Suggested Topics within your search.
Suggested Topics within your search.
-
2281
A blockchain technology for improving financial flows in humanitarian supply chains: benefits and challenges
Published 2025-04-01“…Key challenges identified include scalability issues, high cost and resource requirements, lack of network reliability, data privacy, supply chain integration, knowledge and training gaps, regulatory frameworks and ethical considerations. …”
Get full text
Article -
2282
Client Selection for Generalization in Accelerated Federated Learning: A Multi-Armed Bandit Approach
Published 2025-01-01“…Federated learning (FL) is an emerging machine learning (ML) paradigm used to train models across multiple nodes (i.e., clients) holding local data sets, without explicitly exchanging the data. …”
Get full text
Article -
2283
Personal, environmental and behavioral predictors associated with online fraud victimization among adults.
Published 2025-01-01“…A self-reporting questionnaire was developed based on the PEB framework and used to collect data targeting Malaysian adults. …”
Get full text
Article -
2284
Decision-making model in digital commerce: electronic trust-based purchasing intention through online food delivery applications (OFDAs)
Published 2024-09-01“…Design/methodology/approach – Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. …”
Get full text
Article -
2285
CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity
Published 2025-01-01“…Federated learning has recently gained significant attention as a method for building machine learning models due to its ability to preserve data privacy while delivering improved performance. …”
Get full text
Article -
2286
Application of Terminal Audio Mixing in Multi-Bandwidth End-to-End Encrypted Voice Conference
Published 2025-05-01“…It can be used in low-bandwidth scenarios such as satellite networks. …”
Get full text
Article -
2287
Analyzing Visitor Behavior to Enhance Personalized Experiences in Smart Museums: A Systematic Literature Review
Published 2025-05-01“…Behavioral Analytics Platforms and Mobile/Wearable Devices are the most used technologies (42.4%) for delivering personalized content. …”
Get full text
Article -
2288
AI in Medical Questionnaires: Innovations, Diagnosis, and Implications
Published 2025-06-01“…Future research should pay more attention to model interpretability, system compatibility, validation standardization, and ethical governance to effectively address key challenges such as data privacy, clinical integration, and transparency.…”
Get full text
Article -
2289
Toward Secure and Transparent Global Authentication: A Blockchain-Based System Integrating Biometrics and Subscriber Identification Module
Published 2025-01-01“…This approach safeguards user privacy and data security. By employing blockchain technology, B2-GAS eliminates SPOFs, ensures tamper-proof transaction storage, and guarantees transparency. …”
Get full text
Article -
2290
Revolutionizing Imaging Design Content With AIGC: User-Centered Challenges, Opportunities, and Workflow Evolution
Published 2025-01-01“…Technological maturity and public acceptance serve as key adoption drivers, while social construction and innovation underscore AI’s capacity to foster creativity and design diversity. Ethics and privacy reflect user concerns over data security, whereas learning costs negatively affect adoption due to perceived complexity. …”
Get full text
Article -
2291
Fine-Tuned YOLO Model for Monitoring Children Across Medical Scenes Based on a Large-Scale Real-World Dataset for Children Detection
Published 2025-01-01“…Accurate detection and monitoring of children in medical settings using computer vision systems present unique challenges due to anatomical differences, environmental complexity, and stringent privacy constraints. …”
Get full text
Article -
2292
HELA-CMM: capability maturity model for adoption of learning analytics in higher education
Published 2025-04-01“…The proposed maturity model comprises 28 capabilities grouped into eight categories: (1) Teaching / Learning / Assessment, (2) Data Management and Analytics, (3) Ethics, Privacy, Legal Issues, (4) People Competences, (5) Management / Leadership, (6) Culture, (7) Infrastructure, and (8) Quality Assurance. …”
Get full text
Article -
2293
A Deep Learning-Based Ensemble Framework for Robust Android Malware Detection
Published 2025-01-01“…The exponential growth of Android applications has resulted in a surge of malware threats, posing severe risks to user privacy and data security. To address these challenges, this study introduces a novel malware detection approach utilizing an ensemble of Convolutional Neural Networks (CNNs) for enhanced classification accuracy. …”
Get full text
Article -
2294
Blockchain in maritime: applications, effects and challenges
Published 2025-07-01“…To prevent issues such as information concealment and privacy breaches, these stakeholders often establish complex and multi-layered data exchange processes, which significantly reduce the operational efficiency of the shipping market. …”
Get full text
Article -
2295
Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
Published 2024-09-01“…The architecture, implemented on a private Ethereum network using Hyperledger Besu and Tessera, ensures secure and transparent transactions, robust dispute resolution, and fraud prevention mechanisms. …”
Get full text
Article -
2296
New secure distributed secret sharing scheme of n product
Published 2014-11-01“…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
Get full text
Article -
2297
Prenatal screening educational interventions for U.S. pregnant women: a scoping review
Published 2025-05-01“…The five steps according to Arksey and O’Malley York and for the Joanna Briggs Institute (JBI) recommendations for data extraction, analysis, and presentation of results were also used in this review. …”
Get full text
Article -
2298
Barriers and facilitators of the electronic medical record adoption among healthcare providers in Addis Ababa, Ethiopia
Published 2024-12-01“…Methods A descriptive-phenomenological approach was used. Data were collected from one hospital and three health centers from 5–13 June, 2023, that implemented the EMR. …”
Get full text
Article -
2299
Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning
Published 2024-01-01“…The rapid evaluation of smart cities has revolutionized the research and development field to a very extensive level which presents challenges in handling massive amounts of data. However, the integration of IoT into various aspects of life has introduced various challenges related to the security and privacy of IoT systems. …”
Get full text
Article -
2300
Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting
Published 2025-01-01“…Artificial Intelligence tools, using natural language processing and machine learning, streamline data extraction. - Despite their benefits, organizations face challenges in selecting the right Artificial Intelligence-driven Knowledge Management software due to a lack of standardized evaluation frameworks. …”
Get full text
Article