Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
usedddddddds » useddddddddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
usedddddddds » useddddddddds (Expand Search)
use » used (Expand Search)
-
2421
Technology-enabled CONTACT tracing in care homes in the COVID-19 pandemic: the CONTACT non-randomised mixed-methods feasibility study
Published 2025-05-01“…Quantitative data were analysed using descriptive statistical methods, and qualitative data were thematically analysed using normalisation process theory. …”
Get full text
Article -
2422
BERT ensemble based MBR framework for android malware detection
Published 2025-04-01“…By leveraging their strengths, the MBR model introduces significant innovation. By using ensemble methods on static data, the MBR framework not only provides a reliable malware detection solution but also presents a novel strategy. …”
Get full text
Article -
2423
CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity
Published 2025-01-01“…Federated learning has recently gained significant attention as a method for building machine learning models due to its ability to preserve data privacy while delivering improved performance. …”
Get full text
Article -
2424
Emergency department care experiences among 2SLGBTQQIA+ patients: a mixed methods study
Published 2025-05-01“…Participants were recruited from the Kingston Health Sciences Centre’s ED, Urgent Care Centre, and at community-based organisations. Quantitative data were analysed using chi-squared tests, while qualitative data underwent thematic analysis. …”
Get full text
Article -
2425
Developing a Life Story Intervention for Older Adults With Dementia or at Risk of Delirium Who Were Hospitalized: Multistage, Stakeholder-Engaged Co-Design Study
Published 2024-09-01“…We used content analysis to analyze qualitative data and descriptive statistics to summarize quantitative data. …”
Get full text
Article -
2426
Modern Trends in the Digitalization of Higher Physical Education in China
Published 2025-03-01“…Additionally, the study emphasizes the need for educator training and professional development, as many physical education teachers lack digital literacy or are resistant to new technologies. Data privacy and security issues are another significant challenge, particularly with the collection and use of personal and health data from wearable devices and online platforms. …”
Get full text
Article -
2427
Harnessing artificial intelligence of things for cardiac sensing: current advances and network-based perspectives
Published 2025-07-01“…Looking ahead, we anticipate that this field will increasingly prioritize data privacy protection, particularly in the era of large language models, to address emerging challenges and ensure sustainable growth. …”
Get full text
Article -
2428
Evaluation of ERP softwares with fuzzy AHP integrated TODIM method
Published 2018-10-01“…Furthermore,the company's data privacy policy has been incorporated into the solutionprocedure with the fuzzy logic, which takes into account these drawbacks.Besides, it has been ensured that the cost criterion is integrated in adetailed manner. …”
Get full text
Article -
2429
Adoption of internet of things in residential smart homes: A structural equation modeling approach
Published 2025-06-01“…This study explores the behavioral factors influencing IoT adoption in residential smart buildings. Using a descriptive-survey method, data were collected from 97 companies involved in the smart home sector through structured questionnaires. …”
Get full text
Article -
2430
Patient and clinician perceptions of telehealth in musculoskeletal physiotherapy services - A systematic review of the evidence-base.
Published 2025-03-01“…Methodological quality was evaluated using the CASP, JBI and QuADS tools. Findings were evaluated via consensus and showed clear patient and clinician satisfaction with positive themes of reduced travel, reduced physical burden, flexibility/accessibility and negative themes of reduced physical contact, computer literacy and privacy infringements. …”
Get full text
Article -
2431
Leveraging Blockchain for Transparency: A Study on Organ Supply Chains and Transplant Processes
Published 2025-01-01“…Structural equation modelling was used to test and validate the model. <i>Results</i>: The study’s findings indicate that social influence, trust, facilitating conditions, government support, performance expectancy, data security and privacy, and technology affinity positively impact blockchain adoption in organ transplants. …”
Get full text
Article -
2432
Enhancing reliability and security in cloud-based telesurgery systems leveraging swarm-evoked distributed federated learning framework to mitigate multiple attacks
Published 2025-07-01“…To address these issues, a distributed framework based on federated learning is proposed, integrating Optimized Gated Transformer Networks (OGTN) with layered chaotic encryption schemes to mitigate multiple unknown cyberattacks while preserving data privacy and integrity. The framework was implemented using TensorFlow Federated Learning Libraries (FLL) and evaluated on the UNSW-NB15 dataset. …”
Get full text
Article -
2433
Digital Transformation in Higher Education: Enhancing Support Services Through Mobile Apps
Published 2025-06-01“…In contrast, other elements such as ease of use, competence, accessibility, and data privacy were not deemed significant concerns by the students. …”
Get full text
Article -
2434
Advanced Monte Carlo for Acquisition Sampling in Bayesian Optimization
Published 2025-01-01“…Bayesian optimization (BO) has proved to be a suitable optimization method in these situations thanks to its sample efficiency and principled way of learning from previous data, but it typically requires that experiments are sequentially performed. …”
Get full text
Article -
2435
Comparative Performance Evaluation of Real-Time Webcam and HOG-Based Facial Recognition Systems for Children's Screen Time Management
Published 2025-06-01“…It highlights critical security and privacy considerations, particularly the responsible handling of facial data in environments accessible to minors. …”
Get full text
Article -
2436
A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service
Published 2015-09-01“…Since existing studies mainly focus on simple statistical analysis of the K-ISMS assessment results, analysis on the cause of certification assessment fault based on past data analysis is insufficient. As a method of managing the certification inspection quality, in this paper, we analyze the association among the fault items of the K-ISMS certification assessment results using association rule mining which involves identifying an association rule among items in the database.…”
Get full text
Article -
2437
A Fully Distributed Power Flow Algorithm with Exponentially Fast Convergence
Published 2019-10-01“…In order to meet the data privacy requirements for interconnected power system power flow calculations, a fully distributed power flow algorithm is proposed. …”
Get full text
Article -
2438
A Multi-Criteria Decision-Making Framework for Evaluating Emerging Digital Technologies in Supply Chain Optimization
Published 2025-07-01“…Ten critical attributes covering technical, economic, and environmental dimensions were identified through expert consultation and a review of relevant literature, including scalability, integration ease, performance benefit, costeffectiveness, environmental and social sustainability, data privacy, and supply chain resilience. The evaluation framework combines the Entropy method for determining objective attribute weights with the TOPSIS method for ranking alternatives. …”
Get full text
Article -
2439
Performance Evaluation of Decentralized Federated Learning: Impact of Fully and K-Connected Topologies, Heterogeneous Computing Resources, and Communication Bandwidth
Published 2025-01-01“…Decentralized federated learning (DFL) enables collaborative model training across distributed devices while preserving data privacy. Despite this, the performance of DFL in real-world scenarios, characterized by varying network topologies, heterogeneous client resources, and communication bandwidth, remains underexplored. …”
Get full text
Article -
2440
A Systematic Literature Review on Sustainability Integration and Marketing Intelligence in the Era of Artificial Intelligence
Published 2024-12-01“…The conversation delves into the difficulties and moral aspects involved in using AI in marketing, such as issues related to data privacy, algorithmic bias, and the importance of a strategic framework that focuses on sustainable development goals. …”
Get full text
Article