Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
-
2541
Barriers facilitators and needs of female sex workers in Arak to access sexual health services a qualitative study
Published 2025-01-01“…Data were collected and analyzed using qualitative content analysis. …”
Get full text
Article -
2542
Nursing Educators’ Perspectives on the Integration of Artificial Intelligence Into Academic Settings
Published 2025-05-01“…However, barriers such as insufficient training, infrastructural challenges, and ethical concerns related to data privacy, algorithmic bias, and AI-driven decision making were highlighted. …”
Get full text
Article -
2543
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Published 2025-07-01“…As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on password data. In password guessing research, there is a conflict between the traditional models’ need for large training samples and the limitations on accessing password data imposed by privacy protection regulations. …”
Get full text
Article -
2544
Pre-class learning assessment on integrating artificial intelligence into evidence-based medicine curriculum
Published 2025-05-01“…Differences between master’s and doctoral students were analyzed using the Mann-Whitney U test.Results A total of 46 students participated in the survey (34 Masters and below, and 12 PhDs). …”
Get full text
Article -
2545
Exploring Perceived Barriers in the Assessment and Management of Female Sexual Dysfunction: An Integrated Qualitative and Quantitative Study among Trainee Residents
Published 2025-01-01“…A total of 92 trainee residents from related medical specialties of psychiatry, gynecology, dermatology, and urology, who provided informed consent, participated in the study. Data were collected using a validated questionnaire regarding perceived barriers related to residents’ knowledge and attitudes toward assessing FSD and a case vignette. …”
Get full text
Article -
2546
What is the Role of Medical Informatics in Digital Healthcare?
Published 2025-05-01“…. • Cybersecurity & Privacy in Healthcare – Implementing robust security solutions (e.g., encryption, blockchain) to safeguard sensitive patient data and ensure compliance with regulations like HIPAA (USA), GDPR (EU), and local healthcare laws…”
Get full text
Article -
2547
Low Saturation Confidence Distribution-based Test-Time Adaptation for cross-domain remote sensing image classification
Published 2025-05-01“…However, most UDA approaches require access to source data, which may be infeasible due to data privacy or transmission constraints. …”
Get full text
Article -
2548
BESPOKE study protocol: a multicentre, prospective observational study to evaluate the impact of circulating tumour DNA guided therapy on patients with colorectal cancer
Published 2021-09-01“…The secondary endpoints are MRD clearance rate (MRD+ to MRD−) during or after adjuvant chemotherapy, percentage of patients that undergo surgery for oligometastatic recurrence, survival of MRD-negative patients treated with adjuvant chemotherapy versus no adjuvant chemotherapy (active surveillance), overall survival, examine the number of stage I CRC that have recurrent disease detected postsurgery, and patient-reported outcomes.Ethics and dissemination This study has received ethical approval from the Advarra Institutional Review Board (IRB) protocol: Natera—20-041-NCP/3766.01, BESPOKE Study of ctDNA Guided Therapy in Colorectal Cancer (BESPOKE CRC) (Pro00041473) on 10 June 2021. Data protection and privacy regulations will be strictly observed in the capturing, forwarding, processing and storing of patients’ data. …”
Get full text
Article -
2549
Assessment of the attitude and fears of the physicians of Pakistan regarding artificial intelligence: a cross-sectional survey in 2024
Published 2025-08-01“…Subject and methods A nation-wide cross-sectional study was conducted using an online questionnaire, based on standardized General Attitude Towards Artificial Intelligence Scale (GAAIS) and self-devised questions, aimed at collecting data about demographic details, attitude and fears of the physicians regarding AI. …”
Get full text
Article -
2550
Exploring quality of life among elderly persons living with HIV in Accra, Ghana.
Published 2025-01-01“…The data was analysed thematically using QSR NVivo 11.…”
Get full text
Article -
2551
Contrastive Self-Supervised Learning for Sensor-Based Human Activity Recognition: A Review
Published 2024-01-01“…Next, we comprehensively review data augmentation methods for sensor data and commonly used benchmark datasets for activity recognition. …”
Get full text
Article -
2552
HealthPass: a contactless check-in and adaptive access control system for lowering cluster infection risk in public health crisis
Published 2024-12-01“…IntroductionEnsuring effective measures against the spread of the virus is paramount for educational institutions and workplaces as they resume operations amidst the ongoing public health crisis. A touchless and privacy-conscious check-in procedure for visitor assessment is critical to safeguarding venues against potential virus transmission.MethodsIn our study, we developed an interaction-free entry system featuring anonymous visitors who voluntarily provide data. …”
Get full text
Article -
2553
Comparing nurses’ and patients’ perceptions of dignity in burn care: a cross-sectional study
Published 2025-03-01“…Methods This cross-sectional study was conducted on 110 nurse-patient dyads at Amir-Al-Moemenin Burn Hospital, Shiraz, Iran between August 2023 to February 2024. Data were collected using patient dignity questionnaire and analyzed using SPSS software version 23.0, utilizing descriptive tests, Mann-Whitney, Kruskal-Wallis, Wilcoxon, and Spearman’s correlation coefficient. …”
Get full text
Article -
2554
Penerapan Metode E-Service Quality Terhadap Pengukuran Tingkat Kepuasan Penggunaan Marketplace
Published 2022-10-01“…The processed data was obtained from distributing questionnaires by using the google form. …”
Get full text
Article -
2555
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
2556
The Experience of Intimacy and Sexuality in Persons with Mental Illness: A Metasynthesis
Published 2025-01-01“…ATLAS.ti software was used to code the primary and secondary data to generate 83 descriptive themes and 17 composite themes, which were further synthesised to create seven interpretive themes. …”
Get full text
Article -
2557
Green banking practices and customer satisfaction-way to green sustainability
Published 2025-04-01“…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
Get full text
Article -
2558
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
Published 2024-12-01“…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
Get full text
Article -
2559
Internet of Things in Medicine: a Bibliometric Review
Published 2024-07-01“…Data visualization was conducted using VOSviewer software. …”
Get full text
Article -
2560
Bridging Cities and Citizens with Generative AI: Public Readiness and Trust in Urban Planning
Published 2025-07-01“…This study explores whether Saudi residents are ready to engage with AI-driven tools in urban planning, how they prefer to interact with them, and what ethical concerns may arise. Using a quantitative, survey-based approach, the study collected data from 232 Saudi residents using non-probability stratified sampling. …”
Get full text
Article