-
101
Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Published 2025-02-01“…Protecting IoT devices from these emerging vulnerabilities has become a critical priority. This study addresses the limitations of existing IoT threat detection methods, which often struggle with the dynamic nature of IoT environments and the growing complexity of cyberattacks. …”
Get full text
Article -
102
"Energetics of the outer retina II: Calculation of a spatio-temporal energy budget in retinal pigment epithelium and photoreceptor cells based on quantification of cellular process...
Published 2025-01-01“…Our data provide insights into vulnerabilities in the aging OR and suggest that diurnal constraints may be important when considering therapeutic interventions to optimize metabolism.…”
Get full text
Article -
103
Influencing factors of self-reported near-miss in clinical nursing information system tasks among nurses: a multicenter cross-sectional study
Published 2025-07-01“…Abstract Background Clinical nursing information systems have certain safety vulnerabilities in the complex interactions of the healthcare environment. …”
Get full text
Article -
104
Malignant catatonia in an adolescent with pogo transposable element derived with zinc finger domain (POGZ) gene mutation: case report
Published 2025-09-01“…The findings emphasise how comprehensive, multidisciplinary approaches remain essential for optimal patient care. Moreover, this case highlights the selective utility of genetic investigation in elucidating potential underpinnings of complex, treatment-resistant malignant catatonia, whilst demonstrating that genetic variants may confer vulnerability rather than direct causation. …”
Get full text
Article -
105
Robust design of bicycle infrastructure networks
Published 2025-05-01“…Interestingly, while the more complex optimization models yield better overall welfare results, the improvements over simpler methods are small. …”
Get full text
Article -
106
A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks
Published 2025-04-01“…However, the widespread deployment of these devices introduces significant security vulnerabilities due to limited resources and inadequate network protocols. …”
Get full text
Article -
107
SECURE VERTEX-EDGE DOMINATION IN HYPERCUBE AND GRID GRAPHS: APPLICATIONS OF CYBERSECURITY IN BANKING FOR SECURE TRANSACTIONS
Published 2025-06-01“…This algorithm efficiently computes the minimum number of security agents required to monitor transaction flows, thus reducing vulnerabilities. This research not only fills a critical gap in existing network security methodologies but also proposes a novel framework for protecting complex networks from evolving cyber threats, thereby advancing the frontier of cybersecurity and mathematical graph theory.…”
Get full text
Article -
108
HCAP: Hybrid cyber attack prediction model for securing healthcare applications.
Published 2025-01-01“…However, this growth has also introduced new vulnerabilities, increasing the risk of cybersecurity attacks. …”
Get full text
Article -
109
Proof of Inherent Intelligence Consensus Mechanism Empowering Blockchain-Enabled Transactive Energy
Published 2025-01-01“…However, complex optimization problems associated with the decentralized power grid are poorly integrated into the existing blockchain applications. …”
Get full text
Article -
110
A Data-Driven Analysis of Engineering Contract Risk Characterization Based on Judicial Cases of Disputes
Published 2025-06-01“…The study proposes stratified risk mitigation strategies, including governmental regulatory improvements and enterprise-level management optimizations. These findings offer valuable insights into advancing risk governance in construction contract administration, particularly through an enhanced understanding of dispute complexity and systemic vulnerabilities.…”
Get full text
Article -
111
An overview on extenders used in ram sperm cryopreservation
Published 2024-11-01“…To achieve the best results, this complex process requires the meticulous balance of numerous variables. …”
Get full text
Article -
112
RiceChain-Plus: an enhanced framework for blockchain-based rice supply chain systems-ensuring security, privacy, and efficiency
Published 2025-06-01“…The rice supply chain is a complex system that demands effective management to ensure reliability and efficiency, given the involvement of multiple stakeholders. …”
Get full text
Article -
113
Household systematic network analysis for achieving the food-energy-water nexus in South Africa: exploring the relationship between FEW nexus synergies and trade-offs
Published 2025-12-01“…Network analysis, similar to the food-energy-water (FEW) nexus, facilitates the understanding of complex interdependencies and supports more effective decision-making. …”
Get full text
Article -
114
Collaborative vehicle routing for equitable and effective food allocation in nonprofit settings
Published 2025-04-01“…Design/methodology/approach – This study introduces a multiobjective Mixed Integer Programming (MIP) model aimed at addressing the complex challenge of effectively distributing food, particularly for food banks serving vulnerable populations in low-income urban and rural areas. …”
Get full text
Article -
115
A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P
Published 2025-01-01“…When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
Get full text
Article -
116
Towards a Universal Security Framework for Darknet Suppression: Conceptual Foundations and Future Prospects
Published 2025-01-01“…In addition, these methods for predicting multi-network connections and optimizing trap node deployment improve tracking capabilities in complex environments. …”
Get full text
Article -
117
CRISIS, HAZARD, AND DISASTER MANAGEMENT: A STUDY OF REGULATORY FORMULATION AND INSTITUTIONAL COORDINATION
Published 2023-09-01“…However, in countries where unstructured regulation is unstructured, there are complexities and multiple interpretations of regulations and there are intersections of institutional authority, which creates vulnerabilities in dealing with risk. …”
Get full text
Article -
118
Intelligent penetration testing method for power internet of things systems combining ontology knowledge and reinforcement learning.
Published 2025-01-01“…Penetration testing, as an essential means of information security protection, is critical for identifying and fixing security vulnerabilities. Given the complexity of power IoT systems and the limitations of traditional manual testing methods, this paper proposes an automated penetration testing method that combines prior knowledge with deep reinforcement learning. …”
Get full text
Article -
119
Preferential Cyber Defense for Power Grids
Published 2023-10-01“…The resources that can be deployed to protect a power grid are limited, rendering the need to impose preferences and priorities in optimal resource allocation. Due to the complexity of modern power grids, exploitation of machine learning is desired for developing optimal preferential cybersecurity defense strategies, where choosing a suitable mathematical framework to describe preference satisfaction and articulating a specific machine-learning method are key. …”
Get full text
Article -
120
Renewable Energy Sources and the New Paradigm in Energy Engineering
Published 2019-12-01“…As a consequence, in the new paradigm, the optimization solutions are shifting from compliance with simple objective functions (as minimal cost or minimal impact) towards compliance with complex, dynamic, data driven solutions.…”
Get full text
Article