Results 61 to 70 of about 18,377 (182)
ABSTRACT With increasing geopolitical risks, environmental pressures, and regulatory demands, the sustainable sourcing of raw materials has become a global priority for achieving the United Nations Sustainable Development Goals (SDGs), particularly SDG 9 (Industry, Innovation and Infrastructure), SDG 12 (Responsible Consumption and Production), and SDG
Francesco Parisi +5 more
wiley +1 more source
Progressive growing of self-organized hierarchical representations for exploration [PDF]
Designing agent that can autonomously discover and learn a diversity of structures and skills in unknown changing environments is key for lifelong machine learning.
Etcheverry, Mayalen +2 more
core +2 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Options for Securing RTP Sessions [PDF]
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core +2 more sources
Proliferation of the term “emotion dysregulation” in child psychopathology parallels the growing interest in processes that influence negative emotional reactivity. While it commonly refers to a clinical phenotype where intense anger leads to behavioral dyscontrol, the term implies etiology because anything that is dysregulated requires an impaired ...
Joseph C. Blader +2 more
wiley +1 more source
Observing the invisible: X‐ray CT for plant–microbe interactions
Utility of X‐ray computed tomography (X‐ray CT) for visualising belowground plant interactions between multiple spatial scales and focal planes. Summary Plant–microbe interactions are inherently spatial, yet the physical structure of the soil and rhizosphere is rarely treated as a mechanistic variable in experimental design.
Eric C. Pereira, Chris A. Bell
wiley +1 more source
Root trait dynamics of historical canola varieties under low and high nitrogen supply
Abstract Nitrogen fertilizer is a major input cost in crop production, making it crucial to enhance nitrogen use efficiency (NUE) to reduce fertilizer dependence without compromising yields. Root system architecture (RSA) is a key determinant of nutrient acquisition, particularly under nutrient‐limited conditions.
Shankar Pahari, Raju Soolanayakanahally
wiley +1 more source

