Results 61 to 70 of about 305,823 (288)

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Food insecurity and unemployment among immigrants in the United States

open access: yesAmerican Journal of Agricultural Economics, EarlyView.
Abstract Immigrants can be more vulnerable to economic downturns and, during periods of economic hardship, more likely to experience food insecurity compared to natives. This study examines the differential effect of the unemployment rate on the probability of being food insecure among diverse groups of immigrant households relative to natives in the ...
Siwen Zhou   +3 more
wiley   +1 more source

Authentication enhancement of RFID card using an electronically clippable shield and fingerprint-biometrics [PDF]

open access: yes, 2012
Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification.
Abdurahim, Almabruk Shatewi
core  

Using photovoice to understand community perceptions of firearm risks and protective factors among Asian Americans

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract This study used photovoice methodology to explore Asian Americans' perspectives on the root causes and protective factors of firearm violence in their communities. Photovoice provided a participatory platform for community members to document lived experiences and identify priorities for change.
Tsu‐Yin Wu   +4 more
wiley   +1 more source

Valuation Method for Hardware-Software Unites of Trusted Boot

open access: yesБезопасность информационных технологий, 2015
The science-based approach to obtaining integrated assessment of features for hardware-software unites of trusted boot based on an algorithm of receiving a comprehensive measure to assess the effectiveness of protection against unauthorized access and ...
Aleksey Albertovich Modestov   +1 more
doaj  

Access Denied: Barriers for Unauthorized Immigrants Pursuing the American Dream [PDF]

open access: yes, 2015
Millions of immigrants from all around the world are living in the United States without legal authorization. Most have come in search of a better life for themselves or their children, with the belief that through enough hard work, they can achieve the “
McMillen, Kristin
core   +1 more source

Supported Decision‐Making Rights in Behaviour Support Policies

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Disability policy emphasises that people with disability have the right to exercise their will and preferences in their lives, and decision‐making support must be provided to realise this right if they request. One context in which people's will and preferences are often restricted is behaviour support.
Sally Robinson   +6 more
wiley   +1 more source

Obfuscation of combination circuits of digital devices from unauthorized access

open access: yesInformatika, 2019
The problems of designing modern VLSI and SoC are analyzed. The most difficult problems of design are problems of verification of projects at different stages of design.
L. A. Zolotorevich
doaj  

A process activity monitor for AOS/VS [PDF]

open access: yes
With the ever increasing concern for computer security, users of computer systems are becoming more sensitive to unauthorized access. One of the initial security concerns for the Shuttle Management Information System was the problem of users leaving ...
Chapman, J. S.   +2 more
core   +1 more source

An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

open access: yes, 2017
As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks.
Bray B.   +10 more
core   +1 more source

Home - About - Disclaimer - Privacy