Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
2301
“Invisible wounds of childbirth”; women’s experiences of obstetric violence: a phenomenological qualitative study
Published 2025-08-01“…The interview data were transcribed and then subjected to qualitative content analysis in accordance with Standards for Qualitative Research Reporting (SRQR) using Graneheim and Lundman’s content analysis method. …”
Get full text
Article -
2302
The Effect of AI (Artificial Intelligence) in Education on Student Motivation: A Systematic Literature Review
Published 2024-04-01“…However, challenges such as limited technological access, resistance to change, and concerns regarding data privacy and ethics remain critical barriers. …”
Get full text
Article -
2303
A Systematic Survey of Distributed Decision Support Systems in Healthcare
Published 2025-02-01“…Finally, it discusses open issues as future research directions in the field of DDSSs in the healthcare sector, including data structure standardization, alert fatigue for healthcare workers using DDSSs, and the lack of adherence of emerging technologies like blockchain to medical regulations.…”
Get full text
Article -
2304
ROBOTISATION AND SERVICE AUTOMATION IN THE TOURISM AND HOSPITALITY SECTOR: A META-STUDY (1993-2024)
Published 2024-09-01“…Analyses 310 publications published in the last 32 years processed using Google Scholar search engine. The data sets used for the observations consist primarily of key research works, predominantly appearing in peer-reviewed international journals. …”
Get full text
Article -
2305
Artificial intelligence assistance in English for communication competence of english for specific purposes
Published 2024-12-01“…A sequential explanatory mixed-methods design collected data from thirty-one undergraduate students using a Likert-scale questionnaire followed by semi-structured interviews to provide more detailed insights. …”
Get full text
Article -
2306
A Survey on Hybrid-CNN and LLMs for Intrusion Detection Systems: Recent IoT Datasets
Published 2024-01-01“…Various IDS methodologies, including those using Machine Learning (ML), Deep Learning (DL) and Large Language Models (LLMs), are employed to identify intrusions within the data; however, improvements to the detection systems are still needed. …”
Get full text
Article -
2307
Preferences and Willingness to Pay for Health App Assessments Among Health Care Stakeholders: Discrete Choice Experiment
Published 2025-05-01“… BackgroundThe adoption of high-quality health apps has been slow, despite the myriad benefits associated with their use. This is partly due to concerns regarding the effectiveness, safety, and data privacy of such apps. …”
Get full text
Article -
2308
A NLP analysis of digital demand for healthcare jobs in China
Published 2025-04-01“…Compliance and data privacy skills were also highly demanded, reflecting the healthcare sector’s commitment to regulatory adherence and data security. …”
Get full text
Article -
2309
Audio–Visual Synchronization and Lip Movement Analysis for Real-Time Deepfake Detection
Published 2025-07-01“…This study contributes to the field by providing a robust real-time solution for detecting deepfakes in audio–visual synthetic data, ensuring enhanced detection accuracy and effective generalization across various deepfake manipulations and demographic data.…”
Get full text
Article -
2310
Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi.
Published 2025-01-01“…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. …”
Get full text
Article -
2311
SparseBatch: Communication-efficient Federated Learning with Partially Homomorphic Encryption
Published 2025-01-01“…It operates by aggregating local gradient updates contributed by participating clients, all the while safeguarding the privacy of sensitive data. Industrial FL frameworks employ additively homomorphic encryption (HE) to ensure that local gradient updates are masked during aggregation, guaranteeing no update is revealed. …”
Get full text
Article -
2312
Exploring the promising role of internet of things in urban water systems: a comprehensive global analysis of insights, trends, and research priorities
Published 2025-03-01“…Most explored areas include water quality monitoring, leak detection, smart metering, and demand management, while challenges in the future lie in data security, privacy, and interoperability. Despite growing research interests, gaps remain in standardization, community engagement, and developing robust IoT architectures. …”
Get full text
Article -
2313
Cross-Room CO<sub>2</sub>-Based Presence Detection for Occupancy Profiling
Published 2025-01-01“…The first contribution involves the development of a presence detection model based on CO2 data, which is easy to measure and non-privacy intrusive. …”
Get full text
Article -
2314
Unlocking potential of open source model training in decentralized federated learning environment
Published 2025-06-01“…Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. …”
Get full text
Article -
2315
Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty
Published 2025-01-01“…Eitemen and Money Laundering Concept itself. This paper uses an explanative qualitative method, and a literature study to obtain the data to strengthen this paper. …”
Get full text
Article -
2316
Patient Satisfaction Regarding Quality Nursing Care
Published 2024-01-01“…Overall the data showed that patientrsquos expectations in some aspects were not sufficiently matched. …”
Get full text
Article -
2317
Policy Factors Affecting the Technological Catch-up of Electronic Health Services in Iran through Blockchain Technology
Published 2022-06-01“…According to the Blockchain Opportunity window, a technological and economic catch-up is possible in e-health services in the country. Decentralization, data transparency, security and privacy are the key features of Blockchain technology. …”
Get full text
Article -
2318
Transformation of Dependent Rights In The Digital Era A Study In Electronic Implementation
Published 2025-03-01“…However, in its implementation, there are still various obstacles, such as limited technological infrastructure, low public digital literacy, and challenges in maintaining data security and user privacy. This study uses normative juridical methods, utilizing legal and conceptual approaches to examine the effectiveness of regulations regarding electronic liens. …”
Get full text
Article -
2319
Blockchain-Enhanced Security for 5G Edge Computing in IoT
Published 2025-04-01“…The rapid expansion of 5G networks and edge computing has amplified security challenges in Internet of Things (IoT) environments, including unauthorized access, data tampering, and DDoS attacks. This paper introduces EdgeChainGuard, a hybrid blockchain-based authentication framework designed to secure 5G-enabled IoT systems through decentralized identity management, smart contract-based access control, and AI-driven anomaly detection. …”
Get full text
Article -
2320
Why We Disclose on Social Media? Towards a Dual-Pathway Model
Published 2025-04-01“…A moderated mediation model was proposed and tested using cross-sectional survey data collected from 1519 Chinese netizens. …”
Get full text
Article