Results 161 to 170 of about 61,508 (265)

A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm. [PDF]

open access: yesSci Rep
Jyothi KK   +8 more
europepmc   +1 more source

Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”

open access: yesRegulation &Governance, EarlyView.
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley   +1 more source

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

Cyber-attack Detection and Isolation

open access: yesInternational Journal of Advanced Engineering and Management Research
Chetanpal Singh, Rahul Thakkar
openaire   +1 more source

Artificial intelligence in blood donor management: A narrative review

open access: yesVox Sanguinis, EarlyView.
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley   +1 more source

Paris Olympics and Paralympics: Insights from nationwide coordination in preparedness, supply chain management and blood inventory

open access: yesVox Sanguinis, EarlyView.
Abstract The Paris 2024 Olympic Games posed a unique challenge due to their scale, associated risks and the need for robust healthcare preparedness. This review outlines the forecasting and anticipatory measures taken by the Etablissement français du sang (EFS) to ensure a resilient blood supply chain throughout the event.
Jean‐Baptiste Thibert   +9 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Warning: Warnings Can Backfire Even When They Provide New and Important Information

open access: yesJournal of Behavioral Decision Making, Volume 39, Issue 2, April 2026.
ABSTRACT We clarify the conditions under which warnings that provide useful information backfire. Our analysis is based on three observations: (1) warnings can increase the attention given to the warned‐against behavior, (2) in many settings, counterproductive warned‐against behaviors (like texting while driving) are typically rewarding, and (3 ...
Ido Erev   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy