Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\"useds » \"usedds (Expand Search)
\\"useds » \\"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\"useds » \"usedds (Expand Search)
\\"useds » \\"usedds (Expand Search)
-
2541
Penerapan Metode E-Service Quality Terhadap Pengukuran Tingkat Kepuasan Penggunaan Marketplace
Published 2022-10-01“…The processed data was obtained from distributing questionnaires by using the google form. …”
Get full text
Article -
2542
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
2543
The Experience of Intimacy and Sexuality in Persons with Mental Illness: A Metasynthesis
Published 2025-01-01“…ATLAS.ti software was used to code the primary and secondary data to generate 83 descriptive themes and 17 composite themes, which were further synthesised to create seven interpretive themes. …”
Get full text
Article -
2544
Assessing user preferences and competitive strategies of Gojek and Grab in ASEAN’s ride-hailing market
Published 2024-12-01“…This study aims to determine the criteria, sub-criteria, and alternatives influencing users in choosing ride-hailing and map Gojek and Grab’s grand strategy to compete in the ASEAN market, especially in Indonesia, Thailand, Vietnam, and Singapore. This research uses a questionnaire to collect data, with 377 Gojek and Grab users as participants. …”
Get full text
Article -
2545
Green banking practices and customer satisfaction-way to green sustainability
Published 2025-04-01“…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
Get full text
Article -
2546
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
Published 2024-12-01“…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
Get full text
Article -
2547
Internet of Things in Medicine: a Bibliometric Review
Published 2024-07-01“…Data visualization was conducted using VOSviewer software. …”
Get full text
Article -
2548
Bridging Cities and Citizens with Generative AI: Public Readiness and Trust in Urban Planning
Published 2025-07-01“…This study explores whether Saudi residents are ready to engage with AI-driven tools in urban planning, how they prefer to interact with them, and what ethical concerns may arise. Using a quantitative, survey-based approach, the study collected data from 232 Saudi residents using non-probability stratified sampling. …”
Get full text
Article -
2549
ChatGPT’s Integration in GCC Higher Education: Bibliometric Analysis of Trends
Published 2024-10-01“…Key findings include the positive impact of ChatGPT on personalized learning and student engagement, as well as the growing focus on ethical concerns such as data privacy and bias. The study also identified strong interdisciplinary connections, with AI research in education intersecting with fields such as computer science, linguistics, and cognitive science. …”
Get full text
Article -
2550
Operation Strategy of Multi-Virtual Power Plants Participating in Joint Electricity–Carbon Market Based on Carbon Emission Theory
Published 2025-05-01“…The study uses data from a VPP dispatch center in Shanxi Province. …”
Get full text
Article -
2551
A comprehensive systematic review of intrusion detection systems: emerging techniques, challenges, and future research directions
Published 2025-05-01“…Blockchain and quantum computing technologies are explored to improve data privacy, resilience, and scalability in decentralized and resource-constrained environments. …”
Get full text
Article -
2552
Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks
Published 2017-01-01“…The proposed protocol includes steps for secure RO and handover management, where mutual authentication, key exchange, perfect forward secrecy, and privacy are supported. The correctness of the proposed protocol is formally analyzed using BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). …”
Get full text
Article -
2553
Enhancing IoT Security in 5G Networks
Published 2024-12-01“…We constructed the 5G network infrastructure using OMNeT++ with the INET and Simu5G frameworks. …”
Get full text
Article -
2554
Lung-AttNet: An Attention Mechanism-Based CNN Architecture for Lung Cancer Detection With Federated Learning
Published 2025-01-01“…Furthermore, to address medical data sensitivity and privacy concerns, the model is deployed in a Federated Learning (FL) framework, where the global model is trained using weights from local models rather than sharing raw data. …”
Get full text
Article -
2555
Hybrid Transformer-KAN Within Federated Learning Framework: A Novel Machine Learning Approach for Improved Short-Term Weather Forecasting
Published 2025-01-01“…Furthermore, federated learning is applied to the proposed method to exploit the spatio-temporal dependencies while protecting data privacy. As a result, a novel framework of Federated-Transformer-KAN is proposed to collaboratively forecast weather variables in a distributed manner, without sharing data that is collected by the intelligent sensors equipped at each weather station locally. …”
Get full text
Article -
2556
Assessment of breastfeeding self-efficacy in nursing mothers following earthquakes: A case study of the Kahramanmaraş earthquakes in Turkey
Published 2025-06-01“…During the study period, all eligible mothers visiting the polyclinic who met the inclusion criteria were evaluated. Data were collected using a "Descriptive Data Form" and the "Breastfeeding Self-Efficacy Short Form Scale." …”
Get full text
Article -
2557
A cross-sectional study assessing customers’ perception, satisfaction, and attitude toward e-pharmacy services in Saudi Arabia
Published 2024-12-01“…A self-administered online questionnaire was distributed via social media, and convenience sampling was used to collect data from December 2022 to January 2023. …”
Get full text
Article -
2558
Contrastive Self-Supervised Learning for Sensor-Based Human Activity Recognition: A Review
Published 2024-01-01“…Next, we comprehensively review data augmentation methods for sensor data and commonly used benchmark datasets for activity recognition. …”
Get full text
Article -
2559
How Gender-Sensitive Disaster Management is Addressed in the Turkish Parliament: A Qualitative Study from Feminist Bioethics Perspective
Published 2025-07-01“…The data were systematically retrieved using the keywords “earthquake,” “disaster,” “gender,” “women,” and “health.” …”
Get full text
Article -
2560
Reinforcement Learning With Deep Features: A Dynamic Approach for Intrusion Detection in IoT Networks
Published 2025-01-01“…As IoT devices continue to advance, securing interconnected systems against malicious attacks is essential to ensure data privacy, system integrity, and user safety. …”
Get full text
Article