Suggested Topics within your search.
Suggested Topics within your search.
-
2521
The Impact of Electronic Health Records on Healthcare: Global Benefits and Challenges
Published 2025-03-01Get full text
Article -
2522
Exploring the Prevalence of Renewable Energy Practices and Awareness Levels in Palestine
Published 2025-03-01Get full text
Article -
2523
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
2524
Current application, possibilities, and challenges of artificial intelligence in the management of rheumatoid arthritis, axial spondyloarthritis, and psoriatic arthritis
Published 2025-06-01“…Multimodal AI, focusing on collaboration, reliability, transparency, and patient-centered innovation, looks like the future of medical practice. …”
Get full text
Article -
2525
ICT Usage and Implementation of Competence-Based Curriculum in Selected Secondary Schools in Kabale Municipality.
Published 2023“…The study recommended that schools need to have adequate and up-to-date ICT infrastructure, including hardware, software, and connectivity; Teachers need to be trained in how to effectively integrate ICT into their teaching practices; Encourage collaboration and sharing of best practices; ICT should be integrated into all subject areas, not just in computer studies or ICT classes; Schools should regularly evaluate the impact of ICT integration on student learning outcomes and Schools need to provide ongoing support to teachers and students to ensure that they are able to use technology effectively. …”
Get full text
Thesis -
2526
Inventory Management and Service Delivery in Government Hospitals: A Case Study of Kabale Regional Referral Hospital.
Published 2023“…The major challenges that KRRH was facing in IM processes included: Late delivery by the suppliers; Inadequate tools and equipment to use in inventory management like computer software; Manual documentation; Inconsistent tracking of ordered goods and services; Lack of collaboration between the Procurement and Inventory department and other departments; Poor inventory management process; Lack of Transparency amongst the store staff: and Entrance of unauthorized personnel among others. …”
Get full text
Thesis -
2527
Steel Surface Defect Detection Technology Based on YOLOv8-MGVS
Published 2025-01-01Get full text
Article -
2528
-
2529
-
2530
Enhancing Forensic Analysis of Construction Project Delays Through Digital Interventions
Published 2025-07-01Get full text
Article -
2531
-
2532
-
2533
Machine learning-based myocardial infarction bibliometric analysis
Published 2025-02-01“…In the realm of MI and ML research, cooperative teams led by figures such as Dey, Damini, and Berman, Daniel S. in the United States have emerged, indicating that Chinese scholars should strengthen their collaborations and focus on both qualitative and quantitative development. …”
Get full text
Article -
2534
Towards Efficient SAR Ship Detection: Multi-Level Feature Fusion and Lightweight Network Design
Published 2025-07-01“…Thus, guided by the principles of lightweight design, robustness, and energy efficiency optimization, this study proposes a three-stage collaborative multi-level feature fusion framework to reduce model complexity without compromising detection performance. …”
Get full text
Article -
2535
Exploring Group Clinical Supervision: Enhancing Professional Awareness and Unity in a Single-Group Case Study
Published 2024-12-01“…Background: Clinical supervision serves as a collaborative reflection mechanism, enabling clinicians to enhance their cognitive and emotional awareness of their practice. …”
Get full text
Article -
2536
Synergies in VVER reactor long-term operation and aging: A comprehensive review of CAMIVVER, DELISA-LTO, and EVEREST projects
Published 2025-01-01“…The CAMIVVER project concentrates on the development of VVER specific computational methods to support their safety assessments. …”
Get full text
Article -
2537
-
2538
Task Scheduling of Multiple Humanoid Robot Manipulators by Using Symbolic Control
Published 2025-05-01Get full text
Article -
2539
-
2540
ST-MSRN: An enhanced spatio-temporal super-resolution model for complex meteorological data reconstruction
Published 2025-08-01Get full text
Article