Results 211 to 220 of about 1,363,692 (325)

Artificial intelligence in blood donor management: A narrative review

open access: yesVox Sanguinis, EarlyView.
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley   +1 more source

Paris Olympics and Paralympics: Insights from nationwide coordination in preparedness, supply chain management and blood inventory

open access: yesVox Sanguinis, EarlyView.
Abstract The Paris 2024 Olympic Games posed a unique challenge due to their scale, associated risks and the need for robust healthcare preparedness. This review outlines the forecasting and anticipatory measures taken by the Etablissement français du sang (EFS) to ensure a resilient blood supply chain throughout the event.
Jean‐Baptiste Thibert   +9 more
wiley   +1 more source

When cyber-attack becomes cyber war

open access: yes, 2018
Tematska konferencija o kibernetičkoj ...
openaire   +1 more source

Blood supply continuity and emergency preparedness in natural and man‐made disasters and in armed conflicts—The Nordic perspectives

open access: yesVox Sanguinis, EarlyView.
Abstract Recent events have highlighted the urgent need for comprehensive blood preparedness plans at local, regional, national and cross‐border levels within the Nordic countries. This article outlines the perspectives and strategies related to blood preparedness in Norway, Sweden and Finland, in the context of emergencies, disasters and armed ...
Agneta Wikman   +8 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. [PDF]

open access: yesPeerJ Comput Sci
Abbas S   +6 more
europepmc   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy