Results 11 to 20 of about 1,773,552 (288)

Towards Validating Risk Indicators Based on Measurement Theory (Extended version) [PDF]

open access: yes, 2010
Due to the lack of quantitative information and for cost-efficiency, most risk assessment methods use partially ordered values (e.g. high, medium, low) as risk indicators.
Morali, Ayse, Wieringa, Roel
core   +8 more sources

Stand-Alone and Hybrid Positioning Using Asynchronous Pseudolites

open access: yesSensors, 2014
global navigation satellite system (GNSS) receivers are usually unable to achieve satisfactory performance in difficult environments, such as open-pit mines, urban canyons and indoors. Pseudolites have the potential to extend GNSS usage and significantly
Ciro Gioia, Daniele Borio
doaj   +1 more source

Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach

open access: yesInformation, 2020
Security has become one of the primary factors that cloud customers consider when they select a cloud provider for migrating their data and applications into the Cloud.
Sebastian Pape   +3 more
doaj   +1 more source

Security Analysis and Enhancement of INTERBUS Protocol in ICS Based on Colored Petri Net

open access: yesInformation, 2023
The integration of buses in industrial control systems, fueled by advancements such as the Internet of Things (IoT), has led to their widespread adoption, significantly enhancing operational efficiency.
Tao Feng   +3 more
doaj   +1 more source

Impact Webs: a novel conceptual modelling approach for characterising and assessing complex risks [PDF]

open access: yesHydrology and Earth System Sciences
Identifying, characterising, and assessing the complex nature of risks are vital to realise the expected outcome of the Sendai Framework for Disaster Risk Reduction.
E. Sparkes   +5 more
doaj   +1 more source

Research on Text Information Depth Extraction and Multi-keyword Parallel Matching Technique [PDF]

open access: yesJisuanji gongcheng, 2018
At present,text information extraction and retrieval cannot adapt to the complex environment,limited by user rights and facing the problem of large storage capacity.Based on the feature analysis of all kinds of document text information,a parallel depth ...
WANG Wenqi,LI Yong,GUAN Yunyun
doaj   +1 more source

Cross-Network User Identity Linkage Method with Deep Learning Based on SDNE Embedding Representation [PDF]

open access: yesJisuanji kexue yu tansuo
Mining the correlation between massive virtual identities and determining the identity of different virtual identities are of great significance for accurate user recommendation, abnormal user detection, public opinion control and so on.
CHENG Jialin, YUAN Deyu, SUN Zeyu, CHEN Ziyan
doaj   +1 more source

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

X-ray Prohibited Items Detection Based on Inverted Bottleneck and Light Convolution Block Attention Module [PDF]

open access: yesJisuanji kexue yu tansuo
To resolve the problems of position and angle change causing miss and false detection, low accuracy of difficult samples in X-ray luggage images, using YOLOv5 as the baseline, this paper proposes a model by inverted bottleneck and light convolution block
DONG Yishan, GUO Jingyuan, LI Mingze, SUN Jia'ao, LU Shuhua
doaj   +1 more source

Preliminary Examination of Emergent Threat and Risk Landscapes in Intelligent Harvesting Robots

open access: yesApplied Sciences, 2022
Recently, many farmers have started using robots to help with labour-intensive harvesting operations and deal with labour shortage that was also a negative consequence of the recent COVID-19 pandemic.
Nabil Moukafih   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy