Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley +1 more source
Secure electronic health record access control via blockchain, dual-attribute encryption, and large language model-based attribute extraction. [PDF]
Nekouie A +3 more
europepmc +1 more source
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source
HADA: A Hybrid Anomaly Detection Approach Using Unsupervised Machine Learning
Overview of HADA, an unsupervised fraud detection pipeline that preprocesses and scales transaction data, applies PCA for dimensionality reduction, scores anomalies using Isolation Forest, selects anomalous transactions via thresholding, and clusters the selected anomalies using Agglomerative Hierarchical Clustering (AHC) to produce interpretable ...
Francis Thiong'o +3 more
wiley +1 more source
BBAS: A blockchain-based authentication system for e-health with multi-factor authentication, access control, and post-quantum security. [PDF]
Latif R +4 more
europepmc +1 more source
Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu +3 more
wiley +1 more source
The Heterocycle Isostere Explorer: A Computational Tool for the Discovery of Novel Aromatic Heterocyclic Isosteres. [PDF]
Holland MTO +4 more
europepmc +1 more source
ABSTRACT Background Artificial intelligence (AI) has catalyzed profound shifts in public health education, compelling institutions to explore innovative methods to prepare a digitally competent and resilient workforce. AI has emerged as a transformative tool, enabling adaptive, personalized, and scalable learning experiences.
Mst Masuma Akter Semi +8 more
wiley +1 more source
Synchronizing LLM-based semantic knowledge bases via secure federated fine-tuning in semantic communication. [PDF]
Li L +6 more
europepmc +1 more source

