Results 211 to 220 of about 1,171,713 (299)

The Conditional Impact of Recent Economic, Global, and Technological Challenges on Productivity Growth in EU Regions

open access: yesGrowth and Change, Volume 57, Issue 1, March 2026.
ABSTRACT The global landscape is marked by ongoing transformations and abrupt shifts driven by new forms of globalisation through the expansion of Global Value Chains, the Fourth Industrial Revolution, and recurring crises. This paper examines the role of these key economic, global, and technological challenges in shaping productivity growth across EU ...
Maria Tsiapa
wiley   +1 more source

Nurturing Digital Government Reform: Nuggets of Wisdom From a Global Frontrunner

open access: yesInformation Systems Journal, Volume 36, Issue 2, Page 214-229, March 2026.
ABSTRACT Government reform initiatives increasingly incorporate significant digital elements. This article builds on successful, long‐term Danish experiences with digital government reform and offers “nuggets of wisdom” to policymakers, organisations, and countries wishing to advance such reform. In international surveys, Denmark is consistently ranked
Ulrik B. U. Roehl, Andreas Berggreen
wiley   +1 more source

The Missing Link in Digital Transformation Leadership: Unpacking the Role of Knowledge

open access: yesInformation Systems Journal, Volume 36, Issue 2, Page 230-246, March 2026.
ABSTRACT Leading digital transformation (DT) is challenging due to the unforeseen hurdles that arise through the novelty of digital technologies and the broad scope of organisational change. Even those with a wealth of experience and skills may struggle to respond adequately to inherently novel situations.
Malmi Amadoru   +2 more
wiley   +1 more source

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

Deciphering the Interplay Between Wetting and Chemo‐Mechanical Fracture in Lithium‐Ion Battery Cathode Materials

open access: yesAdvanced Functional Materials, Volume 36, Issue 11, 5 February 2026.
The fundamental intricate couplings between electrolyte wetting and fracture evolution are investigated in large single‐crystal V2O5 samples using both experimental techniques and simulations. Both approaches reveal consistent fracture patterns and lithium distribution concentration maps influenced by the wetting mechanism.
Wan‐Xin Chen   +6 more
wiley   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Digital Agriculture: Past, Present, and Future

open access: yesAdvanced Intelligent Discovery, Volume 2, Issue 1, February 2026.
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang   +3 more
wiley   +1 more source

Meta Reinforcement Learning for Automated Cyber Defence

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
ABSTRACT Reinforcement learning (RL) solutions have shown considerable promise for automating the defense of networks to cyber attacks. However, a limitation to their real world deployment is the sample efficiency and generalizability of RL agents. This means that even small changes to attack types require a new agent to be trained from scratch.
Andrew Thomas, Nick Tillyer
wiley   +1 more source

Multi‐Agent Reinforcement Learning for Cyber Defence Transferability and Scalability

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
A method for using mutli‐agent reinforcement learning that allows for zero shot transfer across network setups. Diagrams show the local observation construction, training and agent mapping process. The results for novel 15 and 30 node networks show effective transfer and improved scaling performance. ABSTRACT Reinforcement learning (RL) has shown to be
Andrew Thomas   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy