Suggested Topics within your search.
Suggested Topics within your search.
-
2381
The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs):
Published 2025“…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
Get full text
Article -
2382
Identification of Factors Affecting the Selection of Women's Gyms
Published 2021-06-01“…The data were analyzed by SPSS26 software using Exploratory Factor Analysis test.Results: The results showed that 44 final characteristics affecting the selection of the gym were factorized into 8 factors by factor analysis and these factors explain 67% of the total variance.Conclusion: Factors influencing the selection of women's gymnasiums in order of priority include Physical Evidence, process, Place, price, product, People, Promotion and Privacy.…”
Get full text
Article -
2383
Revolutionizing Sports: The Role of Wearable Technology and AI in Training and Performance Analysis
Published 2025-03-01“…Additionally, AI-driven wearables raise concerns over data security, ethical handling, and equitable access, as high costs limit their use in amateur sports. …”
Get full text
Article -
2384
Evaluating new technologies and organizational structures
Published 2024-12-01“…Co-authors Knut Wenig and Xiaoyao Han are examining the findability of data deposited in data repositories that are using DDI metadata standards. …”
Get full text
Article -
2385
Human-Centered Design of an mHealth Tool for Optimizing HIV Index Testing in Wartime Ukraine: Formative Research Case Study
Published 2025-01-01“…CASI-Plus provides client-facing information on APS methods and uses a standardized, self-guided questionnaire with nonjudgmental language for clients to list partners who would benefit from HIV testing. …”
Get full text
Article -
2386
Pre-class learning assessment on integrating artificial intelligence into evidence-based medicine curriculum
Published 2025-05-01“…Differences between master’s and doctoral students were analyzed using the Mann-Whitney U test.Results A total of 46 students participated in the survey (34 Masters and below, and 12 PhDs). …”
Get full text
Article -
2387
Exploring Perceived Barriers in the Assessment and Management of Female Sexual Dysfunction: An Integrated Qualitative and Quantitative Study among Trainee Residents
Published 2025-01-01“…A total of 92 trainee residents from related medical specialties of psychiatry, gynecology, dermatology, and urology, who provided informed consent, participated in the study. Data were collected using a validated questionnaire regarding perceived barriers related to residents’ knowledge and attitudes toward assessing FSD and a case vignette. …”
Get full text
Article -
2388
Preferences and Willingness to Pay for Health App Assessments Among Health Care Stakeholders: Discrete Choice Experiment
Published 2025-05-01“… BackgroundThe adoption of high-quality health apps has been slow, despite the myriad benefits associated with their use. This is partly due to concerns regarding the effectiveness, safety, and data privacy of such apps. …”
Get full text
Article -
2389
Analisa Sentimen Financial Technology Peer To Peer Lending Pada Aplikasi Koinworks
Published 2022-12-01“…Reviews contained in the Google Play comments column can be used as a data source that can be shared with data mining. …”
Get full text
Article -
2390
Evaluating Factors Affecting Interior Architectural Space Quality to Enhance Spatial Resilience and Human Productivity: An Application of Maslow’s Hierarchy of Needs
Published 2025-06-01“…Data collection continued until the point of data saturation, at which no new theme was identified. …”
Get full text
Article -
2391
Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection
Published 2024-11-01“…Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. …”
Get full text
Article -
2392
Advancing Hematopoietic Stem Cell Transplantation Typing: Harnessing Hyperledger Fabric’s Blockchain Architecture
Published 2024-01-01“…This innovative approach optimizes user experience, maintains data integrity, and ensures privacy. Future integration with existing databases could enable secure data sharing among healthcare institutions, allowing rapid verification of data ownership and unified authentication. …”
Get full text
Article -
2393
Penerapan Metode E-Service Quality Terhadap Pengukuran Tingkat Kepuasan Penggunaan Marketplace
Published 2022-10-01“…The processed data was obtained from distributing questionnaires by using the google form. …”
Get full text
Article -
2394
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
2395
Green banking practices and customer satisfaction-way to green sustainability
Published 2025-04-01“…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
Get full text
Article -
2396
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
Published 2024-12-01“…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
Get full text
Article -
2397
Enhancing IoT Security in 5G Networks
Published 2024-12-01“…We constructed the 5G network infrastructure using OMNeT++ with the INET and Simu5G frameworks. …”
Get full text
Article -
2398
Strengthening health information systems and inherent statistical outputs for improved malaria control and interventions in western Kenya
Published 2025-06-01“…Methods such as spatiotemporal models using climate and case data can improve outbreak predictions, while machine learning techniques can optimize insecticide-treated bed net distributions by pinpointing high-risk households. …”
Get full text
Article -
2399
A NLP analysis of digital demand for healthcare jobs in China
Published 2025-04-01“…This involved designing task-specific prompts, preprocessing the data to remove duplicates and normalize text, and training the model using the Hugging Face Transformers library. …”
Get full text
Article -
2400
The Effect of AI (Artificial Intelligence) in Education on Student Motivation: A Systematic Literature Review
Published 2024-04-01“…However, challenges such as limited technological access, resistance to change, and concerns regarding data privacy and ethics remain critical barriers. …”
Get full text
Article