Results 41 to 50 of about 3,272 (163)
ABSTRACT Temperature is an important factor affecting daily life, and accurate multi‐step temperature prediction can provide essential support for weather prediction, energy management, agricultural planning, and disaster mitigation. However, as the prediction horizon extends, the nonlinear nature of temperature data becomes more prominent, making it ...
Baohe Liu +4 more
wiley +1 more source
Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley +1 more source
A Robust Selective Encryption Scheme for H.265/HEVC Video
To protect the information of video stream, many selective video encryption schemes have been proposed based on the H.265/HEVC video. However, most of the existing algorithms are not robust, thus failing to decrypt under packet loss.
Chen Chen +3 more
doaj +1 more source
Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu +3 more
wiley +1 more source
Kombinasi AES dan HMAC SHA-256 untuk Pengamanan Parameter URL dari Serangan SQL Injection
SQL Injection merupakan salah satu ancaman terbesar dalam keamanan aplikasi web, dimana penyerang dapat memanipulasi database melalui exploitasi celah keamanan pada parameter URL.
Gagan Akhmad Fauzi, Alam Rahmatulloh
doaj +1 more source
Hash Algorithm In Verification Of Certificate Data Integrity And Security
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar +2 more
doaj +1 more source
Abstract Aim Significant, positive correlations between internet gaming disorder (IGD) and autism spectrum disorder (ASD) are known. Individuals with ASD are prone to problematic internet use due to addiction or restricted interests. Here, we examined cortical neural activity in individuals with IGD comorbid with ASD during a gaming‐related cue ...
Faisal Budisasmita Paturungi Parawansa +11 more
wiley +1 more source
A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency.
Hoai Luan Pham +3 more
doaj +1 more source
This paper proposes Block‐FairFL, a Trustworthy Federated Learning framework empowered by Blockchain, to address the dual challenges of security and fairness in deploying AI for industrial engineering. ABSTRACT The integration of artificial intelligence into the industrial Internet of Things is pivotal for predictive maintenance and autonomous control.
Hui Li
wiley +1 more source
Phenomenal knowledge and phenomenal causality
Abstract There has been extensive debate over whether we can have phenomenal knowledge in the case of epiphenomenalism. This article aims to bring that debate to a close. I first develop a refined causal account of knowledge—one that is modest enough to avoid various putative problems, yet sufficiently robust to undermine the epiphenomenalist position.
Lei Zhong
wiley +1 more source

