Results 101 to 110 of about 507,468 (294)
Optimizing Face Recognition Using PCA
Principle Component Analysis PCA is a classical feature extraction and data representation technique widely used in pattern recognition. It is one of the most successful techniques in face recognition. But it has drawback of high computational especially
Abdullah, Manal +2 more
core +1 more source
Digital Rights Activism in Multilevel Governance
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley +1 more source
The graphical abstract presents the concept of applying machine‐learning algorithms to assess the performance of photovoltaic modules. Data from solar panels are fed to surrogates of intelligent models, to assess the following performance metrics: identifying faults, quantifying energy production and trend degradation over time. The combination of data
Nangamso Nathaniel Nyangiwe +3 more
wiley +1 more source
Chatting Towards Inclusivity: A Digital Approach to Inclusion Action Plans and Leader Development
ABSTRACT Inclusion is a cornerstone of success for organizations and society, yet inclusion is not guaranteed. Building on inclusive leadership research and relational models theory, we argue that inclusion cannot manifest without systematic effort and planning by leaders.
Vindhya Singh +4 more
wiley +1 more source
ABSTRACT Introduction Technology plays a dual role in adolescents' lives, offering valuable avenues for social engagement and support while also introducing risks of social comparison, harassment, and loneliness. Qualitative data that centers on adolescent voices and contexts can illuminate the interplay of these protective and risk factors.
Xiaoqi Ma +5 more
wiley +1 more source
A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning
With its continuous improvements, the cloud computing system leaves an open door for malicious activities. This promotes the significance of constructing a malware action detection component to discover the anomalies in the virtual environment.
Nagarajan Pandeeswari +1 more
doaj +1 more source
Abstract Background This study aimed to perform a prediction model validation for furcation involvement (FI) risk in molars receiving a new fixed prosthesis (FP) using a unique cohort assessed at three time points. Methods Following the Oral Health Statistical (OHStat) reporting guidelines, this cohort study examined 181 patients (203 molars) from 2018–
Khushboo Kalani +5 more
wiley +1 more source
ABSTRACT Digital platform (DP) enterprises have risen to the top of the global economy by inverting traditional business models. They earn money through matchmaking, transaction facilitation, and efficient orchestration of other stakeholders' resources.
Lukas R. G. Fitz, Jochen Scheeg
wiley +1 more source
A Relational View of Uncertainty
ABSTRACT There is significant confusion and debate in entrepreneurship and strategy research about the nature and locus of uncertainty. Does uncertainty reside internally in the agent or externally in the environment? This article introduces a relational view of uncertainty (RVU) to help reframe this issue.
Daniel Leunbach
wiley +1 more source
Abstract Machine learning has opened the door for the automated sorting (classification) of images, holograms and acoustic backscatters of individual plankton, invertebrates, fish and marine mammals. However, this field is complicated by decades of paradoxically promising reports of classifier performance that do not correlate with real‐world uptake of
Bianca M. Owen +5 more
wiley +1 more source

