Results 11 to 20 of about 126 (75)

Parametric design method of building structured cabling system oriented to data mining

open access: yesIET Networks, EarlyView., 2022
This paper puts forward the method of secondary development and design software through the research of building structured cabling system (SCS), and uses data mining technology to carry out parametric design of building SCS. Then, the feasibility of the design is tested by comparing the data of the traditional design and the parametric design ...
Bing Wang, Wei Yue
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Accountability in Government Use of AI: Citizen Concerns and Preferences

open access: yesPublic Administration, EarlyView.
ABSTRACT Government adoption of AI opens the “pandora's box” of accountability, a core aspect of public value. Despite the centrality of governmental AI accountability, citizens' concerns and preferences in holding governments accountable for AI usage remain poorly understood.
Naikang Feng, Yanto Chandra
wiley   +1 more source

Smart Contracts and SME Resilience: Business Model Adaptation and International Considerations

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, Volume 43, Issue 1, March 2026.
ABSTRACT Smart contracts (SCs), appended to a blockchain, protect digital environments and their resources, processes and structures, reducing mismatches between legal and actual rights and ownership. They enhance digital resilience by improving transparency, traceability and trust in digital transactions.
Araz Zirar   +2 more
wiley   +1 more source

The Missing Link in Digital Transformation Leadership: Unpacking the Role of Knowledge

open access: yesInformation Systems Journal, Volume 36, Issue 2, Page 230-246, March 2026.
ABSTRACT Leading digital transformation (DT) is challenging due to the unforeseen hurdles that arise through the novelty of digital technologies and the broad scope of organisational change. Even those with a wealth of experience and skills may struggle to respond adequately to inherently novel situations.
Malmi Amadoru   +2 more
wiley   +1 more source

AI‐Driven Optimization Techniques for Power Quality Improvement in Microgrids: Trends, Techniques, and Future Directions

open access: yesEnergy Science &Engineering, Volume 14, Issue 1, Page 583-610, January 2026.
Decentralized energy systems are gaining momentum, and microgrids have become a vital component of the modern power landscape. Yet, maintaining power quality within these systems presents ongoing challenges due to the presence of nonlinear loads, variable renewable energy sources, and frequent switching operations.
Mahnoor Zahid   +5 more
wiley   +1 more source

Enhanced Modelling and Analysis of Cyber‐Physical System Security Against DoS Attacks Using Generalised Stochastic Petri Nets

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
This paper proposes a new framework for the analysis of cyber‐physical system security against denial‐of‐service (DoS) attacks using generalised stochastic Petri nets. The model incorporates immediate and timed transitions, thus mapping both continuous operations of cyber‐physical system and discrete‐event natures of cyber threats.
Mahdi Jafarpour, M. Sami Fadali
wiley   +1 more source

Forensic detection of medical image manipulation using PACS and DICOM artifacts

open access: yesJournal of Forensic Sciences, Volume 71, Issue 1, Page 371-387, January 2026.
Abstract With the digitization of medical information, illegal activities such as medical crimes and insurance fraud through tampering have increased. Medical images are particularly vulnerable due to their nature as soft copies and their transmission over networks.
Sojung Oh   +5 more
wiley   +1 more source

Reinvigorating Conversation in Logistics and Supply Chains: A Cross‐Disciplinary Theoretical Toolkit for Disruptive Value Creation

open access: yesJournal of Business Logistics, Volume 47, Issue 1, January 2026.
ABSTRACT Contemporary logistics and supply chain management (L/SCM) face unprecedented disruption from emerging technologies, rising complexity, and escalating uncertainties, in which traditional approaches to value creation have limited reach. In this vein, this paper introduces a cross‐disciplinary theoretical toolkit that draws on unconventional (or
Maciel M. Queiroz   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy