Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedddddds » useddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
usedddddds » useddddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
2581
Contrastive Self-Supervised Learning for Sensor-Based Human Activity Recognition: A Review
Published 2024-01-01“…Next, we comprehensively review data augmentation methods for sensor data and commonly used benchmark datasets for activity recognition. …”
Get full text
Article -
2582
HealthPass: a contactless check-in and adaptive access control system for lowering cluster infection risk in public health crisis
Published 2024-12-01“…IntroductionEnsuring effective measures against the spread of the virus is paramount for educational institutions and workplaces as they resume operations amidst the ongoing public health crisis. A touchless and privacy-conscious check-in procedure for visitor assessment is critical to safeguarding venues against potential virus transmission.MethodsIn our study, we developed an interaction-free entry system featuring anonymous visitors who voluntarily provide data. …”
Get full text
Article -
2583
Comparing nurses’ and patients’ perceptions of dignity in burn care: a cross-sectional study
Published 2025-03-01“…Methods This cross-sectional study was conducted on 110 nurse-patient dyads at Amir-Al-Moemenin Burn Hospital, Shiraz, Iran between August 2023 to February 2024. Data were collected using patient dignity questionnaire and analyzed using SPSS software version 23.0, utilizing descriptive tests, Mann-Whitney, Kruskal-Wallis, Wilcoxon, and Spearman’s correlation coefficient. …”
Get full text
Article -
2584
Penerapan Metode E-Service Quality Terhadap Pengukuran Tingkat Kepuasan Penggunaan Marketplace
Published 2022-10-01“…The processed data was obtained from distributing questionnaires by using the google form. …”
Get full text
Article -
2585
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
2586
The Experience of Intimacy and Sexuality in Persons with Mental Illness: A Metasynthesis
Published 2025-01-01“…ATLAS.ti software was used to code the primary and secondary data to generate 83 descriptive themes and 17 composite themes, which were further synthesised to create seven interpretive themes. …”
Get full text
Article -
2587
Assessing user preferences and competitive strategies of Gojek and Grab in ASEAN’s ride-hailing market
Published 2024-12-01“…This study aims to determine the criteria, sub-criteria, and alternatives influencing users in choosing ride-hailing and map Gojek and Grab’s grand strategy to compete in the ASEAN market, especially in Indonesia, Thailand, Vietnam, and Singapore. This research uses a questionnaire to collect data, with 377 Gojek and Grab users as participants. …”
Get full text
Article -
2588
Green banking practices and customer satisfaction-way to green sustainability
Published 2025-04-01“…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
Get full text
Article -
2589
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
Published 2024-12-01“…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
Get full text
Article -
2590
Internet of Things in Medicine: a Bibliometric Review
Published 2024-07-01“…Data visualization was conducted using VOSviewer software. …”
Get full text
Article -
2591
Bridging Cities and Citizens with Generative AI: Public Readiness and Trust in Urban Planning
Published 2025-07-01“…This study explores whether Saudi residents are ready to engage with AI-driven tools in urban planning, how they prefer to interact with them, and what ethical concerns may arise. Using a quantitative, survey-based approach, the study collected data from 232 Saudi residents using non-probability stratified sampling. …”
Get full text
Article -
2592
ChatGPT’s Integration in GCC Higher Education: Bibliometric Analysis of Trends
Published 2024-10-01“…Key findings include the positive impact of ChatGPT on personalized learning and student engagement, as well as the growing focus on ethical concerns such as data privacy and bias. The study also identified strong interdisciplinary connections, with AI research in education intersecting with fields such as computer science, linguistics, and cognitive science. …”
Get full text
Article -
2593
Operation Strategy of Multi-Virtual Power Plants Participating in Joint Electricity–Carbon Market Based on Carbon Emission Theory
Published 2025-05-01“…The study uses data from a VPP dispatch center in Shanxi Province. …”
Get full text
Article -
2594
A comprehensive systematic review of intrusion detection systems: emerging techniques, challenges, and future research directions
Published 2025-05-01“…Blockchain and quantum computing technologies are explored to improve data privacy, resilience, and scalability in decentralized and resource-constrained environments. …”
Get full text
Article -
2595
Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks
Published 2017-01-01“…The proposed protocol includes steps for secure RO and handover management, where mutual authentication, key exchange, perfect forward secrecy, and privacy are supported. The correctness of the proposed protocol is formally analyzed using BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). …”
Get full text
Article -
2596
Enhancing IoT Security in 5G Networks
Published 2024-12-01“…As a result, a robust network infrastructure is required to handle the massive volumes of data collected and transmitted to these devices. …”
Get full text
Article -
2597
How Gender-Sensitive Disaster Management is Addressed in the Turkish Parliament: A Qualitative Study from Feminist Bioethics Perspective
Published 2025-07-01“…The data were systematically retrieved using the keywords “earthquake,” “disaster,” “gender,” “women,” and “health.” …”
Get full text
Article -
2598
Reinforcement Learning With Deep Features: A Dynamic Approach for Intrusion Detection in IoT Networks
Published 2025-01-01“…As IoT devices continue to advance, securing interconnected systems against malicious attacks is essential to ensure data privacy, system integrity, and user safety. …”
Get full text
Article -
2599
Unveiling practical insights of eHealth implementation in Europe: a grey literature review on legal, ethical, financial, and technological (LEFT) considerations
Published 2025-08-01“…Legal barriers include navigating complex regulatory frameworks, interpreting regulations, and concerns about data privacy. Facilitators focus on centralized governance and Europe's role in the global data market. …”
Get full text
Article -
2600
Exploring the role of digital technology for feedback exchange in clinical training: a scoping review
Published 2024-12-01“…The incorporation of virtual reality and artificial intelligence presents promising opportunities for personalized, real-time feedback, but requires vigilant governance to ensure data integrity and privacy. Scoping review protocol https://doi.org/10.1186/s13643-022-02151-8…”
Get full text
Article