Results 71 to 80 of about 35,630 (203)

Accountability in the Delivery of Guaranteed Employment Through MGNREGA in Rural India

open access: yesReview of Development Economics, EarlyView.
ABSTRACT We use the uneven rollout of accountability measures to identify their impact on the provision of guaranteed employment in rural Andhra Pradesh and Telangana, India. A public information campaign combined with an NGO‐supported grievance mechanism resulted in treated households working over 10 additional days per year in the program. We find no
Tara Bedi, Lukas Kuld
wiley   +1 more source

Critical success factors for preventing E-banking fraud [PDF]

open access: yes, 2013
E-Banking fraud is an issue being experienced globally and is continuing to prove costly to both banks and customers. Frauds in e-banking services occur as a result of various compromises in security ranging from weak authentication systems to ...
Shah, Mahmood
core   +1 more source

Foraging Ecology and Fisheries Interactions of Common Bottlenose Dolphins (Tursiops truncatus) Inferred From Strandings in Western Iberian Atlantic Waters

open access: yesMarine Mammal Science, Volume 42, Issue 3, July 2026.
ABSTRACT The common bottlenose dolphin (Tursiops truncatus) is a resident species along the Portuguese mainland coast, yet knowledge of its stranding patterns and feeding ecology is scarce. This study presents a comprehensive assessment of strandings (n = 264, from 1980 to 2019) and feeding ecology based on stomach content analysis (n = 43 from 1997 to
Ana Marçalo   +13 more
wiley   +1 more source

An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning

open access: yesIEEE Access, 2019
Traditional authentication systems use alphanumeric or graphical passwords, or token-based techniques that require “something you know and something you have”. The disadvantages of these systems include the risks of forgetfulness, loss, and
Ebrahim Al Alkeem   +6 more
doaj   +1 more source

A Comprehensive Review of Traditional and Machine Learning‐Assisted Diffuse Optical Spectroscopy and Imaging Techniques for Dermatological Applications

open access: yesAdvanced Photonics Research, Volume 7, Issue 5, May 2026.
This review critically examines clinical studies on both conventional and machine learning (ML)‐integrated diffuse optical spectroscopy and imaging methods for dermatological applications, with a primary focus on the past decade and inclusion of earlier foundational work where appropriate.
Iftak Hussain   +7 more
wiley   +1 more source

A schema for cryptographic keys generation using hybrid biometrics [PDF]

open access: yes, 2006
Biometric identifiers refer to unique physical properties or behavioural attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly
Donelan, Helen   +2 more
core  

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

Empowering Biometric Security: A Paradigm Shift in Remote Identification

open access: yesSystems and Computing
Context: In an increasingly digital world, the need for secure and reliable identity verification is more critical than ever. Biometric authentication stands out due to its inherent uniqueness and resistance to forgery, yet its performance is still ...
Yacine Belhocine   +3 more
doaj   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

Development of Universal Biometric Authentication Modules for Managing Permissions to Windows XP

open access: yesБезопасность информационных технологий, 2013
This paper describes the universal biometric authentication developed modules for the managing permissions to the operating system Windows XP. These modules are effective and convenient tools to solve the challenges of deployment any biometric ...
Alexey Nikolaevich Ruchay
doaj  

Home - About - Disclaimer - Privacy