Results 101 to 110 of about 4,851,518 (333)

Linux Security [PDF]

open access: yes, 2017
Information age has brought a new colossal change in a person’s habitual life. The level of computer literacy has grown greatly and even a middle level specialist is able to perform the tasks intended for the programming experts.
Gubkina, V.V.   +2 more
core  

Ontology‐Based Data Acquisition, Refinement, and Utilization in the Development of a Multilayer Ferrite Inductor

open access: yesAdvanced Engineering Materials, EarlyView.
Multilayer ferrite inductor prototypes are fabricated by cofiring metallized tapes of NiCuZn ferrite and glass‐ceramic composite. Prerequisites for a predictive component simulation are discussed. An automated data‐pipeline stores and semantically links the experimental data acquired in the study according to a domain ontology.
Björn Mieller   +8 more
wiley   +1 more source

Improving Food Security in Africa: Highlights of 25 Years of Research, Capacity-Building, and Outreach. [PDF]

open access: yes
Decades of research have led to substantially improved understanding of the nature of food insecurity. A combination of economic growth and targeted programs resulted in a steady fall (until the food crisis of 2007/08) in the percentage of the world’s ...
Food Security Group at Michigan State University
core   +1 more source

Concepts for a Semantically Accessible Materials Data Space: Overview over Specific Implementations in Materials Science

open access: yesAdvanced Engineering Materials, EarlyView.
This manuscript presents advances in digital transformation within materials science and engineering, emphasizing the role of the MaterialDigital Initiative. By testing and applying concepts such as ontologies, knowledge graphs, and integrated workflows, it promotes semantic interoperability and data‐driven innovation. The article reviews collaborative
Bernd Bayerlein   +44 more
wiley   +1 more source

Arguing security: validating security requirements using structured argumentation [PDF]

open access: yes, 2005
This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon ...
Haley, Charles B.   +3 more
core   +2 more sources

An Ontology‐Augmented Digital Twin for Fiber‐Reinforced Polymer Structures at the Example of Wind Turbine Rotor Blades

open access: yesAdvanced Engineering Materials, EarlyView.
A methodology for establishing an ontology‐augmented structural digital twin for fiber‐reinforced polymer structures dedicated to individual lifetime prediction, in this case, a wind turbine rotor blade, is introduced. The methodology resembles the manufacturing as well as the operation of the structure.
Marc Luger   +6 more
wiley   +1 more source

A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]

open access: yesarXiv, 2006
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones.
arxiv  

Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention

open access: yesApplied Sciences
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li   +4 more
doaj   +1 more source

Semantic Orchestration and Exploitation of Material Data: A Dataspace Solution Demonstrated on Steel and Copper Applications

open access: yesAdvanced Engineering Materials, EarlyView.
This article introduces the Dataspace Management System (DSMS), a methodological framework realized in software, designed as a technology stack to power dataspaces with a focus on advanced knowledge management in materials science and manufacturing. DSMS leverages heterogeneous data through semantic integration, linkage, and visualization, aligned with
Yoav Nahshon   +7 more
wiley   +1 more source

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? [PDF]

open access: yesarXiv, 2017
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles?
arxiv  

Home - About - Disclaimer - Privacy