Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedddds » useddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
usedddds » useddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
2181
A Self-Sovereign Identity-Based Authentication and Reputation Protocol for IoV Applications
Published 2025-01-01“…Key innovations include a lightweight proof of reputation mechanism based on multi-party computation, enabling vehicles to collaboratively assess trustworthiness using recent spatiotemporal data without compromising privacy. …”
Get full text
Article -
2182
Comparison of Machine Learning Methods for Menstrual Cycle Analysis and Prediction
Published 2025-03-01“…The findings highlight the potential for improved accuracy in reproductive health tracking, with future research opportunities to incorporate additional variables such as hormonal history and lifestyle factors, as well as a focus on data privacy.…”
Get full text
Article -
2183
Application of Criminal Offenders Misuse of National Identification Numbers for Phone Card Registration in Makassar City
Published 2024-03-01“…The findings indicate that despite the absence of specific laws on starter pack registration, Indonesian citizens are protected by constitutional, administrative, ITE (Information and Electronic Transactions), and personal data protection laws. However, obstacles exist in enforcing criminal offenses related to NIK misuse, including outlet registration by actors lacking buyer identities due to fierce competition and public preference for instant solutions without considering the consequences of using others' NIK for SIM card registration.…”
Get full text
Article -
2184
A Review of Asynchronous Byzantine Consensus Protocols
Published 2024-12-01“…Blockchain technology can be used in the IoT to ensure the data privacy collected by sensors. …”
Get full text
Article -
2185
Consumption of boutique hotel experiences as revealed by electronic word-of-mouth
Published 2019-07-01“…The research considered prior studies on experiential consumption, as well as publications focused on understanding postmodern individuals. Netnography was used to collect data on – and analyse – post-consumption behaviours boutique hotels. …”
Get full text
Article -
2186
A Comparative Analysis of Artificial Intelligence Regulatory Law in Asia, Europe, and America
Published 2024-01-01“…The primary considerations in formulating these regulations include ethical principles, data privacy, algorithmic bias, transparency, explainability, and international collaboration. …”
Get full text
Article -
2187
Updatable Multi-User Dynamic Searchable Encryption Scheme with Bidirectional Verification
Published 2025-06-01“…The scheme enables secure dynamic data sharing in multi-user scenarios by constructing an index structure using homomorphic message authentication codes and bitmaps. …”
Get full text
Article -
2188
Smart Safety Helmets with Integrated Vision Systems for Industrial Infrastructure Inspection: A Comprehensive Review of VSLAM-Enabled Technologies
Published 2025-08-01“…This paper compiles numerous industrial use cases, from bridges and tunnels to plants and power facilities, demonstrating significant improvements in inspection efficiency, data quality, and worker safety. …”
Get full text
Article -
2189
LITERATURE REVIEW ON THE DOUBLE-EDGED SWORD OF AI IN MENTAL HEALTH: A DEEP DIVE INTO CHATGPT'S CAPABILITIES AND LIMITATIONS
Published 2024-04-01“…Key ethical concerns include data privacy and accountability. Conclusion: The study recommends a balanced approach, suggesting ChatGPT as an adjunct rather than a replacement for conventional mental health services. …”
Get full text
Article -
2190
Electroencephalography-Based Brain-Computer Interfaces in Rehabilitation: A Bibliometric Analysis (2013–2023)
Published 2024-11-01“…Ethical considerations, including data privacy, transparency, and equitable access to BCI technologies, must be prioritized to ensure the inclusive development and use of these technologies across diverse socioeconomic groups.…”
Get full text
Article -
2191
Electronic health record in military healthcare systems: A systematic review.
Published 2025-01-01“…Current literature on EHR use in military healthcare is lacking and disjointed. …”
Get full text
Article -
2192
Evaluation of Government Programmes on Enhancing the Lives of the Elderly: A Case Study of Social Assistance Grant for Empowerment in Mitooma District.
Published 2024“…Different data collection tools like interview guide, and questionnaire were used. …”
Get full text
Thesis -
2193
Predictors of Women’s Satisfaction with Hospital-Based Intrapartum Care in Asmara Public Hospitals, Eritrea
Published 2017-01-01“…The key predictors of satisfaction with intrapartum care were provision of clean bed and beddings (AOR = 18.87, 2.33–15.75), privacy during examinations (AOR = 10.22, 4.86–21.48), using understandable language (AOR = 8.72, 3.57–21.27), showing how to summon for help (AOR = 8.16, 4.30–15.48), showing baby immediately after birth (AOR = 8.14, 2.87–23.07), control of the delivery room (AOR = 6.86, 2.65–17.75), receiving back massage (AOR = 6.43, 3.23–12.81), toilet access and cleanliness (AOR = 6.09, 3.25–11.42), availability of chairs for relatives (AOR = 5.96, 3.14–11.30), allowing parents to stay during labour (AOR = 3.52, 1.299–9.56), and request for permission before any procedure (AOR = 2.39, 1.28–4.46). …”
Get full text
Article -
2194
Integrating Machine Learning and IoT for Effective Plant Disease Management
Published 2025-01-01“…Further, the framework is structured for privacy of data and security using strong encryption and secure access protocols. …”
Get full text
Article -
2195
Advancing sustainability: The impact of emerging technologies in agriculture
Published 2024-12-01“…However, it is important to carefully address ethical and socio-economic considerations, including accessibility and data privacy, to manage these effects effectively. …”
Get full text
Article -
2196
The State of Artificial Intelligence and its Prospects in Pakistan's Medical Sector
Published 2024-12-01“…The rising integration of AI in Pakistani medicine necessitates the evolution of regulatory frameworks to guarantee patient safety, data privacy, and ethical application of AI technologies. …”
Get full text
Article -
2197
Deep Learning dengan Teknik Early Stopping untuk Mendeteksi Malware pada Perangkat IoT
Published 2025-02-01“…This approach utilizes machine learning techniques and intense learning to identify and mitigate cyber threats. The use of Convolutional Neural Network (CNN) in classifying the IoT-23 dataset with the SMOTE (Synthetic Minority Oversampling Technique) data balancing technique and the Early Stopping function shows high results. …”
Get full text
Article -
2198
Decentralized multi-agent federated and reinforcement learning for smart water management and disaster response
Published 2025-07-01“…IoT devices are adopted for sensing and data acquisition, adaptive learning for decision-making, and optimization of energy use among the agents in the system through metaheuristic algorithms. …”
Get full text
Article -
2199
Federated learning for crop yield prediction: A comprehensive review of techniques and applications
Published 2025-06-01“…Federated Learning (FL) as a decentralized approach to machine learning facilitates collaborative model training on different data sources while maintaining privacy—making it highly applicable technology for sensitive agricultural data. …”
Get full text
Article -
2200
Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem
Published 2020-12-01“…Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. …”
Get full text
Article