Results 71 to 80 of about 164,979 (324)
Exploring the talent training mode of “cybersecurity doctor”
The competition for cyber security is ultimately the competition of talents. Countries around the world have placed cyber security talents at the national strategic level.
CHEN Xingshu, WANG Haizhou, RUAN Shuhua +2 more
doaj +1 more source
In our increasingly connected world, cybersecurity and privacy (CSP) have become center stage issues. The European Union and the United States are the two regions at the forefront of cyber challenges. This chapter presents the key elements of the CSP landscapes in the European Union and the United States.
J Clarke +8 more
openaire +4 more sources
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone +3 more
wiley +1 more source
How Can Digital Platforms Resolve Market Failures to Foster a Circular Economy?
ABSTRACT Market failures—such as asymmetric information, incomplete markets, externalities, and market power—present major barriers to a circular economy (CE) transition. Although government intervention is traditionally proposed, this paper examines the potential of digital platforms, particularly software‐as‐a‐service (SaaS) business‐to‐business (B2B)
Ässia Boukhatmi, Wim Van Opstal
wiley +1 more source
Parametric design method of building structured cabling system oriented to data mining
This paper puts forward the method of secondary development and design software through the research of building structured cabling system (SCS), and uses data mining technology to carry out parametric design of building SCS. Then, the feasibility of the design is tested by comparing the data of the traditional design and the parametric design ...
Bing Wang, Wei Yue
wiley +1 more source
This paper is part of a series of six publications presenting lessons learned during the setup, regulatory submission, and conduct of the proof‐of‐concept Trials@Home RADIAL trial. The three‐arm RADIAL trial, comprising fully decentralized, hybrid, and conventional arms, is the first clinical study to evaluate the feasibility and acceptability of ...
Helga Gardarsdottir +12 more
wiley +1 more source
Elevator dynamic monitoring and early warning system based on machine learning algorithm
In order to monitor and warn the elevator dynamics, in this work, the machine learning algorithm is introduced, and the particle swarm algorithm is used to perfect the model. The model is optimised, and the experimental comparison shows that the optimisation of the model parameters can further improve the accuracy of the elevator load prediction. Then,
Shuai Zhang, Qiangguo Yin, Jinlong Wang
wiley +1 more source
Open-Vocabulary Object Detection in UAV Imagery: A Review and Future Perspectives
Due to its extensive applications, aerial image object detection has long been a hot topic in computer vision. In recent years, advancements in unmanned aerial vehicle (UAV) technology have further propelled this field to new heights, giving rise to a ...
Yang Zhou +5 more
doaj +1 more source
ABSTRACT As the Internet of Things (IoT) surges forward, intersecting with an urgent demand for environmental sustainability (ES), digital technologies emerge as potent orchestrators of systemic transformation. Employing a subtle blend of bibliometric‐systematic literature review (B‐SLR) and qualitative insights, this research investigates IoT's ...
Giuseppe Lanfranchi +2 more
wiley +1 more source
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina +4 more
wiley +1 more source

