Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 20
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sci Rep ; 14(1): 5678, 2024 Mar 07.
Artigo em Inglês | MEDLINE | ID: mdl-38453988

RESUMO

Improved software for processing medical images has inspired tremendous interest in modern medicine in recent years. Modern healthcare equipment generates huge amounts of data, such as scanned medical images and computerized patient information, which must be secured for future use. Diversity in the healthcare industry, namely in the form of medical data, is one of the largest challenges for researchers. Cloud environment and the Block chain technology have both demonstrated their own use. The purpose of this study is to combine both technologies for safe and secure transaction. Storing or sending medical data through public clouds exposes information into potential eavesdropping, data breaches and unauthorized access. Encrypting data before transmission is crucial to mitigate these security risks. As a result, a Blockchain based Chaotic Arnold's cat map Encryption Scheme (BCAES) is proposed in this paper. The BCAES first encrypts the image using Arnold's cat map encryption scheme and then sends the encrypted image into Cloud Server and stores the signed document of plain image into blockchain. As blockchain is often considered more secure due to its distributed nature and consensus mechanism, data receiver will ensure data integrity and authenticity of image after decryption using signed document stored into the blockchain. Various analysis techniques have been used to examine the proposed scheme. The results of analysis like key sensitivity analysis, key space analysis, Information Entropy, histogram correlation of adjacent pixels, Number of Pixel Change Rate, Peak Signal Noise Ratio, Unified Average Changing Intensity, and similarity analysis like Mean Square Error, and Structural Similarity Index Measure illustrated that our proposed scheme is an efficient encryption scheme as compared to some recent literature. Our current achievements surpass all previous endeavors, setting a new standard of excellence.

2.
Heliyon ; 10(1): e23254, 2024 Jan 15.
Artigo em Inglês | MEDLINE | ID: mdl-38163235

RESUMO

Ambient Intelligence is a concept that relates to a new paradigm of pervasive computing and has the objective of automating responses from the system to humans without any human intervention. In social media forensics, gathering, analyzing, storing, and validating relevant evidence for investigation in a heterogeneous environment is still questionable. There is no hierarchy for automation, even though standardization and secure processes from data collection to validation have not yet been discussed. This poses serious issues for the current investigation procedures and future evidence chain of custody management. This paper contributes threefold. First, it proposes a framework using a blockchain network with a dual chain of data transmission for privacy protection, such as on-chain and off-chain. Second, a protocol is designed to detect and separate local and global cyber threats and undermine multiple federated principles to personalize search space broadly. Third, this study manages personalized updates by means of optimizing backtracking parameters and automating replacements, which directly affects the reduction of negative influence on the social networking environment in terms of imbalanced and distributed data issues. This proposed framework enhances stability in digital investigation. In addition, the simulation uses an extensive social media dataset in different cyberspaces with a variety of cyber threats to investigate. The proposed work outperformed as compared to traditional single-level personalized search and other state-of-the-art schemes.

3.
Sensors (Basel) ; 23(21)2023 Oct 30.
Artigo em Inglês | MEDLINE | ID: mdl-37960533

RESUMO

Wireless sensor networks (WSNs), constrained by limited resources, demand routing strategies that prioritize energy efficiency. The tactic of cooperative routing, which leverages the broadcast nature of wireless channels, has garnered attention for its capability to amplify routing efficacy. This manuscript introduces a power-conscious routing approach, tailored for resource-restricted WSNs. By exploiting cooperative communications, we introduce an innovative relay node selection technique within clustered networks, aiming to curtail energy usage while safeguarding data dependability. This inventive methodology has been amalgamated into the Routing Protocol for Low-Power and Lossy Networks (RPL), giving rise to the cooperative and efficient routing protocol (CERP). The devised CERP protocol pinpoints and selects the most efficacious relay node, ensuring that packet transmission is both energy-minimal and reliable. Performance evaluations were executed to substantiate the proposed strategy, and its practicality was examined using an Arduino-based sensor node and the Contiki operating system in real-world scenarios. The outcomes affirm the efficacy of the proposed strategy, outshining the standard RPL concerning reliability and energy conservation, enhancing RPL reliability by 10% and energy savings by 18%. This paper is posited to contribute to the evolution of power-conscious routing strategies for WSNs, crucial for prolonging sensor node battery longevity while sustaining dependable communication.

4.
PeerJ Comput Sci ; 9: e1521, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37705660

RESUMO

Cybersecurity guarantees the exchange of information through a public channel in a secure way. That is the data must be protected from unauthorized parties and transmitted to the intended parties with confidentiality and integrity. In this work, we mount an attack on a cryptosystem based on multivariate polynomial trapdoor function over the field of rational numbers Q. The developers claim that the security of their proposed scheme depends on the fact that a polynomial system consisting of 2n (where n is a natural number) equations and 3n unknowns constructed by using quasigroup string transformations, has infinitely many solutions and finding exact solution is not possible. We explain that the proposed trapdoor function is vulnerable to a Gröbner basis attack. Selected polynomials in the corresponding Gröbner basis can be used to recover the plaintext against a given ciphertext without the knowledge of the secret key.

5.
Sensors (Basel) ; 23(18)2023 Sep 12.
Artigo em Inglês | MEDLINE | ID: mdl-37765873

RESUMO

Brain tumors in Magnetic resonance image segmentation is challenging research. With the advent of a new era and research into machine learning, tumor detection and segmentation generated significant interest in the research world. This research presents an efficient tumor detection and segmentation technique using an adaptive moving self-organizing map and Fuzzyk-mean clustering (AMSOM-FKM). The proposed method mainly focused on tumor segmentation using extraction of the tumor region. AMSOM is an artificial neural technique whose training is unsupervised. This research utilized the online Kaggle Brats-18 brain tumor dataset. This dataset consisted of 1691 images. The dataset was partitioned into 70% training, 20% testing, and 10% validation. The proposed model was based on various phases: (a) removal of noise, (b) selection of feature attributes, (c) image classification, and (d) tumor segmentation. At first, the MR images were normalized using the Wiener filtering method, and the Gray level co-occurrences matrix (GLCM) was used to extract the relevant feature attributes. The tumor images were separated from non-tumor images using the AMSOM classification approach. At last, the FKM was used to distinguish the tumor region from the surrounding tissue. The proposed AMSOM-FKM technique and existing methods, i.e., Fuzzy-C-means and K-mean (FMFCM), hybrid self-organization mapping-FKM, were implemented over MATLAB and compared based on comparison parameters, i.e., sensitivity, precision, accuracy, and similarity index values. The proposed technique achieved more than 10% better results than existing methods.


Assuntos
Neoplasias Encefálicas , Humanos , Neoplasias Encefálicas/diagnóstico por imagem , Algoritmos , Análise por Conglomerados , Aprendizado de Máquina , Personalidade
6.
Diagnostics (Basel) ; 13(16)2023 Aug 12.
Artigo em Inglês | MEDLINE | ID: mdl-37627917

RESUMO

Spine image analysis is based on the accurate segmentation and vertebrae recognition of the spine. Several deep learning models have been proposed for spine segmentation and vertebrae recognition, but they are very computationally demanding. In this research, a novel deep learning model is introduced for spine segmentation and vertebrae recognition using CT images. The proposed model works in two steps: (1) A cascaded hierarchical atrous spatial pyramid pooling residual attention U-Net (CHASPPRAU-Net), which is a modified version of U-Net, is used for the segmentation of the spine. Cascaded spatial pyramid pooling layers, along with residual blocks, are used for feature extraction, while the attention module is used for focusing on regions of interest. (2) A 3D mobile residual U-Net (MRU-Net) is used for vertebrae recognition. MobileNetv2 includes residual and attention modules to accurately extract features from the axial, sagittal, and coronal views of 3D spine images. The features from these three views are concatenated to form a 3D feature map. After that, a 3D deep learning model is used for vertebrae recognition. The VerSe 20 and VerSe 19 datasets were used to validate the proposed model. The model achieved more accurate results in spine segmentation and vertebrae recognition than the state-of-the-art methods.

