Results 91 to 100 of about 10,775 (222)
Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis
We explore security aspects of a new computing paradigm that combines novel memristors and traditional Complimentary Metal Oxide Semiconductor (CMOS) to construct a highly efficient analog and/or digital fabric that is especially well-suited to Machine ...
Will Lillis +2 more
doaj +1 more source
Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley +1 more source
Abstract Manned space exploration to distant destinations, including Mars, continues to be an aspiration of humankind. Space travel does, however, present many challenges to the body, amongst which adaptation to microgravity is perhaps the largest. For instance, both short and long manned spaceflight missions have shown substantial deleterious effects ...
Gerard McMahon +2 more
wiley +1 more source
Hardware Validation for Semi-Coherent Transmission Security
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority.
Michael Fletcher +2 more
doaj +1 more source
Abstract Active learning (AL) has emerged as a pedagogical response to diverse educational challenges across multiple disciplines. This scoping review maps the terrain of AL implementation patterns, examining AL practices in Business Education, Information and Communication Technology (ICT) Engineering, Mathematics, and Statistics from 2015 until the ...
Dubravka Novkovic +2 more
wiley +1 more source
Within quantum chemistry, density functional theory (DFT) is a revolution. This serves as an example of a multitude of other scientific events, supporting the idea that revolutions are always large, if observed with the appropriate magnification. ABSTRACT Distinguishing scientific revolutions from normal science is a subjective, conflicting matter ...
Sebastian Kozuch
wiley +1 more source
Machine Learning and Deep Learning Approaches for SQL Injection Detection: A Review
Structured Query Language Injection (SQLi) remains one of the most serious threats to web applications and has the ability to bypass traditional signature-based detection through obfuscation and zero-day payloads.
Sahar Saadallah Ahmed +1 more
doaj +1 more source
ABSTRACT Understanding how early mother–child interactions are linked to children's social‐cognitive processes requires methods capable of capturing the temporal structure of naturalistic behavior. This study introduces a computational framework based on Bayesian Network modeling to identify sequential dependencies among nonverbal behaviors (smiles ...
Eleuda Nunez +5 more
wiley +1 more source
The transactive energy market is an emerging development in energy economics built on advanced metering infrastructure. Data generated in this context is often required for market operations, while also being privacy sensitive.
Daniel Sousa-Dias +4 more
doaj +1 more source
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source

