Results 141 to 150 of about 5,739,313 (302)

Collaborative Multiagent Closed‐Loop Motion Planning for Multimanipulator Systems

open access: yesAdvanced Intelligent Systems, EarlyView.
This work presents a hierarchical multi‐manipulator planner, emphasizing highly overlapping space. The proposed method leverages an enhanced Dynamic Movement Primitive based planner along with an improvised Multi‐Agent Reinforcement Learning approach to ensure regulatory and mediatory control while ensuring low‐level autonomy. Experiments across varied
Tian Xu, Siddharth Singh, Qing Chang
wiley   +1 more source

Learning atomic forces from uncertainty-calibrated adversarial attacks

open access: yesnpj Computational Materials
Adversarial approaches, which intentionally challenge machine learning models by generating difficult examples, are increasingly being adopted to improve machine learning interatomic potentials (MLIPs).
Henrique Musseli Cezar   +5 more
doaj   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Bayesian adversarial learning

open access: yes, 2018
Deep neural networks have been known to be vulnerable to adversarial attacks, raising lots of security concerns in the practical deployment. Popular defensive approaches can be formulated as a (distributionally) robust optimization problem, which minimizes a "point estimate" of worst-case loss derived from either per-datum perturbation or adversary ...
Ye, Nanyang, Zhu, Zhanxing
openaire   +1 more source

“Will you be there for me?” Social support from family and friends during cold case sexual assault prosecutions

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell   +4 more
wiley   +1 more source

Understanding Youth Assaults of Police Officers in Australia: A Power Threat Meaning Framework Analysis

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This study explores youth violence towards police officers in Australia through the Power Threat Meaning Framework (PTMF) to better understand the underlying factors contributing to such violence; focusing on power dynamics, childhood adversity, and trauma.
Dimitra Lattas   +4 more
wiley   +1 more source

Adults With Intellectual Disability Moving out of the Family Home Using the National Disability Insurance Scheme: Family Members' Planning Experiences

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT For adults with intellectual disability and their families, future planning and moving out of the family home in Australia will increasingly occur within the context of the National Disability Insurance Scheme (NDIS). As a market‐based, individualised funding system its impact on this transition remains largely unknown. This paper reports on a
I. Belperio   +5 more
wiley   +1 more source

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy