Results 221 to 230 of about 25,319 (281)
Ensemble models are adopted to estimate the sterile content of scraps arriving to the scrap yard. Feed‐forward neural networks are exploited to estimate steel composition and temperature after Ladle furnace. The models are validated on data from two steelworks very satisfactory results and are inherently transferable to other steelworks, as they are ...
Valentina Colla +7 more
wiley +1 more source
Privacy-Preserving Multi-User Graph Intersection Scheme for Wireless Communications in Cloud-Assisted Internet of Things. [PDF]
Yang S.
europepmc +1 more source
Theorizing Synchronization of Organizational Resources in Dynamic Environments
ABSTRACT Resource orchestration (RO) in dynamic environments poses challenges during strategic initiatives. Although prior research highlights RO's benefits, little is known about how managerial decisions influence RO over time, potentially leading to inefficiencies.
Haytham Siala +6 more
wiley +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
Abstract Background Gastrointestinal nematode infections are ubiquitous in grazing livestock worldwide impacting animal health and production. Faecal egg count (FEC) is an accessible diagnostic test that can guide the need for treatment. However, interpretation of FECs can be challenging.
Eilidh Geddes +7 more
wiley +1 more source
AI edge cloud service provisioning for knowledge management smart applications. [PDF]
Maciá-Lillo A +4 more
europepmc +1 more source
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things. [PDF]
Guo C +5 more
europepmc +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Dynamic Privacy-Preserving Anonymous Authentication Scheme for Condition-Matching in Fog-Cloud-Based VANETs. [PDF]
Zhan Y, Xie W, Shi R, Huang Y, Zheng X.
europepmc +1 more source

