Suggested Topics within your search.
Suggested Topics within your search.
-
4961
Autoregressive integrated moving average model–based secure data aggregation for wireless sensor networks
Published 2020-03-01“…Nodes in a wireless sensor network are normally constrained by hardware and environmental conditions and face challenges of reduced computing capabilities and system security vulnerabilities. …”
Get full text
Article -
4962
Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions
Published 2019-01-01“…This constant connectivity opens new avenues for novel applications such as the realization of social Internet of things and its subdomain the social Internet of vehicles. …”
Get full text
Article -
4963
Factorization of the Hilbert space of eternal black holes in general relativity
Published 2025-01-01Get full text
Article -
4964
Multidimensional fuzzy ϕ-contraction inequality and its application
Published 2025-06-01Get full text
Article -
4965
WebTephraCalc: a tephra fall volume estimation system using WebGIS and OGC web services
Published 2025-05-01Get full text
Article -
4966
Automated segmentation of synchrotron-scanned fossils
Published 2025-03-01“…Computed tomography has revolutionised the study of the internal three-dimensional structure of fossils. …”
Get full text
Article -
4967
Artificial Intelligence and Moral intelligence
Published 2008-07-01“…We present intelligence as a system with an internal structure and the structural levels of the moral system, as well as certain characteristics of artificial intelligent agents which can/must be treated as 1- individual entities (with a complex, specialized, autonomous or selfdetermined, even unpredictable conduct), 2- entities endowed with diverse or even multiple intelligence forms, like moral intelligence, 3- open and, even, free-conduct performing systems (with specific, flexible and heuristic mechanisms and procedures of decision), 4 – systems which are open to education, not just to instruction, 5- entities with “lifegraphy”, not just “stategraphy”, 6- equipped not just with automatisms but with beliefs (cognitive and affective complexes), 7- capable even of reflection (“moral life” is a form of spiritual, not just of conscious activity), 8 – elements/members of some real (corporal or virtual) community, 9 – cultural beings: free conduct gives cultural value to the action of a ”natural” or artificial being. …”
Get full text
Article -
4968
Detection and localization of indigenous economic grasses in depth-color close-range aerial images, using a novel trainingless data-to-decision approach (DIKD Hierarchy), for the S...
Published 2025-03-01“…Traditional open-field plant monitoring approaches are costly, labor-intensive, and risky. …”
Get full text
Article -
4969
Some Outcomes Involving a Specific Class of Functions over Differential Subordination and Superordination
Published 2024-12-01Get full text
Article -
4970
Can ChatGPT AI Replace or Contribute to Experts’ Diagnosis for Renovation Measures Identification?
Published 2025-01-01Get full text
Article -
4971
Digital Twin-Aided Municipal Traffic Control
Published 2025-07-01“…Swift advances in computing and artificial intelligence (AI) technologies of late have prompted the increasing applications of digital twins (DiTs) to various sectors for boosting effectiveness and productivity. …”
Get full text
Article -
4972
-
4973
Detect anomalous quartic gauge couplings at muon colliders with quantum kernel k-means
Published 2025-04-01Get full text
Article -
4974
A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey
Published 2025-01-01“…Finally, we discuss emerging trends in attack techniques and countermeasures, highlighting open challenges and future research directions to secure modern computing systems.…”
Get full text
Article -
4975
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01“…In the context of cooperative vehicle-infrastructure systems (CVIS), vehicles often offload computational tasks to roadside units (RSUs) for execution due to their own constrained computing resources. …”
Get full text
Article -
4976
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Get full text
Article -
4977
Electronic Logbook System
Published 2024-03-01“…Modern scientific research, conducted on technically complex facilities, often requires auxiliary information and computing systems to support effective resolution of research tasks. …”
Get full text
Article -
4978
Weyl fermion creation by cosmological gravitational wave background at 1-loop
Published 2025-01-01Get full text
Article -
4979
-
4980
A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication
Published 2025-05-01“…Cooperative Unmanned Aerial Vehicle (UAV) technology can significantly improve data acquisition in Internet of Things (IoT) environments, which are characterized by wide distribution and limited capacity of ground-based devices. However, due to the open nature of wireless communications, such applications face security threats posed by UAV authentication, especially in scalable IoT environments. …”
Get full text
Article