Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
uses » useds (Expand Search)
use » used (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
uses » useds (Expand Search)
use » used (Expand Search)
-
2461
Advanced Monte Carlo for Acquisition Sampling in Bayesian Optimization
Published 2025-01-01“…Bayesian optimization (BO) has proved to be a suitable optimization method in these situations thanks to its sample efficiency and principled way of learning from previous data, but it typically requires that experiments are sequentially performed. …”
Get full text
Article -
2462
Comparative Performance Evaluation of Real-Time Webcam and HOG-Based Facial Recognition Systems for Children's Screen Time Management
Published 2025-06-01“…It highlights critical security and privacy considerations, particularly the responsible handling of facial data in environments accessible to minors. …”
Get full text
Article -
2463
A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service
Published 2015-09-01“…Since existing studies mainly focus on simple statistical analysis of the K-ISMS assessment results, analysis on the cause of certification assessment fault based on past data analysis is insufficient. As a method of managing the certification inspection quality, in this paper, we analyze the association among the fault items of the K-ISMS certification assessment results using association rule mining which involves identifying an association rule among items in the database.…”
Get full text
Article -
2464
A Multi-Criteria Decision-Making Framework for Evaluating Emerging Digital Technologies in Supply Chain Optimization
Published 2025-07-01“…Ten critical attributes covering technical, economic, and environmental dimensions were identified through expert consultation and a review of relevant literature, including scalability, integration ease, performance benefit, costeffectiveness, environmental and social sustainability, data privacy, and supply chain resilience. The evaluation framework combines the Entropy method for determining objective attribute weights with the TOPSIS method for ranking alternatives. …”
Get full text
Article -
2465
Performance Evaluation of Decentralized Federated Learning: Impact of Fully and K-Connected Topologies, Heterogeneous Computing Resources, and Communication Bandwidth
Published 2025-01-01“…Decentralized federated learning (DFL) enables collaborative model training across distributed devices while preserving data privacy. Despite this, the performance of DFL in real-world scenarios, characterized by varying network topologies, heterogeneous client resources, and communication bandwidth, remains underexplored. …”
Get full text
Article -
2466
A Systematic Literature Review on Sustainability Integration and Marketing Intelligence in the Era of Artificial Intelligence
Published 2024-12-01“…The conversation delves into the difficulties and moral aspects involved in using AI in marketing, such as issues related to data privacy, algorithmic bias, and the importance of a strategic framework that focuses on sustainable development goals. …”
Get full text
Article -
2467
Asynchronous blockchain‐based federated learning for tokenized smart power contract of heterogeneous networked microgrid system
Published 2024-12-01“…For simulation purposes, MATLAB and python programming have been used with real‐time data of microgrids.…”
Get full text
Article -
2468
A Survey on the Effectiveness of Existing Smart Home Cyber Attacks Detection Solution: A Broadband Service Providers’ Perspective
Published 2025-01-01“…We also discuss future research directions, emphasising scalable and data-efficient methods to reduce storage requirements, costs, and privacy concerns, which will enable BSPs to manage millions of customer networks more effectively.…”
Get full text
Article -
2469
Toward a Domain-Overarching Metadata Schema for Making Health Research Studies FAIR (Findable, Accessible, Interoperable, and Reusable): Development of the NFDI4Health Metadata Sch...
Published 2025-05-01“…The National Research Data Infrastructure for Personal Health Data (NFDI4Health) seeks to optimize data sharing among the clinical, epidemiological, and public health research communities while preserving privacy and ethical regulations. …”
Get full text
Article -
2470
The Effect of Viral Promotional Advergames on the Behavioral Reactions
Published 2024-09-01“…This research used data from pre-measure and post-measure assessments within a real viral marketing campaign. …”
Get full text
Article -
2471
Arabic speaking women’s experience of postpartum contraceptive counselling in Sweden
Published 2025-07-01“…The FGDs were conducted in Arabic and translated to English. Data was analysed using reflexive thematic analysis. …”
Get full text
Article -
2472
Enhancing technological sustainability in academia: leveraging ChatGPT for teaching, learning and evaluation
Published 2024-12-01“…However, it also sheds light on the ethical issues and challenges associated with its use, including privacy and data protection, transparency and alignment with educational principles. …”
Get full text
Article -
2473
Advancing sustainability: The impact of emerging technologies in agriculture
Published 2024-12-01“…However, it is important to carefully address ethical and socio-economic considerations, including accessibility and data privacy, to manage these effects effectively. …”
Get full text
Article -
2474
Exploring unsupervised feature extraction algorithms: tackling high dimensionality in small datasets
Published 2025-07-01“…Abstract Small datasets are common in many fields due to factors such as limited data collection opportunities or privacy concerns. …”
Get full text
Article -
2475
Establishing a Collaborative Genomic Repository for Adult Burn Survivors: A Burn Model System Feasibility Study
Published 2024-11-01“…We set out two primary objectives, namely (1) to develop standard operating procedures for genetic sample collection and storage, DNA isolation, and data integration into an existing multicenter database; and (2) to demonstrate the feasibility of correlating genetic variation to functional outcomes in a pilot study, using the catechol-O-methyltransferase (COMT) gene. …”
Get full text
Article -
2476
Effects of Virtual Care on Patient and Provider Experience of the Clinical Encounter: Qualitative Hermeneutic Study
Published 2024-11-01“…A total of 17 patients and 10 providers from various disciplines were interviewed by phone as part of a study on health care implementation in the context of a kidney care service in northern British Columbia, Canada. The interview data were analyzed using a hermeneutic approach, which emphasizes careful attention to reported experiences in relation to the relationships and contexts of care. …”
Get full text
Article -
2477
Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks
Published 2025-08-01“…The training model defines the convolutional layer's structure, sliding window size, neuron connection weights, and outputs using the improved data. The training period is used for attack detection, and the weights are calculated from trained and real-time data. …”
Get full text
Article -
2478
A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture
Published 2025-05-01“…This study designs a progressive solution by (1) building a crowdsourced data collection network, using mobile terminals equipped with GPS technology to automatically collect device signal features, replacing inefficient manual drive tests; (2) developing a progressive signal update algorithm that integrates real-time crowdsourced data and historical signals to optimize the signal fingerprint database in dynamic environments; (3) establishing an edge service architecture to offload signal matching and trajectory estimation tasks to MEC nodes, using lightweight computing engines to reduce the load on the core network. …”
Get full text
Article -
2479
Retracted: An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks
Published 2022-01-01“…Also, the safety messages are modified or discarded by the attacker or any other node and it may lead to the loss of privacy, integrity, confidentiality, and authentication of the data.So to enhance the security of VANETs, it is very much essential to invent a secure communication protocol, to protect the infrastructure of the network and the confidentiality of the data. …”
Get full text
Article -
2480
Advancing the Sensitivity Frontier in digital contact tracing: Comparative analysis of proposed methods toward maximized utility
Published 2025-01-01“…During the COVID-19 pandemic, many countries adopted Digital Contact Tracing (DCT) technology to control infections. However, the widely-used Bluetooth Low Energy (BLE)-based DCT requires both the infected individual and the contact to have the application activated to detect exposure. …”
Get full text
Article