Results 311 to 320 of about 667,722 (335)
ABSTRACT Smallholder farmers are reverting to traditional production methods due to the high opportunity costs and unintended consequences of new technologies. This study focuses on row planting technology, which is labor‐intensive and slow without mechanized operations.
Emmanuel Tetteh Jumpah+4 more
wiley +1 more source
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions. [PDF]
Alotaibi A, Aldawghan H, Aljughaiman A.
europepmc +1 more source
Employing large language models safely and effectively as a practicing neurosurgeon. [PDF]
Patil A+5 more
europepmc +1 more source
Privacy Relevance and Disclosure Intention in Mobile Apps: The Mediating and Moderating Roles of Privacy Calculus and Temporal Distance. [PDF]
Chen M, Chen M.
europepmc +1 more source
Principles and implementation strategies for equitable and representative academic partnerships in global health informatics research. [PDF]
Campbell E+7 more
europepmc +1 more source
Overcoming Challenges in Video-Based Health Monitoring: Real-World Implementation, Ethics, and Data Considerations. [PDF]
Ferreira S+5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 2016
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Nathan Clarke+3 more
openaire +2 more sources
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Nathan Clarke+3 more
openaire +2 more sources
Privacy Petri Net and Privacy Leak Software
Journal of Computer Science and Technology, 2015Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the ...
Lejun Fan+4 more
openaire +2 more sources