Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1381
Using telemedicine to support care for people with type 2 diabetes mellitus: a qualitative analysis of patients’ perspectives
Published 2019-10-01“…Four themes emerged from the analysis: (1) generational difference; (2) independence and convenience, (3) sharing of health data and privacy and (4) concerns and challenges. …”
Get full text
Article -
1382
-
1383
Assessment of the Quality of Smartphone-Based Applications and Games for Teaching Medical Terminology Using the Mobile Application Rating Scale (MARS)
Published 2024-10-01“…The same checklist was used for data extraction. The quality of apps was measured using the Mobile App Rating Scale (MARS). …”
Get full text
Article -
1384
Women’s hospital birth experiences in Harar, eastern Ethiopia: a qualitative study using Roy’s Adaptation Model
Published 2022-07-01“…Interviews were audio-recorded and transcribed on the spot and the interviews were analysed using a deductive content analysis approach. Data were analysed using the four components of Roy’s Adaptation Model (RAM) as a guiding framework of women’s experiences: physiological, self-concept, role and function, and interdependence.Results Various behaviours were identified: under physiological mode, common behaviours identified included labour pain, fatigue, surgical site pain and anaesthesia-related complication. …”
Get full text
Article -
1385
Bootstrapping BI-RADS classification using large language models and transformers in breast magnetic resonance imaging reports
Published 2025-04-01“…Specifically, missing category information (MCI) that is absent in the free-text reports is supplemented by assigning default values to the missing categories in the structured reports. To ensure data privacy, a locally deployed Qwen-Chat model is employed. …”
Get full text
Article -
1386
Management of the Chain of Custody of Digital Evidence Using Blockchain and Self-Sovereign Identities: A Systematic Literature Review
Published 2025-01-01“…While state-of-the-art reviews identify various aspects, it is necessary to include the use of Self-Sovereign Identity (SSI) systems within the scope of research. …”
Get full text
Article -
1387
-
1388
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Published 2025-01-01“…Detection methods currently face challenges due to the complex and enormous amounts of data inherent in IoV systems. This paper presents a new approach toward improving DDoS attack detection by using the Gini index in feature selection and Federated Learning during model training. …”
Get full text
Article -
1389
-
1390
ReACT_OCRS: An AI-Driven Anonymous Online Reporting System Using Synergized Reasoning and Acting in Language Models
Published 2025-01-01“…Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response times. …”
Get full text
Article -
1391
-
1392
Enhancing unmanned aerial vehicle and smart grid communication security using a ConvLSTM model for intrusion detection
Published 2024-12-01“…The emergence of small-drone technology has revolutionized the way we use drones. Small drones leverage the Internet of Things (IoT) to deliver location-based navigation services, making them versatile tools for various applications. …”
Get full text
Article -
1393
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…Here the fog nodes gather the information from the medical sensor devices and the data is validated using smart contracts in the blockchain network. …”
Get full text
Article -
1394
Determinants of behavioral intentions and their impact on student performance in the use of AI technology in higher education in Indonesia: A SEM-PLS analysis based on TPB, UTAUT,...
Published 2025-01-01“…The findings reveal that Attitude toward Behavior and Technology Anxiety significantly influence Student Performance through mediating variables such as Performance Expectancy, Facilitating Conditions, and Behavioral Intention to Use. Notably, perceived risk negatively affects behavioral intention and academic outcomes, suggesting high student awareness of data privacy, technological dependency, and accuracy uncertainty. …”
Get full text
Article -
1395
Non-Contact Fall Detection System Using 4D Imaging Radar for Elderly Safety Based on a CNN Model
Published 2025-05-01“…A CNN model classifies postures into standing, sitting, and lying, while changes in the speed and position distinguish falling actions from lying-down actions. The Point Cloud data were normalized and organized using zero padding and k-means clustering to improve the learning efficiency. …”
Get full text
Article -
1396
Using malware for software-defined networking–based smart home security management through a taint checking approach
Published 2016-08-01“…Accordingly, this article proposes a taint propagation analysis model incorporating a weighted spanning tree analysis scheme for tracking data with taint marking using several taint checking tools with an open software-defined networking architecture for solving the dynamic taint propagation analysis problem. …”
Get full text
Article -
1397
Using AI chatbots (e.g., CHATGPT) in seeking health-related information online: The case of a common ailment
Published 2025-03-01“…Using structural equation modeling on survey data collected from 231 respondents in the US, our study examines the hypotheses linking hedonic and utilitarian values, user satisfaction, willingness to reuse conversational AI, and intentions to take recommended actions. …”
Get full text
Article -
1398
-
1399
Grouping Digital Health Apps Based on Their Quality and User Ratings Using K-Medoids Clustering: Cross-Sectional Study
Published 2025-07-01“…With over 350,000 digital health apps available on the app stores today, those apps need to be of sufficient quality to be safe to use. Discovering the typology of digital health apps regarding professional and clinical assurance (PCA), user experience (UX), data privacy (DP), and user ratings may help in determining the areas where digital health apps can improve. …”
Get full text
Article -
1400
Barriers and facilitators to seeking psychological support among healthcare professionals: a qualitative study using the Theoretical Domains Framework
Published 2025-03-01“…Data were analyzed using framework analysis and relevant domains were identified according to the frequency of participants’ belief statements. …”
Get full text
Article