Results 71 to 80 of about 305,410 (292)

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Functional Mapping of Neurodevelopmental Disease Pathways to Key Neurodevelopmental Processes Represented in the Developmental Neurotoxicity In Vitro Testing Battery

open access: yesAdvanced Science, EarlyView.
Human‐relevant methods are essential for modern chemical safety assessment. This study helps define the capabilities and boundaries of an in vitro testing battery for developmental neurotoxicity by exploring its biological applicability domain. By linking neurodevelopmental disease‐related pathways to key neurodevelopmental processes, the work enhances
Eliska Kuchovska   +14 more
wiley   +1 more source

Distributed communications and control network for robotic mining [PDF]

open access: yes
The application of robotics to coal mining machines is one approach pursued to increase productivity while providing enhanced safety for the coal miner.
Schiffbauer, William H.
core   +1 more source

GloPath: An Entity‐Centric Foundation Model for Glomerular Lesion Assessment and Clinicopathological Insights

open access: yesAdvanced Science, EarlyView.
An entity‐centric foundation model, GloPath, is introduced for comprehensive glomerular lesion assessment from routine renal biopsy images. Trained on over one million glomeruli, the framework enables robust lesion recognition, grading, and cross modality diag nosis, while uncovering large‐scale clinicopathological associations.
Qiming He   +28 more
wiley   +1 more source

Integrating Spatial Proteogenomics in Cancer Research

open access: yesAdvanced Science, EarlyView.
Xx xx. ABSTRACT Background: Spatial proteogenomics marks a paradigm shift in oncology by integrating molecular analysis with spatial information from both spatial proteomics and other data modalities (e.g., spatial transcriptomics), thereby unveiling tumor heterogeneity and dynamic changes in the microenvironment.
Yida Wang   +13 more
wiley   +1 more source

A Review of Financial Accounting Fraud Detection based on Data Mining Techniques

open access: yes, 2012
With an upsurge in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection (FAFD) has become an emerging topic of great importance for academic, research and industries.
Panigrahi, Prabin Kumar, Sharma, Anuj
core   +1 more source

An Integrated NLP‐ML Framework for Property Prediction and Design of Steels

open access: yesAdvanced Science, EarlyView.
This study presents a data‐driven framework that uses language‐processing techniques to interpret steel processing descriptions and machine‐learning models to predict mechanical properties. By organising complex process histories into meaningful groups and enabling rapid property forecasts, the work supports faster, more informed steel design through ...
Kiran Devraju   +5 more
wiley   +1 more source

An Electronic Market Space Architecture Based On Intelligent Agents And Data Mining Technologies [PDF]

open access: yes
This paper presents an overview of current trends in electronic Business (E-Business), and discusses how an enterprise can use the Electronic Market space based on intelligent agents and data mining techniques to its strategic advantage.
Constanta Nicoleta BODEA   +1 more
core  

Intelligent customer relationship management (ICRM) by EFLOW portal [PDF]

open access: yes, 2002
Customer relationship management (CRM) has become a strategic initiative aimed at getting, growing, and retaining the right customers. A great amount of numeric data and even more soft information are available about customers.
Baracskai, Zoltán   +2 more
core   +1 more source

Sensor networks security based on sensitive robots agents. A conceptual model

open access: yes, 2012
Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the
B. Kim   +11 more
core   +1 more source

Home - About - Disclaimer - Privacy