Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
2461
Pharmacogenetic testing: current state of the issue
Published 2024-11-01“…Despite its potential, the integration of pharmacogenetics into clinical practice faces challenges, including a lack of reliable clinical evidence, inadequate physician education, and the need for a comprehensive health IT infrastructure to support the use of genetic data. Ethical and legal issues, such as patient privacy and the risk of genetic discrimination, also present significant obstacles. …”
Get full text
Article -
2462
Exploring nurse and patient perspectives on WeChat-based prenatal education in Chinese public hospitals: a qualitative inquiry
Published 2025-04-01“…Seventeen obstetric nurses and eight pregnant women participated in semi-structured interviews between March and August 2024. Data were analyzed using thematic analysis to identify commonalities and divergences between nurse-driven and patient-driven experiences. …”
Get full text
Article -
2463
Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3
Published 2021-10-01“…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
Get full text
Article -
2464
Evaluating Factors Affecting Interior Architectural Space Quality to Enhance Spatial Resilience and Human Productivity: An Application of Maslow’s Hierarchy of Needs
Published 2025-06-01“…Data collection continued until the point of data saturation, at which no new theme was identified. …”
Get full text
Article -
2465
Messenger-based assessment of empathic accuracy in couples’ smartphone communication
Published 2025-02-01“…Methods Data from N = 102 participants (51 couples) was used to investigate how accurate judgments of partners’ affect map their partners’ actual affect. …”
Get full text
Article -
2466
Optimising resources allocation in implementing school counselling programme at schools in the Ohangwena region
Published 2024-09-01“…In-depth semi-structured interviews and focus group discussions were used to gather data. Thematic results revealed that teacher-counsellors had no counselling rooms to conduct individual counselling, no separate budget for school counselling programme, and that file cabinets and display boards were only available in very few schools and were inadequate school-counsellor in schools. …”
Get full text
Article -
2467
Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing
Published 2025-04-01“…Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. …”
Get full text
Article -
2468
Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing
Published 2025-05-01“…Furthermore, the lack of transparency and credibility in intelligence sources has negatively impacted the quality and trustworthiness of shared data. To address these issues, authors aim to leverage blockchain technology, utilizing its decentralized and tamper-proof properties to ensure corporate privacy and the reliability of intelligence sources. …”
Get full text
Article -
2469
Leveraging Blockchain Technology for Secure 5G Offloading Processes
Published 2025-04-01“…This paper proposes a Blockchain-based marketplace using Hyperledger Fabric to optimize resource allocation and enhance security. …”
Get full text
Article -
2470
Lightweight Authentication for Devices in Internet of Thing Environment: A Survey
Published 2023-12-01“…The extremely large number of associated devices together through different protocols make it vulnerable to be threatened by several types of attacks, such as; Unauthorized Access and Authentication Attacks, Network Attacks, Data Privacy and Integrity Attacks, and Supply Chain Attacks. …”
Get full text
Article -
2471
Customer’s Satisfaction via Online Shopping Environment: The Case of China
Published 2021-07-01“…The philosophy of positivism was used to evaluate the online shopping behaviour in a Chinese context. …”
Get full text
Article -
2472
Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger
Published 2025-07-01“…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
Get full text
Article -
2473
Regulating AI in the Energy Sector: A Scoping Review of EU Laws, Challenges, and Global Perspectives
Published 2025-05-01“…Using the PRISMA-ScR methodology, this scoping review systematically analyzes how EU laws and regulations influence the development, adoption, and deployment of AI-driven digital solutions in energy generation, transmission, distribution, consumption, and markets. …”
Get full text
Article -
2474
Teenage Motherhood and its Effect on the Social Welfare of The Victims: A Case Study of Kabale Municipality.
Published 2024“…Hence the study offers an in-depth analysis of the relative contribution of some socio¬demographic factors in explaining adolescent pregnancy in Kabale Municipality. Using primary data collected from different parts of the district, a sample of 30 female adolescents in the age range of 10-19 years was studied. …”
Get full text
Thesis -
2475
DualBranch-AMR: A Semi-Supervised AMR Method Based on Dual-Student Consistency Regularization with Dynamic Stability Evaluation
Published 2025-07-01“…While deep learning has substantially improved the performance of Automatic Modulation Recognition (AMR), it heavily relies on large amounts of labeled data. Given the high annotation costs and privacy concerns, researching semi-supervised AMR methods that leverage readily available unlabeled data for training is of great significance. …”
Get full text
Article -
2476
Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County.
Published 2024“…These challenges included delays in data entry, limited resources for training, occasionally technical issues, infrastructure, and technological constraints, especially in remote areas, and concerns about data security and patient information privacy. …”
Get full text
Thesis -
2477
Leveraging deep neural network and language models for predicting long-term hospitalization risk in schizophrenia
Published 2025-03-01“…In this study, we developed a deep learning model that integrates demographic, behavioral, and blood test data from admission to forecast extended hospital stays using a retrospective cohort. …”
Get full text
Article -
2478
Resilience in the Internet of Medical Things: A Review and Case Study
Published 2024-11-01“…Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. …”
Get full text
Article -
2479
DiReDi: Distillation and Reverse Distillation for AIoT Applications
Published 2024-01-01“…When the user needs to update the edge-AI model to better fit the actual scenario, two reverse distillation (RD) processes are employed to extract the knowledge – the difference between user preferences and the manufacturer's presumptions from the edge-AI model using the user's exclusive data. Only the extracted knowledge is reported back to the upper management cloud server to update the cloud AI model, thus protecting user privacy by not using any exclusive data. …”
Get full text
Article -
2480
BERT ensemble based MBR framework for android malware detection
Published 2025-04-01“…By leveraging their strengths, the MBR model introduces significant innovation. By using ensemble methods on static data, the MBR framework not only provides a reliable malware detection solution but also presents a novel strategy. …”
Get full text
Article