Results 121 to 130 of about 2,054,840 (293)

An interactive segmentation-based method for seismic facies annotation and segmentation

open access: yesScientific Reports
Seismic facies segmentation plays a critical role in seismic interpretation and geological analysis, providing essential support for subsurface stratigraphic characterization and hydrocarbon reservoir identification.
Siyuan Tian   +5 more
doaj   +1 more source

Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]

open access: yes, 2010
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core   +1 more source

Cyber-Security in Smart Grid: Survey and Challenges

open access: yes, 2018
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El   +3 more
core   +1 more source

Unlocking the Future of Insurance: The Power of Open Data, Digital Transformation, and Human Talent

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Despite rapid technological advancement in insurance, there remains a critical gap in understanding how open data initiatives affect employee digital competencies and organizational transformation. This research investigates this relationship through a systematic review of 51 scholarly articles published between 2018 and 2024, using structured
Narongsak Sukma, Siriporn Yamnill
wiley   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Kryptonite for Cryptocurrencies? What Are the Effects of Regulatory Controls on Bitcoin Returns and Volatility?

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley   +1 more source

A semantic approach to reachability matrix computation [PDF]

open access: yes, 2015
The Cyber Security is a crucial aspect of networks management. The Reachability Matrix computation is one of the main challenge in this field. This paper presents an intelligent solution in order to address the Reachability Matrix computational ...
CILIA, NICOLE DALIA   +2 more
core  

Transforming healthcare with large language models: Current applications, challenges, and future directions—a literature review

open access: yesJournal of Intelligent Medicine, EarlyView.
Abstract AI‐based large language models (LLMs) have gradually made their way into various fields, transforming industries and changing the way we solve problems. LLMs have great potential in healthcare, where they can share the burden of data management, retrieval, and decision‐making.
Muhammad Umar   +11 more
wiley   +1 more source

Deep Recurrent Model for Server Load and Performance Prediction in Data Center

open access: yesComplexity, 2017
Recurrent neural network (RNN) has been widely applied to many sequential tagging tasks such as natural language process (NLP) and time series analysis, and it has been proved that RNN works well in those areas.
Zheng Huang   +4 more
doaj   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Home - About - Disclaimer - Privacy