Results 81 to 90 of about 278,396 (266)

A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks

open access: yesIEEE Access, 2017
The rapid growth in the volume and importance of web communication throughout the Internet has heightened the need for better security protection. Security experts, when protecting systems, maintain a database featuring signatures of a large number of ...
Muhammad Hilmi Kamarudin   +3 more
doaj   +1 more source

Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]

open access: yes, 2015
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M   +12 more
core  

Tokenism or Catalytic? Exploring Board Gender Diversity Through the Lens of SDG 9 Outcomes in the EU Context

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza   +2 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Cyber Insurance for Heterogeneous Wireless Networks

open access: yes, 2017
Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume.
Jiang, Hai   +4 more
core   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Features requirement elicitation process for designing a chatbot application

open access: yesIET Networks, EarlyView., 2022
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari   +4 more
wiley   +1 more source

Optimizing Electric Vehicle Charging Scheduling With Deep Q Networks and Long Short‐Term Memory‐Based Electricity and Battery State of Charge Prediction

open access: yesEnergy Science &Engineering, EarlyView.
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga   +6 more
wiley   +1 more source

Bipolar q $q$‐Fractional Fuzzy Aggregation Operators for Multi‐Criteria Decision‐Making in Optimal Renewable Energy Selection

open access: yesEnergy Science &Engineering, EarlyView.
This study introduces bipolar q‐fractional fuzzy sets and new aggregation operators to support renewable energy selection under uncertainty. The proposed decision‐making framework effectively integrates positive and negative evaluations, ensuring consistent ranking and robust performance, as demonstrated through practical analysis and comparative ...
Sagvan Y. Musa   +3 more
wiley   +1 more source

An interactive segmentation-based method for seismic facies annotation and segmentation

open access: yesScientific Reports
Seismic facies segmentation plays a critical role in seismic interpretation and geological analysis, providing essential support for subsurface stratigraphic characterization and hydrocarbon reservoir identification.
Siyuan Tian   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy