Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
69,982 result(s) for "SECURITY DEVICES"
Sort by:
Applied approach to privacy and security for the internet of things
\"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare\"-- Provided by publisher.
An End-to-End Bidirectional Authentication System for Pallet Pooling Management Through Blockchain Internet of Things (BIoT)
Pallet pooling is regarded as a sustainable and cost-effective measure for the industry, but challenging to advocate due to weak data and pallet authentication.In order to establish trust between end-users and pallet pooling services, we propose an end-to-end, bidirectional authentication system for transmitted data and pallets based on blockchain and Internet-of-things (IoT) technologies. In addition, secure data authentication fosters the pallet authenticity in the whole supply chain network, which is achieved by considering the tag, location, and object-specific features. To evaluate the object-specific features, the scale invariant feature transform (SIFT) approach is adopted to match key-points and descriptors between two pallet images. According to the case study, it is found that the proposed system provides a low bandwidth blocking rate and a high probability of restoring complete data payloads. Consequently, positive influences on end-user satisfaction, quality of service, operational errors, and pallet traceability are achieved through the deployment of the proposed system.
Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain
Since the beginning of the new century, all manufacturing enterprises have been seeking ways to transform and upgrade the systems to maintain their competitive advantages. In the process of transformation and upgrading, service innovation has become more vital. In the service innovation mode, customers and suppliers are mainly involved in the manufacture of products. In the process of communication, these suppliers and customers need to rely on public key infrastructure (PKI) for data encryption and identity authentication operations, thereby achieving reliable information exchange and identity authentication in an untrusted environment. Therefore, ensuring the security of network communication for various types of users is crucial. The purpose of this paper is to solve the problem that results when a tampered certificate is difficult to trace due to the single point of failure and vulnerability of the current settlement and authentication system. In this scenario, the user's identity information is leaked in the certificate application. Resolving this problem is necessary to ensure the security of the information network.
Get going with Amazon Echo and Alexa : in easy steps
\"The days of only being able to search for items on computers using text searches are long gone: voice search is rapidly becoming one of the most popular ways to find content on computing devices and the Web. One of the leaders in this area is the Amazon Echo, a high-quality speaker which uses Alexa ... to perform a range of tasks from playing music and making calls to smartphones, to answering questions and even controlling compatible devices in the home, such as turning on the heating ... [This book] leads you through the process of setting up the Amazon Echo, connecting it to your home wifi network and then controlling much of its functionality, so that you can start making the most of your digital personal assistant\"--ONIX annotation.
Reducing the use of screen electronic devices in the evening is associated with improved sleep and daytime vigilance in adolescents
The use of screen electronic devices in the evening negatively affects sleep. Yet, sleep is known to be essential for brain maturation and a key factor for good academic performance, and thus is particularly critical during childhood and adolescence. Although previous studies reported associations between screen time and sleep impairment, their causal relationship in adolescents remains unclear. Using actigraphy and daily questionnaires in a large sample of students (12 to 19 years old), we assessed screen time in the evening and sleep habits over 1 month. This included a 2 week baseline phase, followed by a 40 min sleep education workshop and a 2 week interventional phase, in which participants were asked to stop using screen devices after 9 pm during school nights. During the interventional phase, we found that the reduction of screen time after 9 pm correlated with earlier sleep onset time and increased total sleep duration. The latter led to improved daytime vigilance. These findings provide evidence that restricting screen use in the evening represents a valid and promising approach for improving sleep duration in adolescents, with potential implications for daytime functioning and health.
Point-of-care, smartphone-based, dual-modality, dual-view, oral cancer screening device with neural network classification for low-resource communities
Oral cancer is a growing health issue in a number of low- and middle-income countries (LMIC), particularly in South and Southeast Asia. The described dual-modality, dual-view, point-of-care oral cancer screening device, developed for high-risk populations in remote regions with limited infrastructure, implements autofluorescence imaging (AFI) and white light imaging (WLI) on a smartphone platform, enabling early detection of pre-cancerous and cancerous lesions in the oral cavity with the potential to reduce morbidity, mortality, and overall healthcare costs. Using a custom Android application, this device synchronizes external light-emitting diode (LED) illumination and image capture for AFI and WLI. Data is uploaded to a cloud server for diagnosis by a remote specialist through a web app, with the ability to transmit triage instructions back to the device and patient. Finally, with the on-site specialist's diagnosis as the gold-standard, the remote specialist and a convolutional neural network (CNN) were able to classify 170 image pairs into 'suspicious' and 'not suspicious' with sensitivities, specificities, positive predictive values, and negative predictive values ranging from 81.25% to 94.94%.
\From the moment I wake up I will use it...every day, very hour\: a qualitative study on the patterns of adolescents' mobile touch screen device use from adolescent and parent perspectives
Background The use of mobile touch screen devices, e.g. smartphones and tablet computers, has become increasingly prevalent among adolescents. However, little is known about how adolescents use these devices and potential influences on their use. Hence, this qualitative study explored adolescents' perceptions on their patterns of use and factors influencing use, and perceptions and concerns from parents. Methods Semi-structured interviews were conducted with adolescents (n = 36; 11 to 18 years) and their parents/caregivers (n = 28) in Singapore recruited to represent males and females across a range of ages from different socioeconomic groups. Prompts covered weekday and weekend use patterns, types of activities, perspectives on amount of use, parental control measures and concerns. Interviews were recorded and transcribed. Transcripts were coded and thematic analysis was carried out. Results Smartphone was the most common mobile device owned and used by many of the adolescents, while only some used a tablet. Many adolescents and their parents felt that adolescents' MTSD use was high, frequent and ubiquitous, with frequent checking of device and multitasking during use. Reported influences of use included functional, personal and external influences. Some of the influences were irresistibility of mobile devices, lack of self-control, entertainment or relaxation value, and high use by peers, family and for schoolwork that contributed to high use, or school/parental control measures and lack of internet availability that limited use. Most adolescents were generally unconcerned about their use and perceived their usage as appropriate, while most parents expressed several concerns about their adolescents' use and perceived their usage as excessive. Conclusions This study has provided rich insights into the patterns and influences of contemporary mobile device use by adolescents. Mobile device use has become an integral part of adolescents' daily routines, and was affected by several functional, personal and external influences which either facilitated or limited their use. There also seemed to be a strong inclination for adolescents to frequently check and use their mobile devices. There is an urgent need to understand the implications of these common adolescent behaviours to inform advice for wise mobile device use by adolescents. Keywords: Adolescent, Mobile touch screen device, Smartphone, Tablet computer, Qualitative research