Suggested Topics within your search.
Suggested Topics within your search.
-
2581
The role of artificial intelligence in enhancing personalized learning pathways and clinical training in dental education
Published 2025-12-01“…The review also addresses the expanding integration of AI into educational settings, highlighting both the benefits and the ethical challenges, including issues related to data privacy, algorithmic bias, and the evolving role of human educators. …”
Get full text
Article -
2582
AI adoption in Chinese universities: Insights, challenges, and opportunities from academic leaders
Published 2025-08-01“…Additionally, resource allocation, funding constraints, and concerns over data privacy and security present significant barriers. …”
Get full text
Article -
2583
Optimized Identity Authentication via Channel State Information for Two-Factor User Verification in Information Systems
Published 2025-04-01“…For classification, a kernel support vector machine (SVM) model is trained using a randomized hyperparameter search algorithm. …”
Get full text
Article -
2584
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Published 2025-03-01“…As the proliferation of Internet of Things (IoT) devices grows, challenges in security, privacy, and interoperability become increasingly significant. …”
Get full text
Article -
2585
Human Dignity in Genetics and Reproductive Health in the Digital Age
Published 2025-07-01“…The bringing together of genetics, reproductive health, and digital technologies threatens human dignity from the angle of data security breaches, possible exploitation, and erosion of trust through false information and its related constraints. …”
Get full text
Article -
2586
A "Quıet" need ın the dısaster of the century: a qualıtatıve study on menstrual hygıene management
Published 2025-02-01“…Methods This qualitative study was conducted in June 2023 with 12 women living in tent cities caused by the earthquake. Data were collected through semi-structured interviews conducted via Zoom. …”
Get full text
Article -
2587
A novel half-complementary cipher for in-situ secure computing-in-memory
Published 2025-04-01“…The advent of the new AI era has led to an increase in the number of intelligent terminals in use and the generation of a vast amount of data, driving the development of novel AI accelerator techniques. …”
Get full text
Article -
2588
Integrating Large Language Models into Robotic Autonomy: A Review of Motion, Voice, and Training Pipelines
Published 2025-07-01“…Frameworks such as MapGPT, LLM-Planner, and 3D-LOTUS++ integrate multi-modal data—including vision, speech, and proprioception—for robust planning and real-time recovery. …”
Get full text
Article -
2589
The Impact of AI-Personalized Recommendations on Clicking Intentions: Evidence from Chinese E-Commerce
Published 2025-02-01“…AI-personalized recommendation technology offers more accurate and diverse choices to consumers and increases click-through rates and sales on e-commerce platforms. Yet, data on consumers’ experiences of AI-personalized recommendations and their impact path on clicking intention are scarce. …”
Get full text
Article -
2590
The Role of Evidence-Based Design in Enhancing Architectural Design Process of Healthcare Buildings: A Case Study of General Hospitals in Sulaimani City
Published 2025-04-01“…The research utilizes a mixed method in a systematic, multi-phased approach for data collection. This includes qualitative phone interviews, structured questionnaires, and interviews to gather subjective insights from architects working in three offices in Sulaimani City. …”
Get full text
Article -
2591
Transformations in academic work and faculty perceptions of artificial intelligence in higher education
Published 2025-07-01“…Additionally, ethical debates are emerging around algorithmic transparency, data privacy, and institutional responsibility. Effective integration in higher education demands not only technical proficiency but also ethical grounding, regulatory support, and critical pedagogical development. …”
Get full text
Article -
2592
FedHSP: A Robust Federated Learning Framework Coherently Addressing Heterogeneity, Security, and Performance Challenges
Published 2025-01-01“…Federated Learning (FL) is a machine learning training method that leverages local model gradients instead of accessing private data from individual clients, ensuring privacy. However, the practical implementation of FL faces significant challenges. …”
Get full text
Article -
2593
Implementation of NGS and SNP microarrays in routine forensic practice: opportunities and barriers
Published 2025-05-01“…Conversely, SNP microarrays offer a cost-effective solution for extended kinship testing, Forensic Investigative Genetic Genealogy (FIGG), and phenotypic prediction, though they are less effective with low-quality samples and DNA mixtures. Ethical, legal, and privacy concerns, particularly surrounding the use of Forensic DNA Phenotyping (FDP) and consumer genetic data in FIGG, further complicate their integration into forensic workflows. …”
Get full text
Article -
2594
Decentralized electrochemical biosensors for biomedical applications: From lab to home
Published 2025-01-01“…However, potential risks such as data security vulnerabilities, privacy concerns, and regulatory challenges must be addressed to ensure safe and ethical deployment of these technologies. …”
Get full text
Article -
2595
Comprehensive Review and Future Research Directions on ICT Standardisation
Published 2024-11-01“…Standardisation also solves problems, such as the use of mobile devices, which requires travel abroad when out of range. …”
Get full text
Article -
2596
Ethical and Safety Challenges of Implantable Brain-Computer Interface
Published 2025-04-01“…Ethically, the research emphasizes the importance of informed consent, privacy protection, and user autonomy, particularly in the context of HRI. …”
Get full text
Article -
2597
Class-Hidden Client-Side Watermarking in Federated Learning
Published 2025-01-01“…Federated learning consists of a central aggregator and multiple clients, forming a distributed structure that effectively protects data privacy. However, since all participants can access the global model, the risk of model leakage increases, especially when unreliable participants are involved. …”
Get full text
Article -
2598
Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure
Published 2024-11-01“…This interconnection raises concerns about security, privacy, and the expanding risk of cyber-attacks within the electric vehicle landscape. …”
Get full text
Article -
2599
Machine Learning for Resilient and Sustainable Cities: A Bibliometric Analysis of Smart Urban Technologies
Published 2025-03-01“…A hotspot analysis revealed that research topics are increasingly diverse and dynamically evolving. Issues such as data privacy, cybersecurity, sustainable development, and intelligent transportation have gradually become focal points, reflecting the dual demand of smart city development for technological innovation and green growth. …”
Get full text
Article -
2600
Beijing’s urbanization reflected in apartment layouts: a computer vision and isovist analysis (1970–2020)
Published 2025-05-01“…Our findings show a trend in the isovist intensity of living rooms, dining rooms, and kitchens, indicative of shifts toward privacy and mixed-use spaces, shaped by household occupancy patterns. …”
Get full text
Article