Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
1141
Understanding user acceptance of mobility-as-a-service in Jakarta Metropolitan Area (JMA): Influencing factors and behavioural insights
Published 2025-07-01“…Driven by theoretical constructs of the technology acceptance model, a set of motivational factors and choice scenarios, a behavioural model is conceptualised to explore individuals’ willingness to adopt MaaS in the JMA. Using data from 1,005 respondents collected in a survey, structural equation modelling (SEM), cluster analysis and choice modelling were conducted. …”
Get full text
Article -
1142
FFM: Flood Forecasting Model Using Federated Learning
Published 2023-01-01“…Federated Learning is the most advanced technique of machine learning (ML) that guarantees data privacy, ensures data availability, promises data security, and handles network latency trials inherent in prediction of floods by prohibiting data to be transferred over the network for model training. …”
Get full text
Article -
1143
Testing scenarios for using telepresence robots in healthcare settings
Published 2024-12-01Get full text
Article -
1144
Ethical Design of Data-Driven Decision Support Tools for Improving Cancer Care: Embedded Ethics Review of the 4D PICTURE Project
Published 2025-04-01“…There are myriad ethical issues to consider as the project will create data-driven prognostic models and develop conversation tools using artificial intelligence while including patient perspectives by setting up boards of experiential experts in 8 different countries. …”
Get full text
Article -
1145
The impact of artificial intelligence on behavioral intentions to use mobile banking in the post-COVID-19 era
Published 2025-08-01“…Data has been collected from 412 respondents in Thailand, and structural equation modeling has been employed for the data analysis.ResultsThe findings reveal significant positive effects of performance expectancy, effort expectancy, social influence, facilitating conditions, trust, perceived privacy, perceived intelligence and anthropomorphism of AI on users’ behavioral intentions to use mobile banking. …”
Get full text
Article -
1146
PRE-SERVICE TEACHERS' PERCEPTIONS OF THE USE OF GENAI AND TRADITIONAL GRAMMAR-CHECKING TOOLS FOR ENGLISH WRITING
Published 2025-07-01“…Ethical concerns, particularly regarding data privacy and originality, are also identified. …”
Get full text
Article -
1147
Examining inclusivity: the use of AI and diverse populations in health and social care: a systematic review
Published 2025-02-01“…A holistic approach must be used to address disparities, enforce effective regulations, safeguard privacy, promote inclusion and equity, and emphasize rigorous validation.…”
Get full text
Article -
1148
Investigating High School Students’ Attitudes Toward the Use of AI in Education: Evidence from Cambodia
Published 2025-07-01“…Utilizing evidence from an online survey with 315 students (female = 62.50%), the study showed that Cambodian high school students expressed generally favorable attitudes toward utilizing AI-powered tools in education, particularly pertaining to the use of AI to aid in completing school work. However, the study identified key concerns about data privacy and security issues, the risk of becoming over-dependent on AI, and limited originality about students’ work. …”
Get full text
Article -
1149
Big Data Analytics for Mental Health Education: A New Framework for University-Level Evaluation under Linguistic Confidence Interval Neutrosophic Numbers
Published 2025-05-01“…Ten criteria—including accessibility, awareness, analytics integration, and data ethics—are used to evaluate a diverse set of intervention alternatives ranging from AI-based detection systems to immersive VR training. …”
Get full text
Article -
1150
Assessment of gender-related differences in digital financial services use and health worker performance in Nigeria
Published 2025-07-01“…Quantitative data was analyzed using the student t-test, while inductive coding approach was adopted for qualitative data. …”
Get full text
Article -
1151
Should we communicate with the dead to assuage our grief? An Ubuntu perspective on using griefbots
Published 2024-01-01Get full text
Article -
1152
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
1153
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
1154
AI, machine learning and deep learning in cyber risk management
Published 2025-05-01“…However, challenges persist in ensuring the accuracy of information, understanding the functionality of models, and protecting individuals’ data. Ethical use of personal information and safeguarding privacy remain critical, with researchers needing to prioritize accuracy, transparency in AI models, and fairness in decision-making. …”
Get full text
Article -
1155
FedCVG: a two-stage robust federated learning optimization algorithm
Published 2025-05-01“…Abstract Federated learning provides an effective solution to the data privacy issue in distributed machine learning. …”
Get full text
Article -
1156
OPTIMIZING KEYWORD SEARCH FOR SEARCH ENGINES USING BLOCKCHAIN TECHNOLOGY
Published 2024-12-01Get full text
Article -
1157
Characterizing the neighborhood risk environment in multisite clinic-based cohort studies: A practical geocoding and data linkages protocol for protected health information.
Published 2022-01-01“…<h4>Background</h4>Maintaining patient privacy when geocoding and linking residential address information with neighborhood-level data can create challenges during research. …”
Get full text
Article -
1158
Federated knee injury diagnosis using few shot learning
Published 2025-07-01“…While deep learning approaches have shown promise in identifying knee injuries from MRI scans, they often require large amounts of labeled data, which can be both scarce and privacy-sensitive.MethodsThis paper analyses a hybrid methodology that integrates few-shot learning with federated learning for the diagnosis of knee injuries using MRI scans. …”
Get full text
Article -
1159
Ethical Challenges of Using the Internet of Behavior in the Medical and Healthcare Practice
Published 2024-11-01“…These include concerns about privacy, data security, transparency, behavioral manipulation, equity in access, and the psychological and social consequences of continuous monitoring. …”
Get full text
Article -
1160
User Needs of Online Tutoring Applications Using House of Quality
Published 2025-01-01“…Methodology: The study employs the House of Quality method and was conducted in the Jabodetabek area from 2021 to 2022. Data collection methods included voluntary and purposive sampling, using questionnaires distributed via Google Forms, as well as interviews and focus group discussions. …”
Get full text
Article