Reinforcement learning based Secure edge enabled multi task scheduling model for internet of everything applications. [PDF]
Kesavan V T, R V, Wong WK, Ng PK.
europepmc +1 more source
Fairness at Risk: Where Bias Emerges in Machine Learning
ABSTRACT Artificial intelligence and machine learning (ML) now shape decisions in healthcare, finance and security, but they can reproduce historical prejudice and inequality. Bias in training data and in model implementation can amplify harm, especially for racial and gender minorities.
Otavio de Paula Albuquerque +2 more
wiley +1 more source
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT. [PDF]
Peng T +7 more
europepmc +1 more source
Abstract This study develops and tests a Large Language Model‐based assessment framework that uses a multi‐agent system to analyze students’ written responses, generate scoring rationales, identify uncertainty levels, and assign final scores to support learning.
Namsoo Shin +7 more
wiley +1 more source
Efficient phrase search with reliable verification over encrypted cloud-IoT data. [PDF]
Xu W, Zhu Z, Khalid MI.
europepmc +1 more source
Spontaneous Strategies Used During Novel Word Learning
Abstract This online study examined spontaneous strategies of English‐speaking adults during associative word learning, the relationship of these strategies with learning outcomes and within‐task evolution of strategy use. Participants were to learn to name 14 object–pseudoword pairs across five successive encoding/recall blocks, followed by delayed ...
Matti Laine +4 more
wiley +1 more source
A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes. [PDF]
S S, P M JP.
europepmc +1 more source
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone +3 more
wiley +1 more source
Color image encryption algorithm based on ∞-shaped transformation and closed-loop control model. [PDF]
Zhao F, Zhang X, Zhu F.
europepmc +1 more source
Colour Vision Deficiency in Health Professions Education: A Narrative Literature Review
ABSTRACT Background Colour vision deficiency (CVD) or colour blindness can affect healthcare professionals in tasks that require colour perception. Despite its occurrence, there is limited awareness within healthcare education to support students and practitioners with CVD.
Marnie Imhoff +3 more
wiley +1 more source