7.
Sensors (Basel) ; 23(10)2023 May 10.
Artigo em Inglês | MEDLINE | ID: mdl-37430526

RESUMO

Innovative technological solutions are required to improve patients' quality of life and deliver suitable treatment. Healthcare workers may be able to watch patients from a distance using the Internet of Things (IoT) by using big data algorithms to analyze instrument outputs. Therefore, it is essential to gather information on use and health problems in order to improve the remedies. To ensure seamless incorporation for use in healthcare institutions, senior communities, or private homes, these technological tools must first and foremost be easy to use and implement. We provide a network cluster-based system known as smart patient room usage in order to achieve this. As a result, nursing staff or caretakers can use it efficiently and swiftly. This work focuses on the exterior unit that makes up a network cluster, a cloud storage mechanism for data processing and storage, as well as a wireless or unique radio frequency send module for data transfer. In this article, a spatio-temporal cluster mapping system is presented and described. This system creates time series data using sense data collected from various clusters. The suggested method is the ideal tool to use in a variety of circumstances to improve medical and healthcare services. The suggested model's ability to anticipate moving behavior with high precision is its most important feature. The time series graphic displays a regular light movement that continued almost the entire night. The last 12 h' lowest and highest moving duration numbers were roughly 40% and 50%, respectively. When there is little movement, the model assumes a normal posture. Particularly, the moving duration ranges from 7% to 14%, with an average of 7.0%.


Assuntos
Algoritmos , Qualidade de Vida , Humanos , Monitorização Fisiológica , Leitos , Big Data
8.
Front Physiol ; 14: 1143249, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37064899

RESUMO

The new coronavirus that produced the pandemic known as COVID-19 has been going across the world for a while. Nearly every area of development has been impacted by COVID-19. There is an urgent need for improvement in the healthcare system. However, this contagious illness can be controlled by appropriately donning a facial mask. If people keep a strong social distance and wear face masks, COVID-19 can be controlled. A method for detecting these violations is proposed in this paper. These infractions include failing to wear a facemask and failing to maintain social distancing. To train a deep learning architecture, a dataset compiled from several sources is used. To compute the distance between two people in a particular area and also predicts the people wearing and not wearing the mask, The proposed system makes use of YOLOv3 architecture and computer vision. The goal of this research is to provide valuable tool for reducing the transmission of this contagious disease in various environments, including streets and supermarkets. The proposed system is evaluated using the COCO dataset. It is evident from the experimental analysis that the proposed system performs well in predicting the people wearing the mask because it has acquired an accuracy of 99.2% and an F1-score of 0.99.

9.
Sensors (Basel) ; 23(5)2023 Mar 03.
Artigo em Inglês | MEDLINE | ID: mdl-36904993

RESUMO

Today's critical goals in sensor network research are extending the lifetime of wireless sensor networks (WSNs) and lowering power consumption. A WSN necessitates the use of energy-efficient communication networks. Clustering, storage, communication capacity, high configuration complexity, low communication speed, and limited computation are also some of the energy limitations of WSNs. Moreover, cluster head selection remains problematic for WSN energy minimization. Sensor nodes (SNs) are clustered in this work using the Adaptive Sailfish Optimization (ASFO) algorithm with K-medoids. The primary purpose of research is to optimize the selection of cluster heads through energy stabilization, distance reduction, and latency minimization between nodes. Because of these constraints, achieving optimal energy resource utilization is an essential problem in WSNs. An energy-efficient cross-layer-based expedient routing protocol (E-CERP) is used to determine the shortest route, dynamically minimizing network overhead. The proposed method is used to evaluate the packet delivery ratio (PDR), packet delay, throughput, power consumption, network lifetime, packet loss rate, and error estimation, and the results were superior to existing methods. PDR (100%), packet delay (0.05 s), throughput (0.99 Mbps), power consumption (1.97 mJ), network lifespan (5908 rounds), and PLR (0.5%) for 100 nodes are the performance results for quality-of-service parameters.

10.
Front Physiol ; 14: 1125952, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-36793418

RESUMO

Generally, cloud computing is integrated with wireless sensor network to enable the monitoring systems and it improves the quality of service. The sensed patient data are monitored with biosensors without considering the patient datatype and this minimizes the work of hospitals and physicians. Wearable sensor devices and the Internet of Medical Things (IoMT) have changed the health service, resulting in faster monitoring, prediction, diagnosis, and treatment. Nevertheless, there have been difficulties that need to be resolved by the use of AI methods. The primary goal of this study is to introduce an AI-powered, IoMT telemedicine infrastructure for E-healthcare. In this paper, initially the data collection from the patient body is made using the sensed devices and the information are transmitted through the gateway/Wi-Fi and is stored in IoMT cloud repository. The stored information is then acquired, preprocessed to refine the collected data. The features from preprocessed data are extracted by means of high dimensional Linear Discriminant analysis (LDA) and the best optimal features are selected using reconfigured multi-objective cuckoo search algorithm (CSA). The prediction of abnormal/normal data is made by using Hybrid ResNet 18 and GoogleNet classifier (HRGC). The decision is then made whether to send alert to hospitals/healthcare personnel or not. If the expected results are satisfactory, the participant information is saved in the internet for later use. At last, the performance analysis is carried so as to validate the efficiency of proposed mechanism.

11.
Entropy (Basel) ; 24(11)2022 Nov 03.
Artigo em Inglês | MEDLINE | ID: mdl-36359691

RESUMO

Multiple-input Multiple-Output (MIMO) systems require orthogonal frequency division multiplexing to operate efficiently in multipath communication (OFDM). Channel estimation (C.E.) is used in channel conditions where time-varying features are required. The existing channel estimation techniques are highly complicated. A channel estimation algorithm is needed to estimate the received signal's correctness. In order to resolve this complexity in C.E. methodologies, this paper developed an Improved Channel Estimation Algorithm integrated with DFT-LS-WIENER (ICEA-DA). The Least Square (L.S.) and Minimum Mean Square Error (MMSE) algorithms also use the Discrete Fourier Transform (DFT)-based channel estimation method. The DFT-LS-WIENER channel estimation approach is recommended for better BER performance. The input signal is modulated in the transmitter module using the Quadrature Phase Shift Keying (QPSK) technique, pulse modeling, and least squares concepts. The L.S. Estimation technique needs the channel consistent throughout the estimation period. DFT joined with L.S. gives higher estimation precision and limits M.S.E. and BER. Experimental analysis of the proposed state-of-the-art method shows that DFT-LS-WIENER provides superior performance in terms of symbol error rate (S.E.R.), bit error rate (BER), channel capacity (CC), and peak signal-to-noise (PSNR). At 15 dB SNR, the proposed DFT-LS-WIENER techniques reduce the BER of 48.19%, 38.19%, 14.8%, and 14.03% compared to L.S., LS-DFT, MMSE, and MMSE-DFT. Compared to the conventional algorithm, the proposed DFT-LS-WIENER outperform them.

12.
Comput Intell Neurosci ; 2022: 7451551, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36188684

RESUMO

Machine learning has already been used as a resource for disease detection and health care as a complementary tool to help with various daily health challenges. The advancement of deep learning techniques and a large amount of data-enabled algorithms to outperform medical teams in certain imaging tasks, such as pneumonia detection, skin cancer classification, hemorrhage detection, and arrhythmia detection. Automated diagnostics, which are enabled by images extracted from patient examinations, allow for interesting experiments to be conducted. This research differs from the related studies that were investigated in the experiment. These works are capable of binary categorization into two categories. COVID-Net, for example, was able to identify a positive case of COVID-19 or a healthy person with 93.3% accuracy. Another example is CHeXNet, which has a 95% accuracy rate in detecting cases of pneumonia or a healthy state in a patient. Experiments revealed that the current study was more effective than the previous studies in detecting a greater number of categories and with a higher percentage of accuracy. The results obtained during the model's development were not only viable but also excellent, with an accuracy of nearly 96% when analyzing a chest X-ray with three possible diagnoses in the two experiments conducted.


Assuntos
COVID-19 , Aprendizado Profundo , Pneumonia , COVID-19/diagnóstico por imagem , Humanos , Redes Neurais de Computação , Pneumonia/diagnóstico por imagem , SARS-CoV-2 , Tomografia Computadorizada por Raios X/métodos , Raios X
13.
Biomed Res Int ; 2022: 9449497, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35845927

RESUMO

By comparing the performance of various tree algorithms, we can determine which one is most useful for analyzing biomedical data. In artificial intelligence, decision trees are a classification model known for their visual aid in making decisions. WEKA software will evaluate biological data from real patients to see how well the decision tree classification algorithm performs. Another goal of this comparison is to assess whether or not decision trees can serve as an effective tool for medical diagnosis in general. In doing so, we will be able to see which algorithms are the most efficient and appropriate to use when delving into this data and arrive at an informed decision.


Assuntos
Algoritmos , Inteligência Artificial , Humanos , Software
14.
Sensors (Basel) ; 22(6)2022 Mar 09.
Artigo em Inglês | MEDLINE | ID: mdl-35336282

RESUMO

The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or servers using an open channel, i.e., internet. However, such centralized system based on IIoT provides more vulnerabilities to security and privacy in IIoT networks. In order to resolve these issues, we present a blockchain-based deep-learning framework that provides two levels of security and privacy. First a blockchain scheme is designed where each participating entities are registered, verified, and thereafter validated using smart contract based enhanced Proof of Work, to achieve the target of security and privacy. Second, a deep-learning scheme with a Variational AutoEncoder (VAE) technique for privacy and Bidirectional Long Short-Term Memory (BiLSTM) for intrusion detection is designed. The experimental results are based on the IoT-Botnet and ToN-IoT datasets that are publicly available. The proposed simulations results are compared with the benchmark models and it is validated that the proposed framework outperforms the existing system.


Assuntos
Blockchain , Aprendizado Profundo , Segurança Computacional , Internet , Privacidade
15.
Comput Math Methods Med ; 2022: 8332737, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35281947

RESUMO

The goal of this study is to see how cold plasma affects rabbit bone tissue infected with osteoporosis. The search is divided into three categories: control, infected, and treated. The rabbits were subjected to cold plasma for five minutes in a room with a microwave plasma voltage of "175 V" and a gas flow of "2." A histopathological photograph of infected bone cells is obtained to demonstrate the influence of plasma on infected bone cells, as well as the extent of destruction and effect of plasma therapy before and after exposure. The findings of the search show that plasma has a clear impact on Ca and vitamin D levels. In the cold plasma, the levels of osteocalcin and alkali phosphates (ALP) respond as well. Image processing techniques (second-order gray level matrix) with textural elements are employed as an extra proof. The outcome gives good treatment indicators, and the image processing result corresponds to the biological result.


Assuntos
Osteoporose/terapia , Gases em Plasma/uso terapêutico , Animais , Osso e Ossos/diagnóstico por imagem , Osso e Ossos/metabolismo , Cálcio/metabolismo , Biologia Computacional , Modelos Animais de Doenças , Feminino , Processamento de Imagem Assistida por Computador/métodos , Processamento de Imagem Assistida por Computador/estatística & dados numéricos , Osteoporose/diagnóstico por imagem , Osteoporose/fisiopatologia , Fósforo/sangue , Coelhos , Vitamina D/metabolismo
16.
Comput Intell Neurosci ; 2022: 4569879, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35222627

RESUMO

This study focuses on hybrid synchronization, a new synchronization phenomenon in which one element of the system is synced with another part of the system that is not allowing full synchronization and nonsynchronization to coexist in the system. When lim t ⟶ ∞ Y - α X = 0 , where Y and X are the state vectors of the drive and response systems, respectively, and Wan (α = ∓1)), the two systems' hybrid synchronization phenomena are realized mathematically. Nonlinear control is used to create four alternative error stabilization controllers that are based on two basic tools: Lyapunov stability theory and the linearization approach.


Assuntos
Mídias Sociais , Algoritmos , Simulação por Computador , Humanos , Dinâmica não Linear
17.
Sensors (Basel) ; 22(4)2022 Feb 13.
Artigo em Inglês | MEDLINE | ID: mdl-35214350

RESUMO

Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effective results. Although this technology offers extraordinary results, but at the same time, it also offers multifarious security perils that need to be handled effectively to preserve the trust among all engaged stakeholders. For this, the literature proposes several authentications and data preservation schemes, but somehow they fail to tackle this issue with effectual results. Keeping in view, these constraints, in this paper, we proposed a lightweight authentication and data preservation scheme for IoT based-CPS utilizing deep learning (DL) to facilitate decentralized authentication among legal devices. With decentralized authentication, we have depreciated the validation latency among pairing devices followed by improved communication statistics. Moreover, the experimental results were compared with the benchmark models to acknowledge the significance of our model. During the evaluation phase, the proposed model reveals incredible advancement in terms of comparative parameters in comparison with benchmark models.


