic from the homes of a selected group of volunteers, utilizing authentic malware source code. …”
Get full text
Article -
1186
Detection of Malicious Clients in Federated Learning Using Graph Neural Network
Published 2025-01-01Get full text
Article -
1187
SMS spam detection using BERT and multi-graph convolutional networks
Published 2025-01-01Get full text
Article -
1188
A content review of COVID-19-related apps used in Vietnam
Published 2025-02-01“…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
Get full text
Article -
1189
Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization
Published 2025-05-01“…The goal of the developed framework is to improve the detection of IDS without using centralized data to preserve privacy. Whereas it enhances the processing and detection capability of huge amounts of data generated from IoT devices. …”
Get full text
Article -
1190
The impact of artificial intelligence on behavioral intentions to use mobile banking in the post-COVID-19 era
Published 2025-08-01“…Data has been collected from 412 respondents in Thailand, and structural equation modeling has been employed for the data analysis.ResultsThe findings reveal significant positive effects of performance expectancy, effort expectancy, social influence, facilitating conditions, trust, perceived privacy, perceived intelligence and anthropomorphism of AI on users’ behavioral intentions to use mobile banking. …”
Get full text
Article -
1191
PRE-SERVICE TEACHERS' PERCEPTIONS OF THE USE OF GENAI AND TRADITIONAL GRAMMAR-CHECKING TOOLS FOR ENGLISH WRITING
Published 2025-07-01“…Ethical concerns, particularly regarding data privacy and originality, are also identified. …”
Get full text
Article -
1192
Behavioral Drivers Influencing Women’s Decision to Use Self-Injectable Contraception Provided by Community Health Surveillance Assistants in Rural Malawi
Published 2025-01-01“…Introduction: Self-injection (SI) for contraceptive use is recommended for its proven ability to empower women and overcome barriers to contraceptive access. …”
Get full text
Article -
1193
Examining inclusivity: the use of AI and diverse populations in health and social care: a systematic review
Published 2025-02-01“…A holistic approach must be used to address disparities, enforce effective regulations, safeguard privacy, promote inclusion and equity, and emphasize rigorous validation.…”
Get full text
Article -
1194
Investigating High School Students’ Attitudes Toward the Use of AI in Education: Evidence from Cambodia
Published 2025-07-01“…Utilizing evidence from an online survey with 315 students (female = 62.50%), the study showed that Cambodian high school students expressed generally favorable attitudes toward utilizing AI-powered tools in education, particularly pertaining to the use of AI to aid in completing school work. However, the study identified key concerns about data privacy and security issues, the risk of becoming over-dependent on AI, and limited originality about students’ work. …”
Get full text
Article -
1195
Some ethical and technological challenges of smart cities
Published 2025-12-01“…The moral dilemma and important ethical questions resulting from the use of big data to scrutinise and profile individuals and communities, compromising their privacy and anonymity without their knowledge or consent, cannot be underestimated and appears beyond the control of prevailing data protection protocols.…”
Get full text
Article -
1196
-
1197
Assessment of gender-related differences in digital financial services use and health worker performance in Nigeria
Published 2025-07-01“…Quantitative data was analyzed using the student t-test, while inductive coding approach was adopted for qualitative data. …”
Get full text
Article -
1198
Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing
Published 2024-09-01“…Cloud computing security and data protection are becoming increasingly critical as its use increases. …”
Get full text
Article -
1199
Integrating multi-modal learning analytics dashboard in K-12 education: insights for enhancing orchestration and teacher decision-making
Published 2025-08-01“…Further research should investigate students’ responses more closely and further develop strategies for the responsible, explainable, and unbiased use of student affective data in real classrooms.…”
Get full text
Article -
1200
Building occupancy estimation using single channel CW radar and deep learning
Published 2025-04-01“…Abstract Counting the number of people in a room is crucial for optimizing smart buildings, enhancing energy efficiency, and ensuring security while preserving privacy. This study introduces a novel radar-based occupancy estimation method leveraging a 24-GHz Continuous Wave (CW) radar system integrated with time-frequency mapping techniques using Continuous Wavelet Transform (CWT) and power spectrum analysis. …”
Get full text
Article