Results 131 to 140 of about 2,054,840 (293)
CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges.
Jiahui Jiang +3 more
doaj +1 more source
Abstract The United Nations Sustainable Development Goals (UN SDGs) were defined to improve the quality of life of the global population particularly regarding social and economic aspects, with a major focus on environmental sustainability. The incorporation of digital technologies into the agri‐food sector has become a key enabler in increasing the ...
Daniel Cozzolino, Louwrens C Hoffman
wiley +1 more source
Towards a relation extraction framework for cyber-security concepts
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.
Bridges R. A. +4 more
core +1 more source
HyLPD Digital Twin Control for UAV Stability in High‐Wind Conditions
This work introduces a novel HyLPD, a hybrid control framework combining Linear Quadratic Regulator (LQR) for baseline stability and Deep Deterministic Policy Gradient (DDPG) for adaptive compensation, tailored for UAVs under high‐wind conditions.
Cara Rose +2 more
wiley +1 more source
Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors
Named entity recognition (NER) in deep learning mode heavily relies on the processing and analysis of text vectors. This paper introduces an NER model based on deep learning techniques, emphasizing the fusion of word vectors and category vectors to ...
Yang Zhou +3 more
doaj +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]
Smrčka A +9 more
europepmc +1 more source
Exploring the motivation behind cybersecurity insider threat and proposed research agenda [PDF]
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments.
Clarke, Karla +2 more
core
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source

