Results 41 to 50 of about 305,823 (288)

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

Time-Bound Labor Access to the United States: A Four-Way Win for the Middle Class, Low-Skill Workers, Border Security, and Migrants [PDF]

open access: yes, 2013
The US economy needs low-skill workers now more than ever, and that requires a legal channel for the large-scale, employment-based entry of low-skill workers.
Lant Pritchett, Michael A. Clemens
core  

Low Power Optoelectronic Neuromorphic Memristor for In‐Sensor Computing and Multilevel Hardware Security Communications

open access: yesAdvanced Science, EarlyView.
ABSTRACT Conventional software‐based encryption faces mounting limitations in power efficiency and security, inspiring the development of emerging neuromorphic computing hardware encryption. This study presents a hardware‐level multi‐dimensional encryption paradigm utilizing optoelectronic neuromorphic devices with low energy consumption of 3.3 fJ ...
Bo Sun   +3 more
wiley   +1 more source

Tracking Unauthorized Access Using Machine Learning and PCA for Face Recognition Developments

open access: yesInformation, 2022
In the last two decades there has been obtained tremendous improvements in the field of artificial intelligence (AI) especially in the sector of face/facial recognition (FR).
Vasile-Daniel Păvăloaia, George Husac
doaj   +1 more source

Controlling Photochromism of Donor‐Acceptor Stenhouse Adducts on Micro‐Dot Arrays Beyond Human‐Eyes Resolution for Dynamic Light Encryption

open access: yesAdvanced Science, EarlyView.
This study presents a micro‐dot array strategy for dynamic light encryption, utilizing DASA‐based photochromism with resolution beyond human‐eye capacity. By precisely controlling isomerization kinetics, the method reveals multi‐layered encrypted information under specific light irradiation, enhancing information security and anti‐counterfeiting ...
Hongtao Hu   +10 more
wiley   +1 more source

A Closer Look at Access Control in Multi-User Voice Systems

open access: yesIEEE Access
Voice-controlled systems have revolutionized user interactions, making technology more accessible and intuitive across various settings. In multi-user environments, such as households, voice assistants like Amazon Alexa are favored as they enable ...
Hassan A. Shafei, Chiu C. Tan
doaj   +1 more source

Harnessing Large Language Models to Advance Microbiome Research: From Sequence Analysis to Clinical Applications

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models are transforming microbiome research by enabling advanced sequence profiling, functional prediction, and association mining across complex datasets. They automate microbial classification and disease‐state recognition, improving cross‐study integration and clinical diagnostics.
Jieqi Xing   +4 more
wiley   +1 more source

Feature’s Classification of Hardware-Software Unites of Trusted Boot

open access: yesБезопасность информационных технологий, 2013
This paper aims of identifying the main and additional features of hardware-software unites of trusted boot, while confirming the need to evaluate their impact on the protection efficiency against unauthorized access and offering ways of classifying them.
Elizaveta Aleksandrovna Belyaeva   +1 more
doaj  

Web Access Control Vulnerability Detection Approach Based on Site Maps [PDF]

open access: yesJisuanji kexue
Attackers usually exploit access control vulnerabilities in web applications to gain unauthorized access to systems or engage in malicious activities such as data theft.Existing methods for detecting access control vulnerabilities in web applications ...
REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian
doaj   +1 more source

CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls.
V. S. Kolomoitcev
doaj   +1 more source

Home - About - Disclaimer - Privacy