Suggested Topics within your search.
Suggested Topics within your search.
-
1941
Who are MaaS avoiders, wanderers or enthusiasts and what drives their intentions to adopt MaaS?
Published 2025-12-01“…This study integrates the Unified Theory of Technology Acceptance and Use (UTAUT) and Status Quo Bias (SQB) theories and draws on survey data covering nine dimensions: performance expectancy, effort expectancy, social influence, individual innovation, transition costs, sunk costs, inertia and resistance to use. …”
Get full text
Article -
1942
Arduino – Based Electronic Voting Machine
Published 2019-01-01“…During the construction of any electronic voting system, several aspects must consider, the most important is the privacy of voters and the accuracy of the voting process in addition to maintaining the security of data, this research provides a safe and reliable voting system. …”
Get full text
Article -
1943
Measuring large-scale social networks with high resolution.
Published 2014-01-01“…Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1000 individuals, using state-of-the-art smartphones as social sensors. …”
Get full text
Article -
1944
Artificial intelligence in early warning systems for infectious disease surveillance: a systematic review
Published 2025-06-01“…After screening 600 records and removing duplicates and non-relevant articles, the search yielded 67 relevant studies for review.ResultsKey findings reveal the prevalent use of machine learning (ML), deep learning (DL), and natural language processing (NLP), which often integrate diverse data sources (e.g., epidemiological, web, climate, wastewater). …”
Get full text
Article -
1945
A Fully Distributed Power Flow Algorithm with Exponentially Fast Convergence
Published 2019-10-01“…In order to meet the data privacy requirements for interconnected power system power flow calculations, a fully distributed power flow algorithm is proposed. …”
Get full text
Article -
1946
Federated Learning Enhanced MLP–LSTM Modeling in an Integrated Deep Learning Pipeline for Stock Market Prediction
Published 2024-10-01“…A global model is created and updated through repeated training and totaling of parameters while preserving privacy of the data going to each node. In the performance evaluation, quantitative measures like Root-Mean-Square Error (RMSE), and accuracy are seven used. …”
Get full text
Article -
1947
Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care
Published 2013-12-01“…Although RFID-based procedure is more efficient than traditional process, patient's information may be attacked (or stolen) during the data transmission period. This will cause inappropriate medication use and medical errors. …”
Get full text
Article -
1948
Social media integration in marketing education: A way forward to improve engagement and learning outcomes
Published 2025-03-01“…The findings indicate that social media significantly increased student engagement and knowledge retention. Perceived ease of use, institutional support, and effectiveness in meeting instructional objectives were most significant to adoption. …”
Get full text
Article -
1949
Application of blockchain in urban rail traffic edge computing network
Published 2021-10-01“…Multi-access edge computing (MEC) can provide high-quality service capabilities for computing-intensive services and delay-sensitive services in urban rail traffic.However, many edge facilities in rail traffic edge computing network are exposed to an open environment, and their privacy protection and transmission security are facing great challenges.Blockchain has functional characteristics such as distributed ledger, consensus mechanism, smart contract, and decentralized application.Therefore, the use of blockchain can build a systematic security protection mechanism for the distributed rail traffic edge computing network to ensure network security and data security and realize high-quality urban rail traffic services.Firstly, the basic concept of the blockchain and the urban rail traffic edge computing network architecture were introduced.Then, the structure and application content of the rail traffic edge computing network security protection mechanism integrated with the blockchain was discussed in detail.Finally, the open research issues and challenges of the security protection mechanism were analyzed.…”
Get full text
Article -
1950
Comprehensive synthesis of mHealth interventions in psychiatry: insights from systematic, scoping, narrative reviews and content analysis
Published 2024-10-01“…Conclusion: Despite positive outcomes, challenges such as data privacy, user engagement and healthcare integration persist. …”
Get full text
Article -
1951
Co-similar malware infection patterns as a predictor of future risk.
Published 2021-01-01“…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
Get full text
Article -
1952
Advancing Remote Monitoring for Patients With Alzheimer Disease and Related Dementias: Systematic Review
Published 2025-05-01“…The studies revealed a strong focus on various remote monitoring methods for capturing behavioral, physiological, and environmental data yet showed a gap in evaluating these methods for patient and caregiver needs, privacy, and usability. …”
Get full text
Article -
1953
Barriers to and enhancement of the utilization of digital mental health interventions in low-resource settings: Perceptions of young people in Uganda
Published 2025-02-01“…A thematic approach was used to interpret the results. Results Three themes were identified from the data including perceptions of using DMH services, the perceived barriers to utilization, and suggestions for enhancement of DMH for YP in low-resource settings. …”
Get full text
Article -
1954
The Transformative Impact of Artificial Intelligence in Healthcare: Innovations, applications, and future prospects
Published 2024-01-01“…At the same time, the application of AI in healthcare poses a number of challenges, such as data privacy, algorithmic bias, and ethics. This study also explores the role of AI in global health, the need for policies and regulations, and the long-term impact of AI on future healthcare systems. …”
Get full text
Article -
1955
Investigating the Key Trends in Applying Artificial Intelligence to Health Technologies: A Scoping Review.
Published 2025-01-01“…<h4>Background</h4>The use of Artificial Intelligence (AI) is exponentially rising in the healthcare sector. …”
Get full text
Article -
1956
Factors leading to the adoption of blockchain technology in financial reporting
Published 2025-08-01“…This research analyzed accounting professionals’ awareness of information and communication technologies (ICT), data security, data privacy, and training among accounting professionals. …”
Get full text
Article -
1957
Internet of Medical Things Integrating IoT with Healthcare for Remote Monitoring and Diagnosis
Published 2025-01-01“…By leveraging edge computing, AI, and blockchain-based security, the framework improves data privacy, reduces latency, and increases energy efficiency. …”
Get full text
Article -
1958
Exploring IoT integration challenges: Causal relationships and strategic implications for business models
Published 2025-12-01“…Thirteen crucial components were analysed, influencing interoperability challenges, data security and privacy issues, standardized issues, high initial investment, scaling obstacles, and adverse environmental effects. …”
Get full text
Article -
1959
A Structured and Methodological Review on Multi-View Human Activity Recognition for Ambient Assisted Living
Published 2025-06-01“…Key challenges such as data remediation, privacy, and generalization are discussed, alongside potential solutions such as sensor fusion and advanced learning strategies. …”
Get full text
Article -
1960
Quantitative and qualitative analysis of balcony usage and its impact on the landscape of the neighborhood
Published 2024-07-01“…This research is of qualitative-interpretive type, research strategy, case study and data collection was done by field method. In this research, 20 medium-rise residential buildings built in the 90s, consisting of 100 balconies, were selected in the Darya neighborhood of District 2, Tehran. how they were used by users was analyzed. …”
Get full text
Article