Suggested Topics within your search.
Suggested Topics within your search.
-
1881
Decentralized Distributed Sequential Neural Networks Inference on Low-Power Microcontrollers in Wireless Sensor Networks: A Predictive Maintenance Case Study
Published 2025-07-01“…The growing adoption of IoT applications has led to increased use of low-power microcontroller units (MCUs) for energy-efficient, local data processing. …”
Get full text
Article -
1882
Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences
Published 2025-03-01“…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
Get full text
Article -
1883
Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers
Published 2025-06-01“…The analysis highlights the use of cloud storage as a media to store the proceeds of crime, in the form of data privacy. …”
Get full text
Article -
1884
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى
Published 2019-10-01“…The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. …”
Get full text
Article -
1885
Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty
Published 2025-03-01“…One approach to improve trustworthiness and fairness in AI systems is to use bias mitigation algorithms. However, most bias mitigation algorithms require data sets that contain sensitive attribute values to assess the fairness of the algorithm. …”
Get full text
Article -
1886
Algorithms weighing lives and freedoms: The case of China’s health code
Published 2023-03-01“…Digital contact tracing has attracted enormous interest among academics and legislators since the outbreak of COVID-19, which resulted in several policy papers and research works, discussing issues, such as the effectiveness and accuracy of virus detection, as well concerns in regard to discrimination and data privacy. However, most of the articles refers to technologies and its implications in the West, and less to the peculiarities and problems related to the use of Chinese health code. …”
Get full text
Article -
1887
Bridging the Gap between Neuroarchitecture, Artificial Intelligence, and Sustainability: A Systematic Review of Mental Health in the Built Environment
Published 2025-09-01“…Ethical considerations related to data privacy and consent are also discussed, providing a comprehensive understanding of the potential and challenges in designing AI-driven neuroarchitecture-sustainable adaptive designs.…”
Get full text
Article -
1888
Healthcare professionals and the public sentiment analysis of ChatGPT in clinical practice
Published 2025-01-01“…This study was divided into five steps: data collection, data cleaning, validation of relevance, sentiment analysis, and content analysis using the K-means algorithm. …”
Get full text
Article -
1889
Investigating Online Psychotherapy in the Framework of Ethical Codes
Published 2023-04-01“…The ways people communicate and interact have been changing over time as a result of the increasingly widespread developments and changes in technology. The use of the Internet, which has become an inevitable part of human life, increasingly raises the question of whether psychotherapy can be performed over the Internet. …”
Get full text
Article -
1890
The Dynamics of Regional Head Elections in the Digital Era in Indonesia: The Perspective of First-Time Voters
Published 2025-06-01“…However, on the other hand, the use of social media in political campaigns faces several challenges, including the spread of disinformation, manipulation of opinions by buzzers and influencers, and potential violations of user data privacy. …”
Get full text
Article -
1891
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“… The effective use of cloud technology eliminates the barriers and potential IT obstacles that companies face by using a traditional way of developing a platform for the information systems, as a backbone of modern business. …”
Get full text
Article -
1892
Digital technologies in education: the view of medical students
Published 2025-07-01“…Despite the overall positive perception, the study identified existing problems, such as a lack of practical skills, data privacy issues, and decreased concentration.Conclusion. …”
Get full text
Article -
1893
User and Provider Experiences With Health Education Chatbots: Qualitative Systematic Review
Published 2025-06-01“…For RQ2, accessibility and ease of use emerged as facilitators, whereas trust deficits, technical glitches, and cultural misalignment were key barriers. …”
Get full text
Article -
1894
Digital insurance acceptance among older adults in the context of AI
Published 2025-06-01“…This exploratory study employed the insights of the Technology Acceptance Model (TAM), the Information System Continuance Model (ISCM), and the Customer Satisfaction (C-SAT) method. Data were collected by conducting interviews in September 2024 with 20 older adults using AI-powered insurance services. …”
Get full text
Article -
1895
Micro, Small and Medium-sized Enterprises in the Digital Economy: Barriers to Digitalisation
Published 2025-06-01“…Implications / Recommendations: There is a need for education and support of digital competences, as well as to increase awareness among the owners of small firms as to the benefits digitalisation promises. At the same time, data and privacy must be protected in order to encourage entrepreneurs to safely implement digital solutions. …”
Get full text
Article -
1896
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic
Published 2025-04-01“…The efficacy of our approach was evaluated using a substantial volume of real network traffic data. …”
Get full text
Article -
1897
Energy-aware federated learning for secure edge computing in 5G-enabled IoT networks
Published 2025-05-01“…Abstract The rapid expansion of 5G-enabled IoT networks has intensified the need for efficient, secure, and privacy-preserving machine learning models that can operate in decentralized edge environments. …”
Get full text
Article -
1898
A framework reforming personalized Internet of Things by federated meta-learning
Published 2025-04-01“…However, with the introduction of laws and regulations about data security and privacy protection, centralized solutions, which require data to be collected and processed directly on a central server, become impractical for personalized Internet of Things to train Artificial Intelligence models for a variety of domain-specific scenarios. …”
Get full text
Article -
1899
iScene: An interpretable framework with hierarchical edge services for scene risk identification in 6G internet of vehicles
Published 2024-12-01“…However, the performance of existing risk identification approaches is heavily limited by the imbalanced historical data and the poor model interpretability. Meanwhile, the large processing delay and the potential privacy leakage threat also restrict their application. …”
Get full text
Article -
1900
Feasibility of a computerized clinical decision support system delivered via a socially assistive robot during grand rounds: A pilot study
Published 2025-04-01“…Background Adopting Clinical Decision Support Systems in healthcare faces challenges such as complexity, poor integration with workflows, and concerns about data privacy and quality. Issues such as too many alerts, confusing errors, and difficulty using the technology in front of patients make adoption challenging and prevent it from fitting into daily workflows. …”
Get full text
Article