Results 111 to 120 of about 2,054,840 (293)

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Detection of Electric Network Frequency in Audio Using Multi-HCNet

open access: yesSensors
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li   +6 more
doaj   +1 more source

A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks

open access: yesIEEE Access, 2017
The rapid growth in the volume and importance of web communication throughout the Internet has heightened the need for better security protection. Security experts, when protecting systems, maintain a database featuring signatures of a large number of ...
Muhammad Hilmi Kamarudin   +3 more
doaj   +1 more source

EU Policy‐Making in the Digital Age: Major Trends and Insights From Public Policy Research

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Has digitalization changed policy‐making dynamics at the European Union (EU) level? To investigate this issue, this article presents a scoping review of the literature on EU digital policy‐making. While much scholarship adopts a ‘Governance’ approach, two conceptually rich strands emerge: critical approaches, and digital sovereignty.
Chloé Bérut
wiley   +1 more source

Detecting and Exploring Homogeneous Dense Groups via k-Core Decomposition and Core Member Filtering in Social Networks

open access: yesApplied Sciences
Exploring homogeneous dense groups is one of the important issues in social network structure measurement. k-core decomposition and core member filtering are common methods to uncover homogeneous dense groups in a network.
Zeyu Zhang   +7 more
doaj   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

‘IT Fauna’ and ‘Crime Pays’: Using Critical Design to Envision Cyber Security Futures [PDF]

open access: yes, 2013
The research presented is a collaboration between social scientists, designers and technologists that explored whether critical design could be used to envision cyber security futures.
Ashenden, Debi   +2 more
core  

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

Features requirement elicitation process for designing a chatbot application

open access: yesIET Networks, EarlyView., 2022
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy