Results 131 to 140 of about 288,624 (313)

I5.0‐MM: Beyond Automation Toward Human‐Centric Sustainable Manufacturing

open access: yesSustainable Development, EarlyView.
ABSTRACT Human‐centricity, a core tenet of Industry 5.0, underscores the incorporation of human necessities and societal values into industrial transformation. Maturity models in Industry 4.0 have been extensively used to evaluate digital readiness; they focus on technological aspects, inadequately addressing sustainability, collaboration, and socio ...
Khaled Djebbouri   +3 more
wiley   +1 more source

Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration

open access: yesElectronics Letters
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou   +3 more
doaj   +1 more source

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar   +4 more
wiley   +1 more source

Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication

open access: yesInformation
Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data.
Qian Feng   +3 more
doaj   +1 more source

An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla   +3 more
wiley   +1 more source

Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions

open access: yesIEEE Access
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly.
Jamil Ispahany   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy