Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
useddddddddds » usedddddddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
useddddddddds » usedddddddddds (Expand Search)
use » used (Expand Search)
-
2601
Lung-AttNet: An Attention Mechanism-Based CNN Architecture for Lung Cancer Detection With Federated Learning
Published 2025-01-01“…Furthermore, to address medical data sensitivity and privacy concerns, the model is deployed in a Federated Learning (FL) framework, where the global model is trained using weights from local models rather than sharing raw data. …”
Get full text
Article -
2602
Hybrid Transformer-KAN Within Federated Learning Framework: A Novel Machine Learning Approach for Improved Short-Term Weather Forecasting
Published 2025-01-01“…Furthermore, federated learning is applied to the proposed method to exploit the spatio-temporal dependencies while protecting data privacy. As a result, a novel framework of Federated-Transformer-KAN is proposed to collaboratively forecast weather variables in a distributed manner, without sharing data that is collected by the intelligent sensors equipped at each weather station locally. …”
Get full text
Article -
2603
Assessment of breastfeeding self-efficacy in nursing mothers following earthquakes: A case study of the Kahramanmaraş earthquakes in Turkey
Published 2025-06-01“…During the study period, all eligible mothers visiting the polyclinic who met the inclusion criteria were evaluated. Data were collected using a "Descriptive Data Form" and the "Breastfeeding Self-Efficacy Short Form Scale." …”
Get full text
Article -
2604
A cross-sectional study assessing customers’ perception, satisfaction, and attitude toward e-pharmacy services in Saudi Arabia
Published 2024-12-01“…A self-administered online questionnaire was distributed via social media, and convenience sampling was used to collect data from December 2022 to January 2023. …”
Get full text
Article -
2605
Leveraging machine learning in nursing: innovations, challenges, and ethical insights
Published 2025-05-01“…However, key challenges include ethical considerations, such as data privacy, algorithmic bias, and patient autonomy, which necessitate ongoing research and regulatory oversight.ConclusionsML in nursing offers transformative potential across patient care, education, and operational efficiency, which is balanced by significant challenges and ethical considerations. …”
Get full text
Article -
2606
Insights From a User Experience‐Focused Virtual Study on the Feasibility and Challenges of Decentralized Clinical Trials
Published 2025-08-01“…Standard procedures were developed for each DCT element, addressing issues like identity verification and data privacy based on user perspectives. This study provided insights on implementing DCTs in China, identifying areas that need optimization to meet local regulatory and stakeholders' requirements. …”
Get full text
Article -
2607
Large language models aided patient progression documentation according to the ICD standard
Published 2025-01-01“…In previous works, this task has been carried out using structured data, such as, ICD-coded diagnoses, overlooking unstructured textual information in EHRs. …”
Get full text
Article -
2608
Sustainable financial infrastructure and governance: A fuzzy multi-criteria decision-making analysis of open service innovation in unstable economies
Published 2025-06-01“…Regulatory sandboxes and innovation clusters can foster collaboration between banks, fintech companies, and regulators, enhancing trust and compliance. Strict data governance frameworks aligned with global standards are essential to balancing innovation with privacy.…”
Get full text
Article -
2609
Factors Influencing the Implementation and Adoption of Digital Nursing Technologies: Systematic Umbrella Review
Published 2025-07-01“…MethodsWe used an umbrella review methodology to synthesize the evidence on DNTs and the complexities of their implementation. …”
Get full text
Article -
2610
A hybrid explainable federated-based vision transformer framework for breast cancer prediction via risk factors
Published 2025-05-01“…These models are assessed on binary, multi-class, and Breast Imaging Reporting and Data System (BI-RADS) classification tasks using a unique dataset encompassing real-world risk factors. …”
Get full text
Article -
2611
The Human Voice as a Digital Health Solution Leveraging Artificial Intelligence
Published 2025-05-01“…The primary ethical challenge when incorporating voice as a diagnostic tool is that of privacy and security. To eliminate this, encryption methods exist to convert patient-identifiable vocal data into a more secure, private nature. …”
Get full text
Article -
2612
Smart cities and electrical and electronic waste management: a review of challenges and opportunities
Published 2025-05-01“…Key challenges include information security, privacy, interoperability, costs and sustainability. …”
Get full text
Article -
2613
Differentiating atypical parkinsonian syndromes with hyperbolic few-shot contrastive learning
Published 2024-12-01“…However, the models typically require extensively labeled training datasets, which are costly and pose patient privacy risks. To address the issue of limited training datasets, we propose a novel few-shot learning framework for classifying multiple system atrophy parkinsonian (MSA-P) and progressive supranuclear palsy (PSP) within the APS category using fewer data items. …”
Get full text
Article -
2614
Vision-Based Activity Recognition for Unobtrusive Monitoring of the Elderly in Care Settings
Published 2025-05-01“…The system integrates a frame differencing algorithm with adjustable sensitivity parameters and an anomaly detection model tailored to identify deviations from individual behavior patterns without relying on large volumes of labeled data. The system was validated through real-world deployments across multiple care home rooms, demonstrating significant improvements in emergency response times and ensuring resident privacy through anonymized frame differencing views. …”
Get full text
Article -
2615
A Multi-Criteria Decision-Making Framework for Blockchain Technology Adoption in Smart Healthcare
Published 2025-10-01“…Among the three blockchain platforms evaluated, the results indicate that permissioned blockchain technology is the most suitable for the healthcare sector, primarily due to its strengths in regulatory compliance, data privacy, and system integration. The study’s findings would help practitioners identify and choose the best blockchain platform, thus contributing to a transition in the healthcare industry called “Smart Healthcare 5.0”.…”
Get full text
Article -
2616
Optimized Identity Authentication via Channel State Information for Two-Factor User Verification in Information Systems
Published 2025-04-01“…For classification, a kernel support vector machine (SVM) model is trained using a randomized hyperparameter search algorithm. …”
Get full text
Article -
2617
Inpatient satisfaction with nursing care in a backward region: a cross-sectional study from northwestern China
Published 2020-09-01“…Objectives The aim of the study was to examine the level of patient satisfaction with nursing care and identify the factors affecting satisfaction from the inpatient’s perspective in a backward region of China.Design This was a cross-sectional study.Setting The study was conducted at a tertiary hospital located in northwest China.Participants Patients admitted to the ward for at least 48 hours were chosen to participate in the survey.Primary outcome measure The Newcastle Satisfaction with Nursing Care Scale was used. Data were collected from 219 patients.Results The overall inpatient satisfaction with nursing care was 78.15±4.74. …”
Get full text
Article -
2618
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Published 2025-03-01“…As the proliferation of Internet of Things (IoT) devices grows, challenges in security, privacy, and interoperability become increasingly significant. …”
Get full text
Article -
2619
A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things
Published 2022-05-01“…The structure of unbalanced hash tree generates less verification information during device verification and protects privacy. The sparse Merkel tree multiproofs method is used to generate the verification information to implement the batch authentication of devices. …”
Get full text
Article -
2620
A "Quıet" need ın the dısaster of the century: a qualıtatıve study on menstrual hygıene management
Published 2025-02-01“…The interviews were analyzed using content analysis, and themes and sub-themes reflecting the women's experiences were identified. …”
Get full text
Article