Results 81 to 90 of about 96,539 (341)
A Hybrid Transfer Learning Framework for Brain Tumor Diagnosis
A novel hybrid transfer learning approach for brain tumor classification achieves 99.47% accuracy using magnetic resonance imaging (MRI) images. By combining image preprocessing, ensemble deep learning, and explainable artificial intelligence (XAI) techniques like gradient‐weighted class activation mapping and SHapley Additive exPlanations (SHAP), the ...
Sadia Islam Tonni +11 more
wiley +1 more source
Cyber ttacks - Russian Federation's mechanicm of influence in Ukraine [PDF]
Currently, the international community is facing a hybrid conflict in Ukraine, where traditional and cyber weapons are being used at the same time. The big surprise of the Russian invasion was the apparent absence of a major cyber war.
Victoria Bevziuc, Svetlana Cebotari
doaj
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Cyber Technology and Arms Race
Cyber technology represents digital military capability with the purpose of causing damage to the military strength and the social infrastructure of a potential enemy.
Kanniainen, Vesa
core
You want peace ? Get ready for war...in cyberspace
Objectives A phenomenon is emerging in relations between states that is the opposite of a declaration of war, i.e. the phenomenon of 'unspeakable war', which, according to US experts, may even lead to a so-called 'electronic Pearl Harbour'.
Zbigniew Witkowski
doaj +1 more source
EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core
Deep Learning Methods for Assessing Time‐Variant Nonlinear Signatures in Clutter Echoes
Motion classification from biosonar echoes in clutter presents a fundamental challenge: extracting structured information from stochastic interference. Deep learning successfully discriminates object speed and direction from bat‐inspired signals, achieving 97% accuracy with frequency‐modulated calls but only 48% with constant‐frequency tones. This work
Ibrahim Eshera +2 more
wiley +1 more source
The North Atlantic alliance and collective defense at 70: confession and response revisited [PDF]
The North Atlantic Treaty was largely a response to global sentiment that other international organizations, namely the United Nations, were not accomplishing their intended purpose of the maintenance and promotion of peace and order in the world.
Schmitt, Michael
core +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi +6 more
wiley +1 more source

