Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
-
2261
Human Dignity in Genetics and Reproductive Health in the Digital Age
Published 2025-07-01“…The study’s significance lies in the view that technology determines the trajectory of the rules of engagement in the comity of humans and even medical practice with the imperative of prioritising human dignity in the development and use of genetic and reproductive health technologies. …”
Get full text
Article -
2262
A novel half-complementary cipher for in-situ secure computing-in-memory
Published 2025-04-01“…The advent of the new AI era has led to an increase in the number of intelligent terminals in use and the generation of a vast amount of data, driving the development of novel AI accelerator techniques. …”
Get full text
Article -
2263
Integrating Large Language Models into Robotic Autonomy: A Review of Motion, Voice, and Training Pipelines
Published 2025-07-01“…We also highlight the use of physics-informed neural networks (PINNs) to model object deformation and support precision in contact-rich manipulation tasks. …”
Get full text
Article -
2264
Implementation of NGS and SNP microarrays in routine forensic practice: opportunities and barriers
Published 2025-05-01“…Conversely, SNP microarrays offer a cost-effective solution for extended kinship testing, Forensic Investigative Genetic Genealogy (FIGG), and phenotypic prediction, though they are less effective with low-quality samples and DNA mixtures. Ethical, legal, and privacy concerns, particularly surrounding the use of Forensic DNA Phenotyping (FDP) and consumer genetic data in FIGG, further complicate their integration into forensic workflows. …”
Get full text
Article -
2265
Decentralized electrochemical biosensors for biomedical applications: From lab to home
Published 2025-01-01“…However, potential risks such as data security vulnerabilities, privacy concerns, and regulatory challenges must be addressed to ensure safe and ethical deployment of these technologies. …”
Get full text
Article -
2266
Comprehensive Review and Future Research Directions on ICT Standardisation
Published 2024-11-01“…Standardisation also solves problems, such as the use of mobile devices, which requires travel abroad when out of range. …”
Get full text
Article -
2267
Ethical and Safety Challenges of Implantable Brain-Computer Interface
Published 2025-04-01“…The study of brain-computer interfaces (BCIs) holds immense potential across various fields, particularly in Human-Robot Interaction, where invasive BCIs offer precise and direct communication between the human brain and robotic devices. However, the use of invasive BCIs raises significant ethical, safety, and security concerns that must be addressed to ensure their responsible deployment. …”
Get full text
Article -
2268
Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure
Published 2024-11-01“…This interconnection raises concerns about security, privacy, and the expanding risk of cyber-attacks within the electric vehicle landscape. …”
Get full text
Article -
2269
Beijing’s urbanization reflected in apartment layouts: a computer vision and isovist analysis (1970–2020)
Published 2025-05-01“…Our findings show a trend in the isovist intensity of living rooms, dining rooms, and kitchens, indicative of shifts toward privacy and mixed-use spaces, shaped by household occupancy patterns. …”
Get full text
Article -
2270
Detecting Learning Behavior in Programming Assignments by Analyzing Versioned Repositories
Published 2024-01-01“…The Polivr ecosystem comprises three key modules: Polivr Anonymiser, which ensures data privacy by anonymising student identities; Polivr Core, which mines learning metrics from Git repositories; and Polivr Web Viewer, which transforms the raw metrics into insightful visualisations for educators. …”
Get full text
Article -
2271
Developing an Ontology to Enhance Semantic Interoperability in IoT Environment
Published 2025-05-01“…This study proposes the development of an enhanced ontology that integrates different ontologies in the IoT domain, including key aspects such as interoperability, security, privacy, energy efficiency, and ethics. A formal methodology for ontology design and construction was used in four phases: ontology requirements, design, construction, and evaluation. …”
Get full text
Article -
2272
Quality of Breast Cancer Information on the Internet by African Organizations: An Appraisal
Published 2017-01-01“…The identified websites were assessed using European Commission (EC) quality criteria for health-related websites, which comprises different assessment areas including, completeness, transparency and honesty, authority, privacy and data protection, updating of information, accountability, and accessibility. …”
Get full text
Article -
2273
Perspectives of stakeholders on enhancing access to self-injectable contraception in rural South Sudan
Published 2025-03-01“…Abstract Background Although self-injectable subcutaneous depot medroxyprogesterone acetate (DMPA-SC) has demonstrated promise, there are significant barriers in promoting initiation and continued use in low-resource settings. This study sought to understand the perspectives of stakeholders on promotion of self-injectable contraception use in rural South Sudan. …”
Get full text
Article -
2274
Making temporary homes
Published 2024-06-01“…The interviews were analysed with Interpretative Phenomenological Analysis, and the visual data (photos made by the interviewees and sometimes the researcher, and drawings made by the researcher) was used to place the content of the interviews in a physical context. …”
Get full text
Article -
2275
Web 3.0: The future of the decentralized Internet
Published 2023-01-01“…Decentralization plays an important role in transferring power from providers to users, protecting privacy and regaining control over their information and data. …”
Get full text
Article -
2276
Comparing remote and in-person interpretation experiences for clinicians and Spanish-speaking patients with limited English proficiency: a mixed methods study
Published 2025-05-01“…In regression analyses of patient experience survey data, no evidence of an association between the interpreter method used and patient-reported experiences of clinician communication or interpreter support was found. …”
Get full text
Article -
2277
A qualitative study on the unmet sexual needs of older women
Published 2025-05-01“…Data were analyzed using the Graneheim and Lundman approach. …”
Get full text
Article -
2278
Federated learning based reference evapotranspiration estimation for distributed crop fields.
Published 2025-01-01“…The study intends to propose ETo estimation of multiple locations with distinct weather conditions using a federated learning approach. Traditional centralized approaches require aggregating all data in one place, which can be problematic due to privacy concerns and data transfer limitations. …”
Get full text
Article -
2279
Development of the ethical behavior scale in nursing
Published 2024-11-01“…Qualitative data was obtained through in-depth interviews. Quantitative data were collected using the Ethical Behavior Scale in Nursing (EBSN). …”
Get full text
Article -
2280
A STUDY OF PEOPLE’S PERCEPTION OF ARTIFICIAL INTELLIGENCE IN FINANCE AND SOCIETY
Published 2025-07-01“…This paper investigates how people perceive artificial intelligence (AI), using both original survey data and insights from recent academic and policy literature. …”
Get full text
Article