Results 141 to 150 of about 2,301,308 (387)
With the development of Internet of Things, many applications need to use people’s location information, resulting in a large amount of data need to be processed, called big data.
Zhimin Li, Haoze Lv, Zhaobin Liu
doaj +1 more source
Privacy issues of using cashless mediums of exchange over the internet [PDF]
Anthony Young
openalex +1 more source
Self-Imposed Violations of Privacy in Virtual Communities [PDF]
Virtual communities have grown in recent years due to the accessibility and ease of setting up web pages on communal Internet sites. Organizations, including companies that seek to hire new employees, often scan these web sites as part of their ...
John Warren
core
Cytological Classification Diagnosis for Thyroid Nodules via Multimodal Model Deep Learning
This study introduces AI‐TFNA, an innovative artificial intelligence model designed to assist cytopathologists in classifying thyroid nodules based on The Bethesda System for Reporting Thyroid Cytopathology (TBSRTC). The model effectively differentiates between benign and malignant thyroid nodules, demonstrating significant potential as a screening ...
Yuanzheng Lou +27 more
wiley +1 more source
Micro/Nanorobots for Combating Brain Disorders: Challenges, Advances, and Perspectives
Micro/nanorobots (MNRs) offer a transformative approach for precision therapy in brain disorders. By overcoming biological barriers and enabling controlled propulsion, targeted delivery, and real‐time imaging/tracking, MNRs pave the way toward effective, minimally invasive treatments. This review outlines the interplay between brain disease challenges,
Qi Zhang, Dong Sun
wiley +1 more source
Ubiquitous Social Networks: Opportunities and Challenges for Privacy-Aware User Modelling [PDF]
Privacy has been recognized as an important topic in the Internet for a long time, and technological developments in the area of privacy tools are ongoing. However, their focus was mainly on the individual. With the proliferation of social network sites,
Bettina Berendt +3 more
core
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim +6 more
wiley +1 more source
Ethical Dilemmas and Solutions for Patient Privacy Protection in Internet Hospital
Against the backdrop of rapid medical digitalization, the ethical conflict between medical information sharing and patient privacy protection has become a core dilemma in the development of internet hospitals.
Lian LUO +5 more
doaj +1 more source
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data [PDF]
Indrajit Ray, Sudip Chakraborty
openalex +1 more source
A Scoping Review of Nudges for Enhancing Agricultural Policy
ABSTRACT Following PRISMA guidelines, we conduct a scoping review on 18 empirical studies on nudging interventions for farmers in Europe and the USA. The evidence on the effectiveness of nudges is mixed. Some studies demonstrate positive outcomes, particularly when nudges are combined with other interventions; others report no effect or negative ...
Nadja El Benni +4 more
wiley +1 more source

