Results 71 to 80 of about 2,054,840 (293)

Manet: motion-aware network for video action recognition

open access: yesComplex & Intelligent Systems
Video action recognition is a fundamental task in video understanding. Actions in videos may vary at different speeds or scales, and it is difficult to cope with a wide variety of actions by relying on a single spatio-temporal scale to extract features ...
Xiaoyang Li   +4 more
doaj   +1 more source

Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification

open access: yesSensors, 2023
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin   +4 more
doaj   +1 more source

Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]

open access: yes, 2016
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core  

Implementing Indigenous Data Sovereignty in Australia: A Five‐Phase Framework for Indigenous Data Governance

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article presents the development of a five‐phase Indigenous Data Governance (IDGov) Framework in Australia, focusing on partnerships between the Aboriginal Community Controlled Health Organisation (ACCHO) sector and non‐Indigenous health entities.
Jacob Prehn   +4 more
wiley   +1 more source

TAN: a temporal-aware attention network with context-rich representation for boosting proposal generation

open access: yesComplex & Intelligent Systems
Temporal action proposal generation in an untrimmed video is very challenging, and comprehensive context exploration is critically important to generate accurate candidates of action instances. This paper proposes a Temporal-aware Attention Network (TAN)
Yanyan Jiao   +4 more
doaj   +1 more source

The gamification of cybersecurity training [PDF]

open access: yes, 2017
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie   +7 more
core   +2 more sources

Longitudinal links of negative student–teacher relationships and positive class climate with traditional bullying and cyberbullying perpetration

open access: yesBritish Educational Research Journal, EarlyView.
Abstract The current study aimed to investigate whether negative student–teacher relationships and within‐class perceptions of the class climate at the individual level, and positive class climates at the classroom level in fifth grade, were associated with traditional bullying and cyberbullying perpetration 1 year later, in sixth grade, in a sample of
Robert Thornberg   +3 more
wiley   +1 more source

Symmetric Encryption Algorithms in a Polynomial Residue Number System

open access: yesJournal of Applied Mathematics
In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on the polynomial residue number system for the first time. The main feature of the proposed approach is that when reconstructing the polynomial based on the
I. Yakymenko   +3 more
doaj   +1 more source

N-Trans: Parallel Detection Algorithm for DGA Domain Names

open access: yesFuture Internet, 2022
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang   +4 more
doaj   +1 more source

Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey

open access: yesElectronics, 2021
Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as data,
Waqas Ahmad   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy