Results 161 to 170 of about 420,079 (341)
Capacitive, charge‐domain compute‐in‐memory (CIM) stores weights as capacitance,eliminating DC sneak paths and IR‐drop, yielding near‐zero standbypower. In this perspective, we present a device to systems level performance analysis of most promising architectures and predict apathway for upscaling capacitive CIM for sustainable edge computing ...
Kapil Bhardwaj +2 more
wiley +1 more source
Navigating turbulent waters: resilience and recovery of a tertiary care hospital in Sri Lanka during economic crisis through situational leadership. [PDF]
Sabhapathige R, Deerasinghe D.
europepmc +1 more source
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
Distress, Discomfort and Moral Injury: Emergency Department Clinicians Experiences Caring for People With a Psychosocial Disability and a National Disability Insurance Scheme Plan. [PDF]
McIntyre H +10 more
europepmc +1 more source
The Information Security Management System, Development and Audit [PDF]
Information security management system (ISMS) is that part of the overall management system, based on a business risk approach, that it is developed in order to establish, implement, operate, monitor, review, maintain and improve information ...
Cristian AMANCEI, Traian SURCEL
core
Business Continuity Planning and Learning Based on an Extension to the JDL Data Fusion Model
Sami Mohammed +2 more
openalex +1 more source
Global Report on Business Continuity Planning and Management (BCP/BCM). Survey results
Paola Bongini +3 more
openalex +1 more source

