Results 211 to 220 of about 1,363,692 (325)
Artificial intelligence in blood donor management: A narrative review
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley +1 more source
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. [PDF]
Achaal B +4 more
europepmc +1 more source
Abstract The Paris 2024 Olympic Games posed a unique challenge due to their scale, associated risks and the need for robust healthcare preparedness. This review outlines the forecasting and anticipatory measures taken by the Etablissement français du sang (EFS) to ensure a resilient blood supply chain throughout the event.
Jean‐Baptiste Thibert +9 more
wiley +1 more source
An adaptive predefined time sliding mode control for uncertain nonlinear cyber-physical servo system under cyber attacks. [PDF]
Riaz S, Li B, Qi R, Zhang C.
europepmc +1 more source
When cyber-attack becomes cyber war
Tematska konferencija o kibernetičkoj ...
openaire +1 more source
Abstract Recent events have highlighted the urgent need for comprehensive blood preparedness plans at local, regional, national and cross‐border levels within the Nordic countries. This article outlines the perspectives and strategies related to blood preparedness in Norway, Sweden and Finland, in the context of emergencies, disasters and armed ...
Agneta Wikman +8 more
wiley +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. [PDF]
Abbas S +6 more
europepmc +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source

