Results 91 to 100 of about 24,152 (191)
The Impact of Protest Responses in Choice Experiments [PDF]
Not much attention has been given to protest responses in choice experiments (CE). Using follow-up statements, we are able to identify protest responses and compute welfare estimates with and without the inclusion of such protest responses.
Maria Loureiro, Melina Barrio
core
The rapid escalation of sophisticated cyberattacks demands intrusion detection systems that not only achieve high accuracy but also provide transparency and fairness in decision-making, addressing critical gaps in current machine learning-based ...
Shakti Kundu +7 more
doaj +1 more source
The Cowl - v.22 - n.18 - Mar 30, 1960 [PDF]
The Cowl - student newspaper of Providence College. Volume 22, Number 18 - March 30, 1960.
core +1 more source
Secure clustering and routing – based adaptive – bald eagle search for wireless sensor networks
Wireless sensor networks (WSNs) are self-regulating networks consisting of several tiny sensor nodes for monitoring and tracking applications over extensive areas. Energy consumption and security are the two significant challenges in these networks due to their limited resources and open nature.
Roopashree Hejjaji Ranganathasharma +1 more
openaire +1 more source
Worldwide Phylogenetic Relationship of Avian Poxviruses [PDF]
Blanco, JM +19 more
core +1 more source
The Economics of Endangered Species Poaching [PDF]
endangered species, poaching, International ...
Brant Abbott
core
The Cape San Blas Ecological Study [PDF]
Eglin AFB on Cape San Blas consists of approximately 250 acres located about 180 miles east of the main Eglin reservation. This area lies on the S1.
Carthy, Raymond R. +5 more
core
A Novel Fault Diagnosis of Induction Motor by Using Various Soft Computation Techniques: BESO-RDFA
This paper presents a hybrid prediction technique for fault detection of induction machines. The established hybrid forecast scheme signifies the combined execution of Bald-Eagle- Search-Optimization (BESO) and Random-Decision-Forest-Algorithm (RDFA ...
Kapu V. Sri Ram Prasad +4 more
doaj +1 more source
Nowadays, the Internet of Things (IoT) has become a rapid development; it can be employed by cyber threats in IoT devices. A correct system to recognize malicious attacks at IoT platforms became of major importance to minimize security threats in IoT ...
Louai A. Maghrabi +6 more
doaj +1 more source
Research on Intrusion Detection Based on an Enhanced Random Forest Algorithm
To address the challenges posed by high data dimensionality and class imbalance during intrusion detection, which result in increased computational complexity, resource consumption, and reduced classification accuracy, this paper presents an intrusion ...
Caiwu Lu, Yunxiang Cao, Zebin Wang
doaj +1 more source

