Results 31 to 40 of about 1,364,067 (299)

Les chercheurs face à la surveillance d’État : état des lieux et contre-mesures

open access: yesTracés, 2019
Since the 2013 disclosures of whistleblower Edward Snowden on the surveillance practices of Western intelligence agencies, the exposure of the field of social science to state surveillance – implemented by judiciary and police authorities, and more ...
Félix Tréguer, Camille Noûs
doaj   +1 more source

HRCTNet: a hybrid network with high-resolution representation for object detection in UAV image

open access: yesComplex & Intelligent Systems, 2023
Object detection in unmanned aerial vehicle (UAV) images has attracted the increasing attention of researchers in recent years. However, it is challenging for small object detection using conventional detection methods because less location and semantic ...
Wenjie Xing, Zhenchao Cui, Jing Qi
doaj   +1 more source

occumb: An R package for site occupancy modeling of eDNA metabarcoding data

open access: yesPopulation Ecology, EarlyView.
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley   +1 more source

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports

open access: yesIEEE Access, 2020
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-knowledge from these sources would provide security analysts with credible information, which they can use to detect or find patterns indicative of a cyber-attack.
Aritran Piplai   +5 more
doaj   +1 more source

Blsnet: a tri-branch lightweight network for gesture segmentation against cluttered backgrounds

open access: yesComplex & Intelligent Systems, 2023
Hand gesture segmentation is an essential step to recognize hand gestures for human–robot interaction. However, complex backgrounds and the variety of gesture shapes cause low semantic segmentation accuracy in the existing lightweight methods because of ...
Guoyu Zhou, Zhenchao Cui, Jing Qi
doaj   +1 more source

An Adaptive Management Model for Brown Bears in Hokkaido: Based on Total Population and the Number of Nuisance Bears

open access: yesPopulation Ecology, EarlyView.
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda   +5 more
wiley   +1 more source

Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree

open access: yesIEEE Access, 2021
With the rapid development of cloud storage, cloud users are willing to store data in the cloud storage system, and at the same time, the requirements for the security, integrity, and availability of data storage are getting higher and higher.
Zhenpeng Liu   +3 more
doaj   +1 more source

Speciation Through the Lens of Population Dynamics: A Theoretical Primer on How Small and Large Populations Diverge

open access: yesPopulation Ecology, EarlyView.
Population size and dynamics fundamentally shape speciation by influencing genetic drift, founder events, and adaptive potential. Small populations may speciate rapidly due to stronger drift, whereas large populations harbor more genetic diversity, which can alter divergence trajectories. We highlight theoretical models that incorporate population size
Ryo Yamaguchi   +3 more
wiley   +1 more source

Chinese Character Components Segmentation Method Based on Faster RCNN

open access: yesIEEE Access, 2022
To solve the component segmentation problem caused by the sticking and overlapping of parts in incoherent handwritten calligraphy characters, we propose a Chinese character part segmentation method based on Faster RCNN. The method utilizes the advantages
Xiang Gao   +3 more
doaj   +1 more source

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Home - About - Disclaimer - Privacy