Results 71 to 80 of about 20,005 (219)

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

System Approach to Coherent Cybersecurity Strategy

open access: yesSafety & Defense, 2019
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity ...
Daniel MICHALSKI
doaj   +1 more source

Do Big Data Applications and Financial Innovation Lead to Enhanced Banking Performance? Evidence From the United Kingdom

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT Big data and financial innovations are vital to enhancing the performance of banking institutions. However, limited evidence exists on the effects of big data applications and financial innovation on bank performance. This study addresses this gap by constructing a theoretical framework linking big data applications and financial innovations ...
Mandella Osei‐Assibey Bonsu   +1 more
wiley   +1 more source

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay

open access: yesInformation
Reports produced by popular malware analysis services showed a disparity in samples available for different malware families. The unequal distribution between such classes can be attributed to several factors, such as technological advances and the ...
Antonio Coscia   +3 more
doaj   +1 more source

Enacting Expertise: Ritual and Risk in Cybersecurity

open access: yesPolitics and Governance, 2018
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges.
James Shires
doaj   +1 more source

When Technology Meets Turbulence: The Impact of Digital Transformation and Policy Uncertainty on Audit Opinions

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT This study investigates how Corporate Digital Transformation (CDT) influences audit opinions in Chinese A‐share‐listed non‐financial firms from 2011 to 2022, with a focus on the moderating role of Economic Policy Uncertainty (EPU). Results reveal an inverted U‐shaped relationship: moderate levels of CDT enhance audit outcomes through improved ...
He Min   +2 more
wiley   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy