Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
2581
Optimized Identity Authentication via Channel State Information for Two-Factor User Verification in Information Systems
Published 2025-04-01“…For classification, a kernel support vector machine (SVM) model is trained using a randomized hyperparameter search algorithm. …”
Get full text
Article -
2582
Inpatient satisfaction with nursing care in a backward region: a cross-sectional study from northwestern China
Published 2020-09-01“…Objectives The aim of the study was to examine the level of patient satisfaction with nursing care and identify the factors affecting satisfaction from the inpatient’s perspective in a backward region of China.Design This was a cross-sectional study.Setting The study was conducted at a tertiary hospital located in northwest China.Participants Patients admitted to the ward for at least 48 hours were chosen to participate in the survey.Primary outcome measure The Newcastle Satisfaction with Nursing Care Scale was used. Data were collected from 219 patients.Results The overall inpatient satisfaction with nursing care was 78.15±4.74. …”
Get full text
Article -
2583
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Published 2025-03-01“…As the proliferation of Internet of Things (IoT) devices grows, challenges in security, privacy, and interoperability become increasingly significant. …”
Get full text
Article -
2584
A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things
Published 2022-05-01“…The structure of unbalanced hash tree generates less verification information during device verification and protects privacy. The sparse Merkel tree multiproofs method is used to generate the verification information to implement the batch authentication of devices. …”
Get full text
Article -
2585
A "Quıet" need ın the dısaster of the century: a qualıtatıve study on menstrual hygıene management
Published 2025-02-01“…The interviews were analyzed using content analysis, and themes and sub-themes reflecting the women's experiences were identified. …”
Get full text
Article -
2586
Rapid Whole-Genome Sequencing in Critically Ill Infants and Children with Suspected, Undiagnosed Genetic Diseases: Evolution to a First-Tier Clinical Laboratory Test in the Era of...
Published 2025-03-01“…Factors that will help to develop rWGS as a clinical test in critically ill infants and the limitations are briefly discussed, including an evaluation of the clinical utility and accessibility of genetic testing, education for parents and providers, cost-effectiveness, ethical challenges, consent issues, secondary findings, data privacy concerns, false-positive and false-negative results, challenges in variant interpretation, costs and reimbursement, the limited availability of genetic counselors, and the development of evidence-based guidelines, which would all need to be addressed to facilitate the implementation of pediatric genomic sequencing in an effective widespread manner in the era of precision medicine.…”
Get full text
Article -
2587
The Impact of AI-Personalized Recommendations on Clicking Intentions: Evidence from Chinese E-Commerce
Published 2025-02-01“…AI-personalized recommendation technology offers more accurate and diverse choices to consumers and increases click-through rates and sales on e-commerce platforms. Yet, data on consumers’ experiences of AI-personalized recommendations and their impact path on clicking intention are scarce. …”
Get full text
Article -
2588
The Role of Evidence-Based Design in Enhancing Architectural Design Process of Healthcare Buildings: A Case Study of General Hospitals in Sulaimani City
Published 2025-04-01“…Furthermore, the research incorporates case studies and spatial analysis using DepthMapX to obtain objective insights. The discrepancy between subjective perspectives and objective analysis prompts a deeper exploration of the practical implementation of evidence-based design (EBD) in healthcare architecture. …”
Get full text
Article -
2589
Transformations in academic work and faculty perceptions of artificial intelligence in higher education
Published 2025-07-01“…Additionally, ethical debates are emerging around algorithmic transparency, data privacy, and institutional responsibility. Effective integration in higher education demands not only technical proficiency but also ethical grounding, regulatory support, and critical pedagogical development. …”
Get full text
Article -
2590
FedHSP: A Robust Federated Learning Framework Coherently Addressing Heterogeneity, Security, and Performance Challenges
Published 2025-01-01“…Federated Learning (FL) is a machine learning training method that leverages local model gradients instead of accessing private data from individual clients, ensuring privacy. However, the practical implementation of FL faces significant challenges. …”
Get full text
Article -
2591
Integrating Artificial Intelligence into Service Innovation, Business Development, and Legal Compliance: Insights from the Hainan Free Trade Port Era
Published 2024-10-01“…Hypothesis 3 state that HFTP enterprises comply with these laws while systemically assuring, in theory, and practice, the legal risks of artificial intelligence and its implications for legal regulation, which is a significant aspect of research, addressing legal risks related to data privacy, security, and algorithmic bias with many strategies being proposed. …”
Get full text
Article -
2592
Class-Hidden Client-Side Watermarking in Federated Learning
Published 2025-01-01“…Federated learning consists of a central aggregator and multiple clients, forming a distributed structure that effectively protects data privacy. However, since all participants can access the global model, the risk of model leakage increases, especially when unreliable participants are involved. …”
Get full text
Article -
2593
Machine Learning for Resilient and Sustainable Cities: A Bibliometric Analysis of Smart Urban Technologies
Published 2025-03-01“…A hotspot analysis revealed that research topics are increasingly diverse and dynamically evolving. Issues such as data privacy, cybersecurity, sustainable development, and intelligent transportation have gradually become focal points, reflecting the dual demand of smart city development for technological innovation and green growth. …”
Get full text
Article -
2594
Multimodal Cancellable Biometric Template Protection and Person Verification in Transformed Domain
Published 2024-01-01“…Combining biometric features increases system reliability, safety, and user privacy. We used a colorization technique to generate three separate colors Quick Response (QR) codes from a user-defined Red, Green, Blue (RGB) tuple random seed, which we then combined to create a one-way cancellable template. …”
Get full text
Article -
2595
Image-based food monitoring and dietary management for patients living with diabetes: a scoping review of calorie counting applications
Published 2025-03-01“…However, challenges such as standardization, validation across diverse populations, and data privacy concerns need to be addressed. This review focuses on the role of computer science in dietary intake estimation, specifically food segmentation, classification, and volume estimation for calorie calculation. …”
Get full text
Article -
2596
Navigating the ethical terrain of AI in education: A systematic review on framing responsible human-centered AI practices
Published 2024-12-01“…Following the Preferred Reporting Items for Systematic Review and Meta-Analysis (PRISMA) guidelines, we searched Scopus and Web of Science and identified 40 empirical studies that satisfied our inclusion criteria. Specifically, we used four criteria for the screening process: (1) the study's full text was available in English; (2) the study was published before April 10th, 2024 in peer-reviewed journals or conference proceedings; (3) the study was primary research that collected original data and applied qualitative, quantitative, or mixed-methods as the study methodology; and (4) the study had a clear focus on ethical and/or responsible AI in one or multiple educational context(s). …”
Get full text
Article -
2597
A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption
Published 2024-12-01“…Cryptography ensures secure communication and data privacy, and it has been increasingly applied in healthcare and related areas. …”
Get full text
Article -
2598
Identifying Stakeholder Values for an eHealth Intervention to Facilitate Home-Based Geriatric Rehabilitation: A Qualitative Multi-Method Approach
Published 2025-07-01“…An agile science approach allowed for iterative data collection and analysis until an optimal fit was achieved. …”
Get full text
Article -
2599
Adaptive Federated Learning With Reinforcement Learning-Based Client Selection for Heterogeneous Environments
Published 2025-01-01“…The framework integrates reinforcement learning (RL) based client selection using both Tabular Q-Learning and Deep Q-Network (DQN) strategies to dynamically identify clients that most positively impact global model performance. …”
Get full text
Article -
2600
Development of a Solar-Powered Edge Processing Perimeter Alert System with AI and LoRa/LoRaWAN Integration for Drone Detection and Enhanced Security
Published 2025-01-01“…The system is powered by a LiPo battery, which is recharged using solar energy. The perimeter alert system offers numerous advantages, including edge processing for enhanced data privacy and reduced latency, integrating multiple sensors for increased accuracy, and a decentralized approach to improving security. …”
Get full text
Article