Results 91 to 100 of about 111,415 (271)

Cyber-Security in Smart Grid: Survey and Challenges

open access: yes, 2018
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El   +3 more
core   +1 more source

EU Policy‐Making in the Digital Age: Major Trends and Insights From Public Policy Research

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Has digitalization changed policy‐making dynamics at the European Union (EU) level? To investigate this issue, this article presents a scoping review of the literature on EU digital policy‐making. While much scholarship adopts a ‘Governance’ approach, two conceptually rich strands emerge: critical approaches, and digital sovereignty.
Chloé Bérut
wiley   +1 more source

An interactive segmentation-based method for seismic facies annotation and segmentation

open access: yesScientific Reports
Seismic facies segmentation plays a critical role in seismic interpretation and geological analysis, providing essential support for subsurface stratigraphic characterization and hydrocarbon reservoir identification.
Siyuan Tian   +5 more
doaj   +1 more source

‘IT Fauna’ and ‘Crime Pays’: Using Critical Design to Envision Cyber Security Futures [PDF]

open access: yes, 2013
The research presented is a collaboration between social scientists, designers and technologists that explored whether critical design could be used to envision cyber security futures.
Ashenden, Debi   +2 more
core  

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

A semantic approach to reachability matrix computation [PDF]

open access: yes, 2015
The Cyber Security is a crucial aspect of networks management. The Reachability Matrix computation is one of the main challenge in this field. This paper presents an intelligent solution in order to address the Reachability Matrix computational ...
CILIA, NICOLE DALIA   +2 more
core  

Optimizing Electric Vehicle Charging Scheduling With Deep Q Networks and Long Short‐Term Memory‐Based Electricity and Battery State of Charge Prediction

open access: yesEnergy Science &Engineering, EarlyView.
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga   +6 more
wiley   +1 more source

Deep Recurrent Model for Server Load and Performance Prediction in Data Center

open access: yesComplexity, 2017
Recurrent neural network (RNN) has been widely applied to many sequential tagging tasks such as natural language process (NLP) and time series analysis, and it has been proved that RNN works well in those areas.
Zheng Huang   +4 more
doaj   +1 more source

Unlocking the Future of Insurance: The Power of Open Data, Digital Transformation, and Human Talent

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Despite rapid technological advancement in insurance, there remains a critical gap in understanding how open data initiatives affect employee digital competencies and organizational transformation. This research investigates this relationship through a systematic review of 51 scholarly articles published between 2018 and 2024, using structured
Narongsak Sukma, Siriporn Yamnill
wiley   +1 more source

CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain

open access: yesInformation
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges.
Jiahui Jiang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy