Results 81 to 90 of about 58,524 (307)
The framework uses advanced linear and tree‐based techniques to analyze cross‐domain housing features and improve energy efficiency. Principal component analysis, recursive feature elimination, and random forest identify energy, emissions, cost, and building archetypes as critical factors.
Hafiz Muhammad Shakeel+3 more
wiley +1 more source
A Network-Economic Policy Study of Identity Management Systems and Implications for Security and Privacy Policy [PDF]
Alexandre Repkine, Junseok Hwang
openalex +1 more source
In this study, a deep reinforcement learning framework with multi‐line‐of‐sight guidance is proposed. An augmented‐twin delayed deep deterministic policy gradient algorithm adapts to attitude changes efficiently, reducing computational costs. Simulations show 30.8% faster training and mitigates rudder/exergy issues, validated by an X‐rudder autonomous ...
Chengren Yuan+5 more
wiley +1 more source
A Study on the Security Algorithm for Contexts in Smart Cities
Recently, a great number of smart devices associated with their users exist within Smart City. Users are constantly moving around within Smart City according to their plans and consequently receive various network services from hosting devices adjacent ...
Hoon Ko+3 more
doaj +1 more source
SpiralView: Towards Security Policies Assessment through Visual Correlation of Network Resources with Evolution of Alarms [PDF]
Enrico Bertini+2 more
openalex +1 more source
Trade Realignments and the Need for Integrated Modeling Research in Latin America's Agri‐Food Sector
Agribusiness, EarlyView.
Emiliano Lopez Barrera
wiley +1 more source
Mainstream Artificial Intelligence Technologies in Contemporary Ophthalmology
This review explores the latest artificial intelligence (AI) technologies in ophthalmology, focusing on four key data types: medical imaging, electronic health records, robotic‐assisted surgery, and genomics. It examines the structural features, use cases, clinical goals, and evaluation metrics of various AI algorithms, while also introducing emerging ...
Shiqi Yin+9 more
wiley +1 more source
Towards Effective Security Policy Management for Heterogeneous Network Environments [PDF]
Lawrence Teo, Gail‐Joon Ahn
openalex +1 more source
A novel risk assessment approach that integrates the fuzzy set theory and Z‐numbers with multicriteria decision‐making techniques (Delphi, decision‐making trial and evaluation laboratory, analytic network process, and VIseKriterijumska Optimizacija I Kompromisno Resenje) to manage uncertainty and prioritize human–robot collaboration risks. A real‐world
Emine Bozkus, İhsan Kaya
wiley +1 more source
Nearly every aspect of our life is impacted by digital technologies manufactured and sold by companies. Legislative frameworks to limit the harms of such technologies have been slow to develop and remain entangled in controversy.1 The expanding role of ...
Siena Anstis+2 more
doaj +1 more source