Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddddds » usedddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
useddddds » usedddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
2141
Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
Published 2024-09-01“…The validation phase demonstrated the model’s efficiency in reducing data redundancy and ensuring the consistency and integrity of policy information. …”
Get full text
Article -
2142
Leveraging large language models for the deidentification and temporal normalization of sensitive health information in electronic health records
Published 2025-08-01“…Abstract Secondary use of electronic health record notes enhances clinical outcomes and personalized medicine, but risks sensitive health information (SHI) exposure. …”
Get full text
Article -
2143
Revolutionizing Sports: The Role of Wearable Technology and AI in Training and Performance Analysis
Published 2025-03-01“…Additionally, AI-driven wearables raise concerns over data security, ethical handling, and equitable access, as high costs limit their use in amateur sports. …”
Get full text
Article -
2144
Advances in Infant Cry Paralinguistic Classification—Methods, Implementation, and Applications: Systematic Review
Published 2025-04-01“…ConclusionsThe evolution of infant cry classification methods has progressed from traditional classical statistical methods to machine learning models but with minimal considerations of data privacy, confidentiality, and ultimate deployment to practical use. …”
Get full text
Article -
2145
Influencing Factors and Correlations of User Satisfaction with Mobile Health Applications
Published 2025-01-01“…Using the grounded theory, the study extracted factors influencing user satisfaction with mobile health applications by coding the review data. …”
Get full text
Article -
2146
Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting
Published 2025-01-01“…This research applies a systematic methodology for assessing such software, considering usability, adaptability, cost-effectiveness, and data privacy compliance, specifically tailored to automotive reporting and gives recommendation for software tools.…”
Get full text
Article -
2147
BSLISE directory: innovating global mapping and organization of LIS schools
Published 2025-03-01“…Evolving from the MAP project, the BSLISE directory consolidates and adapts data into a new framework using open-source software. …”
Get full text
Article -
2148
Alternatives to continuous positive airway pressure treatment in sleep apnoeas and hypopnoeas syndrome related to myofunctional and postural reeducation therapy: protocol for a sys...
Published 2021-12-01“…Finally, several patient-related outcomes, namely sleep quality, quality of life and sleep Apnoeas and Hypoapnoeas Index, will be examined.Ethics and dissemination In this case, ethical approval is not necessary. The data used in the review will be exclusively obtained from published studies, implying there are no privacy concerns. …”
Get full text
Article -
2149
Information Technology in Nursing Practice: A Scoping Review of Assessment Tools for Evaluating Nurses’ Competencies
Published 2025-05-01“…This has driven the need to develop specific competencies and maintain a balance between ethical aspects, social and legal challenges related to privacy and data security, as well as the challenge of ensuring person-centered care practice. …”
Get full text
Article -
2150
New secure distributed secret sharing scheme of n product
Published 2014-11-01“…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
Get full text
Article -
2151
The Impact of Digital Technologies on the Development of Payment Services
Published 2020-10-01“…The problems and ways of protecting user identification, data privacy and money safety when using electronic payment services are investigated. …”
Get full text
Article -
2152
Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review
Published 2024-12-01“…However, issues such as data privacy, dental professional job displacement, and the necessity for thorough validation and regulation to ensure safety and efficacy remain significant concerns.…”
Get full text
Article -
2153
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01“…The participants’ private data are encoded as single photons, which are encrypted using a rotational encryption method. …”
Get full text
Article -
2154
Verifiable Key-Aggregate Searchable Encryption Scheme for Fog-Based Internet of Autonomous Vehicles
Published 2025-03-01“…The fog-based Internet of Autonomous Vehicles (FB-IAV) collects extensive sensing data to enhance its understanding of the environment. …”
Get full text
Article -
2155
AI in Structural Health Monitoring for Infrastructure Maintenance and Safety
Published 2024-12-01“…We examine seven core areas where AI significantly advances SHM capabilities: (1) data acquisition and sensor networks, highlighting improvements in sensor technology and data collection; (2) data processing and signal analysis, where AI techniques enhance feature extraction and noise reduction; (3) anomaly detection and damage identification using machine learning (ML) and deep learning (DL) for precise diagnostics; (4) predictive maintenance, using AI to optimize maintenance scheduling and prevent failures; (5) reliability and risk assessment, integrating diverse datasets for real-time risk analysis; (6) visual inspection and remote monitoring, showcasing the role of AI-powered drones and imaging systems; and (7) resilient and adaptive infrastructure, where AI enables systems to respond dynamically to changing conditions. …”
Get full text
Article -
2156
Generative AI in higher education: A global perspective of institutional adoption policies and guidelines
Published 2025-06-01“…Despite these efforts, gaps remain in comprehensive policy frameworks, particularly in addressing data privacy concerns and ensuring equitable access to GAI tools. …”
Get full text
Article -
2157
Development of a Digital Platform: A Perspective to Advance Space Telepharmacy
Published 2023-01-01“…It has specific service protocols for service standardization, including artificial intelligence, to allow agility in services and escalation. All data is protected by privacy and professional ethics guidelines. …”
Get full text
Article -
2158
Community perceptions of ethics and professionalism of community health workers: a qualitative exploration
Published 2025-04-01“…Results The CHWs ensure good quality of services by effective use of mobile phones and by going beyond the call of duty. …”
Get full text
Article -
2159
BACP-LRS: Blockchain and IPFS-based Land Record System
Published 2025-01-01“…Objective: The purpose of the present work is to propose an architecture for blockchain-based access control for distribution, ensuring information privacy. We take advantage of the benefits of blockchain technology in improving land record management while granting access to electronic data through user permissions. …”
Get full text
Article -
2160
THE IMPACT OF AI ON FUNDAMENTAL HUMAN RIGHTS IN EU COUNTRIES. EXAMINATION OF ACADEMIC STUDIES AND THE POSITIONS OF NON-GOVERNMENTAL ORGANIZATIONS REGARDING THE ETHICAL AND AI LEGAL...
Published 2025-05-01“…In the European Union, the development and use of AI pose significant challenges regarding the protection of fundamental human rights, such as the right to privacy, equality, and access to justice. …”
Get full text
Article