Suggested Topics within your search.
Suggested Topics within your search.
-
681
A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis
Published 2025-03-01“…Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training. While FL offers privacy benefits through local training, privacy-preserving strategies are needed since model updates can leak training data information due to various attacks. …”
Get full text
Article -
682
Exploring assessment methods used by Grade Four English First Additional Language Teachers
Published 2024-06-01“…The researchers opted for a thematic analysis approach, allowing for a thorough examination of the data while respecting the privacy and confidentiality of the participants. …”
Get full text
Article -
683
Artificial intelligence methods used in various aquaculture applications: A systematic literature review
Published 2025-02-01“…However, the review also uncovered substantial challenges that will continue limiting widespread adoption, including restricted access to representative data, prohibitive expenses, technical complexities, lack of social acceptance, and data privacy and security concerns. …”
Get full text
Article -
684
The Use of Artificial Intelligence in Medical Diagnostics: Opportunities, Prospects and Risks
Published 2024-07-01“…The AI integration in healthcare can revolutionise the industry by improving patient outcomes, optimising resource allocation, and reducing operational costs. However, the AI use in medicine carries certain risks related to ethics and data privacy, shortcomings in the quality of data for training algorithms, and importance of protecting against cyberthreats. …”
Get full text
Article -
685
Ethical aspects of the use of social networks during the employment process
Published 2022-01-01“…Employers violate the privacy of potential candidates by obtaining data in this manner without making prior notification and receiving consent, which opens up a whole range of complex ethical and legal issues, especially in the light of the large number of fake profiles and pages on social networks. …”
Get full text
Article -
686
Differential Private POI Queries via Johnson-Lindenstrauss Transform
Published 2018-01-01“…In addition, the proposed perturbation method based on the Johnson Lindenstrauss transform satisfies the differential privacy. Two popular point of interest queries, <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>-NN and Range, are used to evaluate the method on two real-world data sets. …”
Get full text
Article -
687
Multifaceted Assessment of Responsible Use and Bias in Language Models for Education
Published 2025-03-01“…This study proposes a framework for the automatic detection of biases and violations of responsible use using a synthetic question-based dataset mimicking student–chatbot interactions. …”
Get full text
Article -
688
An Evaluation on the Potential of Large Language Models for Use in Trauma Triage
Published 2024-10-01“…Overall, the literature highlights multifaceted applications of LLMs, especially in emergency trauma settings, albeit with clear limitations and ethical considerations, such as artificial hallucinations, biased outputs and data privacy issues. There remains room for more rigorous research into refining the consistency and capabilities of LLMs, ensuring their effective integration in real-world trauma triaging to improve patient outcomes and resource utilisation.…”
Get full text
Article -
689
COVID-19 detection using federated machine learning.
Published 2021-01-01“…AI plays an essential role in COVID-19 case classification as we can apply machine learning models on COVID-19 case data to predict infectious cases and recovery rates using chest x-ray. …”
Get full text
Article -
690
Using Federated Learning for Collaborative Intrusion Detection Systems
Published 2023-06-01“…Traditional implementations provide fast and accurate predictions, but require centralised storage of labelled historical data for training. This solution is not always suitable for real-world applications, where regulatory constraints and privacy concerns hamper the collection of sensitive data into a single server. …”
Get full text
Article -
691
Characterizing user mobility using mobile sensing systems
Published 2017-08-01“…Furthermore, we detail the need to use methods that respect the privacy of users and investigate the possibilities offered by network traces, including Wi-Fi and Bluetooth communication technologies. …”
Get full text
Article -
692
Ethical Considerations for Using Artificial Intelligence in Digital Technologies
Published 2025-05-01Get full text
Article -
693
THE POSSIBILITY OF USING ELECTRONIC MEDICAL RECORDS FOR CLINICAL OBSERVATION
Published 2021-05-01“…Of course, there are problems and obstacles to expanding the use of EMC, and one of the solutions to these obstacles is to address issues of semantic compatibility, privacy, and security. …”
Get full text
Article -
694
Behavioural Economics and Consumer Decision-Making in the Age of Artificial Intelligence (AI), Data Science, Business Analytics, and Internet of Things (IoT)
Published 2024-05-01“…However, while AI and IoT facilitate more efficient and engaging consumer experiences, they introduce complex ethical and practical concerns, particularly around data privacy, algorithmic fairness, and maintenance of consumer trust. …”
Get full text
Article -
695
Legal Challenges of Marine Insurance Laws in the Use of Unmanned Ships
Published 2025-03-01Get full text
Article -
696
FFM: Flood Forecasting Model Using Federated Learning
Published 2023-01-01“…Federated Learning is the most advanced technique of machine learning (ML) that guarantees data privacy, ensures data availability, promises data security, and handles network latency trials inherent in prediction of floods by prohibiting data to be transferred over the network for model training. …”
Get full text
Article -
697
#BeSeen: understanding young people’s views of the motivation and impacts of sharing self-harm imagery online and use of their social media data for research—a UK participatory art...
Published 2024-07-01“…Participants from the RAS group were more inclined to agree to their data being used and had higher levels of trust in government.Conclusion Young people care about their privacy and use of their data even when it is publicly available. …”
Get full text
Article -
698
Testing scenarios for using telepresence robots in healthcare settings
Published 2024-12-01Get full text
Article -
699
Barriers to contraceptive access and use among youths (15–24 Years) living in informal urban settlements of Kigali, Rwanda: a qualitative study
Published 2025-08-01“…Abstract Background Contraceptive use among youths below 19 years in Rwanda is still very low, as low as 3.7%, yet their level of sexual activity is high. …”
Get full text
Article -
700
Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communic...
Published 2025-01-01“…The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. …”
Get full text
Article