Results 201 to 210 of about 31,297 (287)
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source
On Using the Shapley Value for Anomaly Localization: A Statistical Investigation
ABSTRACT Recent publications have suggested using the Shapley value for anomaly localization for sensor data systems. We use a reasonable statistical model for the classifiers required to compute the Shapley value to provide repeatable and rigorous analysis in the anomaly localization application.
Rick S. Blum +2 more
wiley +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
This review synthesizes AI advancements in food systems, leveraging machine learning, computer vision, robotics, and IoT for 96%–100% accurate quality inspection, 30% reduced downtime, and enhanced traceability from farm to fork. It highlights transformative potential in sustainability and SDGs while addressing data, ethical, and scalability challenges
Muhammad Waqar +9 more
wiley +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Abstract Organizational risk exposure arises from external sources and internal activities intended to reduce the potential for risks to cause harm. While organizational risk exposure is necessary to realize opportunities, misalignment between risk management and risk exposure may achieve the opposite outcomes.
Emma Soane
wiley +1 more source
Constructing Ionic Fast Diffusion Channels on LiNi0.5Mn1.5O4 for Lithium‐Ion Batteries
A dual‐modification strategy is developed for LNMO cathode, where bulk Ti doping stabilizes the oxygen framework and simultaneously drives the in situ formation of LaTi2O6 nano‐islands as ion diffusion channels on (111) surfaces, enabling high‐rate capacity (∼100 mAh g−1 at 30 C) and excellent cycling retention (87.8% after 1000 cycles).
Xinyi Zhang +10 more
wiley +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source

