Suggested Topics within your search.
Suggested Topics within your search.
-
2721
Cyber Dating Violence: How Is It Perceived in Early Adolescence?
Published 2024-11-01“…Methods: Participants were 466 second- and third-year secondary school students. Data were collected through surveys, and responses were analysed using the Iramuteq program. …”
Get full text
Article -
2722
Construction of an ethical competency evaluation system for clinical physicians in China
Published 2025-07-01“…Methods This study was conducted using a literature review, interviews, and the expert Delphi method. …”
Get full text
Article -
2723
Blockchain modeled swarm optimized lyapunov smart contract deep reinforced secure tasks offloading in smart home
Published 2025-06-01“…The extensive issues regarding a smart home include offloading computational tasks, data security aspects, privacy issues, authentication of Internet of Things (IoT) devices, and so on. …”
Get full text
Article -
2724
Bridging gaps in medical education for digital healthcare: A Singapore case study
Published 2025-07-01“…Data were collected from September 2020 to February 2023 until thematic saturation was achieved, and analysed using qualitative thematic analysis. …”
Get full text
Article -
2725
Assessment of HPV screening modalities within primary care: a systematic review
Published 2025-04-01“…This can possibly reduce the overall disease burden.MethodsA search strategy was conducted across multiple databases, including PubMed, Cochrane Library, Scopus, and Embase. Data extraction was performed using a standardized form to collect detailed information on study characteristics, participant demographics, and various outcomes. …”
Get full text
Article -
2726
PIRO: A web-based search platform for pathology reports, leveraging large language models to generate discrete searchable insights
Published 2025-04-01“…To address this need, we developed PIRO (Pathology Information Retrieval Optimizer), a web-based platform enabling efficient text searches of diagnostic archives. Built using FastAPI, Angular, and Apache Solr, PIRO supports both basic and advanced search functionalities, faceted filtering, and data extraction, while ensuring compliance with institutional privacy protocols. …”
Get full text
Article -
2727
Preserving patient dignity in critical care units: A qualitative content analysis
Published 2025-04-01“…Methods & Materials: This qualitative study was conducted on 20 patients selected from the Critical Care Units of Imam Khomeini Hospital, Tehran, Iran, through purposeful sampling. Data were collected via semi-structured interviews and were analyzed using Graneheim and Lundman’s conventional content analysis method. …”
Get full text
Article -
2728
Virtual Reality and User Experience: Current Trends and Future Challenges
Published 2025-01-01“…Future research should focus on refining interaction paradigms, improving accessibility, and developing ethical frameworks that respect data privacy and protect the user from cybersickness and the psychological effects of prolonged virtual reality exposure.…”
Get full text
Article -
2729
Análise estratégica sobre o emprego de federação de identidade no canal de Internet das organizações Identity federation on organizational internet channel strategic analysis
Published 2007-08-01“…<br>Identity Federation, as a standard of security and identity data privacy intermediation, seems to be a real market solution and has been proposed by three alliances or groups: Shibboleth, WS-Federation and Liberty Alliance. …”
Get full text
Article -
2730
The Status of Observing the Charter of Patients’ Rights and Related Factors from the Point of View of Hospitalized Patients
Published 2020-06-01“…The study instrument was a researcher-made questionnaire with two sections: The first section was related to individual, social, and disease-related information, and the second section to determining the status of the patient’s compliance. The obtained data were analyzed using descriptive (Mean±SD) and inferential statistics (The Chi-Square test, Friedman, and logistic regression). …”
Get full text
Article -
2731
Respectful maternity care and mistreatment: Women's experiences during induction of labor and childbirth in Ghana.
Published 2025-01-01“…Purposive sampling was employed in recruiting the study participants (n = 17). Data analysis was performed based on thematic content using the inductive qualitative analytic framework approach.…”
Get full text
Article -
2732
A Systematic Review of Telehealth Applications in Endocrinology
Published 2024-04-01“…Methods: This study involved a thorough search using comprehensive techniques across databases such as PubMed/Medline, Embase, and Scopus. …”
Get full text
Article -
2733
Febrile disease modeling and diagnosis system for optimizing medical decisions in resource-scarce settings
Published 2024-12-01“…The research investigated the most effective modeling approach for differentiating among 11 febrile illnesses that are prevalent in Nigeria using three intelligent techniques: Extreme Gradient Boost (XGBoost), Fuzzy Cognitive Map (FCM), and Analytic Hierarchy Process (AHP). …”
Get full text
Article -
2734
Consumer perceptions and preferences of pharmacist-led professional services and attributes in Australia: a qualitative focus group study
Published 2025-06-01“…Audio recordings were transcribed verbatim and de-identified. Data were analysed using the thematic analysis technique to identify common themes.Setting Three online focus groups were conducted, inviting participants from AustraliaParticipants 15 adults aged 18 years and above, English-speaking and self-identified as a consumer of health services or a health carer.Results Participants recognised pharmacists primarily as medication experts but also valued additional services like health screening, vaccination and chronic disease management. …”
Get full text
Article -
2735
Attention-Enhanced CNN for High-Performance Deepfake Detection: A Multi-Dataset Study
Published 2025-01-01“…We created a dataset called the Center for Cyber Defense DeepFake (CCDDF) dataset by generating fake images using publicly available Artificial Intelligence (AI) tools and trained our model on these data, achieving a detection accuracy of 97% and an AUC score of 99.58. …”
Get full text
Article -
2736
The Emerging Role of Artificial Intelligence in Dermatology: A Systematic Review of Its Clinical Applications
Published 2025-05-01“…However, further studies are required to address challenges such as algorithmic bias, data privacy, and regulatory oversight. Funding and registration: This review received no external funding and was not registered in a systematic review registry.…”
Get full text
Article -
2737
Design and validation of consumer behavior model based on user-generated content in the banking industry
Published 2024-09-01“…In this regard, it is suggested to improve the social media literacy of customers to produce user-generated content, train and develop skilled and expert human resources in the field of information technology in the bank to analyze data, increase the level of security and privacy of customers, bank investment to develop social platforms and technologies, create trust among customers to produce user-generated content, create the ability of customers to access user-generated content platforms. Bank officials use different tools to produce user-generated content by customers. …”
Get full text
Article -
2738
Deep Learning–Based Precision Cropping of Eye Regions in Strabismus Photographs: Algorithm Development and Validation Study for Workflow Optimization
Published 2025-07-01“…ObjectiveThis study aimed to address these challenges using an advanced preprocessing algorithm to enhance the accuracy, efficiency, and standardization of eye region cropping for clinical workflows and AI data preprocessing. …”
Get full text
Article -
2739
Teledentistry for Improving Access To, and Quality of Oral Health Care: Overview of Systematic Reviews and Meta-Analyses
Published 2025-07-01“…Meanwhile, patient safety (8/30, 27%) and equity (1/30, 10%) were the least explored domains, with few reviews addressing adverse outcomes, as well as concerns related to data privacy (3/30, 10%) and confidentiality (2/30, 6%). …”
Get full text
Article -
2740
Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
Published 2025-01-01“…However, the network communication environment is open and insecure, necessitating the use of a symmetric key to encrypt and decrypt data during the data exchange process. …”
Get full text
Article