Results 81 to 90 of about 6,594 (201)

QuantumNetSec: Quantum Machine Learning for Network Security

open access: yesInternational Journal of Network Management, Volume 35, Issue 4, July/August 2025.
ABSTRACT As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security ...
Diego Abreu   +3 more
wiley   +1 more source

Federated Learning Architectures: A Performance Evaluation With Crop Yield Prediction Application

open access: yesSoftware: Practice and Experience, Volume 55, Issue 7, Page 1165-1184, July 2025.
ABSTRACT Introduction Federated learning has become an emerging technology in data analysis for IoT applications. Methods This paper implements centralized and decentralized federated learning frameworks for crop yield prediction based on Long Short‐Term Memory Network and Gated Recurrent Unit.
Anwesha Mukherjee, Rajkumar Buyya
wiley   +1 more source

Integrating Systems Methodologies for Australian Undersea Surveillance: A Systematic Literature Review

open access: yesSystems Engineering, Volume 28, Issue 4, Page 471-497, July 2025.
ABSTRACT Australia is a maritime nation, relying on access to its surrounding oceans for its economy and security. The Royal Australian Navy conducts undersea surveillance to monitor this vital maritime environment and gain insight into activities beneath the ocean's surface.
Timothy J. Milledge   +2 more
wiley   +1 more source

Institutional Environment and the Use of Blockchain Technology: Exploring the Context and Conditions of Using Blockchain in the Higher Education Institutions

open access: yesHigher Education Quarterly, Volume 79, Issue 3, July 2025.
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak   +2 more
wiley   +1 more source

Blockchain Systems in Food Supply Chains: An Interpretation Through the Lens of Agency and Technology–Organization–Environment Theories

open access: yesJournal of Business Logistics, Volume 46, Issue 3, July 2025.
ABSTRACT Blockchain (BC) systems are increasingly used by consortia to monitor ex‐post opportunism in food supply chains. BC systems differ for BC technical characteristics, complementary technologies, and organizational tools. Yet, little is empirically known about the link between different BC system designs and the context where they are implemented
Pamela Danese, Pietro Romano
wiley   +1 more source

Enhancing the SRAM PUF with an XOR Gate

open access: yesApplied Sciences
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard   +2 more
doaj   +1 more source

Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]

open access: green, 2000
Devang Naik   +4 more
openalex   +1 more source

From Donor‐Acceptor Ligands to Smart Coordination Polymers: Cyanothiazole‐Cu(I) Complexes for Multifunctional Electronic Devices

open access: yesChemistry – A European Journal, Volume 31, Issue 31, June 3, 2025.
Cyanothiazoles, paired with copper(I) iodide, form complexes with luminescent properties. X‐ray crystallography revealed two types of coordination polymers, while spectroscopic, synchrotron, and electric measurements supported by density functional (DFT) calculations studies highlighted their unique electronic features, offering a foundation for future
Karolina Gutmańska   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy