PTCR: Knowledge-Based Visual Question Answering Framework Based on Large Language Model [PDF]
Aiming at the problems of insufficient model input information and poor reasoning performance in knowledge-based visual question answering (VQA), this paper constructs a PTCR knowledge-based VQA framework based on large language model (LLM), which ...
XUE Di, LI Xin, LIU Mingshuai
doaj +1 more source
Virtualization Security Assessment [PDF]
ABSTRACT Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. i Also, guidance is available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet ...
openaire +1 more source
Security risk assessment and protection in the chemical and process industry [PDF]
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute +19 more
core +1 more source
Influence of Temperature on Launching Characteristics of Lithium-Battery-Powered Reluctance Launcher
Lithium-battery-powered reluctance launcher is a device that utilizes lithium batteries to directly discharge into coils, generating electromagnetic force to accelerate an armature.
Zhichao Yu +8 more
doaj +1 more source
CIL-LLM: Incremental Learning Framework Based on Large Language Models for Category Classification [PDF]
To enhance classification accuracy in class-incremental learning (CIL) models for text classification and mitigate the issue of catastrophic forgetting, this paper introduces a CIL framework based on a large language model (CIL-LLM).
WANG Xiaoyu, LI Xin, HU Mianning, XUE Di
doaj +1 more source
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
Economic Efficiency of the Electronic Security Systems in Security Management of Commercial Activities [PDF]
The purpose of this study is to identify some general patterns of the efficiency of electronic security systems used in the security management of the commercial activities and spaces.
Marian NASTASE +1 more
doaj
Anti-terrorist security assessment [PDF]
Contemporary terrorism is a multifaceted and controversial concept, loaded with political instrumentalization, because of which it is very difficult to find scientifically based framework for its analysis.
Dragišić Zoran +2 more
doaj +1 more source
Emotional Reactions to the Perception of Risk in the Pompeii Archaeological Park [PDF]
The assessment of perceived risk by people is extremely important for safety and security management. Each person is based on the opinion of others to make a choice and the Internet represents the place where these opinions are mostly researched, found ...
B. Russo, Simona +5 more
core +2 more sources
A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers
Despite the increasing development of research in the service supply chain, the IT service supply chain measurements have not grown proportionally. In this paper, based on a survey the key indicators in the IT service supply chain and ranking them, a ...
Reza Kalantari +2 more
doaj

