Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1361
Public Health Using Social Network Analysis During the COVID-19 Era: A Systematic Review
Published 2024-11-01“…We highlight the ethical concerns related to the use of social media data, such as privacy and consent, underscoring the potential of integrating ethical SNA with more inclusive, human-centered practices to enhance the effectiveness and community buy-in of emerging computational public health efforts.…”
Get full text
Article -
1362
Quantum proof biometric authentication framework using binary lattices and homomorphic encryption for secure cancelable templates
Published 2025-06-01“…The genuine and impostor distributions in the extensive data sets were used to validate the above authentication thresholds that were chosen through empirical testing. …”
Get full text
Article -
1363
-
1364
Acceptance and perceived usefulness of digital health services in the management of chronic urticaria: a survey of patients and physicians
Published 2025-07-01“…Key barriers to adoption were identified, including concerns over data privacy, limitations in technical infrastructure, and a lack of awareness of available digital health solutions. …”
Get full text
Article -
1365
Using Artificial Intelligence to Predict Customer Satisfaction with E-Payment Systems during the COVID-19 Pandemic
Published 2022-01-01“…Descriptive analytical approach of a sample of 1,025 people living in Saudi Arabia was used to answer the study questions and test its hypotheses. …”
Get full text
Article -
1366
Improving Transformer Performance for French Clinical Notes Classification Using Mixture of Experts on a Limited Dataset
Published 2025-01-01“…The MoE-Transformer addresses the dual challenges of effective training with limited data and low-resource computation suitable for in-house hospital use. …”
Get full text
Article -
1367
Insights From Art Therapists on Using AI-Generated Art in Art Therapy: Mixed Methods Study
Published 2024-12-01“…ResultsThe study began in August 2023, with data collection involving 10 participants taking place in October 2023. …”
Get full text
Article -
1368
A Non-Invertible Secure Template Generation Using AES Encrypted MCC and Random Triangle Projection
Published 2025-01-01“…In recent years, due to the exponential growth in the applicability of biometric authentication systems, it has become essential to address the privacy and security concerns of user biometric information. …”
Get full text
Article -
1369
Real-Time Acoustic Scene Recognition for Elderly Daily Routines Using Edge-Based Deep Learning
Published 2025-03-01“…Traditional acoustic scene monitoring systems that rely on cloud computing are limited by data transmission delays and privacy concerns. Hence, this study proposes an acoustic scene recognition system that integrates edge computing with deep learning to enable real-time monitoring of elderly individuals’ daily activities. …”
Get full text
Article -
1370
A Reference Model of GaaP Readiness Indexes Using Systematic Review and Meta-Synthesis Method
Published 2025-03-01“…This is a qualitative study and a systematic review of the literature in which the meta-synthesis method is used to analyze and analyze the data extracted from selected sources. …”
Get full text
Article -
1371
Advanced Machine Learning and Deep Learning Approaches for Estimating the Remaining Life of EV Batteries—A Review
Published 2025-01-01“…This systematic review presents a critical analysis of advanced machine learning (ML) and deep learning (DL) approaches for predicting the remaining useful life (RUL) of electric vehicle (EV) batteries. …”
Get full text
Article -
1372
Design of an Improved Model for Smart Grid Pricing Using ST-GNN-PNet and MAD-RL-StackelNet
Published 2025-01-01“…However, current pricing models fail to capture spatio-temporal load behavior, consumer heterogeneity, and externalities like emissions. Privacy constraints also hinder granular data collection, causing revenue loss. …”
Get full text
Article -
1373
Distance caregiving using smart home technologies: balancing ethical priorities in family decision-making by only children
Published 2025-07-01“…We used the applied thematic analysis methodology to analyze the data. …”
Get full text
Article -
1374
The Ways of Using Social Media for Health Promotion Among Adolescents: Qualitative Interview and Focus Group Study
Published 2025-06-01“…In addition, 5 individual interviews with boys were carried out to balance gender representation, as boys were less vocal in group settings. Data were analyzed using content analysis with a combined deductive-inductive coding approach in MAXQDA software, achieving high intercoder reliability (Cohen κ=0.93). …”
Get full text
Article -
1375
Automated Digital Safety Planning Interventions for Young Adults: Qualitative Study Using Online Co-design Methods
Published 2025-02-01“…Young adult participants also shared 3 key technological needs of an automated intervention: (1) transparency about how the intervention functions, the kinds of actions it does and does not take, the limits of confidentiality, and the role of human oversight within the program; (2) strong privacy practices—data security around how content within the intervention and how private data created by the intervention would be maintained and used was extremely important to young adult participants given the sensitive nature of suicide-related data; and (3) usability, convenience, and accessibility were particularly important to participants—this includes having an approachable and engaging message tone, customizable message delivery options (eg, length, number, content focus), and straightforward menu navigation. …”
Get full text
Article -
1376
-
1377
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
Published 2023-12-01“…On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. …”
Get full text
Article -
1378
Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT
Published 2025-01-01Get full text
Article -
1379
Secure and intelligent 5G-enabled remote patient monitoring using ANN and Choquet integral fuzzy VIKOR
Published 2025-03-01Get full text
Article -
1380
A Denoising Diffusion Probabilistic Model-Based Human Respiration Monitoring Method Using a UWB Radar
Published 2025-01-01“…This paper proposes a denoising diffusion probabilistic model (DDPM)-based human respiration monitoring method using an ultra-wideband (UWB) radar, where the localization calculation of the target based on the respiration-motion energy ratio, maximum ratio combining (MRC), and principal component analysis (PCA) are included for data enhancement. …”
Get full text
Article