Results 151 to 160 of about 2,054,840 (293)

A New Image Encryption Method Using an Optimized Smart Codebook

open access: yesHuman Behavior and Emerging Technologies
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj   +1 more source

Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations

open access: yesJournal of Network and Computer Applications, 2022
M. Hasan   +5 more
semanticscholar   +1 more source

I5.0‐MM: Beyond Automation Toward Human‐Centric Sustainable Manufacturing

open access: yesSustainable Development, EarlyView.
ABSTRACT Human‐centricity, a core tenet of Industry 5.0, underscores the incorporation of human necessities and societal values into industrial transformation. Maturity models in Industry 4.0 have been extensively used to evaluate digital readiness; they focus on technological aspects, inadequately addressing sustainability, collaboration, and socio ...
Khaled Djebbouri   +3 more
wiley   +1 more source

Named entity recognition model based on Multi‐BiLSTM and competition mechanism

open access: yesElectronics Letters
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou   +3 more
doaj   +1 more source

Cyber Security in the Nigerian Banking Sector: An Appraisal of Audit Committee Effectiveness [PDF]

open access: yes, 2017
This study appraises the relationship that exists between cyber security and audit committee effectiveness using audit committee independence, audit committee technological expertise and audit committee financialexpertise characteristics as independent ...
Ben-Caleb, Egbide   +2 more
core  

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities [PDF]

open access: yes, 2018
In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been ...
Allodi, Luca   +3 more
core   +2 more sources

An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla   +3 more
wiley   +1 more source

Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration

open access: yesElectronics Letters
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy