Results 81 to 90 of about 77,587 (303)

An Adaptive Trust Evaluation Model for Detecting Abnormal Nodes in Underwater Acoustic Sensor Networks

open access: yesSensors
Underwater acoustic sensor networks have a wide range of applications in both civil and military fields, but the complex and changing underwater environment makes them vulnerable to multiple security threats.
Changtao Liu   +3 more
doaj   +1 more source

Efficient Incremental Learning Using Dynamic Correction Vector

open access: yesIEEE Access, 2020
One major challenge for modern artificial neural networks (ANNs) is that they typically does not handle incremental learning well. In other words, while learning the new features, the performances of existing features usually deteriorate. This phenomenon
Yun Xiang   +3 more
doaj   +1 more source

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

Zinc‐Containing Bioactive Glass Programs Macrophage Polarization through Extracellular Traps Regulation for Enhanced Diabetic Wound Healing

open access: yesAdvanced Healthcare Materials, EarlyView.
Zinc‐containing bioactive glass (ZnBG) promotes diabetic wound healing by regulating macrophage extracellular traps (METs). Specifically, ZnBG reduces oxidative stress and inhibits the PAD4 and NLRP3/caspase‐1/GSDMD signaling pathways, thereby suppressing MET formation.
RuiYang Sun   +11 more
wiley   +1 more source

The Path of Internet Law: An Annotated Guide to Legal Landmarks [PDF]

open access: yes, 2011
The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property.
D’Angelo, Diane, Rustad, Michael L.
core   +1 more source

Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020 [PDF]

open access: yes, 2020
The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not ...
Garside, Susanna
core  

Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application

open access: yesAdvanced Materials, EarlyView.
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong   +12 more
wiley   +1 more source

Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions

open access: yes, 2011
As computation spreads from computers to networks of computers, and migrates into cyberspace, it ceases to be globally programmable, but it remains programmable indirectly: network computations cannot be controlled, but they can be steered by local ...
Meadows, Catherine, Pavlovic, Dusko
core  

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Home - About - Disclaimer - Privacy