Results 71 to 80 of about 164,979 (324)

Exploring the talent training mode of “cybersecurity doctor”

open access: yes网络与信息安全学报, 2019
The competition for cyber security is ultimately the competition of talents. Countries around the world have placed cyber security talents at the national strategic level.
CHEN Xingshu, WANG Haizhou, RUAN Shuhua   +2 more
doaj   +1 more source

Cybersecurity and Privacy

open access: yes, 2020
In our increasingly connected world, cybersecurity and privacy (CSP) have become center stage issues. The European Union and the United States are the two regions at the forefront of cyber challenges. This chapter presents the key elements of the CSP landscapes in the European Union and the United States.
J Clarke   +8 more
openaire   +4 more sources

Harnessing Blockchain for Sustainable Business Strategy: A Case Study on Enhancing Accounting Practices

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone   +3 more
wiley   +1 more source

How Can Digital Platforms Resolve Market Failures to Foster a Circular Economy?

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Market failures—such as asymmetric information, incomplete markets, externalities, and market power—present major barriers to a circular economy (CE) transition. Although government intervention is traditionally proposed, this paper examines the potential of digital platforms, particularly software‐as‐a‐service (SaaS) business‐to‐business (B2B)
Ässia Boukhatmi, Wim Van Opstal
wiley   +1 more source

Parametric design method of building structured cabling system oriented to data mining

open access: yesIET Networks, EarlyView., 2022
This paper puts forward the method of secondary development and design software through the research of building structured cabling system (SCS), and uses data mining technology to carry out parametric design of building SCS. Then, the feasibility of the design is tested by comparing the data of the traditional design and the parametric design ...
Bing Wang, Wei Yue
wiley   +1 more source

Regulatory Interactions and Learnings—RADIAL the Trials@Home Proof‐of‐Concept Trial on Decentralization

open access: yesClinical Pharmacology &Therapeutics, EarlyView.
This paper is part of a series of six publications presenting lessons learned during the setup, regulatory submission, and conduct of the proof‐of‐concept Trials@Home RADIAL trial. The three‐arm RADIAL trial, comprising fully decentralized, hybrid, and conventional arms, is the first clinical study to evaluate the feasibility and acceptability of ...
Helga Gardarsdottir   +12 more
wiley   +1 more source

Elevator dynamic monitoring and early warning system based on machine learning algorithm

open access: yesIET Networks, EarlyView., 2022
In order to monitor and warn the elevator dynamics, in this work, the machine learning algorithm is introduced, and the particle swarm algorithm is used to perfect the model. The model is optimised, and the experimental comparison shows that the optimisation of the model parameters can further improve the accuracy of the elevator load prediction. Then,
Shuai Zhang, Qiangguo Yin, Jinlong Wang
wiley   +1 more source

Open-Vocabulary Object Detection in UAV Imagery: A Review and Future Perspectives

open access: yesDrones
Due to its extensive applications, aerial image object detection has long been a hot topic in computer vision. In recent years, advancements in unmanned aerial vehicle (UAV) technology have further propelled this field to new heights, giving rise to a ...
Yang Zhou   +5 more
doaj   +1 more source

Internet of Things (IoT) and the Environmental Sustainability: A Literature Review and Recommendations for Future Research

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT As the Internet of Things (IoT) surges forward, intersecting with an urgent demand for environmental sustainability (ES), digital technologies emerge as potent orchestrators of systemic transformation. Employing a subtle blend of bibliometric‐systematic literature review (B‐SLR) and qualitative insights, this research investigates IoT's ...
Giuseppe Lanfranchi   +2 more
wiley   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy