Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
-
2341
Application progress of artificial intelligence in managing thyroid disease
Published 2025-06-01“…Despite the broad prospects of AI applications, challenges related to data privacy, model interpretability, and clinical applicability remain. …”
Get full text
Article -
2342
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
Published 2025-03-01“…Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. …”
Get full text
Article -
2343
Mapping the landscape of machine learning in chronic disease management: A comprehensive bibliometric study
Published 2025-07-01“…Conclusion ML is rapidly integrating into personalized medicine, real-time monitoring, and multimodal data fusion. However, challenges such as limited collaboration, weak model generalization, and data privacy persist. …”
Get full text
Article -
2344
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
Published 2025-02-01“…IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. …”
Get full text
Article -
2345
Machine learning for post-diploma educational and career guidance: a scoping review in AI-driven decision support systems
Published 2025-05-01“…This scoping review maps the application of ML in post-diploma guidance by examining the types of models used, data sources, reported outcomes, and ethical considerations related to fairness, privacy, and transparency. …”
Get full text
Article -
2346
Technology-enabled CONTACT tracing in care homes in the COVID-19 pandemic: the CONTACT non-randomised mixed-methods feasibility study
Published 2025-05-01“…Quantitative data were analysed using descriptive statistical methods, and qualitative data were thematically analysed using normalisation process theory. …”
Get full text
Article -
2347
Trusted execution environments for quantum computers
Published 2025-06-01“…The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both. …”
Get full text
Article -
2348
Integrating artificial intelligence in drug discovery and early drug development: a transformative approach
Published 2025-03-01“…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
Get full text
Article -
2349
Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring
Published 2025-02-01“…Despite these advancements, challenges remain regarding data quality, clinical integration, and privacy concerns. …”
Get full text
Article -
2350
Federated Online Learning for adaptive load forecasting across decentralized nodes
Published 2025-08-01“…The main drawbacks are twofold: (1) data sharing and transfer results in privacy and security risks, and (2) static models miss opportunities to learn from new data. …”
Get full text
Article -
2351
Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach
Published 2025-07-01“…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
Get full text
Article -
2352
Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications
Published 2018-01-01“…For security, the framework uses blockchain–Tor-based distributed transactions to preserve the therapeutic data privacy, ownership, generation, storage, and sharing. …”
Get full text
Article -
2353
HIV pre-exposure prophylaxis in Latin America: Public policies, healthcare systems and human rights
Published 2025-06-01“…Achieving universal healthcare and adhering to human rights norms can improve access/use of this essential HIV prevention tool.…”
Get full text
Article -
2354
Dimensions related to telemedicine and telehealth competencies of health professionals: A scoping review
Published 2025-03-01“…Introduction Telehealth and telemedicine have proven to be useful in complementing face-to-face care, especially when long distances exist or when it is difficult to access specialists. …”
Get full text
Article -
2355
Acceptability of Guided Symptom Entry and Asynchronous Clinical Communication Software Among Primary Care Staff: Qualitative Study
Published 2025-07-01“…The software was reported to satisfy perceived feature needs for patient verification, privacy and data security, editable plain-language symptom summaries of symptoms, and integration with prewritten response templates (particularly for staff who were nonnative speakers). …”
Get full text
Article -
2356
Implementing a chatbot to promote hereditary breast & ovarian cancer genetic screening in women’s health: identifying barriers and facilitators to screening adoption
Published 2025-07-01“…Findings illustrate how each factor functioned as a facilitator and/or barrier in women’s uptake (e.g., technology being trusted for accuracy versus concerns for data privacy and security). Conclusions While chatbots can extend women’s cancer risk screening access, particularly in rural regions and with college-educated women, systems-level (cost) and individual-level factors (perceived risk, misconceptions about repeating genetic testing) should be addressed to promote adoption. …”
Get full text
Article -
2357
Foreground-Driven Contrastive Learning for Unsupervised Human Keypoint Detection
Published 2025-01-01“…Recently, unsupervised human keypoint detection has become prevalent due to concerns about data privacy. Most existing methods are based on a reconstruction process that extracts appearance and pose information from transformed image pairs and spatially aligns them to obtain a reconstructed image for detection. …”
Get full text
Article -
2358
Sustainable Innovation: Harnessing AI and Living Intelligence to Transform Higher Education
Published 2025-03-01“…However, while AI has the potential to improve education significantly, it also introduces challenges, such as ethical concerns, data privacy risks, and algorithmic bias. The real challenge is not just about embracing AI’s benefits but ensuring it is used responsibly, fairly, and in a way that aligns with educational values. …”
Get full text
Article -
2359
Assessment of the attitude and fears of the physicians of Pakistan regarding artificial intelligence: a cross-sectional survey in 2024
Published 2025-08-01“…Subject and methods A nation-wide cross-sectional study was conducted using an online questionnaire, based on standardized General Attitude Towards Artificial Intelligence Scale (GAAIS) and self-devised questions, aimed at collecting data about demographic details, attitude and fears of the physicians regarding AI. …”
Get full text
Article -
2360
B5G Applications and Emerging Services in Smart IoT Environments
Published 2025-04-01“…Furthermore, the proposed study examines the techniques employed for data transmission in B5G applications, such as Vehicle-to-Vehicle (V2V), Device-to-Device (D2D), and Machine to Machine (M2M) transmissions. …”
Get full text
Article