Security Storage of Sensitive Information in Cloud Computing Data Center [PDF]
Zhong Li, Jia Wang
openalex +1 more source
Abstract Given the vital role of teachers in inclusive education, there has been growing interest in teacher‐related factors that influence their intentions to teach in inclusive classrooms and their inclusive practices. Based on Ajzen's theory of planned behaviour, we investigated the relationship between teachers’ affective attitudes towards ...
İpek Gülsün +3 more
wiley +1 more source
AI-embedded IoT healthcare optimization with trust-aware mobile edge computing. [PDF]
Alamri M +3 more
europepmc +1 more source
Adaptive Algal Cultivation Enabled by a Monthly Biomass Forecasting System
The developed monthly algal forecasting system used to predict biomass production for two algal strains (A and B) at two pond water depths (low and high). The highest predicted production, achieved with strain A at a low pond water depth, is selected as the cultivation strategy to guide the next month's algal growth.
Hongxiang Yan +5 more
wiley +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
Development of Detection and Mitigation of Advanced Persistent Threats Using Artificial Intelligence and Multi-Layer Security on Cloud Computing Infrastructure [PDF]
Hartono Hartono +2 more
openalex +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness. [PDF]
Samy H, Bahaa-Eldin AM, Sobh MA, Taha A.
europepmc +1 more source

