Results 101 to 110 of about 95,083 (206)

Comparison of Haemoglobin Concentrations From Venous and From Finger‐Pricked Capillary Blood in a Region With a High Prevalence of Anaemia in Ethiopia

open access: yesMaternal &Child Nutrition, EarlyView.
ABSTRACT This cross‐sectional study was conducted in the Somali Regional State in Ethiopia. The purpose of the study was to compare haemoglobin (Hb) concentrations from venous and finger‐pricked capillary blood using the HemoCue 301 as well as estimating anaemia prevalence. Participants were non‐pregnant women of reproductive age (WRA), 18–49 years old
Desalegn Kuche   +9 more
wiley   +1 more source

A Proof‐of‐Concept Study of Gamified Rhythmic Training in Preadolescents Who Stutter

open access: yesAnnals of the New York Academy of Sciences, EarlyView.
ABSTRACT Stuttering is a developmental speech fluency disorder linked to timing deficits in speech motor control. Given the shared neural mechanisms between rhythmic timing and speech production, rhythm‐based interventions may hold promise for stuttering.
Kevin Jamey   +4 more
wiley   +1 more source

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

open access: yesWorkshop in Information Security Theory and Practice, 2013
Daniel Schreckling   +3 more
semanticscholar   +1 more source

AI‐driven perception management and political soft power: Insights from expert interviews

open access: yesAI Magazine, Volume 47, Issue 1, Spring 2026.
Abstract This study explores the role of artificial intelligence (AI) in perception management as an emerging tool of political soft power. Drawing on the theoretical frameworks of social psychology, strategic communication, and political communication, the research investigates how AI‐assisted strategies influence public perception, image, and trust ...
Özkul Haraç, Ayhan Dolunay
wiley   +1 more source

Immersive Gamified Training Simulations for Visualization of Structural Maintenance With Virtual Reality

open access: yesComputer Applications in Engineering Education, Volume 34, Issue 2, March 2026.
ABSTRACT Identification of damage and key structural elements is vital to the monitoring and management of civil engineering projects, education, and training. However, practical inspection training is often constrained by cost, safety risk, and limited access to real structures, which reduces opportunities for repeated practice and feedback‐rich ...
Elliott Carter   +3 more
wiley   +1 more source

Consumer Acceptance of High‐Autonomy AI Assistants Is Driven by Perceived Benefits in Online Shopping Settings Characterized by Scarcity

open access: yesPsychology &Marketing, Volume 43, Issue 3, Page 538-555, March 2026.
ABSTRACT Across one behavioral field experiment and four controlled online experiments with almost 2000 US and UK shoppers, the current research investigates the role of perceived benefits in driving consumer acceptance of highly autonomous artificial intelligence (AI), while also examining whether contextual factors, such as scarcity, influence this ...
Darius‐Aurel Frank   +2 more
wiley   +1 more source

Cross‐Cultural Patterns in Artificial Intelligence Literacy Development: Investigating Country and Gender Differences Among Pre‐Service Teachers in Germany and Türkiye

open access: yesEuropean Journal of Education, Volume 61, Issue 1, March 2026.
ABSTRACT As artificial intelligence (AI) rapidly transforms educational landscapes worldwide, developing AI literacy among pre‐service teachers has become increasingly crucial for effective classroom integration and responsible implementation. This comparative study examines AI literacy levels among pre‐service teachers in Türkiye (Turkey officially ...
Meltem Aksoy   +4 more
wiley   +1 more source

Taboos as Drivers for Counterculture: Normalizing Misogyny in Incel Communities and Beyond

open access: yes
Journal of Social Philosophy, EarlyView.
Mihaela Popa‐Wyatt, Justina Berškytė
wiley   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Evolving Digital Transformation in SMEs: Transitioning From Outsourcing to Internal Integration

open access: yesInformation Systems Journal, Volume 36, Issue 2, Page 199-213, March 2026.
ABSTRACT Organisations across various industries continually strive to implement digital transformation (DT) to enhance customer experience and generate new revenue streams. Successful DT journeys require adopting new technologies alongside a comprehensive set of organisational capabilities and skills, heightening the challenge for small and medium ...
Luis Jordan‐de‐Urries   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy