Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
2401
Obstetric Caregivers’ Perspectives on Barriers and Perceived Impacts of Male Involvement in Antenatal Care and Labour in Ekiti State, Nigeria: A Qualitative Study
Published 2025-04-01“…Twelve obstetric caregivers (six doctors and six midwives) were purposivelyselected based on their experience in ANC and labour care. Data were collected through two focusgroup discussions using a semi-structured interview guide. …”
Get full text
Article -
2402
Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3
Published 2021-10-01“…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
Get full text
Article -
2403
Evaluating Factors Affecting Interior Architectural Space Quality to Enhance Spatial Resilience and Human Productivity: An Application of Maslow’s Hierarchy of Needs
Published 2025-06-01“…This research adopts a qualitative, exploratory approach, is practical in its intended application, and employs qualitative data collection techniques. Data collection procedure in this study involved studying documents, conducting in-depth semi-structured interviews and forming a focus group of experts in related fields. …”
Get full text
Article -
2404
Messenger-based assessment of empathic accuracy in couples’ smartphone communication
Published 2025-02-01“…Methods Data from N = 102 participants (51 couples) was used to investigate how accurate judgments of partners’ affect map their partners’ actual affect. …”
Get full text
Article -
2405
Optimising resources allocation in implementing school counselling programme at schools in the Ohangwena region
Published 2024-09-01“…In-depth semi-structured interviews and focus group discussions were used to gather data. Thematic results revealed that teacher-counsellors had no counselling rooms to conduct individual counselling, no separate budget for school counselling programme, and that file cabinets and display boards were only available in very few schools and were inadequate school-counsellor in schools. …”
Get full text
Article -
2406
Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing
Published 2025-04-01“…Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. …”
Get full text
Article -
2407
Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing
Published 2025-05-01“…Furthermore, the lack of transparency and credibility in intelligence sources has negatively impacted the quality and trustworthiness of shared data. To address these issues, authors aim to leverage blockchain technology, utilizing its decentralized and tamper-proof properties to ensure corporate privacy and the reliability of intelligence sources. …”
Get full text
Article -
2408
Leveraging Blockchain Technology for Secure 5G Offloading Processes
Published 2025-04-01“…This paper proposes a Blockchain-based marketplace using Hyperledger Fabric to optimize resource allocation and enhance security. …”
Get full text
Article -
2409
Lightweight Authentication for Devices in Internet of Thing Environment: A Survey
Published 2023-12-01“…The extremely large number of associated devices together through different protocols make it vulnerable to be threatened by several types of attacks, such as; Unauthorized Access and Authentication Attacks, Network Attacks, Data Privacy and Integrity Attacks, and Supply Chain Attacks. …”
Get full text
Article -
2410
Customer’s Satisfaction via Online Shopping Environment: The Case of China
Published 2021-07-01“…The philosophy of positivism was used to evaluate the online shopping behaviour in a Chinese context. …”
Get full text
Article -
2411
Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger
Published 2025-07-01“…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
Get full text
Article -
2412
Regulating AI in the Energy Sector: A Scoping Review of EU Laws, Challenges, and Global Perspectives
Published 2025-05-01“…Using the PRISMA-ScR methodology, this scoping review systematically analyzes how EU laws and regulations influence the development, adoption, and deployment of AI-driven digital solutions in energy generation, transmission, distribution, consumption, and markets. …”
Get full text
Article -
2413
Teenage Motherhood and its Effect on the Social Welfare of The Victims: A Case Study of Kabale Municipality.
Published 2024“…Hence the study offers an in-depth analysis of the relative contribution of some socio¬demographic factors in explaining adolescent pregnancy in Kabale Municipality. Using primary data collected from different parts of the district, a sample of 30 female adolescents in the age range of 10-19 years was studied. …”
Get full text
Thesis -
2414
DualBranch-AMR: A Semi-Supervised AMR Method Based on Dual-Student Consistency Regularization with Dynamic Stability Evaluation
Published 2025-07-01“…While deep learning has substantially improved the performance of Automatic Modulation Recognition (AMR), it heavily relies on large amounts of labeled data. Given the high annotation costs and privacy concerns, researching semi-supervised AMR methods that leverage readily available unlabeled data for training is of great significance. …”
Get full text
Article -
2415
Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County.
Published 2024“…The research utilized a cross-sectional design, incorporating both qualitative and quantitative approaches. Data were collected from 70 healthcare professionals in the selected sub-counties using questionnaires, interviews, and a thorough review of existing reports, policies, and other literature. …”
Get full text
Thesis -
2416
Leveraging deep neural network and language models for predicting long-term hospitalization risk in schizophrenia
Published 2025-03-01“…In this study, we developed a deep learning model that integrates demographic, behavioral, and blood test data from admission to forecast extended hospital stays using a retrospective cohort. …”
Get full text
Article -
2417
Resilience in the Internet of Medical Things: A Review and Case Study
Published 2024-11-01“…Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. …”
Get full text
Article -
2418
Alternatives to continuous positive airway pressure treatment in sleep apnoeas and hypopnoeas syndrome related to myofunctional and postural reeducation therapy: protocol for a sys...
Published 2021-12-01“…Finally, several patient-related outcomes, namely sleep quality, quality of life and sleep Apnoeas and Hypoapnoeas Index, will be examined.Ethics and dissemination In this case, ethical approval is not necessary. The data used in the review will be exclusively obtained from published studies, implying there are no privacy concerns. …”
Get full text
Article -
2419
Information Technology in Nursing Practice: A Scoping Review of Assessment Tools for Evaluating Nurses’ Competencies
Published 2025-05-01“…This has driven the need to develop specific competencies and maintain a balance between ethical aspects, social and legal challenges related to privacy and data security, as well as the challenge of ensuring person-centered care practice. …”
Get full text
Article -
2420
DiReDi: Distillation and Reverse Distillation for AIoT Applications
Published 2024-01-01“…When the user needs to update the edge-AI model to better fit the actual scenario, two reverse distillation (RD) processes are employed to extract the knowledge – the difference between user preferences and the manufacturer's presumptions from the edge-AI model using the user's exclusive data. Only the extracted knowledge is reported back to the upper management cloud server to update the cloud AI model, thus protecting user privacy by not using any exclusive data. …”
Get full text
Article