Results 131 to 140 of about 2,054,840 (293)

CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain

open access: yesInformation
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges.
Jiahui Jiang   +3 more
doaj   +1 more source

The contribution of vibrational spectroscopy and data analytics towards the achievement of the global sustainability goals

open access: yesJournal of the Science of Food and Agriculture, EarlyView.
Abstract The United Nations Sustainable Development Goals (UN SDGs) were defined to improve the quality of life of the global population particularly regarding social and economic aspects, with a major focus on environmental sustainability. The incorporation of digital technologies into the agri‐food sector has become a key enabler in increasing the ...
Daniel Cozzolino, Louwrens C Hoffman
wiley   +1 more source

Towards a relation extraction framework for cyber-security concepts

open access: yes, 2015
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.
Bridges R. A.   +4 more
core   +1 more source

HyLPD Digital Twin Control for UAV Stability in High‐Wind Conditions

open access: yesOptimal Control Applications and Methods, EarlyView.
This work introduces a novel HyLPD, a hybrid control framework combining Linear Quadratic Regulator (LQR) for baseline stability and Deep Deterministic Policy Gradient (DDPG) for adaptive compensation, tailored for UAVs under high‐wind conditions.
Cara Rose   +2 more
wiley   +1 more source

Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors

open access: yesIEEE Access
Named entity recognition (NER) in deep learning mode heavily relies on the processing and analysis of text vectors. This paper introduces an NER model based on deep learning techniques, emphasizing the fusion of word vectors and category vectors to ...
Yang Zhou   +3 more
doaj   +1 more source

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]

open access: yesOpen Res Eur, 2023
Smrčka A   +9 more
europepmc   +1 more source

Exploring the motivation behind cybersecurity insider threat and proposed research agenda [PDF]

open access: yes, 2016
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments.
Clarke, Karla   +2 more
core  

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Home - About - Disclaimer - Privacy