Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
69,982
result(s) for
"SECURITY DEVICES"
Sort by:
Applied approach to privacy and security for the internet of things
\"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare\"-- Provided by publisher.
An End-to-End Bidirectional Authentication System for Pallet Pooling Management Through Blockchain Internet of Things (BIoT)
by
Wu, C H
,
Chen, Qiyang
,
Tsang, Y P
in
Blockchains (Databases)
,
Business logistics
,
Case studies
2021
Pallet pooling is regarded as a sustainable and cost-effective measure for the industry, but challenging to advocate due to weak data and pallet authentication.In order to establish trust between end-users and pallet pooling services, we propose an end-to-end, bidirectional authentication system for transmitted data and pallets based on blockchain and Internet-of-things (IoT) technologies. In addition, secure data authentication fosters the pallet authenticity in the whole supply chain network, which is achieved by considering the tag, location, and object-specific features. To evaluate the object-specific features, the scale invariant feature transform (SIFT) approach is adopted to match key-points and descriptors between two pallet images. According to the case study, it is found that the proposed system provides a low bandwidth blocking rate and a high probability of restoring complete data payloads. Consequently, positive influences on end-user satisfaction, quality of service, operational errors, and pallet traceability are achieved through the deployment of the proposed system.
Journal Article
Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain
2022
Since the beginning of the new century, all manufacturing enterprises have been seeking ways to transform and upgrade the systems to maintain their competitive advantages. In the process of transformation and upgrading, service innovation has become more vital. In the service innovation mode, customers and suppliers are mainly involved in the manufacture of products. In the process of communication, these suppliers and customers need to rely on public key infrastructure (PKI) for data encryption and identity authentication operations, thereby achieving reliable information exchange and identity authentication in an untrusted environment. Therefore, ensuring the security of network communication for various types of users is crucial. The purpose of this paper is to solve the problem that results when a tampered certificate is difficult to trace due to the single point of failure and vulnerability of the current settlement and authentication system. In this scenario, the user's identity information is leaked in the certificate application. Resolving this problem is necessary to ensure the security of the information network.
Journal Article
Get going with Amazon Echo and Alexa : in easy steps
\"The days of only being able to search for items on computers using text searches are long gone: voice search is rapidly becoming one of the most popular ways to find content on computing devices and the Web. One of the leaders in this area is the Amazon Echo, a high-quality speaker which uses Alexa ... to perform a range of tasks from playing music and making calls to smartphones, to answering questions and even controlling compatible devices in the home, such as turning on the heating ... [This book] leads you through the process of setting up the Amazon Echo, connecting it to your home wifi network and then controlling much of its functionality, so that you can start making the most of your digital personal assistant\"--ONIX annotation.
Reducing the use of screen electronic devices in the evening is associated with improved sleep and daytime vigilance in adolescents
by
Haller, Dagmar M
,
Ghisletta, Paolo
,
Afyouni, Alia
in
Academic achievement
,
Childhood
,
Children
2019
The use of screen electronic devices in the evening negatively affects sleep. Yet, sleep is known to be essential for brain maturation and a key factor for good academic performance, and thus is particularly critical during childhood and adolescence. Although previous studies reported associations between screen time and sleep impairment, their causal relationship in adolescents remains unclear. Using actigraphy and daily questionnaires in a large sample of students (12 to 19 years old), we assessed screen time in the evening and sleep habits over 1 month. This included a 2 week baseline phase, followed by a 40 min sleep education workshop and a 2 week interventional phase, in which participants were asked to stop using screen devices after 9 pm during school nights. During the interventional phase, we found that the reduction of screen time after 9 pm correlated with earlier sleep onset time and increased total sleep duration. The latter led to improved daytime vigilance. These findings provide evidence that restricting screen use in the evening represents a valid and promising approach for improving sleep duration in adolescents, with potential implications for daytime functioning and health.
Journal Article
Point-of-care, smartphone-based, dual-modality, dual-view, oral cancer screening device with neural network classification for low-resource communities
by
Kuriakose, Moni Abraham
,
Birur, Praveen
,
Uthoff, Ross D.
in
Applications programs
,
Artificial neural networks
,
Bioengineering
2018
Oral cancer is a growing health issue in a number of low- and middle-income countries (LMIC), particularly in South and Southeast Asia. The described dual-modality, dual-view, point-of-care oral cancer screening device, developed for high-risk populations in remote regions with limited infrastructure, implements autofluorescence imaging (AFI) and white light imaging (WLI) on a smartphone platform, enabling early detection of pre-cancerous and cancerous lesions in the oral cavity with the potential to reduce morbidity, mortality, and overall healthcare costs. Using a custom Android application, this device synchronizes external light-emitting diode (LED) illumination and image capture for AFI and WLI. Data is uploaded to a cloud server for diagnosis by a remote specialist through a web app, with the ability to transmit triage instructions back to the device and patient. Finally, with the on-site specialist's diagnosis as the gold-standard, the remote specialist and a convolutional neural network (CNN) were able to classify 170 image pairs into 'suspicious' and 'not suspicious' with sensitivities, specificities, positive predictive values, and negative predictive values ranging from 81.25% to 94.94%.
Journal Article
\From the moment I wake up I will use it...every day, very hour\: a qualitative study on the patterns of adolescents' mobile touch screen device use from adolescent and parent perspectives
2019
Background The use of mobile touch screen devices, e.g. smartphones and tablet computers, has become increasingly prevalent among adolescents. However, little is known about how adolescents use these devices and potential influences on their use. Hence, this qualitative study explored adolescents' perceptions on their patterns of use and factors influencing use, and perceptions and concerns from parents. Methods Semi-structured interviews were conducted with adolescents (n = 36; 11 to 18 years) and their parents/caregivers (n = 28) in Singapore recruited to represent males and females across a range of ages from different socioeconomic groups. Prompts covered weekday and weekend use patterns, types of activities, perspectives on amount of use, parental control measures and concerns. Interviews were recorded and transcribed. Transcripts were coded and thematic analysis was carried out. Results Smartphone was the most common mobile device owned and used by many of the adolescents, while only some used a tablet. Many adolescents and their parents felt that adolescents' MTSD use was high, frequent and ubiquitous, with frequent checking of device and multitasking during use. Reported influences of use included functional, personal and external influences. Some of the influences were irresistibility of mobile devices, lack of self-control, entertainment or relaxation value, and high use by peers, family and for schoolwork that contributed to high use, or school/parental control measures and lack of internet availability that limited use. Most adolescents were generally unconcerned about their use and perceived their usage as appropriate, while most parents expressed several concerns about their adolescents' use and perceived their usage as excessive. Conclusions This study has provided rich insights into the patterns and influences of contemporary mobile device use by adolescents. Mobile device use has become an integral part of adolescents' daily routines, and was affected by several functional, personal and external influences which either facilitated or limited their use. There also seemed to be a strong inclination for adolescents to frequently check and use their mobile devices. There is an urgent need to understand the implications of these common adolescent behaviours to inform advice for wise mobile device use by adolescents. Keywords: Adolescent, Mobile touch screen device, Smartphone, Tablet computer, Qualitative research
Journal Article