Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,449)

Search Parameters:
Keywords = Information Privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 1380 KiB  
Article
Critical Smart Functions for Smart Living Based on User Perspectives
by Benjamin Botchway, Frank Ato Ghansah, David John Edwards, Ebenezer Kumi-Amoah and Joshua Amo-Larbi
Buildings 2025, 15(15), 2727; https://doi.org/10.3390/buildings15152727 (registering DOI) - 1 Aug 2025
Abstract
Smart living is strongly promoted to enhance the quality of life via the application of innovative solutions, and this is driven by domain specialists and policymakers, including designers, urban planners, computer engineers, and property developers. Nonetheless, the actual user, whose views ought to [...] Read more.
Smart living is strongly promoted to enhance the quality of life via the application of innovative solutions, and this is driven by domain specialists and policymakers, including designers, urban planners, computer engineers, and property developers. Nonetheless, the actual user, whose views ought to be considered during the design and development of smart living systems, has received little attention. Thus, this study aims to identify and examine the critical smart functions to achieve smart living in smart buildings based on occupants’ perceptions. The aim is achieved using a sequential quantitative research method involving a literature review and 221 valid survey data gathered from a case of a smart student residence in Hong Kong. The method is further integrated with descriptive statistics, the Kruskal–Walli’s test, and the criticality test. The results were validated via a post-survey with related experts. Twenty-six critical smart functions for smart living were revealed, with the top three including the ability to protect personal data and information privacy, provide real-time safety and security, and the ability to be responsive to users’ needs. A need was discovered to consider the context of buildings during the design of smart living systems, and the recommendation is for professionals to understand the kind of digital technology to be integrated into a building by strongly considering the context of the building and how smart living will be achieved within it based on users’ perceptions. The study provides valuable insights into the occupants’ perceptions of critical smart features/functions for policymakers and practitioners to consider in the construction of smart living systems, specifically students’ smart buildings. This study contributes to knowledge by identifying the critical smart functions to achieve smart living based on occupants’ perceptions of smart living by considering the specific context of a smart student building facility constructed in Hong Kong. Full article
Show Figures

Figure 1

24 pages, 1294 KiB  
Article
Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo
Future Internet 2025, 17(8), 352; https://doi.org/10.3390/fi17080352 (registering DOI) - 1 Aug 2025
Abstract
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, [...] Read more.
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, “trusted third parties” (TTPs)-free solutions. In this regard, implementations based on blockchain and smart contracts are among the most advanced and promising, even if they are affected by problems regarding the performance and privacy of the information exchanged and processed by smart contracts and managed by blockchains. This paper presents a watermarking protocol implemented by smart contracts and blockchain. The protocol uses a “layer-2” blockchain execution model and performs the computation in “trusted execution environments” (TEEs). Therefore, its implementation can guarantee efficient and confidential execution without compromising ease of use or resorting to TTPs. The protocol and its implementation can, thus, be considered a valid answer to the “trilemma” that afflicts the use of blockchains, managing to guarantee decentralization, security, and scalability. Full article
Show Figures

Figure 1

28 pages, 352 KiB  
Article
Algorithm Power and Legal Boundaries: Rights Conflicts and Governance Responses in the Era of Artificial Intelligence
by Jinghui He and Zhenyang Zhang
Laws 2025, 14(4), 54; https://doi.org/10.3390/laws14040054 (registering DOI) - 31 Jul 2025
Abstract
This study explores the challenges and theoretical transformations that the widespread application of AI technology in social governance brings to the protection of citizens’ fundamental rights. By examining typical cases in judicial assistance, technology-enabled law enforcement, and welfare supervision, it explains how AI [...] Read more.
This study explores the challenges and theoretical transformations that the widespread application of AI technology in social governance brings to the protection of citizens’ fundamental rights. By examining typical cases in judicial assistance, technology-enabled law enforcement, and welfare supervision, it explains how AI characteristics such as algorithmic opacity, data bias, and automated decision-making affect fundamental rights including due process, equal protection, and privacy. The article traces the historical evolution of privacy theory from physical space protection to informational self-determination and further to modern data rights, pointing out the inadequacy of traditional rights-protection paradigms in addressing the characteristics of AI technology. Through analyzing AI-governance models in the European Union, the United States, Northeast Asia, and international organizations, it demonstrates diverse governance approaches ranging from systematic risk regulation to decentralized industry regulation. With a special focus on China, the article analyzes the special challenges faced in AI governance and proposes specific recommendations for improving AI-governance paths. The article argues that only within the track of the rule of law, through continuous theoretical innovation, institutional construction, and international cooperation, can AI technology development be ensured to serve human dignity, freedom, and fair justice. Full article
36 pages, 2671 KiB  
Article
DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems
by Yucong Duan and Zhendong Guo
Appl. Sci. 2025, 15(15), 8508; https://doi.org/10.3390/app15158508 (registering DOI) - 31 Jul 2025
Abstract
This study presents a DIKWP-driven artificial consciousness framework for IoT-enabled smart healthcare, integrating a Data–Information–Knowledge–Wisdom–Purpose (DIKWP) cognitive architecture with a software-defined IoT infrastructure. The proposed system deploys DIKWP agents at edge and cloud nodes to transform raw sensor data into high-level knowledge and [...] Read more.
This study presents a DIKWP-driven artificial consciousness framework for IoT-enabled smart healthcare, integrating a Data–Information–Knowledge–Wisdom–Purpose (DIKWP) cognitive architecture with a software-defined IoT infrastructure. The proposed system deploys DIKWP agents at edge and cloud nodes to transform raw sensor data into high-level knowledge and purpose-driven actions. This is achieved through a structured DIKWP pipeline—from data acquisition and information processing to knowledge extraction, wisdom inference, and purpose-driven decision-making—that enables semantic reasoning, adaptive goal-driven responses, and privacy-preserving decision-making in healthcare environments. The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. Simulated experiments on synthetic vital sign datasets achieved approximately 98% anomaly detection accuracy and up to 90% reduction in communication overhead compared to cloud-centric solutions. Results also demonstrate enhanced explainability via traceable decisions across DIKWP layers and robust performance under intermittent connectivity. These findings indicate that the DIKWP-driven approach can significantly advance IoT-based healthcare by providing secure, explainable, and adaptive services aligned with clinical objectives and patient-centric care. Full article
(This article belongs to the Special Issue IoT in Smart Cities and Homes, 2nd Edition)
Show Figures

Figure 1

19 pages, 1072 KiB  
Article
Efficient and Reliable Identification of Probabilistic Cloning Attacks in Large-Scale RFID Systems
by Chu Chu, Rui Wang, Nanbing Deng and Gang Li
Micromachines 2025, 16(8), 894; https://doi.org/10.3390/mi16080894 (registering DOI) - 31 Jul 2025
Abstract
Radio Frequency Identification (RFID) technology is widely applied in various scenarios, including logistics tracking, supply chain management, and target monitoring. In these contexts, the malicious cloning of legitimate tag information can lead to sensitive data leakage and disrupt the normal acquisition of tag [...] Read more.
Radio Frequency Identification (RFID) technology is widely applied in various scenarios, including logistics tracking, supply chain management, and target monitoring. In these contexts, the malicious cloning of legitimate tag information can lead to sensitive data leakage and disrupt the normal acquisition of tag information by readers, thereby threatening personal privacy and corporate security and incurring significant economic losses. Although some efforts have been made to detect cloning attacks, the presence of missing tags in RFID systems can obscure cloned ones, resulting in a significant reduction in identification efficiency and accuracy. To address these problems, we propose the block-based cloned tag identification (BCTI) protocol for identifying cloning attacks in the presence of missing tags. First, we introduce a block indicator to sort all tags systematically and design a block mechanism that enables tags to respond repeatedly within a block with minimal time overhead. Then, we design a superposition strategy to further reduce the number of verification times, thereby decreasing the execution overhead. Through an in-depth analysis of potential tag response patterns, we develop a precise method to identify cloning attacks and mitigate interference from missing tags in probabilistic cloning attack scenarios. Moreover, we perform parameter optimization of the BCTI protocol and validate its performance across diverse operational scenarios. Extensive simulation results demonstrate that the BCTI protocol meets the required identification reliability threshold and achieves an average improvement of 24.01% in identification efficiency compared to state-of-the-art solutions. Full article
Show Figures

Figure 1

24 pages, 1537 KiB  
Article
Privacy-Aware Hierarchical Federated Learning in Healthcare: Integrating Differential Privacy and Secure Multi-Party Computation
by Jatinder Pal Singh, Aqsa Aqsa, Imran Ghani, Raj Sonani and Vijay Govindarajan
Future Internet 2025, 17(8), 345; https://doi.org/10.3390/fi17080345 (registering DOI) - 31 Jul 2025
Abstract
The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the difficulties that come with traditional federated learning frameworks [...] Read more.
The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the difficulties that come with traditional federated learning frameworks in healthcare sectors, such as scalability, computational effectiveness, and preserving patient privacy for numerous healthcare systems, are discussed. In this work, a new conceptual model known as Hierarchical Federated Learning (HFL) for large, integrated healthcare organizations that include several institutions is proposed. The first level of aggregation forms regional centers where local updates are first collected and then sent to the second level of aggregation to form the global update, thus reducing the message-passing traffic and improving the scalability of the HFL architecture. Furthermore, the HFL framework leveraged more robust privacy characteristics such as Local Differential Privacy (LDP), Gaussian Differential Privacy (GDP), Secure Multi-Party Computation (SMPC) and Homomorphic Encryption (HE). In addition, a Novel Aggregated Gradient Perturbation Mechanism is presented to alleviate noise in model updates and maintain privacy and utility. The performance of the proposed HFL framework is evaluated on real-life healthcare datasets and an artificial dataset created using Generative Adversarial Networks (GANs), showing that the proposed HFL framework is better than other methods. Our approach provided an accuracy of around 97% and 30% less privacy leakage compared to the existing models of FLBM-IoT and PPFLB. The proposed HFL approach can help to find the optimal balance between privacy and model performance, which is crucial for healthcare applications and scalable and secure solutions. Full article
(This article belongs to the Special Issue Security and Privacy in AI-Powered Systems)
Show Figures

Graphical abstract

13 pages, 894 KiB  
Article
Enhancing and Not Replacing Clinical Expertise: Improving Named-Entity Recognition in Colonoscopy Reports Through Mixed Real–Synthetic Training Sources
by Andrei-Constantin Ioanovici, Andrei-Marian Feier, Marius-Ștefan Mărușteri, Alina-Dia Trâmbițaș-Miron and Daniela-Ecaterina Dobru
J. Pers. Med. 2025, 15(8), 334; https://doi.org/10.3390/jpm15080334 - 30 Jul 2025
Viewed by 35
Abstract
Background/Objectives: In routine practice, colonoscopy findings are saved as unstructured free text, limiting secondary use. Accurate named-entity recognition (NER) is essential to unlock these descriptions for quality monitoring, personalized medicine and research. We compared named-entity recognition (NER) models trained on real, synthetic, [...] Read more.
Background/Objectives: In routine practice, colonoscopy findings are saved as unstructured free text, limiting secondary use. Accurate named-entity recognition (NER) is essential to unlock these descriptions for quality monitoring, personalized medicine and research. We compared named-entity recognition (NER) models trained on real, synthetic, and mixed data to determine whether privacy preserving synthetic reports can boost clinical information extraction. Methods: Three Spark NLP biLSTM CRF models were trained on (i) 100 manually annotated Romanian colonoscopy reports (ModelR), (ii) 100 prompt-generated synthetic reports (ModelS), and (iii) a 1:1 mix (ModelM). Performance was tested on 40 unseen reports (20 real, 20 synthetic) for seven entities. Micro-averaged precision, recall, and F1-score values were computed; McNemar tests with Bonferroni correction assessed pairwise differences. Results: ModelM outperformed single-source models (precision 0.95, recall 0.93, F1 0.94) and was significantly superior to ModelR (F1 0.70) and ModelS (F1 0.64; p < 0.001 for both). ModelR maintained high accuracy on real text (F1 = 0.90), but its accuracy fell when tested on synthetic data (0.47); the reverse was observed for ModelS (F1 = 0.99 synthetic, 0.33 real). McNemar χ2 statistics (64.6 for ModelM vs. ModelR; 147.0 for ModelM vs. ModelS) greatly exceeded the Bonferroni-adjusted significance threshold (α = 0.0167), confirming that the observed performance gains were unlikely to be due to chance. Conclusions: Synthetic colonoscopy descriptions are a valuable complement, but not a substitute for real annotations, while AI is helping human experts, not replacing them. Training on a balanced mix of real and synthetic data can help to obtain robust, generalizable NER models able to structure free-text colonoscopy reports, supporting large-scale, privacy-preserving colorectal cancer surveillance and personalized follow-up. Full article
(This article belongs to the Special Issue Clinical Updates on Personalized Upper Gastrointestinal Endoscopy)
Show Figures

