Trends and Insights in Arab Audit Research: A Bibliometric Exploration
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley +1 more source
Quantum resistant blockchain and deep learning revolutionize secure communications for autonomous vehicles. [PDF]
Alluhaibi R.
europepmc +1 more source
Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley +1 more source
Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework. [PDF]
Chakravarthy DG +3 more
europepmc +1 more source
Using Deep Cross Modal Hashing and Error Correcting Codes for Improving\n the Efficiency of Attribute Guided Facial Image Retrieval [PDF]
Veeru Talreja +3 more
openalex +1 more source
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
Enhancing cross-modal retrieval via label graph optimization and hybrid loss functions. [PDF]
Wang L, Wang C, Peng S.
europepmc +1 more source
HADA: A Hybrid Anomaly Detection Approach Using Unsupervised Machine Learning
Overview of HADA, an unsupervised fraud detection pipeline that preprocesses and scales transaction data, applies PCA for dimensionality reduction, scores anomalies using Isolation Forest, selects anomalous transactions via thresholding, and clusters the selected anomalies using Agglomerative Hierarchical Clustering (AHC) to produce interpretable ...
Francis Thiong'o +3 more
wiley +1 more source
Secure and fault tolerant cloud based framework for medical image storage and retrieval in a distributed environment. [PDF]
Amaithi Rajan A, V V, M A, R PK.
europepmc +1 more source
Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu +3 more
wiley +1 more source

