Results 91 to 100 of about 23,622 (224)
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi+7 more
wiley +1 more source
Advantages of regional development—A study on poverty alleviation in contiguous destitute areas
Abstract The 2011–2020 period is the final stage of poverty alleviation in China, which emphasizes regional development. Using county‐level panel data from 2006 to 2015, we explore the impact of regional poverty alleviation policy on economic growth of contiguous destitute areas (CDAs) in China.
Du Hongyu
wiley +1 more source
Localized and Short‐Term Effects of Lockdowns on Urban Rental Markets: Evidence From Shanghai
ABSTRACT This paper investigates the localized and short‐term effects of COVID‐19‐induced lockdowns on Shanghai's rental market in the second half of 2022. Using Difference‐in‐Differences methodologies, we find that rental prices declined by 1.5% following the lockdowns on average, with areas characterized by a high density of companies falling by 2.0%
Yanpeng Jiang, Xiaochi Shen
wiley +1 more source
Machine learning‐assisted prediction of clinical responses to periodontal treatment
Abstract Background Periodontitis is among the most prevalent chronic inflammatory conditions globally, and is associated with bone resorption, tooth loss, and systemic complications. While its treatment is largely standardized, individual outcomes vary, with some patients experiencing further disease progression despite adherence. Methods We developed
Balazs Feher+5 more
wiley +1 more source
Directly Discriminatory Algorithms
Discriminatory bias in algorithmic systems is widely documented. How should the law respond? A broad consensus suggests approaching the issue principally through the lens of indirect discrimination, focusing on algorithmic systems’ impact. In this article, we set out to challenge this analysis, arguing that while indirect discrimination law has an ...
Jeremias Adams‐Prassl+2 more
wiley +1 more source
Optical Metasurfaces for the Next‐Generation Biosensing and Bioimaging
Recent advances in this understanding of light‐matter interactions, combined with innovations in the design and fabrication of large‐scale nanostructured metasurfaces, have enabled transformative approaches to biosensing and bioimaging. This review explores innovations in refractometric sensing, surface‐enhanced spectroscopy, and super‐resolution ...
Anthony J. El‐Helou+6 more
wiley +1 more source
Customer retention and churn prediction in the telecommunication industry: a case study on a Danish university. [PDF]
Saleh S, Saha S.
europepmc +1 more source
1) Bubbles act as negative lenses. The paper discussed several phenomena, such as 2) bubble‐induced collimation of laser beams. 3) Beams initiate the formation of secondary bubbles around nearby gilded vaterite particles. 4) controlling secondary bubble motion by pushing and pulling from mily‐scale length.
Hod Gilad+7 more
wiley +1 more source
The tentacles of surveillance: Cephalopods and United States satellite intelligence
Abstract This article examines the symbol placed on a US spy satellite, National Reconnaissance Office Launch–39 (NROL‐39). In 2013, NROL‐39 was launched into space, the payload vehicle and mission patch emblazoned with a gigantic octopus, its tentacles surrounding the globe, and the words “Nothing Is Beyond Our Reach” written below the globe.
Andrew Bickford
wiley +1 more source
Inspection Game With Imperfect Detection Technology
ABSTRACT In this article, we investigate a generalized two‐player inspection game between an attacker and a defender who allocates multiple resources across a critical system. Specifically, the attacker targets components of the system while the defender coordinates multiple inspection units to monitor disjoint subsets of components and detect attacks.
J. Haden Boone, Mathieu Dahan
wiley +1 more source