Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
1361
Secure and intelligent 5G-enabled remote patient monitoring using ANN and Choquet integral fuzzy VIKOR
Published 2025-03-01Get full text
Article -
1362
AI optimization algorithms enhance higher education management and personalized teaching through empirical analysis
Published 2025-03-01“…The research also identifies challenges and limitations, including data privacy issues, algorithmic bias, and the need for human-AI interaction. …”
Get full text
Article -
1363
A Denoising Diffusion Probabilistic Model-Based Human Respiration Monitoring Method Using a UWB Radar
Published 2025-01-01“…This paper proposes a denoising diffusion probabilistic model (DDPM)-based human respiration monitoring method using an ultra-wideband (UWB) radar, where the localization calculation of the target based on the respiration-motion energy ratio, maximum ratio combining (MRC), and principal component analysis (PCA) are included for data enhancement. …”
Get full text
Article -
1364
Using telemedicine to support care for people with type 2 diabetes mellitus: a qualitative analysis of patients’ perspectives
Published 2019-10-01“…Four themes emerged from the analysis: (1) generational difference; (2) independence and convenience, (3) sharing of health data and privacy and (4) concerns and challenges. …”
Get full text
Article -
1365
-
1366
Metaheuristic-Based Cepstral Sensing Technique for Prolonging Network Lifetime and Mitigating Primary User Emulation Attacks in Cognitive Radio Sensor Network
Published 2025-01-01“…Extensive simulations are used to analyze the proposed algorithm, incorporating important performance parameters including error probability, energy efficiency, residual energy, data gathering efficiency, network longevity, and throughput. …”
Get full text
Article -
1367
Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users
Published 2025-06-01“…The proliferation of the Internet of Things (IoT) has led to an abundance of data streams and real-time dashboards in domains such as smart cities, healthcare, manufacturing, and agriculture. …”
Get full text
Article -
1368
Synthetic Patient–Physician Conversations Simulated by Large Language Models: A Multi-Dimensional Evaluation
Published 2025-07-01“…Background: Data accessibility remains a significant barrier in healthcare AI due to privacy constraints and logistical challenges. …”
Get full text
Article -
1369
Women’s hospital birth experiences in Harar, eastern Ethiopia: a qualitative study using Roy’s Adaptation Model
Published 2022-07-01“…Interviews were audio-recorded and transcribed on the spot and the interviews were analysed using a deductive content analysis approach. Data were analysed using the four components of Roy’s Adaptation Model (RAM) as a guiding framework of women’s experiences: physiological, self-concept, role and function, and interdependence.Results Various behaviours were identified: under physiological mode, common behaviours identified included labour pain, fatigue, surgical site pain and anaesthesia-related complication. …”
Get full text
Article -
1370
Industry 4.0 in commercial airlines: a bibliometric analysis
Published 2025-08-01“…Commercial airlines face numerous challenges related to operational inefficiencies, poor maintenance practices, overcrowding of airports, supply chain complexity, lack of seamless customer experience, safety issues, data privacy and security issues, increasing fuel prices, and sustainability issues; however, Industry 4.0 technologies are widely regarded as a transformative solution, offering advanced tools and methodologies to address these challenges effectively. …”
Get full text
Article -
1371
Bootstrapping BI-RADS classification using large language models and transformers in breast magnetic resonance imaging reports
Published 2025-04-01“…Specifically, missing category information (MCI) that is absent in the free-text reports is supplemented by assigning default values to the missing categories in the structured reports. To ensure data privacy, a locally deployed Qwen-Chat model is employed. …”
Get full text
Article -
1372
Management of the Chain of Custody of Digital Evidence Using Blockchain and Self-Sovereign Identities: A Systematic Literature Review
Published 2025-01-01“…While state-of-the-art reviews identify various aspects, it is necessary to include the use of Self-Sovereign Identity (SSI) systems within the scope of research. …”
Get full text
Article -
1373
A Survey on Anti-Money Laundering Techniques in Blockchain Systems
Published 2025-04-01“…Furthermore, this study discusses the practical applications of these techniques and reviews commonly used datasets that support AML research. Looking ahead, the advancement of AML technologies in blockchain systems necessitates progress in several critical areas: the construction of AML datasets capable of addressing data imbalance and annotation uncertainty, development of trusted AML algorithms, design of detection mechanisms for covert financial activities, and formulation of privacy-preserving yet regulation-compliant AML solutions. …”
Get full text
Article -
1374
Assessment of the Quality of Smartphone-Based Applications and Games for Teaching Medical Terminology Using the Mobile Application Rating Scale (MARS)
Published 2024-10-01“…The same checklist was used for data extraction. The quality of apps was measured using the Mobile App Rating Scale (MARS). …”
Get full text
Article -
1375
"I don't see a reason why we should be hidden from view": Views of a convenience sample of people living with HIV on sharing HIV status data in routinely collected health and care...
Published 2025-01-01“…The overarching theme was around trust, both the loss of trust experienced by participants due to previous negative or discriminatory experiences, and the need to slowly build trust in data-sharing initiatives. Further themes showed that participants were supportive of data being used for research and health care improvements, but needed a guarantee that their privacy would be protected. …”
Get full text
Article -
1376
-
1377
Advanced intrusion detection technique (AIDT) for secure communication among devices in internet of medical things (IoMT)
Published 2025-05-01“…Considering the aforementioned, this study suggests an advanced intrusion detection technology (AIDT) to guarantee safe data exchange amongst IoMT devices. The model uses a probabilistic neural network (PNN) to classify whether intrusions are present or not, and particle swarm optimization (PSO) for feature extraction. …”
Get full text
Article -
1378
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Published 2025-01-01“…Detection methods currently face challenges due to the complex and enormous amounts of data inherent in IoV systems. This paper presents a new approach toward improving DDoS attack detection by using the Gini index in feature selection and Federated Learning during model training. …”
Get full text
Article -
1379
-
1380
ReACT_OCRS: An AI-Driven Anonymous Online Reporting System Using Synergized Reasoning and Acting in Language Models
Published 2025-01-01“…Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response times. …”
Get full text
Article