Figure 1

21 pages, 552 KiB  
Review
Informed Consent in Perinatal Care: Challenges and Best Practices in Obstetric and Midwifery-Led Models
by Eriketi Kokkosi, Sofoklis Stavros, Efthalia Moustakli, Saraswathi Vedam, Anastasios Potiris, Despoina Mavrogianni, Nikolaos Antonakopoulos, Periklis Panagopoulos, Peter Drakakis, Kleanthi Gourounti, Maria Iliadou and Angeliki Sarella
Nurs. Rep. 2025, 15(8), 273; https://doi.org/10.3390/nursrep15080273 - 29 Jul 2025
Viewed by 168
Abstract
Respectful maternity care involves privacy, dignity, and informed choice within the process of delivery as stipulated by the World Health Organization (WHO). Informed consent is a cornerstone of patient-centered care, representing not just a formal document, but an ongoing ethical and clinical process [...] Read more.
Respectful maternity care involves privacy, dignity, and informed choice within the process of delivery as stipulated by the World Health Organization (WHO). Informed consent is a cornerstone of patient-centered care, representing not just a formal document, but an ongoing ethical and clinical process through which women are offered objective, understandable information to support autonomous, informed decision-making. This narrative review critically examines the literature on informed consent in maternity care, with particular attention to both obstetric-led and midwifery-led models of care. In addition to identifying institutional, cultural, and systemic obstacles to its successful implementation, the review examines the definition and application of informed consent in perinatal settings and evaluates its effects on women’s autonomy and satisfaction with care. Important conclusions emphasize that improving women’s experiences and minimizing needless interventions require active decision-making participation, a positive provider–patient relationship, and ongoing support from medical professionals. However, significant gaps persist between legal mandates and actual practice due to provider attitudes, systemic constraints, and sociocultural influences. Women’s experiences of consent can be more effectively understood through the use of instruments such as the Mothers’ Respect (MOR) Index and the Mothers’ Autonomy in Decision Making (MADM) Scale. To promote genuinely informed and considerate maternity care, this review emphasizes the necessity of legislative reform and improved provider education in order to close the gap between policy and practice. Full article
Show Figures

Figure 1

50 pages, 8673 KiB  
Article
Challenges of Integrating Assistive Technologies and Robots with Embodied Intelligence in the Homes of Older People Living with Frailty
by Abdel-Karim Al-Tamimi, Lantana Hewitt, David Cameron, Maher Salem and Armaghan Moemeni
Appl. Sci. 2025, 15(15), 8415; https://doi.org/10.3390/app15158415 - 29 Jul 2025
Viewed by 115
Abstract
The rapid increase in the global population of older adults presents a significant challenge, but also a unique opportunity to leverage technological advancements for promoting independent living and well-being. This study introduces the CIREI framework, which is a comprehensive model designed to enhance [...] Read more.
The rapid increase in the global population of older adults presents a significant challenge, but also a unique opportunity to leverage technological advancements for promoting independent living and well-being. This study introduces the CIREI framework, which is a comprehensive model designed to enhance the integration of smart home and assistive technologies specifically for pre-frail older adults. Developed through a systematic literature review and innovative and comprehensive co-design activities, the CIREI framework captures the nuanced needs, preferences, and challenges faced by older adults, caregivers, and experts. Key findings from the co-design workshop highlight critical factors such as usability, privacy, and personalised learning preferences, which directly influence technology adoption. These insights informed the creation of an intelligent middleware prototype named WISE-WARE, which seamlessly integrates commercial off-the-shelf (COTS) devices to support health management and improve the quality of life for older adults. The CIREI framework’s adaptability ensures it can be extended and refined to meet the ever-changing needs of the ageing population, providing a robust foundation for future research and development in user-centred technology design. All workshop materials, including tools and methodologies, are made available to encourage the further exploration and adaptation of the CIREI framework, ensuring its relevance and effectiveness in the dynamic landscape of ageing and technology. This research contributes significantly to the discourse on ageing in place, digital inclusion, and the role of technology in empowering older adults to maintain independence. Full article
Show Figures

Figure 1

14 pages, 866 KiB  
Article
Switching to Long-Acting Cabotegravir and Rilpivirine in Turkey: Perspectives from People Living with HIV in a Setting of Increasing HIV Incidence
by Rıdvan Dumlu, Yeliz Çiçek, Mahir Kapmaz, Okan Derin, Halis Akalın, Uğur Önal, Egemen Özdemir, Çiğdem Ataman Hatipoğlu, Günay Tuncer Ertem, Alper Şener, Leyla Akgül, Yeşim Çağlar, Derya Tuna Ecer, Mustafa Kemal Çelen, Nur Bahar Oğuz, Figen Yıldırım, Deniz Borcak, Sevtap Şenoğlu, Eyüp Arslan, Sinan Çetin, Meryem Balcı and Ali Mertadd Show full author list remove Hide full author list
Medicina 2025, 61(8), 1373; https://doi.org/10.3390/medicina61081373 - 29 Jul 2025
Viewed by 310
Abstract
Background and Objectives: Long-acting cabotegravir and rilpivirine (LA-CAB/RPV) offers an alternative to daily oral antiretroviral therapy (ART) for people living with HIV (PLWH). Although LA-CAB/RPV has been approved in Turkey, the country remains in the pre-rollout period, and national data on patient [...] Read more.
Background and Objectives: Long-acting cabotegravir and rilpivirine (LA-CAB/RPV) offers an alternative to daily oral antiretroviral therapy (ART) for people living with HIV (PLWH). Although LA-CAB/RPV has been approved in Turkey, the country remains in the pre-rollout period, and national data on patient perspectives are lacking. This is the first nationwide study from Turkey, a setting of increasing HIV incidence, assessing PLWH perspectives on switching to LA-CAB/RPV and the influence of motivational factors on treatment preferences. Materials and Methods: A prospective, multicenter, cross-sectional study was conducted across 11 HIV treatment centers representing all regions of Turkey. Virologically suppressed PLWH meeting current eligibility criteria for LA-CAB/RPV were included. Treatment preferences (switch to LA-CAB/RPV or remain on oral ART) and five anticipated motivational domains, namely perceived efficacy, safety, convenience, privacy, and cost, were systematically assessed through structured, face-to-face interviews. Results: Among 200 eligible participants, 86% (n = 172) preferred switching to LA-CAB/RPV. In all subgroups, LA-CAB/RPV was preferred over oral ART, except for those with no formal literacy. Prior awareness of LA-CAB/RPV was significantly associated with the switching preference (p < 0.001), with healthcare providers being the most common source of information, at 45.5% (n = 172) (p < 0.001). Residential proximity to the healthcare center (p = 0.018) and all motivational factors significantly influenced the preference (p < 0.05). Notably, when participants who initially chose to remain on oral ART were asked whether they would reconsider switching if injections were administered every six months, overall preference for long-acting therapy increased from 86% to 98%. Conclusions: High clinical eligibility and strong acceptability for LA-CAB/RPV were observed among Turkish PLWH. Our findings demonstrate that structured motivational factors significantly influence the treatment preference. Addressing these patient-centered factors and logistical barriers may support the successful integration of long-acting therapies into routine HIV care. Future longer-interval agents may improve patient-centered acceptability. Full article
(This article belongs to the Section Infectious Disease)
Show Figures

Figure 1

23 pages, 3075 KiB  
Article
Building an Agent-Based Simulation Framework of Smartphone Reuse and Recycling: Integrating Privacy Concern and Behavioral Norms
by Wenbang Hou, Dingjie Peng, Jianing Chu, Yuelin Jiang, Yu Chen and Feier Chen
Sustainability 2025, 17(15), 6885; https://doi.org/10.3390/su17156885 - 29 Jul 2025
Viewed by 122
Abstract
The rapid proliferation of electronic waste, driven by the short lifecycle of smartphones and planned obsolescence strategies, presents escalating global environmental challenges. To address these issues from a systems perspective, this study develops an agent-based modeling (ABM) framework that simulates consumer decisions and [...] Read more.
The rapid proliferation of electronic waste, driven by the short lifecycle of smartphones and planned obsolescence strategies, presents escalating global environmental challenges. To address these issues from a systems perspective, this study develops an agent-based modeling (ABM) framework that simulates consumer decisions and stakeholder interactions within the smartphone reuse and recycling ecosystem. The model incorporates key behavioral drivers—privacy concerns, moral norms, and financial incentives—to examine how social and economic factors shape consumer behavior. Four primary agent types—consumers, manufacturers, recyclers, and second-hand retailers—are modeled to capture complex feedback and market dynamics. Calibrated using empirical data from Jiangsu Province, China, the simulation reveals a dominant consumer tendency to store obsolete smartphones rather than engage in reuse or formal recycling. However, the introduction of government subsidies significantly shifts behavior, doubling participation in second-hand markets and markedly improving recycling rates. These results highlight the value of integrating behavioral insights into environmental modeling to inform circular economy strategies. By offering a flexible and behaviorally grounded simulation tool, this study supports the design of more effective policies for promoting responsible smartphone disposal and lifecycle extension. Full article
Show Figures

Graphical abstract

16 pages, 358 KiB  
Article
Artificial Intelligence in Curriculum Design: A Data-Driven Approach to Higher Education Innovation
by Thai Son Chu and Mahfuz Ashraf
Knowledge 2025, 5(3), 14; https://doi.org/10.3390/knowledge5030014 - 29 Jul 2025
Viewed by 207
Abstract
This paper shows that artificial intelligence is fundamentally transforming college curricula by enabling data-driven personalization, which enhances student outcomes and better aligns educational programs with evolving workforce demands. Specifically, predictive analytics, machine learning algorithms, and natural language processing were applied here, grounded in [...] Read more.
This paper shows that artificial intelligence is fundamentally transforming college curricula by enabling data-driven personalization, which enhances student outcomes and better aligns educational programs with evolving workforce demands. Specifically, predictive analytics, machine learning algorithms, and natural language processing were applied here, grounded in constructivist learning theory and Human–Computer Interaction principles, to evaluate student performance and identify at-risk students to propose personalized learning pathways. Results indicated that the AI-based curriculum achieved much higher course completion rates (89.72%) as well as retention (91.44%) and dropout rates (4.98%) compared to the traditional model. Sentiment analysis of learner feedback showed a more positive learning experience, while regression and ANOVA analyses proved the impact of AI on enhancing academic performance to be real. Therefore, the learning content delivery for each student was continuously improved based on individual learner characteristics and industry trends by AI-enabled recommender systems and adaptive learning models. Its advantages notwithstanding, the study emphasizes the need to address ethical concerns, ensure data privacy safeguards, and mitigate algorithmic bias before an equitable outcome can be claimed. These findings can inform institutions aspiring to adopt AI-driven models for curriculum innovation to build a more dynamic, responsive, and learner-centered educational ecosystem. Full article
(This article belongs to the Special Issue Knowledge Management in Learning and Education)
Show Figures

