Results 141 to 150 of about 111,415 (271)
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha +5 more
wiley +1 more source
Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization. [PDF]
Alterazi HA +6 more
europepmc +1 more source
ABSTRACT Smart cities and urban digital twins have fostered the emergence of immersive environments, such as the metaverse. While contemporary scholarlship has increasingly examined the integration of the metaverse within smart city infrastructures, the critical nexus between urban sustainability and the metaverse remains largely under‐researched. This
Jose Manuel Diaz‐Sarachaga +1 more
wiley +1 more source
Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. [PDF]
Khan NF, Ikram N, Saleem S, Zafar S.
europepmc +1 more source
ABSTRACT Context The microservices architectural style has revolutionized the way modern software systems are developed and operated. While the development of new microservices systems can leverage a wide range of resources and proven strategies, the migration of an existing monolithic system is not easily generalizable.
Jonas Fritzsch +6 more
wiley +1 more source
Abstract Using Herzberg's two‐factor theory, this paper examines the hygiene and motivation factors that drive (re)development in accounting higher education programmes. Interviews with accounting educators and discipline leaders demonstrate a range of factors at play in the (re)development of accounting programmes in pursuit of embedding relevant ...
Esin Ozdil +3 more
wiley +1 more source
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]
Alahmadi AN +5 more
europepmc +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source

