Results 171 to 180 of about 139,929 (306)
RETRACTED: Learner emotions and performance in hypercasual VR games with adaptive AI difficulty
Abstract Hypercasual virtual reality games (HVRGs) are widely regarded as cost‐effective tools for rapid skill acquisition, yet the mechanisms that optimise their effectiveness and user acceptance remain insufficiently explored. This mixed‐methods empirical study investigates how playful emotions, characterised by engagement, enjoyment and anxiety ...
Zeeshan Ahmed, Faizan Ahmad, Chen Hui
wiley +1 more source
NetworkGuard: An Edge-Based Virtual Network Sensing Architecture for Real-Time Security Monitoring in Smart Home Environments. [PDF]
El Khaled D +3 more
europepmc +1 more source
ABSTRACT Our planet faces a critical crisis, with pollution, resource depletion and biodiversity loss surpassing sustainable limits. Businesses must address these challenges, with the circular economy and Industry 4.0 offering transformative potential through closed‐loop systems, regenerative solutions and advanced technologies.
Agnes Toth‐Peter +3 more
wiley +1 more source
Virtual and Distributed Hardware Security Module for Secure Key Management
Tese de mestrado, Engenharia Informática , 2024, Universidade de Lisboa, Faculdade de ...
openaire +1 more source
ABSTRACT This article contributes to sustainability research by investigating the complex, geopolitically induced challenges faced by industrial supply chains under international sanctions. Using Iran's steel industry as a case, it examines sustainability barriers through the lens of stakeholder theory. A mixed methods approach was employed.
Seyed Hamed Moosavirad +2 more
wiley +1 more source
Driving into the Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment Systems. [PDF]
Yan M, Crane G, Suillivan D, Shan H.
europepmc +1 more source
ABSTRACT Industry 5.0 has emerged to address the limitations of Industry 4.0 by emphasizing inclusive sustainability through environmentalism, human‐centricity, and resilience. However, its development faces barriers across technological, organizational, and social dimensions.
Mohammad Ali Beheshtinia +4 more
wiley +1 more source
A Lightweight Key Agreement Protocol for V2X Communications Based on Kyber and Saber. [PDF]
Dai Y, Wang Q, Song X, Wang S.
europepmc +1 more source
Implementation of hardware security module using elliptic curve cryptography for cyber-physical system [PDF]
B. S. Nisha, J. Selvakumar
openalex +1 more source

