Results 81 to 90 of about 278,396 (266)
A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks
The rapid growth in the volume and importance of web communication throughout the Internet has heightened the need for better security protection. Security experts, when protecting systems, maintain a database featuring signatures of a large number of ...
Muhammad Hilmi Kamarudin +3 more
doaj +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza +2 more
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Cyber Insurance for Heterogeneous Wireless Networks
Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume.
Jiang, Hai +4 more
core +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
Features requirement elicitation process for designing a chatbot application
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari +4 more
wiley +1 more source
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga +6 more
wiley +1 more source
This study introduces bipolar q‐fractional fuzzy sets and new aggregation operators to support renewable energy selection under uncertainty. The proposed decision‐making framework effectively integrates positive and negative evaluations, ensuring consistent ranking and robust performance, as demonstrated through practical analysis and comparative ...
Sagvan Y. Musa +3 more
wiley +1 more source
An interactive segmentation-based method for seismic facies annotation and segmentation
Seismic facies segmentation plays a critical role in seismic interpretation and geological analysis, providing essential support for subsurface stratigraphic characterization and hydrocarbon reservoir identification.
Siyuan Tian +5 more
doaj +1 more source

