-
261
Artificial intelligence on the agro-industry in the United States of America
Published 2024-10-01“…Despite its numerous advantages, the deployment of AI in agriculture does not come without challenges. …”
Get full text
Article -
262
System of systems method and formal function decomposition for software systems
Published 2010-01-01“…Based on the theory and method of system of system(SoS),the research work for the formal functional de-composition and estimation of large scale and open software systems was described,which were often emerged in IOT(internet of things) and cloud computing environments.It was proposed that abstraction description was necessary for the SoS properties of a large scale and open software system.Based on system abstract,formal methods for functional decomposition and estimation were described.The applications of the methods in system development and stable inter-mediate form building were discussed.The methods proposed here are helpful for improving the processes of implemen-tation,deployment and maintenance of large scale and open software systems in IOT and cloud computing environments.…”
Get full text
Article -
263
Time Zero for Net Zero: A Coal Mine Baseline for Decarbonising Heat
Published 2022-12-01“…Mine water geothermal energy could provide sustainable heating, cooling and storage to assist in the decarbonisation of heat and achieving Net Zero carbon emissions. However, mined environments are highly complex and we currently lack the understanding to confidently enable a widespread, cost-effective deployment of the technology. …”
Get full text
Article -
264
PICT: A low‐cost, modular, open‐source camera trap system to study plant–insect interactions
Published 2021-08-01Get full text
Article -
265
AI augmented edge and fog computing for Internet of Health Things (IoHT)
Published 2025-01-01“…Cloud computing delivers resources over the Internet and enables the deployment of an infinite number of applications to provide services to many sectors. …”
Get full text
Article -
266
Single-cell sequencing provides clues about the developmental genetic basis of evolutionary adaptations in syngnathid fishes
Published 2025-02-01“…Finally, we found that epidermal cells expressed nutrient processing and environmental sensing genes, potentially relevant for the brooding environment. …”
Get full text
Article -
267
Development of biodegradable magnesium alloy stents with coating
Published 2014-07-01“…The coating will dissolve in a longer term, thus delaying the exposition of the magnesium stent to the corrosive environment. We dealt with the problem exploiting the potentialities of a combined approach of experimental and computational methods (both standard and ad-hoc developed) for designing magnesium alloy, coating and scaffold geometry from different points of views. …”
Get full text
Article -
268
Adhesion Testing of Direct-Write Printed Ink on Metallic Structural Components
Published 2025-01-01Get full text
Article -
269
Automation of urban technological census. The historical centre of Bethlehem
Published 2022-12-01“… The research proposal reports the outcomes of a research track concerning the automation of the architectural census of technological elements in urban environments, aiming at the development of a monitoring and management system for the built heritage. …”
Get full text
Article -
270
Evaluation of vegetable pigeonpea [Cajanus cajan (L.) Millsp] genotypes for yield stability
Published 2021-10-01“…Kambi ya Mawe, Katumani and Kiboko had higher IPCA1, indicating greatest interactive environments and adapted genotypes. Kambi ya Mawe, was the most ideal location for evaluating pigeonpea genotypes. …”
Get full text
Article -
271
Outdoor Massive MIMO Testbed With Directional Beams: Design, Implementation, and Validation
Published 2025-01-01“…In this work, we study the achievable multiuser MIMO gains in an outdoor environment by deploying narrow directional beams using a rectangular antenna structure having 48 antenna ports (192 antenna elements), each port with a beamwidth of 30° in azimuth and 90° in elevation. …”
Get full text
Article -
272
Les cartes redistribuées de la gestion locale de l’eau : la mise en œuvre de la réforme « Gemapi » dans l’aire métropolitaine montpelliéraine
Published 2023-06-01“…An important evolution has occurred in local water management since 2014 with the so-called Gemapi reform (management of aquatic environments and flood prevention) and its deployment at the local level. …”
Get full text
Article -
273
Supporting Collaborative Privacy-Observant Information Sharing Using RFID-Tagged Objects
Published 2009-01-01“…Our experiments of RFID-triggered information sharing have identified usability, deployment, and privacy issues of physically based information systems. …”
Get full text
Article -
274
A A Fingerprint-Based Attendance System for Improved Efficiency
Published 2025-01-01“…The system's successful deployment demonstrates its potential to improve operational efficiency and educational outcomes in resource-constrained environments. …”
Get full text
Article -
275
The Impact of GPT Models on Education: Enhancing Learning Outcomes and Addressing Challenges
Published 2025-01-01“…Key areas of focus include the deployment of GPT in adaptive learning platforms, its role in automating grading processes, and its capacity to generate interactive and engaging educational content. …”
Get full text
Article -
276
Dual-stack host discovery method based on SSDP and DNS-SD protocol
Published 2023-02-01“…With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.…”
Get full text
Article -
277
The Art and life of Alàgbà Fálétí – A Pic torial, Art and Artifacts Exhibition in Honor of Alàgbà Adébáyọ̀ Fálétí (1921- 2017) curated by Akinsola Adejuwon and Seyi Ogunjobi...
Published 2021-12-01“…It is an assessment of a thematic display of selected pictures and objects which probably placed the observer within the environment and with people Fálétí related with. The images, pictures, artworks and objects in the display were segmented into five major parts. …”
Get full text
Article -
278
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
Published 2023-01-01“…Additionally, this paper identifies specific mitigation strategies tailored to the energy ICS environment.…”
Get full text
Article -
279
Evolution within a given virulence phenotype (pathotype) is driven by changes in aggressiveness: a case study of French wheat leaf rust populations
Published 2023-04-01“…Plant pathogens are constantly evolving and adapting to their environment, including their host. Virulence alleles emerge, and then increase, and sometimes decrease in frequency within pathogen populations in response to the fluctuating selection pressures imposed by the deployment of resistance genes. …”
Get full text
Article -
280
Indoor Massive MIMO Channel Modelling Using Ray-Launching Simulation
Published 2014-01-01“…We simulate the models in indoor wireless network deployment environments and compare the simulation results with measurements. …”
Get full text
Article