Results 61 to 70 of about 10,579 (187)
From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius +2 more
wiley +1 more source
Abstract Cyanobacteria are cosmopolitan, important components of biomass with a remarkable ability to synthesize a diverse array of bioactive compounds, some of which may have toxic effects on other organisms and ecosystems. In this study, filamentous cyanobacterial strains isolated predominantly from temperate European freshwaters (Aphanizomenon ...
Łukasz Wejnerowski +14 more
wiley +1 more source
Multimodal large language models (MLLMs) have demonstrated strong capabilities in vision-related tasks, capitalizing on their visual semantic comprehension and reasoning capabilities.
Yichen Shi +9 more
doaj +1 more source
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Face anti‐spoofing from the perspective of data sampling
Without deploying face anti‐spoofing countermeasures, face recognition systems can be spoofed by presenting a printed photo, a video, or a silicon mask of a genuine user.
Usman Muhammad, Mourad Oussalah
doaj +1 more source
Large Language Models for Explainable Medical Text Summarization: A Systematic Literature Review
The graphical abstract highlights the three key aspects addressed in this review: the technical background of medical text summarization methods relevant to clinical decision support; the LLM background in providing context for its diagnosis and clinical significance; and clinical decision support with summarization and explainability in patient care ...
Aleka Melese Ayalew +3 more
wiley +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
Integrating Fine-Grained Classification and Motion Relation Analysis for Face Anti-Spoofing
Face Anti-Spoofing (FAS) is the core technical means used to protect face recognition systems from face presentation attack. Facial movement is a commonly used cue in FAS.
Ziyang Cheng, Xiafen Zhang
doaj +1 more source

