Results 91 to 100 of about 77,066 (262)

Solving for Blameless and Optimal Control Under Prioritized Safety Constraints

open access: yesOptimal Control Applications and Methods, EarlyView.
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek   +3 more
wiley   +1 more source

DESIGNING THE ARCHITECTURE AND SOFTWARE COMPONENTS OF THE DOCKERISED BLOCKCHAIN MEDIATOR

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології
Small and medium enterprises are not adopting blockchain solutions in their supply chains and business processes due to the cost of implementing and deploying the solutions.
Pavlo Zherzherunov, Olexandr Shmatko
doaj   +1 more source

All‐sky assimilation impacts of the Tomorrow.io microwave sounder constellation on global weather forecasts

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette   +3 more
wiley   +1 more source

Quantifying Structural Complexity, Effort, and Performance: An Early Experiment Using Network Design Tasks

open access: yesSystems Engineering, EarlyView.
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza   +3 more
wiley   +1 more source

AN ARCHITECTURAL MODEL FOR CONTENT MANAGEMENT IN E-COMMERCE APPLICATIONS USING INTELLIGENT AGENTS

open access: yesHavacılık ve Uzay Teknolojileri Dergisi, 2011
In e-Commerce applications, the size of the architecture is huge and there are too many member shops and too many customers that bring along management difficulties.
Akhan Akbulut, Güray Yılmaz
doaj  

Tumour‐informed workflow to use ctDNA as a biomarker for risk of recurrence in head and neck cancer patients post‐treatment

open access: yesVIEW, EarlyView.
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang   +8 more
wiley   +1 more source

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

Angular Deep Supervised Hashing for Image Retrieval

open access: yesIEEE Access, 2019
Deep learning based image hashing methods learn hash codes by using powerful feature extractors and nonlinear transformations to achieve highly efficient image retrieval. For most end-to-end deep hashing methods, the supervised learning process relies on
Chang Zhou   +8 more
doaj   +1 more source

Trustworthy Federated Learning for Industrial IoT: Balancing Robustness and Fairness via Blockchain‐Based Reputation

open access: yesArtificial Intelligence for Engineering, EarlyView.
This paper proposes Block‐FairFL, a Trustworthy Federated Learning framework empowered by Blockchain, to address the dual challenges of security and fairness in deploying AI for industrial engineering. ABSTRACT The integration of artificial intelligence into the industrial Internet of Things is pivotal for predictive maintenance and autonomous control.
Hui Li
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy