Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
1381
Determinants of behavioral intentions and their impact on student performance in the use of AI technology in higher education in Indonesia: A SEM-PLS analysis based on TPB, UTAUT,...
Published 2025-01-01“…The findings reveal that Attitude toward Behavior and Technology Anxiety significantly influence Student Performance through mediating variables such as Performance Expectancy, Facilitating Conditions, and Behavioral Intention to Use. Notably, perceived risk negatively affects behavioral intention and academic outcomes, suggesting high student awareness of data privacy, technological dependency, and accuracy uncertainty. …”
Get full text
Article -
1382
-
1383
Enhancing unmanned aerial vehicle and smart grid communication security using a ConvLSTM model for intrusion detection
Published 2024-12-01“…The emergence of small-drone technology has revolutionized the way we use drones. Small drones leverage the Internet of Things (IoT) to deliver location-based navigation services, making them versatile tools for various applications. …”
Get full text
Article -
1384
Using malware for software-defined networking–based smart home security management through a taint checking approach
Published 2016-08-01“…Accordingly, this article proposes a taint propagation analysis model incorporating a weighted spanning tree analysis scheme for tracking data with taint marking using several taint checking tools with an open software-defined networking architecture for solving the dynamic taint propagation analysis problem. …”
Get full text
Article -
1385
Using AI chatbots (e.g., CHATGPT) in seeking health-related information online: The case of a common ailment
Published 2025-03-01“…Using structural equation modeling on survey data collected from 231 respondents in the US, our study examines the hypotheses linking hedonic and utilitarian values, user satisfaction, willingness to reuse conversational AI, and intentions to take recommended actions. …”
Get full text
Article -
1386
-
1387
Grouping Digital Health Apps Based on Their Quality and User Ratings Using K-Medoids Clustering: Cross-Sectional Study
Published 2025-07-01“…With over 350,000 digital health apps available on the app stores today, those apps need to be of sufficient quality to be safe to use. Discovering the typology of digital health apps regarding professional and clinical assurance (PCA), user experience (UX), data privacy (DP), and user ratings may help in determining the areas where digital health apps can improve. …”
Get full text
Article -
1388
Barriers and facilitators to seeking psychological support among healthcare professionals: a qualitative study using the Theoretical Domains Framework
Published 2025-03-01“…Data were analyzed using framework analysis and relevant domains were identified according to the frequency of participants’ belief statements. …”
Get full text
Article -
1389
Employing combined spatial and frequency domain image features for machine learning-based malware detection
Published 2024-07-01“…The ubiquitous adoption of Android devices has unfortunately brought a surge in malware threats, compromising user data, privacy concerns, and financial and device integrity, to name a few. …”
Get full text
Article -
1390
Artificial Intelligence in Healthcare: Innovation and Impact in Medical Practice
Published 2025-05-01“…Furthermore, federated learning and domain adaptation techniques may help address data privacy concerns and improve model robustness across diverse populations. …”
Get full text
Article -
1391
Building a Digital Health Research Platform to Enable Recruitment, Enrollment, Data Collection, and Follow-Up for a Highly Diverse Longitudinal US Cohort of 1 Million People in the...
Published 2025-01-01“…Digital research platforms can be used to increase participant access, improve study engagement, streamline data collection, and increase data quality; however, the efficacy and sustainability of digitally enabled studies rely heavily on the design, implementation, and management of the digital platform being used. …”
Get full text
Article -
1392
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…Here the fog nodes gather the information from the medical sensor devices and the data is validated using smart contracts in the blockchain network. …”
Get full text
Article -
1393
Non-Contact Fall Detection System Using 4D Imaging Radar for Elderly Safety Based on a CNN Model
Published 2025-05-01“…A CNN model classifies postures into standing, sitting, and lying, while changes in the speed and position distinguish falling actions from lying-down actions. The Point Cloud data were normalized and organized using zero padding and k-means clustering to improve the learning efficiency. …”
Get full text
Article -
1394
Akrivia Health Database—deep patient characterisation using a secondary mental healthcare dataset in England and Wales: cohort profile
Published 2024-10-01“…The data are anonymised, structured and harmonised from the source electronic health records across a range of information technology systems, enabling for unified, privacy-preserving access for research purposes.Participants The cohort contains data from electronic health records for over 4.6 million patients in England and Wales, as of January 2024. …”
Get full text
Article -
1395
AI-based model for Prediction of Power consumption in smart grid-smart way towards smart city using blockchain technology
Published 2024-12-01“…Ensuring data integrity, privacy, and trust among grid applicants, transmit the data securely and reliably to a centralized or distributed cloud platform utilizing blockchain technology—a secure transmission and storage using Distributed Authentication and Authorization (DAA) protocol. …”
Get full text
Article -
1396
Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)
Published 2022-12-01“…Abbreviations: VANETs: vehicular ad hoc networks; IVC: inter-vehicular communication; NC-WTM: node-centric weight-based trust management algorithm; WTM: weight-based trust management algorithm; RPRep: robust and privacy-preserving reputation management scheme; ART: attack-resistant trust management scheme; MANET: mobile ad hoc network; DSRC: dedicated short-range communication; WAVE: wireless access in vehicular environment; IVC: inter-vehicular communication; I2V: infrastructure-to-vehicle; V2I: vehicle-to-infrastructure; V2V: vehicle-to-vehicle; TA: trust authority; RSU: road side unit; OBU: on-board unit; GPS: global positioning system; WSN: wireless sensor network; VASNETs: vehicular sensor networks; CCW: cooperative collision warning; BMA: bad mouth attack; TDMA: time division multiple access; GDVAN: greedy detection for VANETs; SMTS: spider monkey time synchronization; SVM: support vector machine; DST: Dempster-Shafer theory of evidence; TA: trust authority; PCA: puzzle-based co-authentication; VLC: visible light communication; NE: Nash equilibrium; RTB: request-to-broadcast; CTB: clear-to-broadcast; RREQ: route request message; RREP: route reply; DDR: data disseminate ratio; Dir: direct trust; IDir: indirect trust; TCE: trust computation error; PDR: packet delivery ratio…”
Get full text
Article -
1397
Using information technology to communicate about health and wellbeing, assessment and review: audio computer assisted self-interviewing (A-CASI)
Published 2009-10-01“…In addition, its use is thought to decrease respondent error or fatigue and allows the relatively easy use of more complicated questionnaires, providing richer data than other self-completion approaches (Tourangeau and Smith, 1996).…”
Article -
1398
A True Random Number Generator Based on Race Hazard and Jitter of Braided and Cross-Coupled Logic Gates Using FPGA
Published 2024-01-01“…Cryptographic algorithms, which are critical for protecting user data privacy, rely on cryptographic keys to ensure data security. …”
Get full text
Article -
1399
What multimodal components, tools, dataset and focus of emotion are used in the current research of multimodal emotion: a systematic literature review
Published 2024-12-01“…Data were obtained from IEEE Xplore, Science Direct and Emerald journals which were then sorted based on the PRISMA method. …”
Get full text
Article -
1400
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework
Published 2025-07-01“…The main objective of the SAMFL-SCDCOA methodology is to provide an effective method for preventing cyberattacks in real time using FL and advanced optimization algorithms. Initially, the Z-score normalization is utilized to scale and standardize data to improve analysis consistency and accuracy. …”
Get full text
Article