Suggested Topics within your search.
Suggested Topics within your search.
-
2321
Multicountry research on comprehensive abortion policy implementation in Latin America: a mixed-methods study protocol
Published 2024-01-01“…Informed consent will be obtained from participants. Data will be treated with careful attention to protecting privacy and confidentiality. …”
Get full text
Article -
2322
Assessment of public awareness and willingness to establish a forensic DNA and odontology national database in Egypt: a cross-sectional study
Published 2025-07-01“…Despite concerns about privacy and data misuse, most people acknowledged the potential benefits of using these services. …”
Get full text
Article -
2323
Barriers and facilitators to telemedicine contraception among patients that speak Spanish: a qualitative studyAJOG Global Reports at a Glance
Published 2025-02-01“…Two coders analyzed the data using thematic analysis. Results: The average age of the participants was 32.5 years old (range 19–45). …”
Get full text
Article -
2324
From lab to field with machine learning – Bridging the gap for movement analysis in real-world environments: A commentary
Published 2024-09-01“…Event detection (c) in time series data is the annotation of certain events that are used to extract useful and vital information or to remove unwanted and unnecessary data for further analysis. …”
Get full text
Article -
2325
Decentralized Distributed Sequential Neural Networks Inference on Low-Power Microcontrollers in Wireless Sensor Networks: A Predictive Maintenance Case Study
Published 2025-07-01“…The growing adoption of IoT applications has led to increased use of low-power microcontroller units (MCUs) for energy-efficient, local data processing. …”
Get full text
Article -
2326
Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences
Published 2025-03-01“…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
Get full text
Article -
2327
Audio–Visual Synchronization and Lip Movement Analysis for Real-Time Deepfake Detection
Published 2025-07-01“…This study contributes to the field by providing a robust real-time solution for detecting deepfakes in audio–visual synthetic data, ensuring enhanced detection accuracy and effective generalization across various deepfake manipulations and demographic data.…”
Get full text
Article -
2328
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى
Published 2019-10-01“…The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. …”
Get full text
Article -
2329
SparseBatch: Communication-efficient Federated Learning with Partially Homomorphic Encryption
Published 2025-01-01“…It operates by aggregating local gradient updates contributed by participating clients, all the while safeguarding the privacy of sensitive data. Industrial FL frameworks employ additively homomorphic encryption (HE) to ensure that local gradient updates are masked during aggregation, guaranteeing no update is revealed. …”
Get full text
Article -
2330
Exploring the promising role of internet of things in urban water systems: a comprehensive global analysis of insights, trends, and research priorities
Published 2025-03-01“…Most explored areas include water quality monitoring, leak detection, smart metering, and demand management, while challenges in the future lie in data security, privacy, and interoperability. Despite growing research interests, gaps remain in standardization, community engagement, and developing robust IoT architectures. …”
Get full text
Article -
2331
Cross-Room CO<sub>2</sub>-Based Presence Detection for Occupancy Profiling
Published 2025-01-01“…The first contribution involves the development of a presence detection model based on CO2 data, which is easy to measure and non-privacy intrusive. …”
Get full text
Article -
2332
Bridging the Gap between Neuroarchitecture, Artificial Intelligence, and Sustainability: A Systematic Review of Mental Health in the Built Environment
Published 2025-09-01“…Ethical considerations related to data privacy and consent are also discussed, providing a comprehensive understanding of the potential and challenges in designing AI-driven neuroarchitecture-sustainable adaptive designs.…”
Get full text
Article -
2333
Unlocking potential of open source model training in decentralized federated learning environment
Published 2025-06-01“…Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. …”
Get full text
Article -
2334
Transformation of Dependent Rights In The Digital Era A Study In Electronic Implementation
Published 2025-03-01“…However, in its implementation, there are still various obstacles, such as limited technological infrastructure, low public digital literacy, and challenges in maintaining data security and user privacy. This study uses normative juridical methods, utilizing legal and conceptual approaches to examine the effectiveness of regulations regarding electronic liens. …”
Get full text
Article -
2335
The potential of machine learning in diagnosing neurological and psychiatric diseases: a review
Published 2025-06-01“…However, certain challenges persist, including concerns about data quality, patient privacy and the ethical implications of algorithmic decisions. …”
Get full text
Article -
2336
Generalization challenges in video deepfake detection: methods, obstacles, and technological advances
Published 2025-01-01“…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
Get full text
Article -
2337
Blockchain-Enhanced Security for 5G Edge Computing in IoT
Published 2025-04-01“…The rapid expansion of 5G networks and edge computing has amplified security challenges in Internet of Things (IoT) environments, including unauthorized access, data tampering, and DDoS attacks. This paper introduces EdgeChainGuard, a hybrid blockchain-based authentication framework designed to secure 5G-enabled IoT systems through decentralized identity management, smart contract-based access control, and AI-driven anomaly detection. …”
Get full text
Article -
2338
Why We Disclose on Social Media? Towards a Dual-Pathway Model
Published 2025-04-01“…A moderated mediation model was proposed and tested using cross-sectional survey data collected from 1519 Chinese netizens. …”
Get full text
Article -
2339
Future perspectives on internet of vehicles resource management: digital twin-enabled edge computing frameworks
Published 2025-07-01“…With edge computing, processing data near the source, these technologies significantly lower response time and optimize system performance. …”
Get full text
Article -
2340
COVID-19 and the implications of social and hospital isolation for older adults
Published 2025-08-01“…Method This is an exploratory, descriptive, and qualitative study conducted with 16 hospitalized older adults, who answered a sociodemographic questionnaire and a guiding question. Data were analyzed through textual analysis using the Interface de R pour les Analyses Multidimensionnelles de Textes et de Questionnaires (IRaMuTeQ) software. …”
Get full text
Article