Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
1921
A systematic review of consumers’ and healthcare professionals’ trust in digital healthcare
Published 2025-02-01“…Trust in digital healthcare is complex and, from a consumers’ perspective, can influence digital healthcare use, adoption, acceptance, and usefulness. Consumers’ trust can be affected by the degree of human interaction in automated interventions, perceived risks, privacy concerns, data accuracy, digital literacy, quality of the digital healthcare intervention, satisfaction, education, and income. …”
Get full text
Article -
1922
Multimodal Detection of Agitation in People With Dementia in Clinical Settings: Observational Pilot Study
Published 2025-07-01“…ObjectiveThis study proposes a novel, multimodal system for predicting AA episodes in individuals with severe dementia, integrating wearable sensor data and privacy-preserving video analytics. …”
Get full text
Article -
1923
Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors
Published 2025-04-01“…This study explores the factors influencing college students’ acceptance and resistance toward generative AI technologies by integrating three theoretical frameworks: the Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Social Exchange Theory (SET). Using data from 407 respondents collected through a structured survey, the study employed Structural Equation Modeling (SEM) to examine how functional factors (perceived usefulness, ease of use, and reliability), risk factors (privacy concerns, data security, and ethical issues), and sociolegal factors (trust in governance and regulatory frameworks) impact user attitudes. …”
Get full text
Article -
1924
The IoT and AI in Agriculture: The Time Is Now—A Systematic Review of Smart Sensing Technologies
Published 2025-06-01“…However, this review also identifies critical challenges, including high infrastructure costs, limited interoperability, connectivity constraints in rural areas, and ethical concerns regarding transparency and data privacy. To address these barriers, recent innovations have emphasized the potential of Edge AI for local inference, blockchain systems for decentralized data governance, and autonomous platforms for field-level automation. …”
Get full text
Article -
1925
Design of mTCN framework for disaster prediction a fusion of massive machine type communications and temporal convolutional networks
Published 2025-08-01“…The objective is to develop a scalable, secure, and efficient system for real-time disaster prediction using IoT data streams. Lightweight edge-based TCNs enable localized anomaly detection, while federated learning ensures privacy-preserving collaborative model training across edge devices. …”
Get full text
Article -
1926
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
Get full text
Article -
1927
The Impact of Travel Behavior Factors on the Acceptance of Carsharing and Autonomous Vehicles: A Machine Learning Analysis
Published 2025-06-01“…A stated preference (SP) survey is conducted to collect data on travel behavior, incorporating key attributes such as trip time, trip cost, waiting and walking time, privacy, cybersecurity, and surveillance concerns. …”
Get full text
Article -
1928
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01“…Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. …”
Get full text
Article -
1929
Knowledge and Attitudes Related to Telemedicine among Nursing Staff at the Selected Tertiary Care Hospital, Karnataka, India
Published 2025-04-01“…Methodology: The cross-sectional study was conducted among 201 staff nurses. The data were collected using a self-structured questionnaire after thorough review of the literature. …”
Get full text
Article -
1930
Generative Artificial Intelligence Tools in Medical Research (GAMER): Protocol for a Scoping Review and Development of Reporting Guidelines
Published 2025-08-01“…However, the increasing use of GenAI tools in medical research presents challenges, including ethical concerns, data privacy issues, and the potential for generating false content. …”
Get full text
Article -
1931
Impact of e-banking service quality on e-loyalty in pandemic times through interplay of e-satisfaction
Published 2020-12-01“…Design/methodology/approach – The data was collected through an adapted questionnaire by using emails and messaging applications. …”
Get full text
Article -
1932
The role of cognitive computing in NLP
Published 2025-01-01“…Ethical concerns, including biases in AI, data privacy and societal impact, are critical to address for responsible deployment. …”
Get full text
Article -
1933
Backdoor Attack Against Dataset Distillation in Natural Language Processing
Published 2024-12-01“…We introduce malicious triggers into synthetic data during the distillation phase to execute a backdoor attack on downstream models trained with these data. …”
Get full text
Article -
1934
FedDL: personalized federated deep learning for enhanced detection and classification of diabetic retinopathy
Published 2024-12-01“…Our primary goal is to develop a system that can monitor various medical facilities while ensuring privacy during the training of DL models. This is made possible through federated learning (FL), which allows for the sharing of parameters instead of actual data, employing a decentralized training approach. …”
Get full text
Article -
1935
Internet of Things in healthcare: An adaptive ethical framework for IoT in digital health
Published 2024-12-01“…This approach was employed to validate and refine the AEFIDH, ensuring it encapsulates critical ethical dimensions, including data privacy, informed consent, user autonomy, algorithmic fairness, regulatory compliance, ethical design, and equitable access to healthcare services. …”
Get full text
Article -
1936
From motion to meaning: understanding students’ seating preferences in libraries through PIR-enabled machine learning and explainable AI
Published 2025-07-01“…This study presents a comprehensive, data-driven investigation into students’ seating preferences within academic library environments, aiming to inform user-centered spatial design. …”
Get full text
Article -
1937
Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks
Published 2025-05-01“…To mitigate these, we design a Zero-Trust Architecture (ZTA) enforcing continuous authentication and micro-segmentation for RIC components, coupled with an FL framework that enables collaborative ML training across operators without exposing raw network data. A differential privacy mechanism is applied to global model updates to prevent inference attacks. …”
Get full text
Article -
1938
Challenges Faced By Female Counselors in Providing HIV Testing and Counseling Services in Kashmir: A Qualitative Interpretive Inquiry
Published 2025-04-01“…One interview with a counselor from Leh was conducted via Zoom. Data were transcribed and analyzed using IPA to identify the key themes. …”
Get full text
Article -
1939
What are the Thoughts of Women Whose Husbands’ Frozen Testicular Sperm Is Thawed for in vitro Fertilization on the Day of Oocyte Retrieval? A Qualitative Study
Published 2025-01-01“…Semi-structured, in-depth interviews were conducted to gather qualitative data. The Colaizzi 7-step analysis method was subsequently utilized to analyze the interview transcripts and identify emerging themes.Results: The analysis yielded 3 themes: (1) facing challenges and requiring assistance (a. demonstrate a strong desire to acquire professional knowledge; b. demonstrate a strong desire for recognition); (2) overwhelming psychological stress (a. concerns about potential privacy breaches; b. concerns about security issues; c. concerns about the therapeutic efficacy); (3) improving family atmosphere and marital relationships (a. communication between couples has increased.; b. shared expectations for children help couples establish a common goal).Conclusion: It is recommended that healthcare practitioners implement strategies to enhance patient education and awareness surrounding assisted reproductive technology. …”
Get full text
Article -
1940
ESMART: Energy-Efficient Slice-Mix-Aggregate for Wireless Sensor Network
Published 2013-12-01“…The proposed scheme performs secure data aggregation in a more efficient way while keeping a good performance of privacy preservation. …”
Get full text
Article