Fuzzy logic-based speed guidance strategy for mixed platoons at intersections with communication delay compensation and driver reaction time modeling. [PDF]
Liu X, Yan M, Dai R, Gao M.
europepmc +1 more source
This review synthesizes EEG findings from 28 VIMS studies across four inducing scenarios (abstract cues, virtual videos, vehicle driving, and game scenes) and two display types (HMD and monitor). While Delta/Theta enhancement consistently reflects sensory conflict, Alpha activity shows context dependency: predominantly increasing during passive viewing
Yanru Bai +5 more
wiley +1 more source
A hybrid fuzzy-PIDD² control strategy for coordinated LFC and AVR in renewable-integrated multi-area power systems. [PDF]
Omar MHT, Hamdy RA, Kotb H.
europepmc +1 more source
ABSTRACT Subgroups are dynamic entities evolving constantly in response to changing contexts and time. Although scholars from both the attribute and the network views have acknowledged that subgroups are inherently complex and fluid, research in these traditions has remained bifurcated, with limited efforts to integrate the two perspectives to more ...
Jinhee Moon +3 more
wiley +1 more source
Multiple trajectory optimization and control of robotic agents using hybrid fuzzy embedded artificial intelligence technique for multi target problems. [PDF]
Kumar S, Pandey KK, Parhi DR, Muni MK.
europepmc +1 more source
ABSTRACT There is increasing interest in understanding and recognition of the importance of empathy effects at work. However, despite the two‐party nature of empathy, little research has distinguished between empathy‐giving versus empathy‐receiving, or between empathy‐giver versus receiver.
Xiaoxiao Jiang +3 more
wiley +1 more source
Lightweight image encryption for wireless sensor networks using optimized elliptic curve and fuzzy logic. [PDF]
Zarei M +3 more
europepmc +1 more source
How Do Investors React to Supplier Exploitation? Event Study and Experimental Evidence
ABSTRACT Supplier exploitation, including financial squeezing, payment delays, and non‐contractual demands, is a pervasive form of corporate misconduct. This multi‐method study examines how investors interpret supplier exploitation amid competing ethical and financial considerations.
Seongtae Kim, Sangho Chae, Han Kyul Oh
wiley +1 more source
Enhancing the LEACH protocol and lightweight chaotic cryptography for secure data transmission in wireless sensor networks. [PDF]
Zarei M +3 more
europepmc +1 more source
We present an automated system that combines an image‐based fuzzy logic controller for precise positioning of microfluidic picoliter droplets with nonlinear microscopy, using CARS and TPEF modalities for detailed analysis of droplet composition. Time series and z‐stack images of E. coli, B. subtilis, and M. arborescens were recorded.
Fabian Ott +6 more
wiley +1 more source

