Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
2201
An intelligent conversational agent for querying satellite manoeuvre detections: a case study
Published 2025-06-01“…Moreover, our system can handle sensitive and confidential data without breaching privacy. This paper presents the results of deploying SatChat in conjunction with a particle filter based manoeuvre detection system.…”
Get full text
Article -
2202
IoT-driven smart grid monitoring with enhanced energy routing and advanced encryption techniques
Published 2025-11-01“…The proposed work incorporates Improved Paillier Homomorphic (IPH) based encryption scheme, which assures integrity and confidentiality of data transmitted. The outcomes of proposed smart grid system using MATLAB and FPGA controller demonstrate significant improvements by providing enhanced security and optimal routing. …”
Get full text
Article -
2203
Revolutionizing Midwifery Education : A Scoping Review of Artificial Intelligence Methods
Published 2025-04-01“…Despite these advancements, challenges such as ethical concerns (algorithmic bias, privacy issues), poor data quality, limited AI expertise among educators, and resistance to change in traditional learning environments were noted. …”
Get full text
Article -
2204
DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems
Published 2025-07-01“…The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. …”
Get full text
Article -
2205
The Transformative Impact of Artificial Intelligence in Healthcare: Innovations, applications, and future prospects
Published 2024-01-01“…At the same time, the application of AI in healthcare poses a number of challenges, such as data privacy, algorithmic bias, and ethics. This study also explores the role of AI in global health, the need for policies and regulations, and the long-term impact of AI on future healthcare systems. …”
Get full text
Article -
2206
Views on the incorporation of Geolocation Devices in Field Trips
Published 2022-01-01“…Geolocation in field trips has great potential, but it is an understudied field that needs more research and discussion to ensure data privacy.…”
Get full text
Article -
2207
Exploring mHealth app utilization for diabetes self-management: survey insights from a northern district in Malaysia
Published 2024-12-01“…Users perceived the mHealth app as useful (97.5%), yet faced challenges over the app initiation, charges and data security. …”
Get full text
Article -
2208
An AI-Based Telerehabilitation Solution to Improve Mobility in People With Multiple Sclerosis (the PLATINUMS Project): Protocol for an Implementation and Evaluation Study
Published 2025-07-01“…ResultsFunding for the PLATINUMS project was obtained in February 2024. WP2 data collection began in April 2025 across 4 European sites. …”
Get full text
Article -
2209
Strengthening ethical oversight in genomics and biobanking: a retrospective analysis of research practices in Zimbabwe
Published 2025-07-01“…Consent practices varied: 99(49.5%) protocols utilized specific consent, 37(18.5%) employed broad consent, and 37(18.5%) used blanket consent. Notably, 2(1%) protocols did not use consent forms, opting instead for broad or specific notifications. …”
Get full text
Article -
2210
Blockchain enhanced smart healthcare management for chronic diseases
Published 2025-06-01“…Abstract Chronic diseases affect millions of people worldwide, making it a significant issue for the efficient and secure management of patient data. Most traditional chronic disease management systems fail to manage data in real time and struggle with interoperability and security issues. …”
Get full text
Article -
2211
Hybrid-CID: Securing IoT with Mongoose Optimization
Published 2025-03-01“…After preprocessing, the Hybrid-CID framework develops a hybrid optimization algorithm to identify the intrusions from the traffic data which ensures data privacy by maintaining the reliability and integrity of IoT deployments. …”
Get full text
Article -
2212
A Comprehensive Survey of Electric Vehicle Charging Demand Forecasting Techniques
Published 2024-01-01“…Meanwhile, emerging machine learning techniques bring promising prospects, yet exhibit suboptimal performance with insufficient data. Additionally, existing studies often overlook several critical areas such as overcoming data scarcity, security and privacy concerns, managing the inherent stochasticity of demand data, selecting forecasting methods for a specific feature, and developing standardized performance metrics. …”
Get full text
Article -
2213
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things
Published 2025-05-01“…This article presents a blockchain-assisted safe data-sharing mechanism that provides security requirements in the industry using IoT. …”
Get full text
Article -
2214
Analisis Pengaruh Kualitas Layanan Terhadap Kepuasan Pelanggan dan Loyalitas Pengguna Aplikasi Jenius Menggunakan Model E-S- Qual dan E- Recs- QUal (Studi Kasus: Pengguna Aplikasi...
Published 2022-12-01“…This study involved 100 samples of Jenius application users in Malang City. This research uses purposive sampling as a sampling technique and multiple and simple linear regression analysis as a technique in data analysis. …”
Get full text
Article -
2215
Home Occupant Archetypes
Published 2019-11-01“…Parallelly, in-depth and semi-structured interviews were conducted, which are techniques used to gather qualitative behavioural data from the home occupants. …”
Get full text
Article -
2216
A CAE model-based secure deduplication method
Published 2025-07-01“…Abstract Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. …”
Get full text
Article -
2217
A Bibliometric Analysis of Publications on Surveillance and New Media Concepts in The Web of Science Database
Published 2025-06-01“…To this end, a bibliometric analysis based on quantitative data is conducted using the Web of Science (WoS) database as of June 23, 2024. …”
Get full text
Article -
2218
Mental Health Apps Available in App Stores for Indian Users: Protocol for a Systematic Review
Published 2025-04-01“…Additionally, the apps will be reviewed for quality using the Mobile Application Rating Scale. The data analysis and synthesis strategy will incorporate descriptive statistics based on quality evaluation using the Mobile Application Rating Scale and examining the content of the apps for generating descriptive information. …”
Get full text
Article -
2219
Toward a Domain-Overarching Metadata Schema for Making Health Research Studies FAIR (Findable, Accessible, Interoperable, and Reusable): Development of the NFDI4Health Metadata Sch...
Published 2025-05-01“…The National Research Data Infrastructure for Personal Health Data (NFDI4Health) seeks to optimize data sharing among the clinical, epidemiological, and public health research communities while preserving privacy and ethical regulations. …”
Get full text
Article -
2220
Dynamics of Robo-Advisory Financial Services in Saudi Arabia
Published 2025-06-01“…The key limitations of adopting Robo-advisory services include algorithmic bias, a lack of trust and transparency, legal and regulatory issues, privacy and data security concerns, and limited financial literacy. …”
Get full text
Article