Key Fundamentals and Examples of Sensors for Human Health: Wearable, Non-Continuous, and Non-Contact Monitoring Devices
Sara Guarducci,
No information about this author
Sara Jayousi,
No information about this author
Stefano Caputo
No information about this author
et al.
Sensors,
Journal Year:
2025,
Volume and Issue:
25(2), P. 556 - 556
Published: Jan. 19, 2025
The
increasing
demand
for
personalized
healthcare,
particularly
among
individuals
requiring
continuous
health
monitoring,
has
driven
significant
advancements
in
sensor
technology.
Wearable,
non-continuous
and
non-contact
sensors
are
leading
this
innovation,
providing
novel
methods
monitoring
vital
signs
physiological
data
both
clinical
home
settings.
However,
there
is
a
lack
of
comprehensive
comparative
studies
assessing
the
overall
functionality
these
technologies.
This
paper
aims
to
address
gap
by
presenting
detailed
analysis
selected
wearable,
used
monitoring.
To
achieve
this,
we
conducted
evaluation
various
available
on
market,
utilizing
key
indicators
such
as
performance,
usability,
associated
platforms
functionality,
management,
battery
efficiency,
cost-effectiveness.
Our
findings
highlight
strengths
limitations
each
type,
thus
offering
valuable
insights
selection
most
appropriate
technology
based
specific
healthcare
needs.
study
potential
serve
resource
researchers,
providers,
policymakers,
contributing
deeper
understanding
existing
user-centered
solutions.
Language: Английский
The Future of Virology Diagnostics Using Wearable Devices Driven by Artificial Intelligence
Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 473 - 504
Published: Jan. 10, 2025
The
utilization
of
the
wearable
devices
(WDs)
that
are
enhanced
by
artificial
intelligence
(AI)
can
have
a
notable
potential
in
healthcare.
This
chapter
aimed
to
provide
an
overview
applications
AI-driven
WDs
enhancing
early
detection
and
management
virus
infections.
First,
we
presented
examples
highlight
capabilities
very
monitoring
infections
such
as
COVID-19.
In
addition,
provided
on
utility
machine
learning
algorithms
analyze
large
data
for
signs
We
also
overviewed
enable
real-time
surveillance
effective
outbreak
management.
showed
how
this
be
achieved
via
collection
analysis
diverse
WDs'
across
various
populations.
Finally,
discussed
challenges
ethical
issues
comes
with
virology
diagnostics,
including
concerns
about
privacy
security
well
issue
equitable
access.
Language: Английский
‘The Way to Be Safe Is Never to Be Secure'
International Journal of Information Security and Privacy,
Journal Year:
2025,
Volume and Issue:
19(1), P. 1 - 21
Published: Jan. 10, 2025
Data
security
is
used
to
protect
sensitive
and
confidential
patient
health
information.
The
healthcare
sector
affected
by
the
myriad
of
cybersecurity
threats
attacks.
Safeguarding
Electronic
Personal
Health
Information
(ePHI)
against
attacks
important.
This
study
sought
explore
ePHI
in
South
African
hospitals
with
a
view
proposing
framework.
A
qualitative
was
carried
out
public
using
semi-structured
interviews
purposively
selected
participants
IT
managers,
technicians,
network
controllers.
findings
revealed
that
suffer
from
range
threats,
including
Trojan
viruses,
cryptographic
attacks,
distributed
denial
service
phishing
emails,
password
malware
lack
policies
poor
compliance
data
protection
laws
have
been
recognised
as
major
challenges
facing
hospitals.
proposes
framework
could
assist
securing
providing
set
guidelines
safeguards.
Language: Английский
Quantum-Inspired Statistical Frameworks: Enhancing Traditional Methods with Quantum Principles
Theodoros Kyriazos,
No information about this author
Mary Poga
No information about this author
Encyclopedia,
Journal Year:
2025,
Volume and Issue:
5(2), P. 48 - 48
Published: April 4, 2025
This
manuscript
introduces
a
comprehensive
framework
for
augmenting
classical
statistical
methodologies
through
the
targeted
integration
of
core
quantum
mechanical
principles—specifically
superposition,
entanglement,
measurement,
wavefunctions,
and
density
matrices.
By
concentrating
on
these
foundational
concepts
instead
whole
expanse
theory,
we
propose
“quantum-inspired”
models
that
address
persistent
shortcomings
in
conventional
approaches.
In
particular,
five
pivotal
distributions
(normal,
binomial,
Poisson,
Student’s
t,
chi-square)
are
reformulated
to
incorporate
interference
terms,
phase
factors,
operator-based
transformations,
thereby
facilitating
representation
multimodal
data,
phase-sensitive
dependencies,
correlated
event
patterns—characteristics
frequently
underrepresented
purely
real-valued,
frameworks.
Furthermore,
ten
quantum-inspired
principles
delineated
guide
practitioners
systematically
adapting
mechanics
traditional
inferential
tasks.
These
illustrated
domain-specific
applications
finance,
cryptography
(distinct
from
direct
applications),
healthcare,
climate
modeling,
demonstrating
how
amplitude-based
confidence
measures,
matrices,
measurement
analogies
can
enrich
standard
by
capturing
more
nuanced
correlation
structures
enhancing
predictive
performance.
unifying
constructs
with
established
this
work
underscores
potential
interdisciplinary
collaboration
paves
way
advanced
data
analysis
tools
capable
addressing
high-dimensional,
complex,
dynamically
evolving
datasets.
Complete
R
code
ensures
reproducibility
further
exploration.
Language: Английский
Quantum Public Key Cryptography
Devang Pandya,
No information about this author
P.S. Solanki,
No information about this author
Rakeshkumar Vanzara
No information about this author
et al.
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 181 - 214
Published: Sept. 27, 2024
Cryptography
is
not
for
secure
the
sensitive
data
but
now
days
it
compulsory
in
many
applications
like
IoT,
Cloud
Platform,
business
systems
and
so
on.
A
new
area
of
advanced
information
technology
called
quantum-computing
uses
unique
characteristics
quantum
physics
to
solve
complex
problems,
which
are
beyond
powers
even
most
robust
classical/powerful
computers.
Security
major
concern
computing
environment.
Quantum
cryptography,
addition,
merely
practices
ideologies
mechanism
encrypt/decrypt
transmit
a
way
that
cannot
be
hacked
by
anyone.
This
chapter
explores
public
key
seeks
create
cryptographic
building
blocks
can
withstand
attacks
from
computing-enabled
adversary.
Chapter
begins
with
fundamental
principles
mechanics,
cryptography
and,
core
families
quantum-resistant
schemes.
Language: Английский