Suggested Topics within your search.
Suggested Topics within your search.
-
2261
FedArtML: A Tool to Facilitate the Generation of Non-IID Datasets in a Controlled Way to Support Federated Learning Research
Published 2024-01-01“…Federated Learning (FL) enables collaborative training of Machine Learning (ML) models across decentralized clients while preserving data privacy. One of the challenges that FL faces is when the clients’ data is not independent and identically distributed (non-IID). …”
Get full text
Article -
2262
The Impact of Artificial Intelligence (AI) on Students’ Academic Development
Published 2025-03-01“…However, challenges such as over-reliance on AI, diminished critical thinking skills, data privacy risks, and academic dishonesty were also identified. …”
Get full text
Article -
2263
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
Published 2025-03-01“…Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. …”
Get full text
Article -
2264
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
Published 2025-02-01“…IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. …”
Get full text
Article -
2265
Ethical Challenges of Applying Advanced Technologies in Medical Education: A Scoping Review
Published 2025-02-01“…The results showed that the most important common ethical challenges in modern technologies such as artificial intelligence, simulators, big data, information technology, and digital social media included privacy protection, bias, and lack of accountability. …”
Get full text
Article -
2266
Trusted execution environments for quantum computers
Published 2025-06-01“…The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both. …”
Get full text
Article -
2267
Integrating artificial intelligence in drug discovery and early drug development: a transformative approach
Published 2025-03-01“…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
Get full text
Article -
2268
Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring
Published 2025-02-01“…Despite these advancements, challenges remain regarding data quality, clinical integration, and privacy concerns. …”
Get full text
Article -
2269
Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach
Published 2025-07-01“…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
Get full text
Article -
2270
Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications
Published 2018-01-01“…For security, the framework uses blockchain–Tor-based distributed transactions to preserve the therapeutic data privacy, ownership, generation, storage, and sharing. …”
Get full text
Article -
2271
Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective
Published 2025-06-01“…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
Get full text
Article -
2272
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
Get full text
Article -
2273
The Potential for Large Language Models to Transform Cardiovascular Medicine (Russian Translation)
Published 2025-02-01“…Potential risks, such as loss of data privacy or potential diagnostic errors, should be addressed before use in clinical practice. …”
Get full text
Article -
2274
Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions
Published 2025-01-01“…Abstract This article discusses Blockchain and Generative AI in healthcare, including their uses, difficulties, and solutions. Blockchain technology improves EHR security, privacy, and interoperability, while smart contracts streamline supply chain management and administrative procedures. …”
Get full text
Article -
2275
The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs):
Published 2025“…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
Get full text
Article -
2276
Criminal Law Challenged by Crossing into Virtual Reality
Published 2025-03-01“…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
Get full text
Article -
2277
Human-Centered Design of an mHealth Tool for Optimizing HIV Index Testing in Wartime Ukraine: Formative Research Case Study
Published 2025-01-01“…The tool also enables health care workers (HCWs) to see summarized data to facilitate partner tracking. …”
Get full text
Article -
2278
Exploring mHealth app utilization for diabetes self-management: survey insights from a northern district in Malaysia
Published 2024-12-01“…Users perceived the mHealth app as useful (97.5%), yet faced challenges over the app initiation, charges and data security. …”
Get full text
Article -
2279
Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors
Published 2025-04-01“…This study explores the factors influencing college students’ acceptance and resistance toward generative AI technologies by integrating three theoretical frameworks: the Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Social Exchange Theory (SET). Using data from 407 respondents collected through a structured survey, the study employed Structural Equation Modeling (SEM) to examine how functional factors (perceived usefulness, ease of use, and reliability), risk factors (privacy concerns, data security, and ethical issues), and sociolegal factors (trust in governance and regulatory frameworks) impact user attitudes. …”
Get full text
Article -
2280
Modern Trends in the Digitalization of Higher Physical Education in China
Published 2025-03-01“…Additionally, the study emphasizes the need for educator training and professional development, as many physical education teachers lack digital literacy or are resistant to new technologies. Data privacy and security issues are another significant challenge, particularly with the collection and use of personal and health data from wearable devices and online platforms. …”
Get full text
Article