A New Image Encryption Method Using an Optimized Smart Codebook
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj +1 more source
I5.0‐MM: Beyond Automation Toward Human‐Centric Sustainable Manufacturing
ABSTRACT Human‐centricity, a core tenet of Industry 5.0, underscores the incorporation of human necessities and societal values into industrial transformation. Maturity models in Industry 4.0 have been extensively used to evaluate digital readiness; they focus on technological aspects, inadequately addressing sustainability, collaboration, and socio ...
Khaled Djebbouri +3 more
wiley +1 more source
Named entity recognition model based on Multi‐BiLSTM and competition mechanism
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou +3 more
doaj +1 more source
Preschool Cyber Security Management System Based on Intelligent Agents. [PDF]
Song J.
europepmc +1 more source
Cyber Security in the Nigerian Banking Sector: An Appraisal of Audit Committee Effectiveness [PDF]
This study appraises the relationship that exists between cyber security and audit committee effectiveness using audit committee independence, audit committee technological expertise and audit committee financialexpertise characteristics as independent ...
Ben-Caleb, Egbide +2 more
core
Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray +7 more
wiley +1 more source
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities [PDF]
In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been ...
Allodi, Luca +3 more
core +2 more sources
An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla +3 more
wiley +1 more source
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou +3 more
doaj +1 more source

