Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
-
1321
Health Care Workers’ Perspectives on the Barriers and Facilitators to Digital Health Technology Use to Support Symptomatic Cancer Diagnosis in Southern Africa: Qualitative Study
Published 2025-07-01“…We used the framework method to analyze the data and developed themes that encompassed patterns and meaning in the data to answer the research question. …”
Get full text
Article -
1322
Intrusion Detection Using Machine Learning for Risk Mitigation in IoT-Enabled Smart Irrigation in Smart Farming
Published 2022-01-01“…In this framework, the NSL KDD data set is used as an input data set. In the preprocessing of the NSL-KDD data set, first all symbolic features are converted to numeric features. …”
Get full text
Article -
1323
Hypothetical Preferences and Concerns for Long-Acting Injectable HIV PrEP Use Among Female Barmaids in Ubungo, Dar Es Salaam, Tanzania
Published 2025-08-01“…Interviews were conducted using a guide with semi-structured questions. We adopted an inductive approach for analyzing data.Findings: The majority of PrEP non-users expressed no preference for any form of PrEP, while oral PrEP-users preferred LAI PrEP. …”
Get full text
Article -
1324
Fall Detection Using Federated Lightweight CNN Models: A Comparison of Decentralized vs. Centralized Learning
Published 2025-07-01“…The models were trained using three random seeds to ensure result robustness and stability across varying data partitions. …”
Get full text
Article -
1325
The relevance of implementing the employee digital profile as an element of the employer’s HR policy
Published 2025-06-01“…At the same time, the lack of normative methodologies for the creation and operation of employee digital profiles and comprehensive scientific research predetermine increasing risks of violation of personal data of employees, privacy of employees, as well as discrimination in making legally significant decisions. …”
Get full text
Article -
1326
xFedCAV: Cyberattacks on Leader and Followers in Automated Vehicles With Cooperative Platoons Using Federated Agents
Published 2025-01-01“…Our framework leverages federated learning to enhance privacy and security, using Shapley Additive exPlanations (SHAP) for interpretable detection. …”
Get full text
Article -
1327
Analysis of Service Quality on the Starbucks Indonesia Application Using E-SERVQUAL and Importance Performance Analysis (IPA)
Published 2025-08-01“…This study aims to evaluate the app’s service quality using E-ServQual method, which assesses seven dimensions: efficiency, reliability, fulfillment, privacy, responsiveness, compensation, and contact. …”
Get full text
Article -
1328
Tabular transformer generative adversarial network for heterogeneous distribution in healthcare
Published 2025-03-01“…However, privacy concerns have hindered their widespread use. …”
Get full text
Article -
1329
Crypto management: a novel organizational management model based on blockchain
Published 2022-06-01“…Aim to deal with the problem of data, trust and timeliness asymmetry faced by modern organizational management from the root, a novel organizational management model towards Web 3.0 namely crypto management was proposed.It was enabled by blockchain technology and smart contracts based on it, supported by the federated data, organized in the form of DAO (decentralized autonomous organization), and driven by the incentive mechanism with NFT (non-fungible token) as the core.The primary goal of crypto management was to realize trustable, reliable and usable real-time management decision-making under the premise of data security and privacy protection.The framework of crypto management was formulated, its core components and implementation mode were discussed, and its operation process using the example of personnel performance management was also introduced.Towards the end, the potential future works in this emerging new area were discussed.…”
Get full text
Article -
1330
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map
Published 2022-01-01“…To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. …”
Get full text
Article -
1331
Problem of Harmonization of Legal Norms with the Needs of Police Investigations by Using High-Tech Instruments for Searching Information
Published 2021-03-01“…The problem of harmonization of legal norms with the needs of police investigations with the use of high-tech data search tools has been analyzed. …”
Get full text
Article -
1332
Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning
Published 2025-03-01“…These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads. However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. …”
Get full text
Article -
1333
Using Inertial Measurement Units and Machine Learning to Classify Body Positions of Adults in a Hospital Bed
Published 2025-01-01“…Movement data were captured using five IMU Xsens DOTs attached to the forehead, wrists and ankles. …”
Get full text
Article -
1334
Assessing the practicality of using freely available AI-based GPT tools for coach learning and athlete development
Published 2025-07-01“…Despite the strengths, there were also associated risks and pitfalls when using this process such as the strength and robustness of the applicable statistical outcomes and tensions between keeping the input data within the context and ensuring that the context did not breach privacy issues. …”
Get full text
Article -
1335
Movement Direction Classification Using Low-Resolution ToF Sensor and LSTM-Based Neural Network
Published 2025-06-01Get full text
Article -
1336
Value of Artificial Intelligence for Enhancing Suspicion of Cardiac Amyloidosis Using Electrocardiography and Echocardiography: A Narrative Review
Published 2025-04-01“…Thirteen studies met inclusion criteria with sample sizes ranging from 50 to 2451 patients. Four studies used ECG data, 8 used echocardiography data, and 1 used both. …”
Get full text
Article -
1337
Public Health Using Social Network Analysis During the COVID-19 Era: A Systematic Review
Published 2024-11-01“…We highlight the ethical concerns related to the use of social media data, such as privacy and consent, underscoring the potential of integrating ethical SNA with more inclusive, human-centered practices to enhance the effectiveness and community buy-in of emerging computational public health efforts.…”
Get full text
Article -
1338
Quantum proof biometric authentication framework using binary lattices and homomorphic encryption for secure cancelable templates
Published 2025-06-01“…The genuine and impostor distributions in the extensive data sets were used to validate the above authentication thresholds that were chosen through empirical testing. …”
Get full text
Article -
1339
The Impact of Artificial Intelligence on Personalized Learning in Higher Education: A Systematic Review
Published 2025-03-01“…The risk of bias was assessed using a standardized ranking system. This systematic review follows the PRISMA guidelines to ensure transparency in study selection, data extraction, and synthesis. …”
Get full text
Article -
1340
Advanced Machine Learning and Deep Learning Approaches for Estimating the Remaining Life of EV Batteries—A Review
Published 2025-01-01“…This systematic review presents a critical analysis of advanced machine learning (ML) and deep learning (DL) approaches for predicting the remaining useful life (RUL) of electric vehicle (EV) batteries. …”
Get full text
Article