Results 61 to 70 of about 86,113 (173)

You, Me, and the AI: The Role of Third‐Party Human Teammates for Trust Formation Toward AI Teammates

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT As artificial intelligence (AI) becomes increasingly integrated in teams, understanding the factors that drive trust formation between human and AI teammates becomes crucial. Yet, the emergent literature has overlooked the impact of third parties on human‐AI teaming.
Türkü Erengin   +2 more
wiley   +1 more source

Detecting Deception and Ensuring Data Integrity in a Nationwide mHealth Randomized Controlled Trial: Factorial Design Survey Study

open access: yesJournal of Medical Internet Research
BackgroundSocial behavioral research studies have increasingly shifted to remote recruitment and enrollment procedures. This shifting landscape necessitates evolving best practices to help mitigate the negative impacts of ...
Krista M Kezbers   +4 more
doaj   +1 more source

A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization

open access: yes, 2017
Existing Android malware detection approaches use a variety of features such as security sensitive APIs, system calls, control-flow structures and information flows in conjunction with Machine Learning classifiers to achieve accurate detection.
Chandramohan, Mahinthan   +3 more
core   +1 more source

Key Technical Fields and Future Outlooks of Space Manipulators: A Survey

open access: yesSmartBot, EarlyView.
This paper systematically reviews the technological development of space manipulators, emphasizing the unique challenges posed by space environments. It examines four areas: structural design, modeling, planning, and control, while introducing typical ground test platforms.
Gang Chen   +12 more
wiley   +1 more source

Conceptual evidence collection and analysis methodology for Android devices

open access: yes, 2015
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa   +23 more
core   +1 more source

A Multi‐Node Wearable Monitoring System for Firefighters With Edge AI and LoRa‐BLE Heterogeneous Communication

open access: yesSafety Science and Technology, EarlyView.
A multinode wearable system tailored for firefighters is presented, featuring LoRa‐BLE heterogeneous communication and edge‐side deep learning. It integrates a lightweight 1D‐CNN for real‐time posture recognition and an adaptive Physiological Strain Index (aPSI) model, ensuring reliable status monitoring and safety warning in complex fireground ...
Chongyuan Ni   +8 more
wiley   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Exploring the determinants of malnutrition in 2–5 year Iranian children using structural equation modeling: national food and nutrition surveillance

open access: yesBMC Public Health
Background Childhood malnutrition remains a critical public health challenge in low- and middle-income countries, contributing significantly to morbidity and mortality among children aged 2–5 years.
Samira Rabiei   +9 more
doaj   +1 more source

Preserving evidence integrity in full file system extractions: Assessing hash inconsistencies and potential solutions

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley   +1 more source

Immersive Learning With AI‐Enhanced Virtual Dental Standardized Patient

open access: yes
Journal of Dental Education, EarlyView.
Betti Shahin   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy