Suggested Topics within your search.
Suggested Topics within your search.
-
2001
Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review
Published 2025-03-01“…These gaps include design requirements, software and firmware updates, physical security, the use of big data to detect vulnerabilities, user data privacy, and inconsistencies in machine learning algorithms. …”
Get full text
Article -
2002
The application of artificial intelligence in insomnia, anxiety, and depression: A bibliometric analysis
Published 2025-03-01“…However, challenges around data privacy, ethical concerns, and the interpretability of AI models need to be addressed. …”
Get full text
Article -
2003
SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
Published 2024-12-01“…Our research aims to improve data privacy and reduce communication costs. Furthermore, we also address weaknesses in decentralized learning systems, like Sybil and Model Poisoning attacks. …”
Get full text
Article -
2004
Human-machine in the vortex of digital synergy
Published 2025-05-01“…Using data from 1232 respondents (aged 15+), collected via a quota-based online survey from April 8 to April 26, 2024, logistic regression analyses investigated two key questions: (1) Does increased use of virtual assistants correlate with a higher likelihood of ChatGPT adoption? …”
Get full text
Article -
2005
Making temporary homes
Published 2024-06-01“…The interviews were analysed with Interpretative Phenomenological Analysis, and the visual data (photos made by the interviewees and sometimes the researcher, and drawings made by the researcher) was used to place the content of the interviews in a physical context. …”
Get full text
Article -
2006
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01“…Our approach prioritizes data privacy by processing data locally, thereby avoiding the need for central data collection, while enhancing detection efficiency. …”
Get full text
Article -
2007
Membangun Kepercayaan yang Berkelanjutan di Era Disruptif Komunikasi: Perspektif Media dan Komunikasi Digital
Published 2024-04-01“… The purpose of this research is to find out the factors that can build sustainable trust in the field of disruptive communication from the perspective of digital media and communication. This research uses qualitative research methods. The data collection technique in this research is done by literature study by exploring journals, books and other information relevant to the research. …”
Get full text
Article -
2008
Enabling All In-Edge Deep Learning: A Literature Review
Published 2023-01-01“…Moreover, most of the time central cloud servers are used for such computation, thus opening up other significant challenges, such as high latency, increased communication costs, and privacy concerns. …”
Get full text
Article -
2009
Understanding customer loyalty in digital services: insights from food delivery in emerging markets
Published 2025-07-01“…Trustworthiness has emerged as particularly influential due to concerns over data privacy, while service quality and convenience are crucial in shaping user satisfaction and loyalty.…”
Get full text
Article -
2010
Mental Health Apps Available in App Stores for Indian Users: Protocol for a Systematic Review
Published 2025-04-01“…Additionally, the apps will be reviewed for quality using the Mobile Application Rating Scale. The data analysis and synthesis strategy will incorporate descriptive statistics based on quality evaluation using the Mobile Application Rating Scale and examining the content of the apps for generating descriptive information. …”
Get full text
Article -
2011
A mixed-method study to inform the design of a video observed therapy app to monitor individuals with TB in the Dominican Republic
Published 2025-06-01“…Data integration was achieved by comparing convergent and divergent results.ResultsParticipants expressed a positive attitude towards using DAT to facilitate communication with health personnel to support treatment adherence. …”
Get full text
Article -
2012
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection
Published 2025-01-01“…The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity theft, and potential legal liabilities. …”
Get full text
Article -
2013
Comparing remote and in-person interpretation experiences for clinicians and Spanish-speaking patients with limited English proficiency: a mixed methods study
Published 2025-05-01“…Objective There is concern that remote medical interpretation is not as patient-centred as in-person interpretation, but limited evidence exists comparing interpreter service delivery methods. Using mixed methods, remote and in-person professional medical interpretation were examined from the perspectives of Spanish-speaking patients with limited English proficiency and community health centre (CHC) clinicians.Design Patient experience survey data from Spanish-speaking patients and interviews of primary care clinicians assessed their experiences of using remote versus in-person interpretation. …”
Get full text
Article -
2014
A distributed robust state estimation method based on alternating direction method of multipliers for integrated electricity‐heat system
Published 2024-12-01“…Simulations demonstrate that the proposed method has higher estimation accuracy in both general and strongly correlated adverse data tests and also can ensure data privacy, good robustness and high estimation accuracy. …”
Get full text
Article -
2015
GLOBE Observer: A Case Study in Advancing Earth System Knowledge with AI-Powered Citizen Science
Published 2024-12-01“…GLOBE citizen science data has been used to develop automated data classification routines that enable information discovery of mosquito larvae and land cover labels. …”
Get full text
Article -
2016
eHealth Technology: What Do We Know and What do We Need to Learn
Published 2021-06-01“…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
Get full text
Article -
2017
Federated Learning for Predicting Major Postoperative Complications
Published 2025-06-01“…To develop a robust model to accurately predict the risk of postoperative complications using clinical data from multiple institutions while ensuring data privacy. …”
Get full text
Article -
2018
DAMPAK PEMANFAATAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERILAKU PENGAMBILAN KEPUTUSAN TERHADAP ETIKA BISNIS DAN KEBERLANJUTAN ORGANISASI
Published 2025-06-01“…In an increasingly complex and competitive business era, AI has become a strategic tool that can increase the speed, accuracy, and objectivity of data-based decision-making. However, its use also poses significant ethical challenges, such as issues of transparency, algorithmic bias, accountability, and data privacy. …”
Get full text
Article -
2019
Research Progress on Ambient Visual Information Analysis and Perception Measurement Methods for Motion Vision
Published 2025-05-01“…Despite the promising applications of machine learning in subjective perception research, challenges such as data annotation difficulties, context dependence, and privacy concerns still persist.ConclusionThe research demonstrates the advantages of using panoramic images in capturing comprehensive visual information in both static and dynamic environments, offering a more accurate representation of spatial relationships and overcoming traditional limitations. …”
Get full text
Article -
2020
The Potential for Large Language Models to Transform Cardiovascular Medicine (Russian Translation)
Published 2025-02-01“…Potential risks, such as loss of data privacy or potential diagnostic errors, should be addressed before use in clinical practice. …”
Get full text
Article