Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1401
Akrivia Health Database—deep patient characterisation using a secondary mental healthcare dataset in England and Wales: cohort profile
Published 2024-10-01“…The data are anonymised, structured and harmonised from the source electronic health records across a range of information technology systems, enabling for unified, privacy-preserving access for research purposes.Participants The cohort contains data from electronic health records for over 4.6 million patients in England and Wales, as of January 2024. …”
Get full text
Article -
1402
AI-based model for Prediction of Power consumption in smart grid-smart way towards smart city using blockchain technology
Published 2024-12-01“…Ensuring data integrity, privacy, and trust among grid applicants, transmit the data securely and reliably to a centralized or distributed cloud platform utilizing blockchain technology—a secure transmission and storage using Distributed Authentication and Authorization (DAA) protocol. …”
Get full text
Article -
1403
Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)
Published 2022-12-01“…Abbreviations: VANETs: vehicular ad hoc networks; IVC: inter-vehicular communication; NC-WTM: node-centric weight-based trust management algorithm; WTM: weight-based trust management algorithm; RPRep: robust and privacy-preserving reputation management scheme; ART: attack-resistant trust management scheme; MANET: mobile ad hoc network; DSRC: dedicated short-range communication; WAVE: wireless access in vehicular environment; IVC: inter-vehicular communication; I2V: infrastructure-to-vehicle; V2I: vehicle-to-infrastructure; V2V: vehicle-to-vehicle; TA: trust authority; RSU: road side unit; OBU: on-board unit; GPS: global positioning system; WSN: wireless sensor network; VASNETs: vehicular sensor networks; CCW: cooperative collision warning; BMA: bad mouth attack; TDMA: time division multiple access; GDVAN: greedy detection for VANETs; SMTS: spider monkey time synchronization; SVM: support vector machine; DST: Dempster-Shafer theory of evidence; TA: trust authority; PCA: puzzle-based co-authentication; VLC: visible light communication; NE: Nash equilibrium; RTB: request-to-broadcast; CTB: clear-to-broadcast; RREQ: route request message; RREP: route reply; DDR: data disseminate ratio; Dir: direct trust; IDir: indirect trust; TCE: trust computation error; PDR: packet delivery ratio…”
Get full text
Article -
1404
Using information technology to communicate about health and wellbeing, assessment and review: audio computer assisted self-interviewing (A-CASI)
Published 2009-10-01“…In addition, its use is thought to decrease respondent error or fatigue and allows the relatively easy use of more complicated questionnaires, providing richer data than other self-completion approaches (Tourangeau and Smith, 1996).…”
Article -
1405
A True Random Number Generator Based on Race Hazard and Jitter of Braided and Cross-Coupled Logic Gates Using FPGA
Published 2024-01-01“…Cryptographic algorithms, which are critical for protecting user data privacy, rely on cryptographic keys to ensure data security. …”
Get full text
Article -
1406
What multimodal components, tools, dataset and focus of emotion are used in the current research of multimodal emotion: a systematic literature review
Published 2024-12-01“…Data were obtained from IEEE Xplore, Science Direct and Emerald journals which were then sorted based on the PRISMA method. …”
Get full text
Article -
1407
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework
Published 2025-07-01“…The main objective of the SAMFL-SCDCOA methodology is to provide an effective method for preventing cyberattacks in real time using FL and advanced optimization algorithms. Initially, the Z-score normalization is utilized to scale and standardize data to improve analysis consistency and accuracy. …”
Get full text
Article -
1408
Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation
Published 2025-07-01“…Abstract Medical image encryption is important for maintaining the confidentiality of sensitive medical data and protecting patient privacy. Contemporary healthcare systems store significant patient data in text and graphic form. …”
Get full text
Article -
1409
Experiences and views of patients, carers and healthcare professionals on using modems in domiciliary non-invasive ventilation (NIV): a qualitative study
Published 2020-09-01“…Data suggests a need for increased clarity to patients/carers regarding clinical practice relating to responsiveness to modem data. …”
Get full text
Article -
1410
Prospective acceptability of using mHealth interventions for oral health promotion in a sample of Egyptian women: A cross-sectional study
Published 2024-12-01“…Health awareness (36.8%) and effort & time saving (29%) were the most commonly cited motivators for using mHealth while lack of time (33%) and privacy issues (14.2%) were the main barriers. …”
Get full text
Article -
1411
Generative AI in Improving Personalized Patient Care Plans: Opportunities and Barriers Towards Its Wider Adoption
Published 2024-11-01“…This review aims to serve as a key resource for various stakeholders such as researchers, medical professionals, and data governance. We adopted the PRISMA review methodology and screened a total of 247 articles. …”
Get full text
Article -
1412
Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm
Published 2025-04-01“…The main intention of the MHAID-IWSOA methodology relies on enhancing the cybersecurity detection and migration model using advanced optimization algorithms. Initially, the data pre-processing applies min–max scaling to transform input data into a beneficial format. …”
Get full text
Article -
1413
FedDSL: A Novel Client Selection Method to Handle Statistical Heterogeneity in Cross-Silo Federated Learning Using Flower Framework
Published 2024-01-01“…Once this environment is created, a client selection strategy is applied that uses a weighted approach to select clients. A statistical analysis checks the data distributed among hospitals using skewness and normality tests. …”
Get full text
Article -
1414
-
1415
Using citizen science Raspberry Shake seismometers to enhance earthquake location and characterization: a case study from Wellington, New Zealand
Published 2025-02-01“…Notably, we find that precise station locations are less critical for precise earthquake location, a significant factor given that the publicly available Raspberry Shake locations are obfuscated to protect user privacy. These results suggest that, dependent on network geometry, citizen seismometer data can be a valuable tool in seismic monitoring and improve earthquake location capability, whilst remaining cost-effective. …”
Get full text
Article -
1416
Experience of older adults using smart devices and mHealth apps in nursing homes in Chinese megacities: A descriptive qualitative study
Published 2025-06-01“…Data were collected through semi-structured interviews and analyzed using directed content analysis. …”
Get full text
Article -
1417
Using artificial intelligence based language interpretation in non-urgent paediatric emergency consultations: a clinical performance test and legal evaluation
Published 2025-01-01“…Legal evaluation indicated inconsistent access to language interpretation services across healthcare jurisdictions and potential risks involving data privacy, consent, and malpractice when using AI-based translation tools. …”
Get full text
Article -
1418
-
1419
The role of field studying practices in improving understanding and skills for using electronic medical records among medical records and health information students
Published 2025-04-01“…Specifically, the students showed increased understanding of the concepts and basic functions of EMR (p = 0.001), as well as technical skills for using EMR (p = 0.001). They also demonstrated enhanced knowledge of data security and privacy (p = 0.002), and a better understanding of workflows and procedures for using EMR (p = 0.041). …”
Get full text
Article -
1420