Results 31 to 40 of about 5,054,449 (279)

Theories, Methods, and Evidence

open access: yes, 2019
Abstract This chapter provides an overview of the most prominent theories, methods, and evidence in perpetrator studies. It outlines the most important theories within the field focusing on the individual perpetrator, his/her immediate situation, and the broader societal and cultural context. In addition, it describes the extent to which
Smeulers, Alette   +2 more
openaire   +2 more sources

Evidence Against Evidence Theory (?!)

open access: yes, 2017
30 pages.
Kłopotek, Mieczysław A.   +1 more
openaire   +2 more sources

An Improved K-Means Algorithm Based on Evidence Distance

open access: yesEntropy, 2021
The main influencing factors of the clustering effect of the k-means algorithm are the selection of the initial clustering center and the distance measurement between the sample points.
Ailin Zhu   +4 more
doaj   +1 more source

A Trust-By-Learning Framework for Secure 6G Wireless Networks Under Native Generative AI Attacks

open access: yesIEEE Open Journal of the Communications Society
Sixth-generation $(6G)$ wireless networks will become vulnerable due to native generative AI (GenAI)-driven intelligent poisoning attacks in both the radio unit and the core network.
Md Shirajum Munir   +6 more
doaj   +1 more source

Information Fusion of Conflicting Input Data

open access: yesSensors, 2016
Sensors, and also actuators or external sources such as databases, serve as data sources in order to realise condition monitoring of industrial applications or the acquisition of characteristic parameters like production speed or reject rate.
Uwe Mönks   +3 more
doaj   +1 more source

Novel Higher-Order Clique Conditional Random Field to Unsupervised Change Detection for Remote Sensing Images

open access: yesRemote Sensing, 2022
Change detection (CD) is one of the most important topics in remote sensing. In this paper, we propose a novel higher-order clique conditional random field model to unsupervised CD for remote sensing images (termed HOC2RF), by defining a higher-order ...
Weiqi Fu   +3 more
doaj   +1 more source

Abduction: Theory and Evidence

open access: yes, 2022
This chapter looks at new theoretical work on abduction, with a special focus on arguments concerning the normative status of abduction, as well as at empirical results relevant to the question of whether theories of abduction are descriptively adequate.
openaire   +2 more sources

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

A Novel Sensor Dynamic Reliability Evaluation Method and its Application in Multi-Sensor Information Fusion

open access: yesIEEE Access, 2019
The improvement in recognition accuracy of a multi-sensor system is inseparable from the sensors' dynamic reliability, especially in the case of highly conflicting information. Recent research on multi-sensor system has shown that a difficult problem for
Jiali Weng, Fuyuan Xiao
doaj   +1 more source

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy