|
|
|
Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang
The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriche...
ver más
|
|
|
|
|
|
|
Xianglan Su, Yixia Cai, Bogui Pan, Yongqi Li, Bingquan Liu, Kunzheng Cai and Wei Wang
Pot and field trials were conducted to explore the combined effect of biochar (BC) with topdressing silicon (Si) on Cd uptake by rice and grain yield in Cd-contaminated paddy soil. The treatments, including BC applied before transplanting (TBC), topdress...
ver más
|
|
|
|
|
|
|
Longfei Cui, Feixiang Le, Xinyu Xue, Tao Sun and Yuxuan Jiao
The application of robotics has great implications for future food security, sustainable agricultural development, improving resource efficiency, reducing chemical pesticide use, reducing manual labor, and maximizing field output. Aiming at the problems ...
ver más
|
|
|
|
|
|
|
Aurelia Scarano, Teodoro Semeraro, Antonio Calisi, Roberta Aretano, Caterina Rotolo, Marcello S. Lenucci, Angelo Santino, Gabriella Piro and Monica De Caroli
This study explores the potential application of tomato fruit production within the agrivoltaic system, aiming to evaluate its contribution to food security in the context of climate change. Specifically, the study compares tomato cultivation under agriv...
ver más
|
|
|
|
|
|
|
Hao An, Ruotong Ma, Yuhan Yan, Tailai Chen, Yuchen Zhao, Pan Li, Jifeng Li, Xinyue Wang, Dongchen Fan and Chunli Lv
This paper aims to address the increasingly severe security threats in financial systems by proposing a novel financial attack detection model, Finsformer. This model integrates the advanced Transformer architecture with the innovative cluster-attention ...
ver más
|
|
|
|
|
|
|
Ji-Woon Lee and Hyun-Soo Kang
The escalating use of security cameras has resulted in a surge in images requiring analysis, a task hindered by the inefficiency and error-prone nature of manual monitoring. In response, this study delves into the domain of anomaly detection in CCTV secu...
ver más
|
|
|
|
|
|
|
Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analyt...
ver más
|
|
|
|
|
|
|
Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou and Mehrdad Dianati
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Although se...
ver más
|
|
|
|
|
|
|
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o...
ver más
|
|
|
|
|
|
|
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are dep...
ver más
|
|
|
|