Suggested Topics within your search.
Suggested Topics within your search.
-
2401
Sybil Attack Detection Based on Signal Clustering in Vehicular Networks
Published 2024-01-01“…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
Get full text
Article -
2402
The daunting challenge of Artificial Intelligence in Education: a systematic literature review
Published 2025-03-01“…Finally, there are also ethical and social challenges that address concerns about the privacy of student data, equity in access to advanced technologies, and the potential of AI to perpetuate existing biases. …”
Get full text
Article -
2403
Identifying latent mobility as a service preference segments among college students
Published 2025-04-01“…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
Get full text
Article -
2404
Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks
Published 2024-08-01“…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
Get full text
Article -
2405
CLOUD COMPUTING SECURITY
Published 2016-05-01“…Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. …”
Get full text
Article -
2406
Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors
Published 2025-03-01“…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
Get full text
Article -
2407
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
Published 2025-01-01“…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
Get full text
Article -
2408
Comparison of medical history documentation efficiency and quality based on GPT-4o: a study on the comparison between residents and artificial intelligence
Published 2025-05-01“…Despite these positive results, practical considerations such as data preprocessing, data security, and privacy protection must be addressed in real-world applications. …”
Get full text
Article -
2409
Occupational therapy in the space of artificial intelligence: Ethical considerations and human-centered efforts
Published 2024-12-01“…One way to support future AI technology aligned with OT ethical principles may be through human-centered AI (HCAI), an emerging branch within AI research and developments with a notable overlap of OT values and beliefs.Objective To explore the risks and challenges of AI technology, and how the combined expertise, skills, and knowledge of OT and HCAI can contribute to harnessing its potential and shaping its future, from the perspective of OT’s ethical values and beliefs.Results Opportunities for OT and HCAI collaboration related to future AI technology include ensuring a focus on 1) occupational performance and participation, while taking client-centeredness into account; 2) occupational justice and respect for diversity, and 3) transparency and respect for the privacy of occupational performance and participation data.Conclusion and Significance There is need for OTs to engage and ensure that AI is applied in a way that serves OT and OT clients in a meaningful and ethical way through the use of HCAI.…”
Get full text
Article -
2410
Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing
Published 2025-04-01“…Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. …”
Get full text
Article -
2411
AI-driven assistive technologies in inclusive education: benefits, challenges, and policy recommendations
Published 2025-12-01“…Additionally, the paper highlights limitations related to accuracy, infrastructure needs, educator readiness, and ethical concerns such as data privacy and algorithmic bias.To address these challenges, the study proposes policy recommendations and practical strategies for equitable and responsible AI adoption in education, including targeted educator training, funding for inclusive infrastructure, and development of ethical and technical standards. …”
Get full text
Article -
2412
Leveraging Blockchain Technology for Secure 5G Offloading Processes
Published 2025-04-01“…This paper proposes a Blockchain-based marketplace using Hyperledger Fabric to optimize resource allocation and enhance security. …”
Get full text
Article -
2413
Exploring the effects of artificial intelligence on student and academic well-being in higher education: a mini-review
Published 2025-02-01“…Furthermore, issues such as data privacy and job displacement emerge as AI technologies permeate educational environments. …”
Get full text
Article -
2414
Enhancing Public Service Delivery Efficiency through AI: Current Initiatives and Future Prospects in Bangladesh
Published 2024-12-01“…Some major challenges are infrastructure deficits, data privacy breaches, lack of digital literacy, and unpreparedness of the workforce. …”
Get full text
Article -
2415
Leveraging Agent-Based Modeling and IoT for Enhanced E-Commerce Strategies
Published 2024-10-01“…The effectiveness of this model is validated through simulations and case studies, demonstrating its capacity to handle large data volumes, ensure security and privacy, and maintain seamless interoperability among a variety of IoT devices and e-commerce platforms. …”
Get full text
Article -
2416
Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger
Published 2025-07-01“…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
Get full text
Article -
2417
Regulating AI in the Energy Sector: A Scoping Review of EU Laws, Challenges, and Global Perspectives
Published 2025-05-01“…It identifies key regulatory barriers such as stringent risk assessments, cybersecurity obligations, and data access restrictions, along with enablers like regulatory sandboxes and harmonized compliance frameworks. …”
Get full text
Article -
2418
Teenage Motherhood and its Effect on the Social Welfare of The Victims: A Case Study of Kabale Municipality.
Published 2024“…Hence the study offers an in-depth analysis of the relative contribution of some socio¬demographic factors in explaining adolescent pregnancy in Kabale Municipality. Using primary data collected from different parts of the district, a sample of 30 female adolescents in the age range of 10-19 years was studied. …”
Get full text
Thesis -
2419
The reliability and validity of a non-wearable indoor positioning system to assess mobility in older adults: A cross-sectional study.
Published 2025-01-01“…Currently, there is a lack of consensus on which assessments to use to assess walking speed and how to continuously monitor walking speed outside of the clinic. …”
Get full text
Article -
2420
The Applications of Large Language Models in Mental Health: Scoping Review
Published 2025-05-01“…Relevant information on application details and performance metrics was extracted during the data charting of eligible articles. ResultsA total of 95 articles were drawn from 4859 studies using LLMs for mental health tasks. …”
Get full text
Article