Suggested Topics within your search.
Suggested Topics within your search.
-
2621
Assessment of breastfeeding self-efficacy in nursing mothers following earthquakes: A case study of the Kahramanmaraş earthquakes in Turkey
Published 2025-06-01“…During the study period, all eligible mothers visiting the polyclinic who met the inclusion criteria were evaluated. Data were collected using a "Descriptive Data Form" and the "Breastfeeding Self-Efficacy Short Form Scale." …”
Get full text
Article -
2622
Dimensions related to telemedicine and telehealth competencies of health professionals: A scoping review
Published 2025-03-01“…Introduction Telehealth and telemedicine have proven to be useful in complementing face-to-face care, especially when long distances exist or when it is difficult to access specialists. …”
Get full text
Article -
2623
Implementing a chatbot to promote hereditary breast & ovarian cancer genetic screening in women’s health: identifying barriers and facilitators to screening adoption
Published 2025-07-01“…Findings illustrate how each factor functioned as a facilitator and/or barrier in women’s uptake (e.g., technology being trusted for accuracy versus concerns for data privacy and security). Conclusions While chatbots can extend women’s cancer risk screening access, particularly in rural regions and with college-educated women, systems-level (cost) and individual-level factors (perceived risk, misconceptions about repeating genetic testing) should be addressed to promote adoption. …”
Get full text
Article -
2624
Large language models aided patient progression documentation according to the ICD standard
Published 2025-01-01“…In previous works, this task has been carried out using structured data, such as, ICD-coded diagnoses, overlooking unstructured textual information in EHRs. …”
Get full text
Article -
2625
A hybrid explainable federated-based vision transformer framework for breast cancer prediction via risk factors
Published 2025-05-01“…These models are assessed on binary, multi-class, and Breast Imaging Reporting and Data System (BI-RADS) classification tasks using a unique dataset encompassing real-world risk factors. …”
Get full text
Article -
2626
HIV pre-exposure prophylaxis in Latin America: Public policies, healthcare systems and human rights
Published 2025-06-01“…Achieving universal healthcare and adhering to human rights norms can improve access/use of this essential HIV prevention tool.…”
Get full text
Article -
2627
Foreground-Driven Contrastive Learning for Unsupervised Human Keypoint Detection
Published 2025-01-01“…Recently, unsupervised human keypoint detection has become prevalent due to concerns about data privacy. Most existing methods are based on a reconstruction process that extracts appearance and pose information from transformed image pairs and spatially aligns them to obtain a reconstructed image for detection. …”
Get full text
Article -
2628
B5G Applications and Emerging Services in Smart IoT Environments
Published 2025-04-01“…Furthermore, the proposed study examines the techniques employed for data transmission in B5G applications, such as Vehicle-to-Vehicle (V2V), Device-to-Device (D2D), and Machine to Machine (M2M) transmissions. …”
Get full text
Article -
2629
Smart cities and electrical and electronic waste management: a review of challenges and opportunities
Published 2025-05-01“…Key challenges include information security, privacy, interoperability, costs and sustainability. …”
Get full text
Article -
2630
Differentiating atypical parkinsonian syndromes with hyperbolic few-shot contrastive learning
Published 2024-12-01“…However, the models typically require extensively labeled training datasets, which are costly and pose patient privacy risks. To address the issue of limited training datasets, we propose a novel few-shot learning framework for classifying multiple system atrophy parkinsonian (MSA-P) and progressive supranuclear palsy (PSP) within the APS category using fewer data items. …”
Get full text
Article -
2631
Vision-Based Activity Recognition for Unobtrusive Monitoring of the Elderly in Care Settings
Published 2025-05-01“…The system integrates a frame differencing algorithm with adjustable sensitivity parameters and an anomaly detection model tailored to identify deviations from individual behavior patterns without relying on large volumes of labeled data. The system was validated through real-world deployments across multiple care home rooms, demonstrating significant improvements in emergency response times and ensuring resident privacy through anonymized frame differencing views. …”
Get full text
Article -
2632
A Multi-Criteria Decision-Making Framework for Blockchain Technology Adoption in Smart Healthcare
Published 2025-10-01“…Among the three blockchain platforms evaluated, the results indicate that permissioned blockchain technology is the most suitable for the healthcare sector, primarily due to its strengths in regulatory compliance, data privacy, and system integration. The study’s findings would help practitioners identify and choose the best blockchain platform, thus contributing to a transition in the healthcare industry called “Smart Healthcare 5.0”.…”
Get full text
Article -
2633
Optimized Identity Authentication via Channel State Information for Two-Factor User Verification in Information Systems
Published 2025-04-01“…For classification, a kernel support vector machine (SVM) model is trained using a randomized hyperparameter search algorithm. …”
Get full text
Article -
2634
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Published 2025-03-01“…As the proliferation of Internet of Things (IoT) devices grows, challenges in security, privacy, and interoperability become increasingly significant. …”
Get full text
Article -
2635
A "Quıet" need ın the dısaster of the century: a qualıtatıve study on menstrual hygıene management
Published 2025-02-01“…The interviews were analyzed using content analysis, and themes and sub-themes reflecting the women's experiences were identified. …”
Get full text
Article -
2636
The Impact of AI-Personalized Recommendations on Clicking Intentions: Evidence from Chinese E-Commerce
Published 2025-02-01“…AI-personalized recommendation technology offers more accurate and diverse choices to consumers and increases click-through rates and sales on e-commerce platforms. Yet, data on consumers’ experiences of AI-personalized recommendations and their impact path on clicking intention are scarce. …”
Get full text
Article -
2637
The Role of Evidence-Based Design in Enhancing Architectural Design Process of Healthcare Buildings: A Case Study of General Hospitals in Sulaimani City
Published 2025-04-01“…The investigation includes correlations between participants' prioritization of hospital design aspects such as circulation, accessibility, wayfinding, visibility, and privacy and their professional background, experience, and considerations in EBD. …”
Get full text
Article -
2638
Transformations in academic work and faculty perceptions of artificial intelligence in higher education
Published 2025-07-01“…Additionally, ethical debates are emerging around algorithmic transparency, data privacy, and institutional responsibility. Effective integration in higher education demands not only technical proficiency but also ethical grounding, regulatory support, and critical pedagogical development. …”
Get full text
Article -
2639
FedHSP: A Robust Federated Learning Framework Coherently Addressing Heterogeneity, Security, and Performance Challenges
Published 2025-01-01“…Federated Learning (FL) is a machine learning training method that leverages local model gradients instead of accessing private data from individual clients, ensuring privacy. However, the practical implementation of FL faces significant challenges. …”
Get full text
Article -
2640
Class-Hidden Client-Side Watermarking in Federated Learning
Published 2025-01-01“…Federated learning consists of a central aggregator and multiple clients, forming a distributed structure that effectively protects data privacy. However, since all participants can access the global model, the risk of model leakage increases, especially when unreliable participants are involved. …”
Get full text
Article