Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1421
An efficient trustworthy cyberattack defence mechanism system for self guided federated learning framework using attention induced deep convolution neural networks
Published 2025-05-01“…Conventional ML and DL techniques that function with data kept on a federal server increase the main privacy issues for user information. …”
Get full text
Article -
1422
-
1423
“Simpleness”: a qualitative description study exploring patient perspectives on the barriers and facilitators of using digital health tools to self-manage inflammatory bowel diseas...
Published 2025-02-01“…However, concerns about data entry burden, privacy, and engagement emerged as significant barriers. …”
Get full text
Article -
1424
A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing
Published 2025-06-01“…This study presents a scalable, lightweight hybrid authentication system that integrates blockchain and edge computing within a Hyperledger Consortium network to address such real-time problems, particularly the use of Hyperledger Indy. For secure authentication, Hyperledger ensures a permissioned, decentralized, and impenetrable environment, while edge computing lowers latency by processing data closer to IoMT devices. …”
Get full text
Article -
1425
Artificial Intelligence (AI) in Neurofeedback Therapy Using Electroencephalography (EEG), Heart Rate Variability (HRV), and Galvanic Skin Response (GSR): A Review
Published 2025-01-01“…Additionally, the general adoption of this technology is restricted by concerns regarding patient security and data privacy. The paper emphasizes the role of artificial intelligence in preprocessing data, feature extraction, and AI model analysis by integrating current research findings. …”
Get full text
Article -
1426
Securing IoT devices with zero day intrusion detection system using binary snake optimization and attention based bidirectional gated recurrent classifier
Published 2024-11-01“…Intrusion detection systems (IDS) are generally focused on exact attacks to defend the use of IoT. However, the attacks were unidentified, for IDS still signifies tasks and concerns about consumers’ data privacy and safety. …”
Get full text
Article -
1427
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms
Published 2025-07-01“…As part of intellectual transportation, IoV is a hot topic for researchers because it faces numerous unresolved challenges, particularly regarding privacy and security. The development of recent malicious software with the expanding use of digital services has increased the likelihood of stealing data, corrupting data, or other cybercrimes by malware threats. …”
Get full text
Article -
1428
An intelligent assessment of factors affecting new generations in the era of the internet and new media using intuitionistic hesitant fuzzy sugeno-weber aggregation operators
Published 2025-07-01“…There are many benefits and drawbacks to using the Internet, including issues with human health, education and learning habits, communication and relationships, and privacy and security. …”
Get full text
Article -
1429
Reasons for maternal near-miss in Bahir Dar city administration, northwest Ethiopia: a qualitative interview approach using socio-ecological model
Published 2025-04-01“…Participants were purposively selected until information saturation was reached, after interviewing twenty-five individuals. Data were collected using open-ended interview guides, with audio recordings and field notes. …”
Get full text
Article -
1430
-
1431
SeCo2: Secure Cognitive Semantic Communication in 6G-IoT Networks Using Key-Policy Attribute-Based Encryption and Elliptic Curve Cryptography
Published 2025-06-01“…The framework incorporates a blockchain-based system to provide a secure and privacy-preserving data transmission mechanism. Data preprocessing is conducted using the IoT-Sense dataset, and then encryption is done through a hybrid combination of Key-Policy Attribute-Based Encryption (KP-ABE) and Elliptic Curve Cryptography (ECC). …”
Get full text
Article -
1432
-
1433
INVESTIGATE AND COMPARE GENDER-SPECIFIC DIFFERENCES IN COPING MECHANISMS AMONG PATIENTS DIAGNOSED WITH OBSESSIVE-COMPULSIVE DISORDER USING THE MEANING-CENTERED COPING SCALE SCORES.
Published 2025-06-01“…Participants were recruited through consecutive sampling, and data were analyzed using descriptive and inferential statistics. …”
Get full text
Article -
1434
Challenges in accessing health care services for women and girls with disabilities using a humanitarian physical rehabilitation program in Lebanon: a mixed method study
Published 2024-12-01“…Initially, a retrospective descriptive study analyzed data from the International Committee of the Red Cross (ICRC)-supported physical rehabilitation programme (PRP) database. …”
Get full text
Article -
1435
Strengthening research preparedness for crises: lessons from Norwegian government agencies in using randomized trials and quasi-experimental methods to evaluate public policy inter...
Published 2025-01-01“…The surveyed agencies stressed the importance of legislation providing clear guidelines on when differential treatment can be justified and when informed consent requirements can be waived, as well as faster and clearer processes for managing privacy concerns related to data access. Crucially, greater political acceptance for systematically and gradually implementing reforms, including using randomization, could strengthen evidence-informed public policy, enhancing the scaling-up of effective interventions and deprioritizing ineffective ones.…”
Get full text
Article -
1436
Co-Designing, Developing, and Testing a Mental Health Platform for Young People Using a Participatory Design Methodology in Colombia: Mixed Methods Study
Published 2025-05-01“…MethodsThis study used a mixed methods approach within a structured research and development cycle. …”
Get full text
Article -
1437
Hybrid Deep Learning Models Using LSTM with Random Forest for Radio Frequency-Based Human Activity Recognition in Line-of-Sight and Non-Line-of-Sight Environments
Published 2025-06-01“…The dataset included data from 8 subjects performing 10 different activities. …”
Get full text
Article -
1438
Development of a large Danish single-centre retro- and prospective transgender cohort using a web-based platform: a study protocol of a transgender cohort study
Published 2025-06-01“…Medical records will provide information on demographics, mental health, physical health, and gender-affirming treatment details. Data will be managed using REDCap, ensuring compliance with GDPR and the National Data Protection Act.Ethics and dissemination While recognising the potential privacy risks associated with data collection, the study considers these outweighed by the benefits of advancing knowledge on gender diversity and the impacts of gender-affirming care. …”
Get full text
Article -
1439
Exploring perceived barriers and facilitators to using mobile phone technology for delivering HPV test results in malawi: a qualitative study with HPV-Screened women, healthcare pr...
Published 2025-07-01“…We conducted a study to identify the perceived barriers and facilitators to using mobile phones for delivering HPV results, aiming to improve the retention of HPV-positive women in care. …”
Get full text
Article -
1440
Implementing a Cross-Border Next-Generation Personal Health Record in the Philippines and Taiwan: An Implementation Case Report Using Health Level 7 International Fast Healthcare I...
Published 2025-07-01“…We developed an implementation plan focusing on data interoperability, standardization, and privacy or security protocols. …”
Get full text
Article