Results 71 to 80 of about 35,630 (203)
Accountability in the Delivery of Guaranteed Employment Through MGNREGA in Rural India
ABSTRACT We use the uneven rollout of accountability measures to identify their impact on the provision of guaranteed employment in rural Andhra Pradesh and Telangana, India. A public information campaign combined with an NGO‐supported grievance mechanism resulted in treated households working over 10 additional days per year in the program. We find no
Tara Bedi, Lukas Kuld
wiley +1 more source
Critical success factors for preventing E-banking fraud [PDF]
E-Banking fraud is an issue being experienced globally and is continuing to prove costly to both banks and customers. Frauds in e-banking services occur as a result of various compromises in security ranging from weak authentication systems to ...
Shah, Mahmood
core +1 more source
ABSTRACT The common bottlenose dolphin (Tursiops truncatus) is a resident species along the Portuguese mainland coast, yet knowledge of its stranding patterns and feeding ecology is scarce. This study presents a comprehensive assessment of strandings (n = 264, from 1980 to 2019) and feeding ecology based on stomach content analysis (n = 43 from 1997 to
Ana Marçalo +13 more
wiley +1 more source
An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning
Traditional authentication systems use alphanumeric or graphical passwords, or token-based techniques that require “something you know and something you have”. The disadvantages of these systems include the risks of forgetfulness, loss, and
Ebrahim Al Alkeem +6 more
doaj +1 more source
This review critically examines clinical studies on both conventional and machine learning (ML)‐integrated diffuse optical spectroscopy and imaging methods for dermatological applications, with a primary focus on the past decade and inclusion of earlier foundational work where appropriate.
Iftak Hussain +7 more
wiley +1 more source
A schema for cryptographic keys generation using hybrid biometrics [PDF]
Biometric identifiers refer to unique physical properties or behavioural attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly
Donelan, Helen +2 more
core
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
Empowering Biometric Security: A Paradigm Shift in Remote Identification
Context: In an increasingly digital world, the need for secure and reliable identity verification is more critical than ever. Biometric authentication stands out due to its inherent uniqueness and resistance to forgery, yet its performance is still ...
Yacine Belhocine +3 more
doaj +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
Development of Universal Biometric Authentication Modules for Managing Permissions to Windows XP
This paper describes the universal biometric authentication developed modules for the managing permissions to the operating system Windows XP. These modules are effective and convenient tools to solve the challenges of deployment any biometric ...
Alexey Nikolaevich Ruchay
doaj

