Results 91 to 100 of about 234,523 (279)
Enhanced Android Malware Detect Models Based on Explainable Generative Adversarial Networks
With the widespread adoption of smartphones over the past decade, mobile applications have become a primary target for malicious attacks, usually in the form of malware.
Shamma Alshebli +6 more
doaj +1 more source
Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie +10 more
wiley +1 more source
Real-time multiple people gait recognition in the edge
Deploying deep learning models on edge devices offers advantages in terms of data security and communication latency. However, optimizing these models to achieve fast computing speeds without sacrificing accuracy can be challenging, especially in video ...
Paula Ruiz-Barroso +3 more
doaj +1 more source
Instrument Detection and Descriptive Gesture Segmentation on a Robotic Surgical Maneuvers Dataset
Large datasets play a crucial role in the progression of surgical robotics, facilitating advancements in the fields of surgical task recognition and automation.
Irene Rivas-Blanco +4 more
doaj +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom +2 more
wiley +1 more source
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley +1 more source
This review synthesizes EEG findings from 28 VIMS studies across four inducing scenarios (abstract cues, virtual videos, vehicle driving, and game scenes) and two display types (HMD and monitor). While Delta/Theta enhancement consistently reflects sensory conflict, Alpha activity shows context dependency: predominantly increasing during passive viewing
Yanru Bai +5 more
wiley +1 more source
According to Newton's second law of motion, we humans describe a dynamical system with a differential equation, which is naturally discretized into a difference equation whenever a computer is used.
Huang, Lirong
core
ABSTRACT There is increasing interest in understanding and recognition of the importance of empathy effects at work. However, despite the two‐party nature of empathy, little research has distinguished between empathy‐giving versus empathy‐receiving, or between empathy‐giver versus receiver.
Xiaoxiao Jiang +3 more
wiley +1 more source

