Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
1101
Enhancing Internet of Things security in healthcare using a blockchain-driven lightweight hashing system
Published 2025-05-01Get full text
Article -
1102
Product Engagement Detection Using Multi-Camera 3D Skeleton Reconstruction and Gaze Estimation
Published 2025-05-01Get full text
Article -
1103
Standardized patient profile review using large language models for case adjudication in observational research
Published 2025-01-01“…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
Get full text
Article -
1104
Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study
Published 2025-01-01“…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
Get full text
Article -
1105
Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing
Published 2025-01-01“…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
Get full text
Article -
1106
Client aware adaptive federated learning using UCB-based reinforcement for people re-identification
Published 2025-05-01“…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
Get full text
Article -
1107
A DLP Module Design Based on Plug-in for MS Word
Published 2020-08-01“…This model uses security measures such as data encryption and access control to prevent accidental leakage of the classified files by the insiders. …”
Get full text
Article -
1108
Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method
Published 2019-05-01“…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
Get full text
Article -
1109
A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation
Published 2025-12-01“…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
Get full text
Article -
1110
Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain
Published 2025-07-01“…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
Get full text
Article -
1111
GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor
Published 2025-01-01“…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
Get full text
Article -
1112
Nuclei segmentation and classification from histopathology images using federated learning for end-edge platform.
Published 2025-01-01“…To protect data privacy, the framework employs a FedAvg-based federated learning scheme, enabling decentralized training without exposing sensitive data. …”
Get full text
Article -
1113
Monitoring oral health remotely: ethical considerations when using AI among vulnerable populations
Published 2025-04-01Get full text
Article -
1114
A framework for systematically applying humanistic ethics when using AI as a design material
Published 2019-07-01“…Because AI-supported and autonomous decision making has the potential for widespread negative personal, social, and environmental effects, we aim to take a proactive stance to uphold human rights, respect individuals’ privacy, protect personal data, and enable freedom of expression and equality. …”
Get full text
Article -
1115
A decentralised architecture for secure exchange of assets in data spaces: The case of SEDIMARKGitHub
Published 2025-08-01“…Together the technologies used in SEDIMARK ensure privacy, trust and data quality for secure management, sharing, and monetisation of assets in data spaces.…”
Get full text
Article -
1116
Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm
Published 2025-01-01“…Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. …”
Get full text
Article -
1117
Analysis of MAXIM Application Service Quality on User Satisfaction using the E-Service Quality Method
Published 2024-11-01“…Efficiency, fulfillment, system availability, privacy, responsiveness, compensation, and interaction are the seven factors used, while user satisfaction is the dependent variable. …”
Get full text
Article -
1118
Global Health care Professionals’ Perceptions of Large Language Model Use In Practice: Cross-Sectional Survey Study
Published 2025-05-01“…The majority of our participants found ChatGPT to be useful; however, there are concerns about patient privacy, data security, and its legal and ethical issues as well as the accuracy of its information. …”
Get full text
Article -
1119
-
1120
Passive Sensing for Mental Health Monitoring Using Machine Learning With Wearables and Smartphones: Scoping Review
Published 2025-08-01“…However, clinical translation requires standardized protocols, larger longitudinal studies (≥3 months), and ethical frameworks for data privacy. Future work should prioritize multimodal sensor fusion and explainable artificial intelligence to bridge the gap between technical performance and clinical deployability.…”
Get full text
Article