-
61
-
62
Research Status and Challenges of Data-Driven Construction Project Management in the Big Data Context
Published 2021-01-01“…However, a comprehensive review for technological change, the resulting process, and organizational changes in the Big Data context, especially from the angle of whole lifecycle of construction project, is lacking. …”
Get full text
Article -
63
Predictive Modeling for Electric Vehicle Battery State of Health: A Comprehensive Literature Review
Published 2025-01-01Get full text
Article -
64
Impact of Stratospheric Sudden Warming on East Asian Winter Monsoons
Published 2015-01-01Get full text
Article -
65
Concept of matrix readiness methodology application development for managing innovative digitalization projects
Published 2024-02-01“…The relationship between the product lifecycle model and the matrix readiness methodology has been analyzed thoroughly. …”
Get full text
Article -
66
BIM-Based Model Checking: A Scientometric Analysis and Critical Review
Published 2024-12-01“…Building information modeling (BIM) has been widely applied throughout the entire lifecycle of projects in the architecture, engineering, and construction (AEC) industry. …”
Get full text
Article -
67
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Published 2025-01-01Get full text
Article -
68
Evaluation and optimization of carbon emission for federal edge intelligence network
Published 2024-03-01“…In recent years, the continuous evolution of communication technology has led to a significant increase in energy consumption.With the widespread application and deep deployment of artificial intelligence (AI) technology and algorithms in telecommunication networks, the network architecture and technological evolution of network intelligent will pose even more severe challenges to the energy efficiency and emission reduction of future 6G.Federated edge intelligence (FEI), based on edge computing and distributed federated machine learning, has been widely acknowledged as one of the key pathway for implementing network native intelligence.However, evaluating and optimizing the comprehensive carbon emissions of federated edge intelligence networks remains a significant challenge.To address this issue, a framework and a method for assessing the carbon emissions of federated edge intelligence networks were proposed.Subsequently, three carbon emission optimization schemes for FEI networks were presented, including dynamic energy trading (DET), dynamic task allocation (DTA), and dynamic energy trading and task allocation (DETA).Finally, by utilizing a simulation network built on real hardware and employing real-world carbon intensity datasets, FEI networks lifecycle carbon emission experiments were conducted.The experimental results demonstrate that all three optimization schemes significantly reduce the carbon emissions of FEI networks under different scenarios and constraints.This provides a basis for the sustainable development of next-generation intelligent communication networks and the realization of low-carbon 6G networks.…”
Get full text
Article -
69
-
70
Microbial Inoculants in Sustainable Agriculture: Advancements, Challenges, and Future Directions
Published 2025-01-01Get full text
Article -
71
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…Then, a secure blind signature with Paillier encryption (SBSPE) algorithm was designed in this architecture to safeguard the data and privacy of the edge-area smart terminals throughout the data processing lifecycle of edge-area smart terminals. Blind signature technology was integrated into SBSPE algorithm on the basis of Paillier semi-homomorphic encryption algorithm. …”
Get full text
Article -
72
Benefits management in software development: A systematic review of empirical studies
Published 2021-02-01Get full text
Article -
73
-
74
-
75
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01“…The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
Get full text
Article -
76
Cumulative earnings of Black, Chinese, South Asian and White individuals born in Canada
Published 2024-11-01“…The study shows that the higher cumulative earnings of Chinese (+20%) and South Asian (+15%) men (relative to White men) can be mostly or entirely accounted for by their higher education levels and their overrepresentation in science, technology, engineering, and mathematics (STEM) fields of study. …”
Get full text
Article -
77
-
78
-
79
Preparation and application evaluation of monoclonal antibodies against Monkeypox virus A29 protein
Published 2025-01-01Get full text
Article -
80
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01“…Malicious assaults and information leakage have grown in importance in practically every area of information and communication technology (ICT) in recent years. Enterprise ledger organization, preservation, security, and protection are all greatly aided by information security (IS). …”
Get full text
Article