Results 121 to 130 of about 278,396 (266)
Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza +2 more
wiley +1 more source
Named entity recognition model based on Multi‐BiLSTM and competition mechanism
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou +3 more
doaj +1 more source
Cyber security picture 2013 [PDF]
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.
core
ABSTRACT Food loss and waste (FLW) within agri‐food supply chains significantly impact the consumer economy, depleting natural resources and contributing to greenhouse gas emissions, thereby posing a critical challenge to sustainable development. Digital transformation is increasingly recognised as a key lever for reducing FLW in agri‐food supply ...
Stefano Abbate, Piera Centobelli
wiley +1 more source
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. [PDF]
Renaud K, Coles-Kemp L.
europepmc +1 more source
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha +5 more
wiley +1 more source
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou +3 more
doaj +1 more source
ABSTRACT Smart cities and urban digital twins have fostered the emergence of immersive environments, such as the metaverse. While contemporary scholarlship has increasingly examined the integration of the metaverse within smart city infrastructures, the critical nexus between urban sustainability and the metaverse remains largely under‐researched. This
Jose Manuel Diaz‐Sarachaga +1 more
wiley +1 more source
Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data.
Qian Feng +3 more
doaj +1 more source

