Results 101 to 110 of about 4,851,518 (333)
Information age has brought a new colossal change in a person’s habitual life. The level of computer literacy has grown greatly and even a middle level specialist is able to perform the tasks intended for the programming experts.
Gubkina, V.V.+2 more
core
Multilayer ferrite inductor prototypes are fabricated by cofiring metallized tapes of NiCuZn ferrite and glass‐ceramic composite. Prerequisites for a predictive component simulation are discussed. An automated data‐pipeline stores and semantically links the experimental data acquired in the study according to a domain ontology.
Björn Mieller+8 more
wiley +1 more source
Improving Food Security in Africa: Highlights of 25 Years of Research, Capacity-Building, and Outreach. [PDF]
Decades of research have led to substantially improved understanding of the nature of food insecurity. A combination of economic growth and targeted programs resulted in a steady fall (until the food crisis of 2007/08) in the percentage of the world’s ...
Food Security Group at Michigan State University
core +1 more source
This manuscript presents advances in digital transformation within materials science and engineering, emphasizing the role of the MaterialDigital Initiative. By testing and applying concepts such as ontologies, knowledge graphs, and integrated workflows, it promotes semantic interoperability and data‐driven innovation. The article reviews collaborative
Bernd Bayerlein+44 more
wiley +1 more source
Arguing security: validating security requirements using structured argumentation [PDF]
This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon ...
Haley, Charles B.+3 more
core +2 more sources
A methodology for establishing an ontology‐augmented structural digital twin for fiber‐reinforced polymer structures dedicated to individual lifetime prediction, in this case, a wind turbine rotor blade, is introduced. The methodology resembles the manufacturing as well as the operation of the structure.
Marc Luger+6 more
wiley +1 more source
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones.
arxiv
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li+4 more
doaj +1 more source
This article introduces the Dataspace Management System (DSMS), a methodological framework realized in software, designed as a technology stack to power dataspaces with a focus on advanced knowledge management in materials science and manufacturing. DSMS leverages heterogeneous data through semantic integration, linkage, and visualization, aligned with
Yoav Nahshon+7 more
wiley +1 more source
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? [PDF]
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles?
arxiv