Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
-
1741
Social media integration in marketing education: A way forward to improve engagement and learning outcomes
Published 2025-03-01“…The findings indicate that social media significantly increased student engagement and knowledge retention. Perceived ease of use, institutional support, and effectiveness in meeting instructional objectives were most significant to adoption. …”
Get full text
Article -
1742
Application of blockchain in urban rail traffic edge computing network
Published 2021-10-01“…Multi-access edge computing (MEC) can provide high-quality service capabilities for computing-intensive services and delay-sensitive services in urban rail traffic.However, many edge facilities in rail traffic edge computing network are exposed to an open environment, and their privacy protection and transmission security are facing great challenges.Blockchain has functional characteristics such as distributed ledger, consensus mechanism, smart contract, and decentralized application.Therefore, the use of blockchain can build a systematic security protection mechanism for the distributed rail traffic edge computing network to ensure network security and data security and realize high-quality urban rail traffic services.Firstly, the basic concept of the blockchain and the urban rail traffic edge computing network architecture were introduced.Then, the structure and application content of the rail traffic edge computing network security protection mechanism integrated with the blockchain was discussed in detail.Finally, the open research issues and challenges of the security protection mechanism were analyzed.…”
Get full text
Article -
1743
Comprehensive synthesis of mHealth interventions in psychiatry: insights from systematic, scoping, narrative reviews and content analysis
Published 2024-10-01“…Conclusion: Despite positive outcomes, challenges such as data privacy, user engagement and healthcare integration persist. …”
Get full text
Article -
1744
Arduino – Based Electronic Voting Machine
Published 2019-01-01“…During the construction of any electronic voting system, several aspects must consider, the most important is the privacy of voters and the accuracy of the voting process in addition to maintaining the security of data, this research provides a safe and reliable voting system. …”
Get full text
Article -
1745
PERCEPTIONS AND EXPERIENCES OF M-HEALTH TECHNOLOGIES AND SOCIAL MEDIA: A QUALITATIVE STUDY IN PATIENTS WITH SCHIZOPHRENIA
Published 2023-12-01“…The qualitative methodology used consists of an individual structured interview and the data were subjected to thematic analysis. …”
Get full text
Article -
1746
Co-similar malware infection patterns as a predictor of future risk.
Published 2021-01-01“…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
Get full text
Article -
1747
Design of an intelligent AI-based multi-layer optimization framework for grid-tied solar PV-fuel cell hybrid energy systems
Published 2025-12-01“…With this, we now have a scalable and real-time energy-efficient solution for future smart grid systems. • Integrated Intelligence Stack: Combines RL-ENN, T-STFREP, FL-DEO, GNNHSCO, and Q-GAN-ESO into a unified architecture for real-time control, forecasting, decentralized optimization, network routing, and synthetic scenario generation. • Real-Time, Scalable, and Privacy-Preserving: Enables adaptive energy dispatch, federated optimization without compromising data privacy, and graph-based power routing, making it suitable for large-scale, smart grid deployments. • Proven Long-Term Performance: Achieved significant improvements over traditional methods (GA, PSO) with 27.5 % lower NPC, 18.2 % reduction in COE, and 30.2 % increase in battery life, validated using 30 years of meteorological data.…”
Get full text
Article -
1748
Challenges of online teaching and adaptation strategies among Iranian female teachers during the COVID-19 pandemic: a qualitative study
Published 2025-01-01“…Data analysis was carried out using the Colaizzi approach in MAXQDA-2018 software, and the Guba and Lincoln criteria were used to improve the quality of the findings. …”
Get full text
Article -
1749
Evaluation of the strategy for implementing the GLA:D programme in Switzerland: protocol for an implementation-effectiveness hybrid type 3 design study with a mixed-method approach
Published 2022-06-01“…The study population will be the healthcare professionals who are involved in the conservative management of knee OA in Switzerland, that is, physiotherapists and medical doctors, and their patients.Ethics and dissemination The use of the registry data containing data of patients participating in the GLA:D Switzerland OA programme does not fall within the scope of the Swiss Human Research Act (BASEC-Nr. …”
Get full text
Article -
1750
The daunting challenge of Artificial Intelligence in Education: a systematic literature review
Published 2025-03-01“…Finally, there are also ethical and social challenges that address concerns about the privacy of student data, equity in access to advanced technologies, and the potential of AI to perpetuate existing biases. …”
Get full text
Article -
1751
Exploring the influence of cognitive factors among Chinese parents on the sustainability of children’s digital education
Published 2025-03-01“…Findings Perceived playability, usefulness, social influence, and satisfaction significantly predict continuance intention. …”
Get full text
Article -
1752
CLOUD COMPUTING SECURITY
Published 2016-05-01“…Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. …”
Get full text
Article -
1753
ENGLISH:FROM MANUSCRIPTS TO MONITORS: THE DIGITAL EVOLUTION OF ISLAMIC KNOWLEDGE AND THE ROLE OF COMPUTERIZING IN SAFEGUARDING TRADITION FOR FUTURE GENERATIONS
Published 2024-06-01“…The paper explores the danger of breaching privacy and the abuse of personal data pointing to the necessity and effectiveness of a policy against such issues. …”
Get full text
Article -
1754
GOVERNANCE TOKENS IN THE CONCEPT OF ELECTRONIC GOVERNMENT
Published 2023-12-01“…We emphasized that the use of blockchain technology raises significant privacy concerns, as many e-government services involve personal data that must be properly protected to avoid situations where the blockchain could become the target of attacks by attackers trying to obtain unauthorized access to the personal information of citizens. …”
Get full text
Article -
1755
Perceptions and Needs of Stakeholders Regarding MyPal Project’s Electronic Patient-Reported Outcome App: Cross-Sectional Qualitative Focus Group Study
Published 2025-08-01“…Questions emerged about how and when HCPs would review and respond to patient-reported data. In the third theme, applicability for use in health care, participants emphasized the importance of the system’s ease of use, particularly for older patients and young children. …”
Get full text
Article -
1756
Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration
Published 2024-10-01“…Federated learning offers a framework for developing local models across institutions while safeguarding sensitive data. This paper introduces a novel approach for heart disease prediction using the TabNet model, which combines the strengths of tree-based models and deep neural networks. …”
Get full text
Article -
1757
The Impact of Personalized Office Spaces on Faculty Productivity, Performance, and Satisfaction in Universities’ Educational Facilities: Case Study of Al Yamamah University, Riyadh...
Published 2025-07-01“…Data were analyzed using thematic analysis for qualitative insights, focusing on environmental aspects (such as: natural lighting, ventilation, noise control, etc.), psychological factors (such as: privacy, aesthetic appeal, etc.), and architectural settings (such as: area, space layout, materials, etc.). …”
Get full text
Article -
1758
An Elderly Fall Detection Method Based on Federated Learning and Extreme Learning Machine (Fed-ELM)
Published 2022-01-01“…Then, Federated Learning is applied to share data information among different users without involving user privacy. …”
Get full text
Article -
1759
Factors that affect clinical youth engagement in digital mental health research: a qualitative sub-study nested within a prospective cohort study
Published 2025-04-01“…Methods Semi-structured interviews were conducted with a purposive sample of participants from the 3S-YP study. Interview data was analysed using codebook thematic analysis. …”
Get full text
Article -
1760
Acceptability of an online peer support group as a strategy to improve antiretroviral therapy adherence among young people in Kampala district, Uganda: qualitative findings
Published 2025-04-01“…In implementing online support groups, due consideration should be given to software tools with high privacy standards and zero-rated data use for new apps. …”
Get full text
Article