Results 311 to 320 of about 667,722 (335)

Examining the Impact of Row Planting on Labor Use for Sustainable Food Production Among Maize Farmers in Rural Ghana

open access: yesAgribusiness, EarlyView.
ABSTRACT Smallholder farmers are reverting to traditional production methods due to the high opportunity costs and unintended consequences of new technologies. This study focuses on row planting technology, which is labor‐intensive and slow without mechanized operations.
Emmanuel Tetteh Jumpah   +4 more
wiley   +1 more source

Employing large language models safely and effectively as a practicing neurosurgeon. [PDF]

open access: yesActa Neurochir (Wien)
Patil A   +5 more
europepmc   +1 more source

Bridging Data Silos in Oncology with Modular Software for Federated Analysis on Fast Healthcare Interoperability Resources: Multisite Implementation Study.

open access: yesJ Med Internet Res
Ziegler J   +30 more
europepmc   +1 more source

Principles and implementation strategies for equitable and representative academic partnerships in global health informatics research. [PDF]

open access: yesJ Am Med Inform Assoc
Campbell E   +7 more
europepmc   +1 more source

Video recording in GI endoscopy. [PDF]

open access: yesVideoGIE
Bazerbachi F   +10 more
europepmc   +1 more source

Software Defined Privacy

2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 2016
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Nathan Clarke   +3 more
openaire   +2 more sources

Privacy Petri Net and Privacy Leak Software

Journal of Computer Science and Technology, 2015
Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the ...
Lejun Fan   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy