Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\\"use » \\\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\\"useddds » \\"usedddds (Expand Search)
\\\"use » \\\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\\"useddds » \\"usedddds (Expand Search)
-
2701
Optimized Video Watermarking With Entropy-Aware Block Selection and Modified Hénon-Map Encryption
Published 2024-01-01“…Video watermarking is a technique used to embed information into video content, ensuring privacy protection and preventing data misuse. …”
Get full text
Article -
2702
Exploring health challenges and coping strategies in young patients undergoing maintenance hemodialysis: a qualitative study
Published 2025-07-01“…Methods A qualitative study was conducted through semi-structured interviews with nine MHD patients in a tertiary hospital located in a new first-tier city in China. The interview data were analyzed using Colaizzi’s method with the aid of NVivo 14 (QSR International) software, and all patients’ information was anonymized to protect their privacy. …”
Get full text
Article -
2703
The lived experience of mothers who give birth after induction of labour in hospital settings in Southern Ethiopia: a phenomenological study
Published 2025-07-01“…Data were analyzed thematically using Braun and Clarke’s six-phase method, supported by Open Code Software Version 4.02. …”
Get full text
Article -
2704
Feasibility of digital healthcare in enhancing healthcare access in semiurban areas of Karachi, Pakistan: a qualitative descriptive study
Published 2025-07-01“…Both inductive and deductive approaches were used for data analysis.Measure of outcomes The assessment of feasible demand-side and supply-side factors would be extremely useful in the planning and implementation of a sustainable digital health programme.Results Digital health is an acceptable and practically feasible option and is a potential solution to enhance healthcare access and equity, particularly in semiurban and rural remote areas, where healthcare access is limited. …”
Get full text
Article -
2705
Utilization of artificial intelligence in clinical practice: A systematic review of China's experiences
Published 2025-05-01“…Methods Following PRISMA guidelines, this review conducted a comprehensive search in Web of Science, Scopus, and PubMed. Bias was assessed using the JBI and NOS tools. Data on study design, population, AI technologies, applications, clinical issues, and outcomes were extracted. …”
Get full text
Article -
2706
Special Issue on Contemporary Research Studies in Operations Research, Business Analytics, and Business Intelligence
Published 2025-06-01“…Ethical AI Considerations: Addressing ethical concerns such as data privacy, fairness, and biases in AI systems to ensure responsible use. 6. …”
Get full text
Article -
2707
Cyber Dating Violence: How Is It Perceived in Early Adolescence?
Published 2024-11-01“…Methods: Participants were 466 second- and third-year secondary school students. Data were collected through surveys, and responses were analysed using the Iramuteq program. …”
Get full text
Article -
2708
Experiences and perceptions of respectful maternity care among mothers during childbirth in health facilities of Eastern province of Rwanda: An appreciative inquiry.
Published 2025-01-01“…We employed the thematic analysis and used NVivo 12 to organize codes and develop a codebook.…”
Get full text
Article -
2709
Construction of an ethical competency evaluation system for clinical physicians in China
Published 2025-07-01“…Methods This study was conducted using a literature review, interviews, and the expert Delphi method. …”
Get full text
Article -
2710
VILLAGE WEBSITE DEVELOPMENT TRAINING AS A DIGITAL-BASED SERVICE OPTIMIZATION IN ALANG-ALANG VILLAGE, TRAGAH, BANGKALAN
Published 2025-06-01“…The training covered website management, data privacy, and integration with local policies, facilitated by trainers and mentors from Universitas Airlangga. …”
Get full text
Article -
2711
Blockchain modeled swarm optimized lyapunov smart contract deep reinforced secure tasks offloading in smart home
Published 2025-06-01“…The extensive issues regarding a smart home include offloading computational tasks, data security aspects, privacy issues, authentication of Internet of Things (IoT) devices, and so on. …”
Get full text
Article -
2712
Alleviating stressfeeding in the emergency department: Elucidating the tensions induced by workplace lactation space issues
Published 2024-08-01“…Methods Our team used an exploratory qualitative design to investigate lactation‐specific stressors and understand their relationship to individuals’ needs when lactating in EM workplace environments. …”
Get full text
Article -
2713
Factors enhancing operation and maintenance of sanitation facilities for improved service levels in Kampala Schools
Published 2025-02-01“…A cross-sectional study approach and systematic random sampling techniques were used to collect data from 274 schools (selected from 852) using checklists and questionnaires. …”
Get full text
Article -
2714
Wearable Technologies for Health Promotion and Disease Prevention in Older Adults: Systematic Scoping Review and Evidence Map
Published 2025-06-01“…The opportunities presented by wearable devices are countered by multiple challenges, including data availability and reliability, technical limitations, utility and user acceptance, cost, security and privacy, performance gaps, and challenges. …”
Get full text
Article -
2715
Bridging gaps in medical education for digital healthcare: A Singapore case study
Published 2025-07-01“…Data were collected from September 2020 to February 2023 until thematic saturation was achieved, and analysed using qualitative thematic analysis. …”
Get full text
Article -
2716
Assessment of HPV screening modalities within primary care: a systematic review
Published 2025-04-01“…This can possibly reduce the overall disease burden.MethodsA search strategy was conducted across multiple databases, including PubMed, Cochrane Library, Scopus, and Embase. Data extraction was performed using a standardized form to collect detailed information on study characteristics, participant demographics, and various outcomes. …”
Get full text
Article -
2717
PIRO: A web-based search platform for pathology reports, leveraging large language models to generate discrete searchable insights
Published 2025-04-01“…To address this need, we developed PIRO (Pathology Information Retrieval Optimizer), a web-based platform enabling efficient text searches of diagnostic archives. Built using FastAPI, Angular, and Apache Solr, PIRO supports both basic and advanced search functionalities, faceted filtering, and data extraction, while ensuring compliance with institutional privacy protocols. …”
Get full text
Article -
2718
Preserving patient dignity in critical care units: A qualitative content analysis
Published 2025-04-01“…Methods & Materials: This qualitative study was conducted on 20 patients selected from the Critical Care Units of Imam Khomeini Hospital, Tehran, Iran, through purposeful sampling. Data were collected via semi-structured interviews and were analyzed using Graneheim and Lundman’s conventional content analysis method. …”
Get full text
Article -
2719
Virtual Reality and User Experience: Current Trends and Future Challenges
Published 2025-01-01“…Future research should focus on refining interaction paradigms, improving accessibility, and developing ethical frameworks that respect data privacy and protect the user from cybersickness and the psychological effects of prolonged virtual reality exposure.…”
Get full text
Article -
2720
Análise estratégica sobre o emprego de federação de identidade no canal de Internet das organizações Identity federation on organizational internet channel strategic analysis
Published 2007-08-01“…<br>Identity Federation, as a standard of security and identity data privacy intermediation, seems to be a real market solution and has been proposed by three alliances or groups: Shibboleth, WS-Federation and Liberty Alliance. …”
Get full text
Article