Results 91 to 100 of about 181,953 (301)
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan +4 more
wiley +1 more source
Enacting Expertise: Ritual and Risk in Cybersecurity
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges.
James Shires
doaj +1 more source
DeepSeek in Education: Exploring the Transformative Potential of AI‐Driven Educational Intelligence
ABSTRACT The integration of artificial intelligence into education remains challenged by issues of scalability, interpretability, and multimodal adaptability. DeepSeek's AI‐driven educational tools show potential to improve educational applications through advances in reasoning efficiency, lightweight deployment, and multimodal fusion.
Jian Liao, Fan Sun, Yajie Liu, Yuli Hu
wiley +1 more source
ABSTRACT Big data and financial innovations are vital to enhancing the performance of banking institutions. However, limited evidence exists on the effects of big data applications and financial innovation on bank performance. This study addresses this gap by constructing a theoretical framework linking big data applications and financial innovations ...
Mandella Osei‐Assibey Bonsu +1 more
wiley +1 more source
System Approach to Coherent Cybersecurity Strategy
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity ...
Daniel MICHALSKI
doaj +1 more source
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on ...
Ji Hyuk Jung +3 more
doaj +1 more source
The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information [PDF]
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity
Marcus, Daniel J.
core +1 more source
ABSTRACT This study investigates how Corporate Digital Transformation (CDT) influences audit opinions in Chinese A‐share‐listed non‐financial firms from 2011 to 2022, with a focus on the moderating role of Economic Policy Uncertainty (EPU). Results reveal an inverted U‐shaped relationship: moderate levels of CDT enhance audit outcomes through improved ...
He Min +2 more
wiley +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
Reports produced by popular malware analysis services showed a disparity in samples available for different malware families. The unequal distribution between such classes can be attributed to several factors, such as technological advances and the ...
Antonio Coscia +3 more
doaj +1 more source