Figure 1

22 pages, 1156 KiB  
Article
An Attribute-Based Proxy Re-Encryption Scheme Supporting Revocable Access Control
by Gangzheng Zhao, Weijie Tan and Changgen Peng
Electronics 2025, 14(15), 2988; https://doi.org/10.3390/electronics14152988 - 26 Jul 2025
Viewed by 209
Abstract
In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilities such as blurred data sovereignty boundaries and nonlinear surges [...] Read more.
In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilities such as blurred data sovereignty boundaries and nonlinear surges in privacy leakage risks. Existing academic research indicates current proxy re-encryption schemes remain insufficient for cloud access control scenarios characterized by diversified user requirements and personalized permission management, thus failing to fulfill the security needs of emerging computing paradigms. To resolve these issues, a revocable attribute-based proxy re-encryption scheme supporting policy-hiding is proposed. Data owners encrypt data and upload it to the blockchain while concealing attribute values within attribute-based encryption access policies, effectively preventing sensitive information leaks and achieving fine-grained secure data sharing. Simultaneously, proxy re-encryption technology enables verifiable outsourcing of complex computations. Furthermore, the SM3 (SM3 Cryptographic Hash Algorithm) hash function is embedded in user private key generation, and key updates are executed using fresh random factors to revoke malicious users. Ultimately, the scheme proves indistinguishability under chosen-plaintext attacks for specific access structures in the standard model. Experimental simulations confirm that compared with existing schemes, this solution delivers higher execution efficiency in both encryption/decryption and revocation phases. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

17 pages, 1486 KiB  
Article
Use of Instagram as an Educational Strategy for Learning Animal Reproduction
by Carlos C. Pérez-Marín
Vet. Sci. 2025, 12(8), 698; https://doi.org/10.3390/vetsci12080698 - 25 Jul 2025
Viewed by 201
Abstract
The present study explores the use of Instagram as an innovative strategy in the teaching–learning process in the context of animal reproduction topics. In the current era, with digital technology and social media transforming how information is accessed and consumed, it is essential [...] Read more.
The present study explores the use of Instagram as an innovative strategy in the teaching–learning process in the context of animal reproduction topics. In the current era, with digital technology and social media transforming how information is accessed and consumed, it is essential for teachers to adapt and harness the potential of these tools for educational purposes. This article delves into the need for teachers to stay updated with current trends and the importance of promoting digital competences among teachers. This research aims to provide insights into the benefits of integrating social media into the educational landscape. Students of Veterinary Science degrees, Master’s degrees in Equine Sport Medicine as well as vocational education and training (VET) were involved in this study. An Instagram account named “UCOREPRO” was created for educational use, and it was openly available to all users. Instagram usage metrics were consistently tracked. A voluntary survey comprising 35 questions was conducted to collect feedback regarding the educational use of smartphone technology, social media habits and the UCOREPRO Instagram account. The integration of Instagram as an educational tool was positively received by veterinary students. Survey data revealed that 92.3% of respondents found the content engaging, with 79.5% reporting improved understanding of the subject and 71.8% acquiring new knowledge. Students suggested improvements such as more frequent posting and inclusion of academic incentives. Concerns about privacy and digital distraction were present but did not outweigh the perceived benefits. The use of short videos and microlearning strategies proved particularly effective in capturing students’ attention. Overall, Instagram was found to be a promising platform to enhance motivation, engagement, and informal learning in veterinary education, provided that thoughtful integration and clear educational objectives are maintained. In general, students expressed positive opinions about the initiative, and suggested some ways in which it could be improved as an educational tool. Full article
Show Figures

Figure 1

23 pages, 16115 KiB  
Article
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos
by Zhiyu Xie, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng and Yiting Lin
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790 - 25 Jul 2025
Viewed by 135
Abstract
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to [...] Read more.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. Full article
Show Figures

Figure 1

Back to TopTop