Results 81 to 90 of about 922,831 (255)
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core
This work presents a systematic review of atmospheric turbulence fundamentals, including theoretical formulations and adaptive optics‐based mitigation strategies. This includes an in‐depth examination of the devices, theories, and methodologies associated with traditional correction approaches.
Qinghui Liu+5 more
wiley +1 more source
Poka: A Necro‐Robot Beetle with a Measured Payload Ratio of 6847%
Here, Poka, a necro‐robot beetle with the ability to carry more than 68 times its own weight, is introduced, making it also a walking robot with the highest payload ratio measured to date. This paper is concerned with the design, manufacture and validation of ‘Poka', a novel millimetre‐scale necro‐robot aimed at bridging the performance gap between ...
Yordan Tsvetkov, Parvez Alam
wiley +1 more source
AQUA‐FINS: Advanced Quantitative Underwater Analysis by a Flexible Integrated Nitrate Sensor
This work presents a flexible, integrated sensor array for real‐time monitoring of nitrate, pH, and temperature in aquaculture. The sensors exhibit high sensitivity and selectivity, while a regression model improves nitrate detection accuracy in dynamic conditions. Successful field deployment of the sensor array highlights its potential for maintaining
Shah Zayed Riam+6 more
wiley +1 more source
Economic feasibility of fish cage culture in Lake Victoria, Kenya
The study analyzed the economic viability of cage fish culture in Lake Victoria, Kenya through analysis of input‐output relationship and profitability. The study revealed that cage fish farming in the lake is profitable and worthwhile. Abstract Fish cage culture has rapidly grown throughout Lake Victoria's shores, with Nile tilapia (Oreochromis ...
Kevin Obiero+3 more
wiley +1 more source
Toward optimal multi-objective models of network security: Survey [PDF]
Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed
Huang, W, Maple, C, Viduto, Valentina
core
A 3D‐Printed Microfluidic Sensor Platform for Online Bioprocess Monitoring
A 3D‐printed microfluidic lab‐on‐a‐chip sensor platform is presented, compatible with various cultivation setups, that integrates sensors for pH, pO₂, pCO₂, glucose, lactate, and additionally features a sampling unit for small‐volume abstraction. With this platform, continuous real‐time monitoring of critical bioprocess parameters is enabled and ...
Christopher Heuer+5 more
wiley +1 more source
Graphical Abstract This study deals with a timely topic, COVID‐19, whose impacts on aquaculture have never been quantified in Benin. Direct discussions were held with aquaculture producers to understand how they are feeling the impact of the pandemic on their business.
Toundji Olivier Amoussou+7 more
wiley +1 more source
Firearm-related action recognition and object detection dataset for video surveillance systems
The proposed dataset is comprised of 398 videos, each featuring an individual engaged in specific video surveillance actions. The ground truth for this dataset was expertly curated and is presented in JSON format (standard COCO), offering vital ...
Jesus Ruiz-Santaquiteria+4 more
doaj
U.S. public and private venture capital markets, 1998-2001: A fundamental information analysis [PDF]
Systematic analysis of U.S. capital markets reveals important empirical facts that analytical modeling or empirical research seeking to explain the 1998-2001 movements needs to recognize. There is no single "bubble point" at which U.S.
Armstrong, Chris+3 more
core