Results 171 to 180 of about 22,301 (286)
Abstract The United Nations Sustainable Development Goals (UN SDGs) were defined to improve the quality of life of the global population particularly regarding social and economic aspects, with a major focus on environmental sustainability. The incorporation of digital technologies into the agri‐food sector has become a key enabler in increasing the ...
Daniel Cozzolino, Louwrens C Hoffman
wiley +1 more source
The graphical abstract outlines the progressive development and impact of stereotactic radiosurgery (SRS) and stereotactic body radiotherapy (SBRT). Technological Evolution illustrates the transition from brachytherapy with single‐dose, LDR/HDR schedules to fractionated radiotherapy, three‐dimensional conformal radiotherapy (3DCRT) and Gamma Knife ...
Jing Zhang +10 more
wiley +1 more source
HyLPD Digital Twin Control for UAV Stability in High‐Wind Conditions
This work introduces a novel HyLPD, a hybrid control framework combining Linear Quadratic Regulator (LQR) for baseline stability and Deep Deterministic Policy Gradient (DDPG) for adaptive compensation, tailored for UAVs under high‐wind conditions.
Cara Rose +2 more
wiley +1 more source
Cyber Victimization: Tools Used to Combat Cybercrime and Victim Characteristics
AbstractCyber victimization is explored through the lens of end users and the tools they use to combat cybercrime. These tools are important in mitigating a variety of threats to the confidentiality, integrity, and availability of information and associated systems for end users, whether through intentional criminal activity, accidents, or system ...
Marc Dupuis, Emiliya Jones
openaire +1 more source
Emotional intelligence mediated the association between interpersonal mindfulness and bullying victimization/perpetration (BV/BP). Higher interpersonal mindfulness was significantly associated with higher emotional intelligence. Higher emotional intelligence was significantly associated with lower BV/BP.
Marguerita Aoun +7 more
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
Features requirement elicitation process for designing a chatbot application
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari +4 more
wiley +1 more source
Deep Reinforcement Learning‐Based Control for Real‐Time Hybrid Simulation of Civil Structures
ABSTRACT Real‐time Hybrid Simulation (RTHS) is a cyber‐physical technique that studies the dynamic behavior of a system by combining physical and numerical components that are coupled through a boundary condition enforcer. In structural engineering, the numerical components are subjected to environmental loads that become dynamic displacements of the ...
Andrés Felipe Niño +6 more
wiley +1 more source
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina +4 more
wiley +1 more source

