Results 91 to 100 of about 196,474 (374)
Small U‐Net for Fast and Reliable Segmentation in Imaging Flow Cytometry
A schematic illustrating the key components and workflow for training a U‐Net model with a customizable architecture. The process begins with data curation and annotation using the integrated GUI, followed by model configuration and training, and concludes with deployment optimized for performance metrics and processing speed.
Sara Kaliman+8 more
wiley +1 more source
Intelligent connected vehicles (ICVs) are one of the fast-growing directions that plays a significant role in the area of autonomous driving. To realize collaborative computation among ICVs, federated learning (FL) or federated-based large language model
Yang Bai+7 more
doaj +1 more source
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li+5 more
doaj +1 more source
RWU Cybersecurity Expert Works on State Initiative to Combat Cyber Threats [PDF]
As a founding member of the state\u27s Joint Cyber Task Force, RWU Cybersecurity Program Director Douglas White battles cyber disruptions in R.I.
Siliezar, Juan
core +1 more source
In our increasingly connected world, cybersecurity and privacy (CSP) have become center stage issues. The European Union and the United States are the two regions at the forefront of cyber challenges. This chapter presents the key elements of the CSP landscapes in the European Union and the United States.
J Clarke+8 more
openaire +4 more sources
CYBERSECURITY DYNAMICS IN NIGERIAN BANKING: TRENDS AND STRATEGIES REVIEW
This paper provides an in-depth review of the cybersecurity dynamics within the Nigerian banking sector, emphasizing recent trends and strategic approaches to address emerging challenges.
Oluwatosin Reis+3 more
semanticscholar +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi+4 more
wiley +1 more source
EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core
Enhancing Energy Storage Efficiency: Advances in Battery Management Systems in Electric Vehicles
The rapid adoption of electric vehicles (EVs) underscores the urgent need for advanced battery management systems (BMS) to ensure safety, efficiency, and reliability. This article delves into the core functionalities of BMS, including state estimation, thermal management, and cell balancing, which are pivotal for optimizing battery performance ...
Hamid Naseem+3 more
wiley +1 more source
An Options Approach to Cybersecurity Investment
Cybersecurity has become a key factor that determines the success or failure of companies that rely on information systems. Therefore, investment in cybersecurity is an important financial and operational decision.
Michail Chronopoulos+2 more
doaj +1 more source