Results 61 to 70 of about 9,353 (203)

Regulating via Conditionality: The Instruments of the New Industrial Policy

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Conditionality was a central concern in the development literature of the 1990s. With the significant expansion of targeted public support to private firms since the Great Financial Crisis, the issue of conditionality has once again become a focal point in industrial policy debates.
Fabio Bulfone, Timur Ergen, Erez Maggor
wiley   +1 more source

Robots Tackle DARPA Underground Challenge

open access: yesEngineering, 2022
Mitch Leslie
doaj   +1 more source

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

The effect of rudder deflections on hydrodynamic performance of underwater vehicles during dynamic maneuver

open access: yesJournal of Engineering and Applied Science
A computational study is conducted for the flow over the submarine under the rudder deflection condition, considering the complicated flow characteristics of a submersible under maneuvering conditions.
Imran Mushtaque   +4 more
doaj   +1 more source

Miner Alerts Module To Generate Itemsets Based On FP-Growth Algorithm Improvement

open access: yesAl-Mustansiriyah Journal of Science, 2018
Data mining techniques becomes very useful for all areas, Which gives impressive results and accurate. It is can be works with huge data and variance types data. The intrusion detection system (IDS) has huge numbers of alerts without classify and almost
Karim Hashim Al-Saedi   +1 more
doaj   +1 more source

PlantCV v4: Image analysis software for high‐throughput plant phenotyping

open access: yesThe Plant Phenome Journal, Volume 9, Issue 1, December 2026.
Abstract PlantCV is an open‐source Python project aimed at developing tools to address a range of image‐based, plant phenotyping questions. PlantCV has been used for more than 10 years to automate trait collection from image data, and the newest release, PlantCV version 4, continues to lower the barrier to entry for users without substantial coding ...
Haley Schuhl   +61 more
wiley   +1 more source

Winning the DARPA Grand Challenge [PDF]

open access: yesIFAC Proceedings Volumes, 2006
The DARPA Grand Challenge has been the most significant challenge to the mobile robotics community in more than a decade. The challenge was to build an autonomous robot capable of traversing 132 miles of unrehearsed desert terrain in less than 10 hours. In 2004, the best robot only made 7.3 miles.
openaire   +2 more sources

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

DARPA's explainable AI (XAI) program: A retrospective

open access: yesApplied AI Letters, 2021
David Gunning   +3 more
doaj   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy