Results 141 to 150 of about 2,301,308 (387)

Noise-added selection method for location-based service using differential privacy in Internet of Things

open access: yesAdvances in Mechanical Engineering, 2019
With the development of Internet of Things, many applications need to use people’s location information, resulting in a large amount of data need to be processed, called big data.
Zhimin Li, Haoze Lv, Zhaobin Liu
doaj   +1 more source

Self-Imposed Violations of Privacy in Virtual Communities [PDF]

open access: yes
Virtual communities have grown in recent years due to the accessibility and ease of setting up web pages on communal Internet sites. Organizations, including companies that seek to hire new employees, often scan these web sites as part of their ...
John Warren
core  

Cytological Classification Diagnosis for Thyroid Nodules via Multimodal Model Deep Learning

open access: yesAdvanced Science, EarlyView.
This study introduces AI‐TFNA, an innovative artificial intelligence model designed to assist cytopathologists in classifying thyroid nodules based on The Bethesda System for Reporting Thyroid Cytopathology (TBSRTC). The model effectively differentiates between benign and malignant thyroid nodules, demonstrating significant potential as a screening ...
Yuanzheng Lou   +27 more
wiley   +1 more source

Micro/Nanorobots for Combating Brain Disorders: Challenges, Advances, and Perspectives

open access: yesAdvanced Science, EarlyView.
Micro/nanorobots (MNRs) offer a transformative approach for precision therapy in brain disorders. By overcoming biological barriers and enabling controlled propulsion, targeted delivery, and real‐time imaging/tracking, MNRs pave the way toward effective, minimally invasive treatments. This review outlines the interplay between brain disease challenges,
Qi Zhang, Dong Sun
wiley   +1 more source

Ubiquitous Social Networks: Opportunities and Challenges for Privacy-Aware User Modelling [PDF]

open access: yes
Privacy has been recognized as an important topic in the Internet for a long time, and technological developments in the area of privacy tools are ongoing. However, their focus was mainly on the individual. With the proliferation of social network sites,
Bettina Berendt   +3 more
core  

Hardware Security for Edge Computing Via CMOS‐Compatible Multi‐Level Flash Memory with Hash‐Based Key Generation

open access: yesAdvanced Electronic Materials, EarlyView.
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim   +6 more
wiley   +1 more source

Ethical Dilemmas and Solutions for Patient Privacy Protection in Internet Hospital

open access: yesYixue yu zhexue
Against the backdrop of rapid medical digitalization, the ethical conflict between medical information sharing and patient privacy protection has become a core dilemma in the development of internet hospitals.
Lian LUO   +5 more
doaj   +1 more source

A Scoping Review of Nudges for Enhancing Agricultural Policy

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT Following PRISMA guidelines, we conduct a scoping review on 18 empirical studies on nudging interventions for farmers in Europe and the USA. The evidence on the effectiveness of nudges is mixed. Some studies demonstrate positive outcomes, particularly when nudges are combined with other interventions; others report no effect or negative ...
Nadja El Benni   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy