Results 41 to 50 of about 751,714 (331)
Cybersecurity is normally defined as protecting systems against all kinds of cyberattacks; however, due to the rapid and permanent expansion of technology and digital transformation, the threats are also increasing. One of those new threats is ransomware,
Latifa Albshaier +2 more
doaj +1 more source
Recent advances in the digital gaming industry have provided impressive demonstrations of highly skilful artificial intelligence agents capable of performing complex intelligent behaviours.
Naveed Anwer Butt +6 more
doaj +1 more source
The Next Generation of Mobile Computing for Hospitals [PDF]
Mobile computing in the broadest sense is when multiple communications devices work together within an environment, unhampered by equipment limitations, distance, or interference.
Adis, Warren
core +1 more source
This work develops 3D‐printable tribopolymer networks that can enhance triboelectric performance under high humidity environments. Polar hydrophilic functional groups and incorporation of zwitterionic monomers promote bound‐water–dominated interfacial polarization thereby increasing electrical outputs.
Linguangze Zhuo +8 more
wiley +1 more source
A Review of the Recent Trends in Mobile Malware Evolution, Detection, and Analysis
The rapid rise of smartphones and mobile applications has fostered an environment conducive to the advancement of mobile malware, presenting considerable obstacles for both detection and mitigation efforts.
Seetah Almarri +2 more
doaj +1 more source
A New Intelligent Approach for Optimizing 6LoWPAN MAC Layer Parameters
Fairness, low latency, and high throughput with low energy consumption are desired attributes for medium access control (MAC) protocols. The IEEE 802.15.4 standard defines the MAC and physical layers standard for IPv6 over low power personal area network
Bilal R. Al-Kaseem +3 more
doaj +1 more source
Person re-identification has inspired a lot of interest due to its significance in intelligent video surveillance. It is a difficult task due to the presence of critical challenges such as changes in appearance, misalignment, occlusion and background ...
Muhammad Usman Yaseen +4 more
doaj +1 more source
Cyclic Olefin Copolymers as Versatile Materials for Advanced Engineering Applications
Cyclic olefin copolymers (COCs) are presented as highly versatile materials combining tunable synthesis, excellent optical properties, and mechanical robustness. Their potential spans microfluidics, bioengineering, and advanced electronics, while emerging self‐healing and sustainable solutions highlight future opportunities.
Giulia Fredi +3 more
wiley +1 more source
Detection of DSCP-based traffic prioritization manipulations and their impact on network performance
Differentiated Services Code Point (DSCP) manipulations can distort bandwidth allocation, expose security risks, and degrade performance, yet they are difficult to detect in dynamic traffic. Dynamic traffic flows and sophisticated evasion strategies make
M. M. Hafizur Rahman +2 more
doaj +1 more source
Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for ...
Munirah Maher Alshabibi +2 more
doaj +1 more source

