Results 81 to 90 of about 21,877 (187)

Artificial Creativity and Human Fragility

open access: yesModern Theology, EarlyView.
Abstract This article critiques the widespread assumption that generative AI systems exhibit genuine artistic creativity. While such systems can produce novel and aesthetically appealing outputs, assessments based solely on results obscure fundamental differences between human and artificial agents.
Johanna Merz
wiley   +1 more source

A Novel Digital Audio Encryption and Forensics Watermarking Scheme

open access: yesIEEE Access
There are a large amount of audio signals stored in third-party storage centers. To improve the privacy and security of audio signals, a digital audio encryption and forensics watermarking scheme is proposed. We defined the signal energy ratio feature of
Junjie He, Pei Zhu, Zhenghui Liu, Yi Cao
doaj   +1 more source

‘I'm willing to walk into violence’: The impact of personal trauma on staff compassion in secure services

open access: yesPsychology and Psychotherapy: Theory, Research and Practice, EarlyView.
Abstract Objectives Current evidence on the impact of personal trauma on health care professionals is mixed. Some studies suggest a personal history of trauma can be a risk factor for secondary traumatisation. Other research suggests that personal experiences of trauma can help professionals to better recognise their patients' trauma symptoms.
Bethan Owen   +3 more
wiley   +1 more source

Writer Identification Using Inexpensive Signal Processing Techniques

open access: yes, 2009
We propose to use novel and classical audio and text signal-processing and otherwise techniques for "inexpensive" fast writer identification tasks of scanned hand-written documents "visually".
P. Mahalanobis   +9 more
core   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Securing Our Future Homes: Smart Home Security Issues and Solutions [PDF]

open access: yes, 2019
The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries.
Romano, Nicholas
core   +1 more source

Spartan Daily, September 9, 1981 [PDF]

open access: yes, 1980
Volume 77, Issue 6https://scholarworks.sjsu.edu/spartandaily/6781/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +2 more sources

Digital Forensic Analysis of UAV Flight Data Using Static and Dynamic Methods in Coal Mining Area

open access: yesJournal of Information Systems and Informatics
Unmanned Aerial Vehicles (UAV) have become vital tools in industrial sectors such as coal mining for site inspections and operational monitoring. However, unauthorized UAV flights present security risks that necessitate forensic investigation.
Muhammad Yusuf Halim, Ahmad Luthfi
doaj   +1 more source

Stay True to the Sound of History: Philology, Phylogenetics and Information Engineering in Musicology

open access: yesApplied Sciences, 2018
This work investigates computational musicology for the study of tape music works tackling the problems concerning stemmatics. These philological problems have been analyzed with an innovative approach considering the peculiarities of audio tape ...
Sebastiano Verde   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy