Results 81 to 90 of about 2,054,840 (293)

Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?

open access: yesBritish Educational Research Journal, EarlyView.
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley   +1 more source

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

Advancing Sustainable Development in Manufacturing: A Strategic Framework for Overcoming Green–Lean Implementation Barriers

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Manufacturing's transition to sustainable development depends on integrating green with lean under credible environmental policy and stakeholder engagement. Although benefits are well established, the literature underspecifies implementation barriers and their prioritisation. This study identifies, structures, and prioritises barriers to green–
Jose Arturo Garza‐Reyes   +4 more
wiley   +1 more source

MAP-GAN: multi-attribute facial privacy protection model without losing identification

open access: yesCybersecurity
In recent years, the proliferation of facial image collection systems coupled with significant advancements in machine learning-driven image analysis techniques has posed formidable challenges to protecting individuals’ privacy information, raising ...
Yue Wang   +5 more
doaj   +1 more source

Can maturity models support cyber security? [PDF]

open access: yes, 2017
© 2016 IEEE. We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of
Hoang, DB, Le, NT
core   +1 more source

How Supply Networks Influence Sustainable Innovation: Evidence From Ghana's Public Works Procurement

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Recent environmental and sustainability standards in procurement increase short‐term production and operational costs to suppliers, which are often recouped by charging price premiums for innovative solutions. However, public buyers are less likely to pay such price premiums, resulting in a disincentive among suppliers to bid for innovation ...
Peter Adjei‐Bamfo   +5 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Fast Payments Across Heterogeneous Blockchains for Internet of Things

open access: yesIEEE Access
Internet of Things data exchange services facilitate the connection and flexible exchange of data among distributed IoT data sources. Traditional IoT data exchange services typically involve direct data uploads to the cloud, allowing service providers to
Zhikai Lin   +3 more
doaj   +1 more source

Log Analyzer To Detect Malicious Attacks Based On Pattern Matching [PDF]

open access: yesITM Web of Conferences
The Log Analyzer scan through the system logs and search for patterns found in particular cyber threat and come to conclusion whether a system is infiltrated and data is being breached, given if the patterns of cyber threat match with the system logs and
Murthy N. N. A. G. Sadasiva   +3 more
doaj   +1 more source

Label propagation algorithm based on Roll-back detection and credibility assessment

open access: yesMathematical Biosciences and Engineering, 2020
The traditional label propagation algorithm (LPA) iteratively propagates labels from a small number of labeled samples to many unlabeled ones based on the sample similarities.
Ying Dong   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy