Results 41 to 50 of about 3,272 (163)

A Sequence‐to‐Sequence Approach for Short‐Term Temperature Prediction With Data Decomposition and Reconstruction

open access: yesNatural Resource Modeling, Volume 39, Issue 2, May 2026.
ABSTRACT Temperature is an important factor affecting daily life, and accurate multi‐step temperature prediction can provide essential support for weather prediction, energy management, agricultural planning, and disaster mitigation. However, as the prediction horizon extends, the nonlinear nature of temperature data becomes more prominent, making it ...
Baohe Liu   +4 more
wiley   +1 more source

Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley   +1 more source

A Robust Selective Encryption Scheme for H.265/HEVC Video

open access: yesIEEE Access, 2023
To protect the information of video stream, many selective video encryption schemes have been proposed based on the H.265/HEVC video. However, most of the existing algorithms are not robust, thus failing to decrypt under packet loss.
Chen Chen   +3 more
doaj   +1 more source

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

Kombinasi AES dan HMAC SHA-256 untuk Pengamanan Parameter URL dari Serangan SQL Injection

open access: yesJurnal Informatika dan Multimedia
SQL Injection merupakan salah satu ancaman terbesar dalam keamanan aplikasi web, dimana penyerang dapat memanipulasi database melalui exploitasi celah keamanan pada parameter URL.
Gagan Akhmad Fauzi, Alam Rahmatulloh
doaj   +1 more source

Hash Algorithm In Verification Of Certificate Data Integrity And Security

open access: yesAptisi Transactions on Technopreneurship, 2021
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar   +2 more
doaj   +1 more source

Atypical cortical neural activity in internet gaming disorder comorbid with autism spectrum disorder during a cue reactivity task: A magnetoencephalography study

open access: yesPsychiatry and Clinical Neurosciences Reports, Volume 5, Issue 1, March 2026.
Abstract Aim Significant, positive correlations between internet gaming disorder (IGD) and autism spectrum disorder (ASD) are known. Individuals with ASD are prone to problematic internet use due to addiction or restricted interests. Here, we examined cortical neural activity in individuals with IGD comorbid with ASD during a gaming‐related cue ...
Faisal Budisasmita Paturungi Parawansa   +11 more
wiley   +1 more source

A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator

open access: yesIEEE Access, 2022
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency.
Hoai Luan Pham   +3 more
doaj   +1 more source

Trustworthy Federated Learning for Industrial IoT: Balancing Robustness and Fairness via Blockchain‐Based Reputation

open access: yesArtificial Intelligence for Engineering, Volume 2, Issue 1, Page 67-77, March 2026.
This paper proposes Block‐FairFL, a Trustworthy Federated Learning framework empowered by Blockchain, to address the dual challenges of security and fairness in deploying AI for industrial engineering. ABSTRACT The integration of artificial intelligence into the industrial Internet of Things is pivotal for predictive maintenance and autonomous control.
Hui Li
wiley   +1 more source

Phenomenal knowledge and phenomenal causality

open access: yesNoûs, Volume 60, Issue 1, Page 212-232, March 2026.
Abstract There has been extensive debate over whether we can have phenomenal knowledge in the case of epiphenomenalism. This article aims to bring that debate to a close. I first develop a refined causal account of knowledge—one that is modest enough to avoid various putative problems, yet sufficiently robust to undermine the epiphenomenalist position.
Lei Zhong
wiley   +1 more source

Home - About - Disclaimer - Privacy