Results 221 to 230 of about 79,967 (299)
ABSTRACT Drought tolerance in crops often involves trade‐offs between water conservation, growth and reproduction. Understanding how water‐saving strategies are implemented at physiological and metabolic levels remains critical for improving crop performance under water‐limited conditions.
Ryosuke Mega +9 more
wiley +1 more source
Transforming Smart Healthcare Systems with AI-Driven Edge Computing for Distributed IoMT Networks. [PDF]
Almufareh MF, Humayun M, Haseeb K.
europepmc +1 more source
e‐Government Adoption in Ghana: Structural Conditions and Employee Affective Orientation
ABSTRACT Globally, technological innovations are driving governments towards e‐government adoption. Digitization efforts have met with more resistance and challenges in the Global South context due to high levels of financial, logistical, and technical constraints.
Sandy Zook +3 more
wiley +1 more source
Incident-aware smart prioritization framework for penetration testing and prevention of URL-based cybersecurity attacks in industry 4.0 IoT networks. [PDF]
Nurlan Z +7 more
europepmc +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
Mapping Cyber Bot Behaviors: Understanding Payload Patterns in Honeypot Traffic. [PDF]
Wang S, Tu C, Zhang Y, Zhang M, Xue P.
europepmc +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Leveraging data analytics to revolutionize cybersecurity with machine learning and deep learning. [PDF]
Srinivasulu A +4 more
europepmc +1 more source

