Results 91 to 100 of about 181,953 (301)

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

Enacting Expertise: Ritual and Risk in Cybersecurity

open access: yesPolitics and Governance, 2018
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges.
James Shires
doaj   +1 more source

DeepSeek in Education: Exploring the Transformative Potential of AI‐Driven Educational Intelligence

open access: yesFuture in Educational Research, EarlyView.
ABSTRACT The integration of artificial intelligence into education remains challenged by issues of scalability, interpretability, and multimodal adaptability. DeepSeek's AI‐driven educational tools show potential to improve educational applications through advances in reasoning efficiency, lightweight deployment, and multimodal fusion.
Jian Liao, Fan Sun, Yajie Liu, Yuli Hu
wiley   +1 more source

Do Big Data Applications and Financial Innovation Lead to Enhanced Banking Performance? Evidence From the United Kingdom

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT Big data and financial innovations are vital to enhancing the performance of banking institutions. However, limited evidence exists on the effects of big data applications and financial innovation on bank performance. This study addresses this gap by constructing a theoretical framework linking big data applications and financial innovations ...
Mandella Osei‐Assibey Bonsu   +1 more
wiley   +1 more source

System Approach to Coherent Cybersecurity Strategy

open access: yesSafety & Defense, 2019
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity ...
Daniel MICHALSKI
doaj   +1 more source

An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4

open access: yesIEEE Access
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on ...
Ji Hyuk Jung   +3 more
doaj   +1 more source

The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information [PDF]

open access: yes, 2018
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity
Marcus, Daniel J.
core   +1 more source

When Technology Meets Turbulence: The Impact of Digital Transformation and Policy Uncertainty on Audit Opinions

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT This study investigates how Corporate Digital Transformation (CDT) influences audit opinions in Chinese A‐share‐listed non‐financial firms from 2011 to 2022, with a focus on the moderating role of Economic Policy Uncertainty (EPU). Results reveal an inverted U‐shaped relationship: moderate levels of CDT enhance audit outcomes through improved ...
He Min   +2 more
wiley   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay

open access: yesInformation
Reports produced by popular malware analysis services showed a disparity in samples available for different malware families. The unequal distribution between such classes can be attributed to several factors, such as technological advances and the ...
Antonio Coscia   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy