Artificial intelligence in blood donor management: A narrative review
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley +1 more source
Response to the Letter to the Editor. [PDF]
Karie NM.
europepmc +1 more source
Abstract The Paris 2024 Olympic Games posed a unique challenge due to their scale, associated risks and the need for robust healthcare preparedness. This review outlines the forecasting and anticipatory measures taken by the Etablissement français du sang (EFS) to ensure a resilient blood supply chain throughout the event.
Jean‐Baptiste Thibert +9 more
wiley +1 more source
Terrorism, Perceived Threat, and Support for Surveillance: A Virtual Reality Experiment on Cyber vs. Conventional Terrorism. [PDF]
Snider KLG +5 more
europepmc +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Guarding against malicious biased threats (GAMBiT) datasets: Revealing cognitive bias in human-subjects red-team cyber range operations. [PDF]
Beltz B +11 more
europepmc +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
Mitigating shoulder spoofing vulnerabilities in mobile payment systems: a security framework. [PDF]
Alqahtani O +5 more
europepmc +1 more source
Futures of Everyday Life: A Qualitative Content Analysis of Future Personas in Scenarios
ABSTRACT Scenario reports, holding a long‐standing tradition in foresight and futures studies, act as an essential document for organizations to prepare for possible, plausible, and alternative futures. Focusing on descriptions and representations of everyday life, we examined 29 future persona narratives from six publications—covering a wide field ...
Gerhard Schönhofer +3 more
wiley +1 more source
Korea-UK collaboration in cyber security: from issues and challenges to sustainable partnership [PDF]
Trim, Peter R.J., Youm, H.Y.
core

