Results 31 to 40 of about 1,764,419 (291)

PTCR: Knowledge-Based Visual Question Answering Framework Based on Large Language Model [PDF]

open access: yesJisuanji kexue yu tansuo
Aiming at the problems of insufficient model input information and poor reasoning performance in knowledge-based visual question answering (VQA), this paper constructs a PTCR knowledge-based VQA framework based on large language model (LLM), which ...
XUE Di, LI Xin, LIU Mingshuai
doaj   +1 more source

Virtualization Security Assessment [PDF]

open access: yesInformation Security Journal: A Global Perspective, 2009
ABSTRACT Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. i Also, guidance is available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet ...
openaire   +1 more source

Security risk assessment and protection in the chemical and process industry [PDF]

open access: yes, 2014
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute   +19 more
core   +1 more source

Influence of Temperature on Launching Characteristics of Lithium-Battery-Powered Reluctance Launcher

open access: yesIEEE Access
Lithium-battery-powered reluctance launcher is a device that utilizes lithium batteries to directly discharge into coils, generating electromagnetic force to accelerate an armature.
Zhichao Yu   +8 more
doaj   +1 more source

CIL-LLM: Incremental Learning Framework Based on Large Language Models for Category Classification [PDF]

open access: yesJisuanji kexue yu tansuo
To enhance classification accuracy in class-incremental learning (CIL) models for text classification and mitigate the issue of catastrophic forgetting, this paper introduces a CIL framework based on a large language model (CIL-LLM).
WANG Xiaoyu, LI Xin, HU Mianning, XUE Di
doaj   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Economic Efficiency of the Electronic Security Systems in Security Management of Commercial Activities [PDF]

open access: yesRevista de Management Comparat International, 2014
The purpose of this study is to identify some general patterns of the efficiency of electronic security systems used in the security management of the commercial activities and spaces.
Marian NASTASE   +1 more
doaj  

Anti-terrorist security assessment [PDF]

open access: yesВојно дело, 2014
Contemporary terrorism is a multifaceted and controversial concept, loaded with political instrumentalization, because of which it is very difficult to find scientifically based framework for its analysis.
Dragišić Zoran   +2 more
doaj   +1 more source

Emotional Reactions to the Perception of Risk in the Pompeii Archaeological Park [PDF]

open access: yes, 2020
The assessment of perceived risk by people is extremely important for safety and security management. Each person is based on the opinion of others to make a choice and the Internet represents the place where these opinions are mostly researched, found ...
B. Russo, Simona   +5 more
core   +2 more sources

A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers

open access: yesInternational Journal of Information and Communication Technology Research, 2020
Despite the increasing development of research in the service supply chain, the IT service supply chain measurements have not  grown proportionally. In this paper, based on a  survey the key indicators in the IT service supply chain and ranking them, a ...
Reza Kalantari   +2 more
doaj  

Home - About - Disclaimer - Privacy