Assuntos
Segurança Computacional , Internet das Coisas , Comunicação , Atenção à Saúde , Tecnologia
18.
Sensors (Basel) ; 22(2)2022 Jan 12.
Artigo em Inglês | MEDLINE | ID: mdl-35062530

RESUMO

The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible to various security vulnerabilities. Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. In literature, blockchain-enabled frameworks have been presented to resolve those issues. However, these methods have primarily focused on data storage and blockchain is used as a database. In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. Additionally, the proposed approach provides a secure key revocation mechanism and updates various policies accordingly. As a result, a secure patient healthcare data access scheme is devised, which integrates blockchain and trust chain to fulfill the efficiency and security issues in the current schemes for sharing both types of digital healthcare data. Hence, our proposed approach provides more security, efficiency, and transparency with cost-effectiveness. We performed our simulations based on the blockchain-based tool Hyperledger Fabric and OrigionLab for analysis and evaluation. We compared our proposed results with the benchmark models, respectively. Our comparative analysis justifies that our proposed framework provides better security and searchable mechanism for the healthcare system.


Assuntos
Blockchain , Registros de Saúde Pessoal , Atenção à Saúde , Humanos , Redes Neurais de Computação , Reprodutibilidade dos Testes
19.
PLoS One ; 16(11): e0258788, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34758022

RESUMO

The educational research is increasingly emphasizing the potential of student engagement and its impact on performance, retention and persistence. This construct has emerged as an important paradigm in the higher education field for many decades. However, evaluating and predicting the student's engagement level in an online environment remains a challenge. The purpose of this study is to suggest an intelligent predictive system that predicts the student's engagement level and then provides the students with feedback to enhance their motivation and dedication. Three categories of students are defined depending on their engagement level (Not Engaged, Passively Engaged, and Actively Engaged). We applied three different machine-learning algorithms, namely Decision Tree, Support Vector Machine and Artificial Neural Network, to students' activities recorded in Learning Management System reports. The results demonstrate that machine learning algorithms could predict the student's engagement level. In addition, according to the performance metrics of the different algorithms, the Artificial Neural Network has a greater accuracy rate (85%) compared to the Support Vector Machine (80%) and Decision Tree (75%) classification techniques. Based on these results, the intelligent predictive system sends feedback to the students and alerts the instructor once a student's engagement level decreases. The instructor can identify the students' difficulties during the course and motivate them through e-mail reminders, course messages, or scheduling an online meeting.


Assuntos
Educação a Distância/métodos , Motivação , Redes Neurais de Computação , Estudantes/psicologia , Máquina de Vetores de Suporte , Correio Eletrônico , Retroalimentação Psicológica , Humanos , Resolução de Problemas , Aprendizagem Baseada em Problemas/métodos , Envio de Mensagens de Texto , Universidades , Comunicação por Videoconferência
20.
Comput Intell Neurosci ; 2021: 1220374, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-35047026

RESUMO

In gynecological care, mHealth (mobile health) technology may play an important role. Medical professionals' willingness to use this technology is the key to its acceptance. Most doctors utilize mobile health technology; however, there is still room for improvement in the use of mHealth. Gynecologists were asked to participate in this research to see how open they were to use mobile health technologies. In this descriptive-analytical investigation, the researchers determined the average scores for each variable. The overall mean for preparedness to embrace mobile medical technology is 1.8 out of 2, as shown in Table 1. When it came to their desire to embrace mobile health technology, doctors' years of experience correlated negatively with their age. According to our findings, the amount of interest in mobile health technology is high. Patients' private information must be protected throughout the usage of this technology though. Mobile health technology may effectively reach patients in remote areas, but it is not a substitute for face-to-face encounters with medical professionals.


Assuntos
Aplicativos Móveis , Telemedicina , Tecnologia Biomédica , Humanos , Tecnologia
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...