Results 51 to 60 of about 104,418 (235)

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

‘IT Fauna’ and ‘Crime Pays’: Using Critical Design to Envision Cyber Security Futures [PDF]

open access: yes, 2013
The research presented is a collaboration between social scientists, designers and technologists that explored whether critical design could be used to envision cyber security futures.
Ashenden, Debi   +2 more
core  

Bipolar q $q$‐Fractional Fuzzy Aggregation Operators for Multi‐Criteria Decision‐Making in Optimal Renewable Energy Selection

open access: yesEnergy Science &Engineering, EarlyView.
This study introduces bipolar q‐fractional fuzzy sets and new aggregation operators to support renewable energy selection under uncertainty. The proposed decision‐making framework effectively integrates positive and negative evaluations, ensuring consistent ranking and robust performance, as demonstrated through practical analysis and comparative ...
Sagvan Y. Musa   +3 more
wiley   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]

open access: yes, 2016
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core  

Towards a relation extraction framework for cyber-security concepts

open access: yes, 2015
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.
Bridges R. A.   +4 more
core   +1 more source

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Unlocking the Future of Insurance: The Power of Open Data, Digital Transformation, and Human Talent

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Despite rapid technological advancement in insurance, there remains a critical gap in understanding how open data initiatives affect employee digital competencies and organizational transformation. This research investigates this relationship through a systematic review of 51 scholarly articles published between 2018 and 2024, using structured
Narongsak Sukma, Siriporn Yamnill
wiley   +1 more source

Features requirement elicitation process for designing a chatbot application

open access: yesIET Networks, EarlyView., 2022
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy