Results 101 to 110 of about 507,353 (292)

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

Optimizing Electric Vehicle Charging Scheduling With Deep Q Networks and Long Short‐Term Memory‐Based Electricity and Battery State of Charge Prediction

open access: yesEnergy Science &Engineering, EarlyView.
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga   +6 more
wiley   +1 more source

Rule-based classification of energy theft and anomalies in consumers load demand profile

open access: yesIET Smart Grid, 2019
The invent of advanced metering infrastructure (AMI) opens the door for a comprehensive analysis of consumers consumption patterns including energy theft studies, which were not possible beforehand. This study proposes a fraud detection methodology using
Sonal Jain   +2 more
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Validation of model predicting furcation involvement in newly crowned teeth—A 5‐year retrospective follow‐up

open access: yesJournal of Periodontology, EarlyView.
Abstract Background This study aimed to perform a prediction model validation for furcation involvement (FI) risk in molars receiving a new fixed prosthesis (FP) using a unique cohort assessed at three time points. Methods Following the Oral Health Statistical (OHStat) reporting guidelines, this cohort study examined 181 patients (203 molars) from 2018–
Khushboo Kalani   +5 more
wiley   +1 more source

cc-Golog: Towards More Realistic Logic-Based Robot Controllers

open access: yes, 2000
High-level robot controllers in realistic domains typically deal with processes which operate concurrently, change the world continuously, and where the execution of actions is event-driven as in ``charge the batteries as soon as the voltage level is low'
Grosskreutz, Henrik, Lakemeyer, Gerhard
core   +3 more sources

Coping Practices of Small‐ and Medium‐Sized Enterprises Facing Power Asymmetry in Digital Platform Business

open access: yesStrategic Change, EarlyView.
ABSTRACT Digital platform (DP) enterprises have risen to the top of the global economy by inverting traditional business models. They earn money through matchmaking, transaction facilitation, and efficient orchestration of other stakeholders' resources.
Lukas R. G. Fitz, Jochen Scheeg
wiley   +1 more source

Cold EI—The Way to Improve GC‐MS and Increase Its Range of Applications

open access: yesMass Spectrometry Reviews, EarlyView.
ABSTRACT Gas chromatography‐mass spectrometry (GC‐MS) with Cold electron ionization (EI) is based on interfacing the GC and MS with a supersonic molecular beam (SMB) along with electron ionization of vibrationally cold sample compounds in the SMB in a contact‐free fly‐through ion source (hence the name Cold EI).
Aviv Amirav   +3 more
wiley   +1 more source

A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning

open access: yesCybernetics and Information Technologies, 2015
With its continuous improvements, the cloud computing system leaves an open door for malicious activities. This promotes the significance of constructing a malware action detection component to discover the anomalies in the virtual environment.
Nagarajan Pandeeswari   +1 more
doaj   +1 more source

A Critique of Saul Kripke's "Wittgenstein on Rules and Private Language" [PDF]

open access: yes, 2008
In Wittgenstein on Rules and Private Language, Saul Kripke presents a controversial skeptical argument, which he attributes to Wittgenstein’s interlocutor in the Philosophical Investigations [PI].
Gitsoulis, Chrysoula
core  

Home - About - Disclaimer - Privacy