Results 71 to 80 of about 249,913 (283)
Redefining Optimal Coverage Path Planning for FLS‐Equipped AUVs With Deep Reinforcement Learning
ABSTRACT Autonomous Underwater Vehicles (AUVs) have emerged as indispensable tools for a variety of subsea tasks, from habitat monitoring and seabed mapping to infrastructure inspection and mine countermeasures. A fundamental challenge in this field is Coverage Path Planning (CPP), the problem of ensuring complete and efficient area coverage.
Lorenzo Cecchi +3 more
wiley +1 more source
There are a number of important planned changes in the way that the regulatory function is to be conducted in Englandand Wales in the future (Department of Health, 1998).
Forder, Julien E. +2 more
core
ABSTRACT Across garment factories in the Global South, the promise of “ethical fashion” coexists with poverty wages and retaliation. This study examines why the global call for decent work has not improved labor conditions in Bangladesh's ready‐made garment industry.
Md. Rafiqul Islam Rana
wiley +1 more source
Tracking Report 2003 Outdoor Cap Company, Bangladesh 12020505B [PDF]
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide.
Fair Labor Association
core +1 more source
ABSTRACT Infrastructure‐led development in rapidly urbanizing economies often generates accessibility gains that fail to translate into balanced urban outcomes, particularly when local fiscal institutions redirect those gains toward revenue‐generating land uses. Filling this gap, especially in fiscally constrained county‐level cities where land finance
Ming Xie, Xiaoxiao Liao, Zhenlin Xie
wiley +1 more source
Looking for Trouble: Pre‐Intervention Monitoring in Human and AI Driver Training
We compare two types of situations involving monitoring of car driving: a driving instructor overseeing a trainee driver and a safety driver overseeing the performance of autonomous vehicle (AV) software. Our focus is on instances of monitoring that precede (1) interventions that are aborted before impacting the driving and (2) actual interventions on ...
Mathias Broth +2 more
wiley +1 more source
Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley +1 more source
Looking for a quick fix: How weak social auditing is keeping workers in sweatshop [PDF]
CCC_05_quick_fix.pdf: 4178 downloads, before Oct.
Clean Clothes Campaign
core +1 more source
Abstract This study examined the effects of repeated viewing and reading fluency on incidental second language vocabulary acquisition through captioned video exposure. A total of 149 Japanese EFL learners watched a short animation with or without captions, varying in the number of repetitions (once, twice, or three times).
Satsuki Kurokawa, Takumi Uchihara
wiley +1 more source
Stakeholders’ views on improving the organic certification system: Results from an EU level workshop [PDF]
The FP7 CERTCOST project has the overall objective to give recommendations to the public authorities and private actors in the whole organic certification chain on how to improve the organic food certification systems in terms of efficiency, transparency
Abay, Canan +3 more
core

