Results 121 to 130 of about 111,415 (271)

Cyber security threats: A never-ending challenge for e-commerce. [PDF]

open access: yesFront Psychol, 2022
Liu X   +6 more
europepmc   +1 more source

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

A New Image Encryption Method Using an Optimized Smart Codebook

open access: yesHuman Behavior and Emerging Technologies
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Named entity recognition model based on Multi‐BiLSTM and competition mechanism

open access: yesElectronics Letters
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou   +3 more
doaj   +1 more source

The cyber security learning and research environment [PDF]

open access: yes, 2012
This report outlines the design and configuration of the Cyber Security Learning and Research Environment (CLARE). It explains how such a system can be implemented with minimal hardware either on a single machine or across multiple machines.
Bhardwaj, Julian
core  

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

From ESG to Sustainable Development: A Path Designed for the Triple Helix Spheres

open access: yesSustainable Development, EarlyView.
ABSTRACT This work examines the relationship between environmental, social, and governance (ESG) initiatives and sustainable development (SD), highlighting a scientific gap in their effective connection. It aims to propose a framework with recommendations for promoting SD through ESG, considering the governmental, business, and academic spheres from ...
Elen Cristina Bravos Giupponi   +3 more
wiley   +1 more source

Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration

open access: yesElectronics Letters
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy