Results 81 to 90 of about 349,669 (308)

Precision planter monitoring system based on mobile communication network

open access: yesIET Networks, EarlyView., 2022
Abstract Sowing is an important link in agricultural production and the basis for ensuring high yields and bumper harvests. Agriculture requires precision plows with good performance and stable work. However, the seeding process is in a completely closed state, and the operator relies mainly on experience to judge the operating state and performance of
Bing Li, Jiyun Li
wiley   +1 more source

The flexible, the stereotyped and the in‐between: putting together the combinatory tool use origins hypothesis

open access: yesBiological Reviews, EarlyView.
ABSTRACT Tool use research has long made the distinction between tool using that is considered learned and flexible, and that which appears to be instinctive and stereotyped. However, animals with an inherited tool use specialisation can exhibit flexibility, while tool use that is spontaneously innovated can be limited in its expression and facilitated
Jennifer A. D. Colbourne   +1 more
wiley   +1 more source

Intent Arabic text categorisation based on different machine learning and term frequency

open access: yesIET Networks, EarlyView., 2022
Abstract The complexity of Internet network configurations has made managing networks a complicated undertaking. Intent‐Based Networking (IBN) is a potential solution to this issue. In contrast to conventional networks, where a concrete description of the settings typically conveys a network administrator's goal kept on each device, an administrator's ...
Mohammad Fadhil Mahdi   +1 more
wiley   +1 more source

Análisis comparativo de mecanismos de minería de datos para la generación de reglas de asociación aplicables a caches de Grandes Datos

open access: yesRevista Tecnológica, 2015
La minería de datos aporta una información invaluable que puede ser usada para mejorar los procesos en diversas áreas tales como la medicina, comercio, informática, entre otras.
Johnny Torres, Cristina L. Abad
doaj  

A Scalable and Highly Configurable Cache-Aware Hybrid Flash Translation Layer

open access: yesComputers, 2014
This paper presents a cache-aware configurable hybrid flash translation layer (FTL), named CACH-FTL. It was designed based on the observation that most state-of­­-the-art flash-specific cache systems above FTLs flush groups of pages belonging to the ...
Jalil Boukhobza   +2 more
doaj   +1 more source

An Eco‐Social Lens on Voice for Undervoiced and Unvoiced Stakeholders

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This conceptual paper argues it is important from an ecological–social (eco‐social) whole system point of view for businesses and policymakers to take the interests of and impacts on unvoiced and undervoiced [un(der)voiced] stakeholders into consideration for both strategic and justice reasons.
Sandra Waddock
wiley   +1 more source

Design and implementation of geographic information system with mobile terminal and 5G network

open access: yesIET Networks, EarlyView., 2022
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley   +1 more source

Defending Against Flush+Reload Attack With DRAM Cache by Bypassing Shared SRAM Cache

open access: yesIEEE Access, 2020
Cache side-channel attack is one of the critical security threats to modern computing systems. As a representative cache side-channel attack, Flush+Reload attack allows an attacker to steal confidential information (e.g., private encryption key) by ...
Minwoo Jang   +3 more
doaj   +1 more source

Barcoding of episodic memories in the hippocampus of a food-caching bird [PDF]

open access: gold, 2023
Selmaan N. Chettih   +3 more
openalex   +1 more source

From Ecosystem Threats to Balance Sheets: Biodiversity Risks Exposure and Corporate Cash Policies

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study investigates how firms strategically respond to biodiversity risk by examining their cash holding decisions. Using firm‐level data from China, we find that firm‐level biodiversity risk exposure significantly increases corporate cash holdings.
Jing Hao   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy