Results 81 to 90 of about 141,441 (275)
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Cyber Attacks and Combat Behavior [PDF]
Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages.
Carataș Maria Alina +2 more
doaj
This study demonstrates that ECOSTRESS lands surface temperature (LST) data are sensitive to forest thinning, regional drought, and their interaction. Consistent with high‐resolution UAV images, ECOSTRESS LST data indicate thinned forest had significantly greater temperature across years.
Temuulen Tsagaan Sankey +9 more
wiley +1 more source
Resort to Self-Defense Against Cyber Attacks by Non-State Actors in International Law10.22133/mtlj.2025.424362.1265 [PDF]
In the discussion of resorting to Self defenseSelf-defense against cyber attackscyber-attacks by non-State actors, at first it must be determined that for what type of cyber attackcyber-attack the right to Self defenseSelf-defense is allowed.
parviz farshasaid, Mahmoud Jalali
doaj +1 more source
Cyber-Security in Smart Grid: Survey and Challenges
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El +3 more
core +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
Wireless ICS Training Platform [PDF]
Indiana University - Purdue University IndianapolisEssential public services, such as Electric, Water and Gas Utilities, are becoming increasingly reliant on network connected devices to control their processes. Wireless control systems are becoming more
Cassandra Boman, Nick Pohlman
core
ABSTRACT This study explores how digital transformation, measured by the Global Digitalisation Index (GDI), relates to progress on the UN Sustainable Development Goals (SDGs) across EU member states. Using partial correlation, regression analysis with interaction terms and cluster analysis, the research examines the moderating effects of governance and
Luis Fonseca +4 more
wiley +1 more source
Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core

