Results 91 to 100 of about 196,474 (374)

Small U‐Net for Fast and Reliable Segmentation in Imaging Flow Cytometry

open access: yesCytometry Part A, EarlyView.
A schematic illustrating the key components and workflow for training a U‐Net model with a customizable architecture. The process begins with data curation and annotation using the integrated GUI, followed by model configuration and training, and concludes with deployment optimized for performance metrics and processing speed.
Sara Kaliman   +8 more
wiley   +1 more source

Using Homomorphic Proxy Re-Encryption to Enhance Security and Privacy of Federated Learning-Based Intelligent Connected Vehicles

open access: yesIET Information Security
Intelligent connected vehicles (ICVs) are one of the fast-growing directions that plays a significant role in the area of autonomous driving. To realize collaborative computation among ICVs, federated learning (FL) or federated-based large language model
Yang Bai   +7 more
doaj   +1 more source

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach

open access: yesIEEE Access, 2019
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li   +5 more
doaj   +1 more source

RWU Cybersecurity Expert Works on State Initiative to Combat Cyber Threats [PDF]

open access: yes, 2017
As a founding member of the state\u27s Joint Cyber Task Force, RWU Cybersecurity Program Director Douglas White battles cyber disruptions in R.I.
Siliezar, Juan
core   +1 more source

Cybersecurity and Privacy

open access: yes, 2020
In our increasingly connected world, cybersecurity and privacy (CSP) have become center stage issues. The European Union and the United States are the two regions at the forefront of cyber challenges. This chapter presents the key elements of the CSP landscapes in the European Union and the United States.
J Clarke   +8 more
openaire   +4 more sources

CYBERSECURITY DYNAMICS IN NIGERIAN BANKING: TRENDS AND STRATEGIES REVIEW

open access: yesComputer Science & IT Research Journal
This paper provides an in-depth review of the cybersecurity dynamics within the Nigerian banking sector, emphasizing recent trends and strategic approaches to address emerging challenges.
Oluwatosin Reis   +3 more
semanticscholar   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Enhancing Energy Storage Efficiency: Advances in Battery Management Systems in Electric Vehicles

open access: yesEnergy Technology, EarlyView.
The rapid adoption of electric vehicles (EVs) underscores the urgent need for advanced battery management systems (BMS) to ensure safety, efficiency, and reliability. This article delves into the core functionalities of BMS, including state estimation, thermal management, and cell balancing, which are pivotal for optimizing battery performance ...
Hamid Naseem   +3 more
wiley   +1 more source

An Options Approach to Cybersecurity Investment

open access: yesIEEE Access, 2018
Cybersecurity has become a key factor that determines the success or failure of companies that rely on information systems. Therefore, investment in cybersecurity is an important financial and operational decision.
Michail Chronopoulos   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy