Suggested Topics within your search.
Suggested Topics within your search.
-
2481
Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective
Published 2025-06-01“…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
Get full text
Article -
2482
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
Get full text
Article -
2483
Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions
Published 2025-01-01“…Abstract This article discusses Blockchain and Generative AI in healthcare, including their uses, difficulties, and solutions. Blockchain technology improves EHR security, privacy, and interoperability, while smart contracts streamline supply chain management and administrative procedures. …”
Get full text
Article -
2484
The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs):
Published 2025“…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
Get full text
Article -
2485
HIV pre-exposure prophylaxis in Latin America: Public policies, healthcare systems and human rights
Published 2025-06-01“…Achieving universal healthcare and adhering to human rights norms can improve access/use of this essential HIV prevention tool.…”
Get full text
Article -
2486
Foreground-Driven Contrastive Learning for Unsupervised Human Keypoint Detection
Published 2025-01-01“…Recently, unsupervised human keypoint detection has become prevalent due to concerns about data privacy. Most existing methods are based on a reconstruction process that extracts appearance and pose information from transformed image pairs and spatially aligns them to obtain a reconstructed image for detection. …”
Get full text
Article -
2487
B5G Applications and Emerging Services in Smart IoT Environments
Published 2025-04-01“…Lastly, the proposed study focuses on essential technology based software services, such as healthcare, smart grid, tourism, and agricultural services. These services use the advantages of B5G communication networks and cloud computing. …”
Get full text
Article -
2488
Nursing Educators’ Perspectives on the Integration of Artificial Intelligence Into Academic Settings
Published 2025-05-01“…However, barriers such as insufficient training, infrastructural challenges, and ethical concerns related to data privacy, algorithmic bias, and AI-driven decision making were highlighted. …”
Get full text
Article -
2489
Optimized Video Watermarking With Entropy-Aware Block Selection and Modified Hénon-Map Encryption
Published 2024-01-01“…Video watermarking is a technique used to embed information into video content, ensuring privacy protection and preventing data misuse. …”
Get full text
Article -
2490
Exploring health challenges and coping strategies in young patients undergoing maintenance hemodialysis: a qualitative study
Published 2025-07-01“…Methods A qualitative study was conducted through semi-structured interviews with nine MHD patients in a tertiary hospital located in a new first-tier city in China. The interview data were analyzed using Colaizzi’s method with the aid of NVivo 14 (QSR International) software, and all patients’ information was anonymized to protect their privacy. …”
Get full text
Article -
2491
The lived experience of mothers who give birth after induction of labour in hospital settings in Southern Ethiopia: a phenomenological study
Published 2025-07-01“…Data were analyzed thematically using Braun and Clarke’s six-phase method, supported by Open Code Software Version 4.02. …”
Get full text
Article -
2492
Feasibility of digital healthcare in enhancing healthcare access in semiurban areas of Karachi, Pakistan: a qualitative descriptive study
Published 2025-07-01“…Both inductive and deductive approaches were used for data analysis.Measure of outcomes The assessment of feasible demand-side and supply-side factors would be extremely useful in the planning and implementation of a sustainable digital health programme.Results Digital health is an acceptable and practically feasible option and is a potential solution to enhance healthcare access and equity, particularly in semiurban and rural remote areas, where healthcare access is limited. …”
Get full text
Article -
2493
Utilization of artificial intelligence in clinical practice: A systematic review of China's experiences
Published 2025-05-01“…Methods Following PRISMA guidelines, this review conducted a comprehensive search in Web of Science, Scopus, and PubMed. Bias was assessed using the JBI and NOS tools. Data on study design, population, AI technologies, applications, clinical issues, and outcomes were extracted. …”
Get full text
Article -
2494
BESPOKE study protocol: a multicentre, prospective observational study to evaluate the impact of circulating tumour DNA guided therapy on patients with colorectal cancer
Published 2021-09-01“…The secondary endpoints are MRD clearance rate (MRD+ to MRD−) during or after adjuvant chemotherapy, percentage of patients that undergo surgery for oligometastatic recurrence, survival of MRD-negative patients treated with adjuvant chemotherapy versus no adjuvant chemotherapy (active surveillance), overall survival, examine the number of stage I CRC that have recurrent disease detected postsurgery, and patient-reported outcomes.Ethics and dissemination This study has received ethical approval from the Advarra Institutional Review Board (IRB) protocol: Natera—20-041-NCP/3766.01, BESPOKE Study of ctDNA Guided Therapy in Colorectal Cancer (BESPOKE CRC) (Pro00041473) on 10 June 2021. Data protection and privacy regulations will be strictly observed in the capturing, forwarding, processing and storing of patients’ data. …”
Get full text
Article -
2495
Community health fairs as experiential learning: a qualitative exploration of benefits and challenges
Published 2025-04-01“…Prior to the interview, all participants completed a demographic data sheet. All interviews were audio-recorded, transcribed, checked for accuracy, and de-identified, and MAXQDA was used to manage and code the interviews. …”
Get full text
Article -
2496
Experiences and perceptions of respectful maternity care among mothers during childbirth in health facilities of Eastern province of Rwanda: An appreciative inquiry.
Published 2025-01-01“…We employed the thematic analysis and used NVivo 12 to organize codes and develop a codebook.…”
Get full text
Article -
2497
VILLAGE WEBSITE DEVELOPMENT TRAINING AS A DIGITAL-BASED SERVICE OPTIMIZATION IN ALANG-ALANG VILLAGE, TRAGAH, BANGKALAN
Published 2025-06-01“…The training covered website management, data privacy, and integration with local policies, facilitated by trainers and mentors from Universitas Airlangga. …”
Get full text
Article -
2498
Alleviating stressfeeding in the emergency department: Elucidating the tensions induced by workplace lactation space issues
Published 2024-08-01“…Methods Our team used an exploratory qualitative design to investigate lactation‐specific stressors and understand their relationship to individuals’ needs when lactating in EM workplace environments. …”
Get full text
Article -
2499
Factors enhancing operation and maintenance of sanitation facilities for improved service levels in Kampala Schools
Published 2025-02-01“…A cross-sectional study approach and systematic random sampling techniques were used to collect data from 274 schools (selected from 852) using checklists and questionnaires. …”
Get full text
Article -
2500
Wearable Technologies for Health Promotion and Disease Prevention in Older Adults: Systematic Scoping Review and Evidence Map
Published 2025-06-01“…The opportunities presented by wearable devices are countered by multiple challenges, including data availability and reliability, technical limitations, utility and user acceptance, cost, security and privacy, performance gaps, and challenges. …”
Get full text
Article