Results 61 to 70 of about 55,115 (255)
ABSTRACT Objective Recent growth of online research has been accompanied by an increase in reports of fraudulent participants, which can significantly comprise research validity. Drawing from our experience using Qualtrics with open recruitment, existing literature, and emerging studies in eating disorders (ED), we outline the risk and provide simple ...
Jamie‐Lee Pennesi +2 more
wiley +1 more source
Password Policy Purgatory [PDF]
IT system users, (all of us), and administrators, (increasingly large numbers of us), must all manage some passwords. In this article, the author reviews some issues related to password policies and concludes that managing passwords, in any sensible manner, is becoming more and more of a nuisance for users, a factor that should be to the forefront when
openaire +3 more sources
Predicting Graphical Passwords [PDF]
Over the last decade, the popularity of graphical passwords has increased tremendously. They can now be found on various devices and systems, including platforms such as the Windows 8 and Android operating systems. In this paper, we focus on the PassPoints graphical-password scheme and investigate the extent to which these passwords might be predicted ...
Devlin, M +4 more
openaire +2 more sources
A recyclable triboelectric nanogenerator integrating a pseudo‐honeycomb microstructure with liquid metal doping achieves 120% higher output (122 mW m−2) and >90% retention over seven cycles, enabling self‐powered smart home functions. The performance of single‐electrode triboelectric nanogenerators (SE‐TENGs) is governed by the effective contact area ...
Chencheng Hu +10 more
wiley +1 more source
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel +5 more
wiley +1 more source
Major authentication technologies used in corporate information systems are reviewed. Advantages, disadvantages and applications of various authentication methods are analyzed.
O. V. Kulikova
doaj
A high‐performance wearable triboelectric nanogenerator (TENG) based on polyethyleneimine ‐doped cellulose acetate is demonstrated for dynamic signature authentication. The developed TENG with enhanced interfacial polarization and increased surface charge density exhibits excellent mechanical durability, environmental stability, and long‐term ...
Yoon‐Seo Choi +3 more
wiley +1 more source
Precision planter monitoring system based on mobile communication network
Abstract Sowing is an important link in agricultural production and the basis for ensuring high yields and bumper harvests. Agriculture requires precision plows with good performance and stable work. However, the seeding process is in a completely closed state, and the operator relies mainly on experience to judge the operating state and performance of
Bing Li, Jiyun Li
wiley +1 more source
ABSTRACT Sustainable and equitable governance of water resources is among the most pressing global challenges, emphasising the need for innovations towards transitions in the water sector. Innovations for stakeholder engagement can contribute to such transitions through public participation and cross‐sectoral collaboration.
Anne Ellermann +7 more
wiley +1 more source

