Suggested Topics within your search.
Suggested Topics within your search.
-
2081
BSLISE directory: innovating global mapping and organization of LIS schools
Published 2025-03-01“…Evolving from the MAP project, the BSLISE directory consolidates and adapts data into a new framework using open-source software. …”
Get full text
Article -
2082
Providers' perceptions of implementing standardized postpartum family planning: a qualitative study of midwives and nurses in GhanaAJOG Global Reports at a Glance
Published 2025-05-01“…We interpreted data using thematic analysis. Results: Providers indicated that use of one-on-one counseling and the mobile application in hospital-based postpartum care delivery was acceptable, feasible, and appropriate. …”
Get full text
Article -
2083
Federated learning with integrated attention multiscale model for brain tumor segmentation
Published 2025-04-01“…However, traditional brain tumor segmentation techniques usually rely on centralized data storage and analysis, which might result in privacy issues and violations. …”
Get full text
Article -
2084
Mapping the landscape of machine learning in chronic disease management: A comprehensive bibliometric study
Published 2025-07-01“…Conclusion ML is rapidly integrating into personalized medicine, real-time monitoring, and multimodal data fusion. However, challenges such as limited collaboration, weak model generalization, and data privacy persist. …”
Get full text
Article -
2085
New secure distributed secret sharing scheme of n product
Published 2014-11-01“…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
Get full text
Article -
2086
Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China
Published 2025-02-01“…The findings revealed that students demonstrated moderate familiarity with AI tools, particularly ChatGPT and willingness to use them in coursework. Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
Get full text
Article -
2087
Users' Perceptions and Trust in AI in Direct-to-Consumer mHealth: Qualitative Interview Study
Published 2025-05-01“…Participants described attitudes toward the impact of AI-mHealth on users’ health and personal data (ie, influences on health awareness and management, value for mental vs physical health use cases, and the inevitability of data sharing), influences on their trust in AI-mHealth (ie, endorsements and guidance from health professionals or health or regulatory organizations, attitudes toward technology companies, and reasonable but not necessarily explainable output), and their preferences relating to the amount and type of information that is shared by AI-mHealth apps (ie, the types of data that are collected, future uses of user data, and the accessibility of information). …”
Get full text
Article -
2088
تحليل العلاقة بين مؤشر الحرية الاقتصادية والنمو الاقتصادي (دراسة في بلدان عربية مختارة)
Published 2018-03-01“…Abstract The Index of Economic Freedom, one of the most important economic indicators, which affect the size and quality of economic growth, So the many institutions and organizations in the drafting of a set of standards, that will provide a lot of information and data for workers on economic policies to take advantage of them Including the Index of Economic Freedom, which consists of ten a fundamental elements of the branches off of which (42) is variable, and was to study the relationship between economic freedom and chosen variable and economic growth of the three Arab countries (Egypt - United Arab Emirates - Iraq) After identify the theoretical Framework variables and the index data analysis and identification, has been used statistical program (Evievs) to analyze and assess the impact of economic freedom variables on the dependent variable rate of economic growth, then use the built-in data analysis (Pooling data) in those countries giving dummy variables a role in determining the international privacy in the analysis, Was chosen stability of variables and cointegration to make sure a significant parameters of the model, and it turned out after the analysis to correspond estimate for the study the UAE with the economic theory that explains there a direct correlation between economic freedom cursor and the rate of GDP growth model equation while non-existent relationship in Egypt and Iraq. …”
Get full text
Article -
2089
From Technical Prerequisites to Improved Care: Distributed Edge AI for Tomographic Imaging
Published 2025-01-01“…However, transferring data to the cloud for processing strains communication links, introduces high communication latency, and raises privacy and security concerns. …”
Get full text
Article -
2090
Federated Online Learning for adaptive load forecasting across decentralized nodes
Published 2025-08-01“…The main drawbacks are twofold: (1) data sharing and transfer results in privacy and security risks, and (2) static models miss opportunities to learn from new data. …”
Get full text
Article -
2091
Encouraging gender-inclusive acceptance of multipurpose national-identity smart cards.
Published 2022-01-01“…The data was collected through five hundred questionnaires from Malaysia (the MNIS pioneer) and analyzed using structural equation modeling.…”
Get full text
Article -
2092
A systematic review of consumers’ and healthcare professionals’ trust in digital healthcare
Published 2025-02-01“…Trust in digital healthcare is complex and, from a consumers’ perspective, can influence digital healthcare use, adoption, acceptance, and usefulness. Consumers’ trust can be affected by the degree of human interaction in automated interventions, perceived risks, privacy concerns, data accuracy, digital literacy, quality of the digital healthcare intervention, satisfaction, education, and income. …”
Get full text
Article -
2093
The Impact of Digital Technologies on the Development of Payment Services
Published 2020-10-01“…The problems and ways of protecting user identification, data privacy and money safety when using electronic payment services are investigated. …”
Get full text
Article -
2094
Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review
Published 2024-12-01“…However, issues such as data privacy, dental professional job displacement, and the necessity for thorough validation and regulation to ensure safety and efficacy remain significant concerns.…”
Get full text
Article -
2095
Digital health tools in juvenile idiopathic arthritis: a systematic literature review
Published 2025-05-01“…Tool development and validation processes were poorly or not at all described, and data regarding regulatory compliance, security, or privacy were scarce. …”
Get full text
Article -
2096
Sybil Attack Detection Based on Signal Clustering in Vehicular Networks
Published 2024-01-01“…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
Get full text
Article -
2097
Identifying latent mobility as a service preference segments among college students
Published 2025-04-01“…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
Get full text
Article -
2098
Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks
Published 2024-08-01“…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
Get full text
Article -
2099
Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors
Published 2025-03-01“…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
Get full text
Article -
2100
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
Published 2025-01-01“…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
Get full text
Article