Results 121 to 130 of about 8,269 (263)
Do robots boost productivity? A quantitative meta‐study
ABSTRACT This meta‐study analyzes the productivity effects of industrial robots. More than 1800 estimates from 85 primary studies are collected. The meta‐analytic evidence suggests that robotization has so far provided, at best, a small boost to productivity. There is strong evidence of publication bias in the positive direction.
Florian Schneider
wiley +1 more source
A robust intelligent zero-day cyber-attack detection technique. [PDF]
Kumar V, Sinha D.
europepmc +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. [PDF]
Nayak J +4 more
europepmc +1 more source
Markov Determinantal Point Process for Dynamic Random Sets
ABSTRACT The Law of Determinantal Point Process (LDPP) is a flexible parametric family of distributions over random sets defined on a finite state space, or equivalently over multivariate binary variables. The aim of this paper is to introduce Markov processes of random sets within the LDPP framework. We show that, when the pairwise distribution of two
Christian Gouriéroux, Yang Lu
wiley +1 more source
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. [PDF]
Albasheer H +8 more
europepmc +1 more source
ABSTRACT With the advent of the Internet of Things, it is increasingly common to have large networks of sensors, where each sensor may collect different types of data, has limited local computing resources and the ability to transmit data to a central cloud. Detecting events that trigger changes in sensor data properties is a key concern.
Ziyang Yang +2 more
wiley +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Perioperative pandemic protocols are also useful during a cyber-attack system downtime. [PDF]
Fremming BA +5 more
europepmc +1 more source
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim +4 more
wiley +1 more source

