Results 91 to 100 of about 234,523 (279)

Enhanced Android Malware Detect Models Based on Explainable Generative Adversarial Networks

open access: yesIEEE Access
With the widespread adoption of smartphones over the past decade, mobile applications have become a primary target for malicious attacks, usually in the form of malware.
Shamma Alshebli   +6 more
doaj   +1 more source

Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy

open access: yesEpilepsia, EarlyView.
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie   +10 more
wiley   +1 more source

Real-time multiple people gait recognition in the edge

open access: yesScientific Reports
Deploying deep learning models on edge devices offers advantages in terms of data security and communication latency. However, optimizing these models to achieve fast computing speeds without sacrificing accuracy can be challenging, especially in video ...
Paula Ruiz-Barroso   +3 more
doaj   +1 more source

Instrument Detection and Descriptive Gesture Segmentation on a Robotic Surgical Maneuvers Dataset

open access: yesApplied Sciences
Large datasets play a crucial role in the progression of surgical robotics, facilitating advancements in the fields of surgical task recognition and automation.
Irene Rivas-Blanco   +4 more
doaj   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

Neurophysiological correlates of visually induced motion sickness severity: A scoping review of the impact of experimental settings on EEG spectral power

open access: yesJournal of Intelligent Medicine, EarlyView.
This review synthesizes EEG findings from 28 VIMS studies across four inducing scenarios (abstract cues, virtual videos, vehicle driving, and game scenes) and two display types (HMD and monitor). While Delta/Theta enhancement consistently reflects sensory conflict, Alpha activity shows context dependency: predominantly increasing during passive viewing
Yanru Bai   +5 more
wiley   +1 more source

Stability of stochastic impulsive differential equations: integrating the cyber and the physical of stochastic systems

open access: yes, 2019
According to Newton's second law of motion, we humans describe a dynamical system with a differential equation, which is naturally discretized into a difference equation whenever a computer is used.
Huang, Lirong
core  

Where Is the Take in Give and Take? A Review of Empathy Effects on Workplace Outcomes for Both Givers and Receivers

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT There is increasing interest in understanding and recognition of the importance of empathy effects at work. However, despite the two‐party nature of empathy, little research has distinguished between empathy‐giving versus empathy‐receiving, or between empathy‐giver versus receiver.
Xiaoxiao Jiang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy