Results 71 to 80 of about 834,303 (333)

How AI Shapes the Future Landscape of Sustainable Building Design With Climate Change Challenges?

open access: yesAdvanced Science, EarlyView.
This review examines how artificial intelligence reshapes sustainable building design faced with climate change challenges. The authors synthesize existing studies to demonstrate AI's transformative potential across design lifecycle phases from climate‐aware form generation to performance optimization.
Pengyuan Shen   +5 more
wiley   +1 more source

An Assessment of Practical Hands-On Lab Activities in Network Security Management

open access: yesJournal of Cybersecurity Education, Research & Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect.
Te-Shun Chou, Nicholas Hempenius
doaj  

Enhancing Security of Software Defined Mobile Networks

open access: yesIEEE Access, 2017
Traffic volumes in mobile networks are rising and end-user needs are rapidly changing. Mobile network operators need more flexibility, lower network operating costs, faster service roll-out cycles, and new revenue sources.
Madhusanka Liyanage   +9 more
doaj   +1 more source

Towards Climate Neutrality by 2050: Role of Aluminum for Short‐ and Long‐Term Energy and Hydrogen Storage

open access: yesAdvanced Energy Materials, EarlyView.
The Aluminum energy storage cycle involves the use of renewable energy for Al production and the generation of heat (dry cycle) and heat and H2 (wet cycle) for energy production via Al‐steam combustion. ABSTRACT Reaching climate neutrality by 2050 requires innovative long‐term energy storage (LTES) solutions beyond the current use of fossil fuels ...
Lorenzo Trombetti   +2 more
wiley   +1 more source

A formal basis for the design and analysis of firewall security policies

open access: yesJournal of King Saud University: Computer and Information Sciences, 2018
A firewall is the core of a well defined network security policy. This paper presents an automata-based method to study firewall security policies. We first propose a procedure that synthesizes an automaton that describes a security policy given as a ...
Ahmed Khoumsi   +2 more
doaj   +1 more source

Comparative Insights and Overlooked Factors of Interphase Chemistry in Alkali Metal‐Ion Batteries

open access: yesAdvanced Energy Materials, EarlyView.
This review presents a comparative analysis of Li‐, Na‐, and K‐ion batteries, focusing on the critical role of electrode–electrolyte interphases. It especially highlights overlooked aspects such as SEI/CEI misconceptions, binder effects, and self‐discharge relevance, emphasizing the limitations of current understanding and offering strategies for ...
Changhee Lee   +3 more
wiley   +1 more source

Keamanan Maritim dan Implikasi Kebijakannya Bagi Indonesia

open access: yesJSP: Jurnal Ilmu Sosial dan Ilmu Politik, 2009
Through the last decade the concept of Maritime Security has been discused in many global and regional forum such as UN and ASEAN. Common agreement on the concept of Marine Security, however, have not been reached.
Makmur Keliat
doaj   +1 more source

2023–2027 CAP First Pillar Reform and Livestock Sector: Production and Economic Impacts on Italian Specialized Dairy Cattle Farms

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT The present study uses an agroeconomic supply model to assess the impacts of 2023–2027 CAP on Italian specialized dairy cattle farms. The model considers the voluntary choice of Eco‐Scheme 1, specifically addressed to livestock farms, through the implementation of binary variables.
Davide Dell'Unto, Raffaele Cortignani
wiley   +1 more source

Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy