Results 41 to 50 of about 751,714 (331)

Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review

open access: yesInformation
Cybersecurity is normally defined as protecting systems against all kinds of cyberattacks; however, due to the rapid and permanent expansion of technology and digital transformation, the threats are also increasing. One of those new threats is ransomware,
Latifa Albshaier   +2 more
doaj   +1 more source

The Development of Intelligent Agents: A Case-Based Reasoning Approach to Achieve Human-Like Peculiarities via Playback of Human Traces

open access: yesIEEE Access, 2023
Recent advances in the digital gaming industry have provided impressive demonstrations of highly skilful artificial intelligence agents capable of performing complex intelligent behaviours.
Naveed Anwer Butt   +6 more
doaj   +1 more source

The Next Generation of Mobile Computing for Hospitals [PDF]

open access: yes, 2015
Mobile computing in the broadest sense is when multiple communications devices work together within an environment, unhampered by equipment limitations, distance, or interference.
Adis, Warren
core   +1 more source

3D‐Printed Hygroscopic Polymer Networks for High‐Humidity Triboelectric Nanogenerators to Wirelessly Power Implantable Electronic Devices‐ A Conceptual Pathway

open access: yesAdvanced Functional Materials, EarlyView.
This work develops 3D‐printable tribopolymer networks that can enhance triboelectric performance under high humidity environments. Polar hydrophilic functional groups and incorporation of zwitterionic monomers promote bound‐water–dominated interfacial polarization thereby increasing electrical outputs.
Linguangze Zhuo   +8 more
wiley   +1 more source

A Review of the Recent Trends in Mobile Malware Evolution, Detection, and Analysis

open access: yesIEEE Access
The rapid rise of smartphones and mobile applications has fostered an environment conducive to the advancement of mobile malware, presenting considerable obstacles for both detection and mitigation efforts.
Seetah Almarri   +2 more
doaj   +1 more source

A New Intelligent Approach for Optimizing 6LoWPAN MAC Layer Parameters

open access: yesIEEE Access, 2017
Fairness, low latency, and high throughput with low energy consumption are desired attributes for medium access control (MAC) protocols. The IEEE 802.15.4 standard defines the MAC and physical layers standard for IPv6 over low power personal area network
Bilal R. Al-Kaseem   +3 more
doaj   +1 more source

A Novel Approach Based on Multi-Level Bottleneck Attention Modules Using Self-Guided Dropblock for Person Re-Identification

open access: yesIEEE Access, 2022
Person re-identification has inspired a lot of interest due to its significance in intelligent video surveillance. It is a difficult task due to the presence of critical challenges such as changes in appearance, misalignment, occlusion and background ...
Muhammad Usman Yaseen   +4 more
doaj   +1 more source

Cyclic Olefin Copolymers as Versatile Materials for Advanced Engineering Applications

open access: yesAdvanced Functional Materials, EarlyView.
Cyclic olefin copolymers (COCs) are presented as highly versatile materials combining tunable synthesis, excellent optical properties, and mechanical robustness. Their potential spans microfluidics, bioengineering, and advanced electronics, while emerging self‐healing and sustainable solutions highlight future opportunities.
Giulia Fredi   +3 more
wiley   +1 more source

Detection of DSCP-based traffic prioritization manipulations and their impact on network performance

open access: yesScientific Reports
Differentiated Services Code Point (DSCP) manipulations can distort bandwidth allocation, expose security risks, and degrade performance, yet they are difficult to detect in dynamic traffic. Dynamic traffic flows and sophisticated evasion strategies make
M. M. Hafizur Rahman   +2 more
doaj   +1 more source

Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review

open access: yesComputers
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for ...
Munirah Maher Alshabibi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy