Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
-
1301
Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method
Published 2019-05-01“…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
Get full text
Article -
1302
A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation
Published 2025-12-01“…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
Get full text
Article -
1303
Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ
Published 2024-12-01“… This study aims to analyze and evaluate the vulnerability of Insecure Direct Object Reference (IDOR) in the thesis registration web application at XYZ University, as well as to provide improvement recommendations to enhance the security of students' personal data. The IDOR vulnerability allows unauthorized access to students' personal documents, which can jeopardize privacy and information security. …”
Get full text
Article -
1304
Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain
Published 2025-07-01“…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
Get full text
Article -
1305
Machine Learning for Human Activity Recognition: State-of-the-Art Techniques and Emerging Trends
Published 2025-03-01Get full text
Article -
1306
GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor
Published 2025-01-01“…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
Get full text
Article -
1307
Nuclei segmentation and classification from histopathology images using federated learning for end-edge platform.
Published 2025-01-01“…To protect data privacy, the framework employs a FedAvg-based federated learning scheme, enabling decentralized training without exposing sensitive data. …”
Get full text
Article -
1308
Tree-to-Me: Standards-Driven Traceability for Farm-Level Visibility
Published 2025-04-01“…These systems also fail to standardise and integrate diverse data sources, ensure data privacy, and scale effectively to meet the demands of modern agriculture. …”
Get full text
Article -
1309
Monitoring oral health remotely: ethical considerations when using AI among vulnerable populations
Published 2025-04-01Get full text
Article -
1310
A framework for systematically applying humanistic ethics when using AI as a design material
Published 2019-07-01“…Because AI-supported and autonomous decision making has the potential for widespread negative personal, social, and environmental effects, we aim to take a proactive stance to uphold human rights, respect individuals’ privacy, protect personal data, and enable freedom of expression and equality. …”
Get full text
Article -
1311
Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks
Published 2024-01-01“…A significant concern in the field of cloud computing is the security and confidentiality of data. A cryptographic access control technique can be used to guarantee data privacy, which prevents unauthorized access and allows only authorized users to access the data. …”
Get full text
Article -
1312
SimProx: A Similarity-Based Aggregation in Federated Learning With Client Weight Optimization
Published 2024-01-01“…Federated Learning (FL) enables decentralized training of machine learning models across multiple clients, preserving data privacy by aggregating locally trained models without sharing raw data. …”
Get full text
Article -
1313
Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm
Published 2025-01-01“…Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. …”
Get full text
Article -
1314
Analysis of MAXIM Application Service Quality on User Satisfaction using the E-Service Quality Method
Published 2024-11-01“…Efficiency, fulfillment, system availability, privacy, responsiveness, compensation, and interaction are the seven factors used, while user satisfaction is the dependent variable. …”
Get full text
Article -
1315
Passive Sensing for Mental Health Monitoring Using Machine Learning With Wearables and Smartphones: Scoping Review
Published 2025-08-01“…However, clinical translation requires standardized protocols, larger longitudinal studies (≥3 months), and ethical frameworks for data privacy. Future work should prioritize multimodal sensor fusion and explainable artificial intelligence to bridge the gap between technical performance and clinical deployability.…”
Get full text
Article -
1316
Perceptions of Executive Decision Makers on Using Social Media in Effective Health Communication: Qualitative Study
Published 2025-05-01“…We included 13 participants from government and private health care sectors in the Al-Qassim region of Saudi Arabia, who were key players and decision makers in health care programs and reforms. Data were recorded, transcribed verbatim, and analyzed using thematic analysis to identify key themes and patterns. …”
Get full text
Article -
1317
FERTILITY CARE IN LOW- AND MIDDLE- INCOME COUNTRIES: The future use of AI to improve accessibility of assisted reproductive technology in low- and middle-income countries
Published 2025-08-01“…Finally, this paper addresses the ethical and practical challenges associated with using these technologies, including potential biases in AI, equitable access, quality control, data privacy, job implications, and cultural sensitivities.…”
Get full text
Article -
1318
Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment
Published 2020-03-01“…This article proposes a method for partially encrypting private information in images using FF1 and FF3-1. The proposed method encrypts private information without increasing the data size, solving the problem of wasted storage space. …”
Get full text
Article -
1319
Federated Learning-Based State of Charge Estimation in Electric Vehicles Using Federated Adaptive Client Momentum
Published 2025-01-01“…The proposed method is initially validated via experimental results using the collected data from Musoshi L5 type EV. …”
Get full text
Article -
1320