Results 71 to 80 of about 733,867 (354)
The geographies of cyberspace [PDF]
In this I paper I explore the need for a new field of geographic enquiry called cybergeography. This is the investigation of the complex and multifaceted structure, use and experience of the online world inside global computer-communications networks,
Dodge, Martin
core +1 more source
Toward the 3rd Generation of Smart Farming: Materials, Devices, and Systems for E‐Plant Technologies
This review explores the latest developments in e‐plant technologies, which are revolutionizing smart farming by enabling real‐time monitoring of plant and environmental conditions. It covers the design, applications, and systems of e‐plant devices, detailing how they integrate data analytics to optimize agricultural practices, enhance crop yields, and
Daegun Kim +5 more
wiley +1 more source
This systematic literature review examines existing literature to determine how Digital Twin (DT) technology can enhance security, with an emphasis on emerging issues, approaches, and proposals in cybersecurity.
Norah Alhamam +2 more
doaj +1 more source
In this paper, we discuss some challenges regarding the Hadoop framework. One of the main ones is the computing performance of Hadoop MapReduce jobs in terms of CPU, memory, and hard disk I/O. The networking side of a Hadoop cluster is another challenge,
Ali Khaleel, Hamed Al-Raweshidy
doaj +1 more source
A Middleware for the Internet of Things
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion.
Cheung, Hon +2 more
core +2 more sources
The characteristics of a vertical n–p–i–p heterostructure transistor device, which exhibits a voltage‐tunable transition between Gaussian and sigmoid functions, are investigated. The mixed state of the transfer curve enables the utilization of both exploitation and exploration, improving computational performance in reinforcement learning tasks ...
Jisoo Park +7 more
wiley +1 more source
A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors.
Alanoud A. Alquwayzani +1 more
doaj +1 more source
Analysing data centers energy consumption is the main step toward building a reliable infrastructure. Evidently, data centers consume a large number of billions of gigabytes information to the point that putting tremendous pressure on energy suppliers ...
Ammar K. Al Mhdawi +1 more
doaj +1 more source
MG-WFBP: Efficient Data Communication for Distributed Synchronous SGD Algorithms
Distributed synchronous stochastic gradient descent has been widely used to train deep neural networks on computer clusters. With the increase of computational power, network communications have become one limiting factor on system scalability.
Chu, Xiaowen, Li, Bo, Shi, Shaohuai
core +1 more source
This review describes the different surface engineering strategies for quantum dots that addresses the challenges associated with surface defects, highlighting their role in enhancing the performance of solar energy conversion technologies. Abstract Colloidal quantum dots (QDs) have garnered significant attention for their unique potential in clean ...
Kokilavani S., Gurpreet Singh Selopal
wiley +1 more source

