Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedddds » useddddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
usedddds » useddddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
2301
Artificial Intelligence in Bronchopulmonary Dysplasia: A Review of the Literature
Published 2025-03-01“…Addressing ethical considerations, such as data privacy and demographic representation, as well as other practical considerations will be essential to ensure the proper implementation of AI clinical tools. …”
Get full text
Article -
2302
Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks
Published 2024-12-01“…To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL). …”
Get full text
Article -
2303
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…At present, encrypted data is the cornerstone of Internet communication, providing the maximum degree of privacy and security protection for all transmitted data while shielding users against potential cyber threats and attacks. …”
Get full text
Article -
2304
5G-MobiCare: A Secure 5G Assisted Remote Mobile Health Monitoring Platform
Published 2025-01-01“…This setup generates vast amounts of real-time data, making secure device authentication essential to ensure data privacy and security. …”
Get full text
Article -
2305
Detecting Learning Behavior in Programming Assignments by Analyzing Versioned Repositories
Published 2024-01-01“…The Polivr ecosystem comprises three key modules: Polivr Anonymiser, which ensures data privacy by anonymising student identities; Polivr Core, which mines learning metrics from Git repositories; and Polivr Web Viewer, which transforms the raw metrics into insightful visualisations for educators. …”
Get full text
Article -
2306
Evaluation of comprehensive abortion care service in University of Gondar Comprehensive Specialized Hospital in Northwest Ethiopia: mixed case study design
Published 2025-03-01“…The qualitative data were recorded through a tape recorder, transcribed in Amharic and translated to English, and analyzed thematically. …”
Get full text
Article -
2307
Evaluation of a piloted digital reproductive health registry in Jordan to improve mother and child health
Published 2025-05-01“…Conclusion The new hRHR has a high acceptance level among stakeholders, health providers and women using MCH services. The evaluation showed that the system improved documentation of data, decreased time, and effort of data reporting and retrieval, and improved access to patient data.…”
Get full text
Article -
2308
The Emergence of AI-Driven Virtual Hospitals: Redefining Patient Care Beyond Physical Boundaries
Published 2025-04-01“…Despite these apparent benefits, the implementation of AI-based virtual hospitals faces challenges in terms of security such as data privacy, cybersecurity risks, and business risks due to overfitting and underfitting models. …”
Get full text
Article -
2309
Developing an Ontology to Enhance Semantic Interoperability in IoT Environment
Published 2025-05-01“…This study proposes the development of an enhanced ontology that integrates different ontologies in the IoT domain, including key aspects such as interoperability, security, privacy, energy efficiency, and ethics. A formal methodology for ontology design and construction was used in four phases: ontology requirements, design, construction, and evaluation. …”
Get full text
Article -
2310
Quality of Breast Cancer Information on the Internet by African Organizations: An Appraisal
Published 2017-01-01“…The identified websites were assessed using European Commission (EC) quality criteria for health-related websites, which comprises different assessment areas including, completeness, transparency and honesty, authority, privacy and data protection, updating of information, accountability, and accessibility. …”
Get full text
Article -
2311
Making temporary homes
Published 2024-06-01“…The interviews were analysed with Interpretative Phenomenological Analysis, and the visual data (photos made by the interviewees and sometimes the researcher, and drawings made by the researcher) was used to place the content of the interviews in a physical context. …”
Get full text
Article -
2312
Web 3.0: The future of the decentralized Internet
Published 2023-01-01“…Decentralization plays an important role in transferring power from providers to users, protecting privacy and regaining control over their information and data. …”
Get full text
Article -
2313
A STUDY OF PEOPLE’S PERCEPTION OF ARTIFICIAL INTELLIGENCE IN FINANCE AND SOCIETY
Published 2025-07-01“…This paper investigates how people perceive artificial intelligence (AI), using both original survey data and insights from recent academic and policy literature. …”
Get full text
Article -
2314
AI in humanitarian healthcare: a game changer for crisis response
Published 2025-07-01“…Ethical concerns such as data privacy, bias, and access inequities remain critical to responsible deployment. …”
Get full text
Article -
2315
Cooperative inference analysis based on DNN convolutional kernel partitioning
Published 2022-12-01“…With the popularity of intelligent chip in the application of edge terminal devices, a large number of AI applications will be deployed on the edge of networks closer to data sources in the future.The method based on DNN partition can realize deep learning model training and deployment on resource-constrained terminal devices, and solve the bottleneck problem of edge AI computing ability.Thekernel based partition method (KPM) was proposed as a new scheme on the basis of traditional workload based partition method (WPM).The quantitative analysis of inference performance was carried out from three aspects of computation FLOPS, memory consumption and communication cost respectively, and the qualitative analysis of the above two schemes was carried out from the perspective of flexibility, robustness and privacy of inference process.Finally, a software and hardware experimental platform was built, and AlexNet and VGG11 networks were implemented using PyTorch to further verify the performance advantages of the proposed scheme in terms of delay and energy consumption.It was concluded that, compared with the WPM scheme, the KPM scheme had better DNN reasoning acceleration effect in large-scale computing scenarios.And it has lower memory usage and energy consumption.…”
Get full text
Article -
2316
Student attendance and evaluation system : A review
Published 2025-06-01“…However, these systems also face challenges, including financial constraints, privacy concerns, and difficulties in scalability. …”
Get full text
Article -
2317
Cooperative inference analysis based on DNN convolutional kernel partitioning
Published 2022-12-01“…With the popularity of intelligent chip in the application of edge terminal devices, a large number of AI applications will be deployed on the edge of networks closer to data sources in the future.The method based on DNN partition can realize deep learning model training and deployment on resource-constrained terminal devices, and solve the bottleneck problem of edge AI computing ability.Thekernel based partition method (KPM) was proposed as a new scheme on the basis of traditional workload based partition method (WPM).The quantitative analysis of inference performance was carried out from three aspects of computation FLOPS, memory consumption and communication cost respectively, and the qualitative analysis of the above two schemes was carried out from the perspective of flexibility, robustness and privacy of inference process.Finally, a software and hardware experimental platform was built, and AlexNet and VGG11 networks were implemented using PyTorch to further verify the performance advantages of the proposed scheme in terms of delay and energy consumption.It was concluded that, compared with the WPM scheme, the KPM scheme had better DNN reasoning acceleration effect in large-scale computing scenarios.And it has lower memory usage and energy consumption.…”
Get full text
Article -
2318
The Impact of Artificial Intelligence on Human Resource Management in the Era of Digitalization
Published 2025-03-01“…This study examines AI-driven HR functions, including recruitment, performance evaluation, and learning and development, while addressing ethical and operational challenges such as bias, data privacy, and job displacement. Using a qualitative methodology, including a narrative literature review and case study analysis, the research explores AI’s integration within HRM through theoretical frameworks such as the Technology Acceptance Model (TAM), Resource-Based View (RBV), and Socio-Technical Systems Theory. …”
Get full text
Article -
2319
Computer-assisted diagnosis to improve diagnostic pathology: A review
Published 2025-01-01“…It emphasizes the strides made in digital pathology, the integration of AI, and the promising prospects for prognostic biomarker discovery using computational methods. Additionally, ethical considerations regarding data privacy, equity, and trust in AI deployment are examined. …”
Get full text
Article -
2320
Cybercrime Regulation through Laws and Strategies: a Glimpse into the Indian Experience
Published 2020-03-01“…This Act underwent amendment in 2008 to accommodate provisions essential to regulate cybercrimes as well as protect data and privacy on cyber space. In addition to the law, other strategies were designed and adopted to better regulate cyber offences including announcing cyber security policies, constituting institutions to take care of certain concerns including those relating to critical infrastructure information, etc. …”
Get full text
Article