Results 61 to 70 of about 1,187,761 (284)

A Blockchain-Based Framework for OSINT Evidence Collection and Identification

open access: yesFuture Internet
The rapid advancement of social media and the exponential increase in online information have made open-source intelligence an essential component of modern criminal investigations.
Han-Wen Huang   +3 more
doaj   +1 more source

Jackpotting and the Canadian Banking Environment

open access: yesThe Journal of Intelligence, Conflict and Warfare, 2018
Insightful intelligence and analysis can be conducted using open-source intelligence data and careful analysis.  This article used open sources and conducted a variety of validation checks to ensure an accurate as possible assessment.
CASIS-Vancouver
doaj   +1 more source

The SP theory of intelligence: benefits and applications

open access: yes, 2013
This article describes existing and expected benefits of the "SP theory of intelligence", and some potential applications. The theory aims to simplify and integrate ideas across artificial intelligence, mainstream computing, and human perception and ...
Wolff, J Gerard
core   +2 more sources

Risk Prediction Models for Recurrence After Curative Treatment of Early‐Stage or Locally Advanced Lung Cancer: A Systematic Review

open access: yesAging and Cancer, EarlyView.
This systematic review synthesizes prognostic models for survival and recurrence in resected non‐small cell lung cancer. While many models demonstrate moderate to good discrimination, few are externally validated and reporting quality is variable, limiting clinical applicability and highlighting the need for robust, transparent model development ...
Evangeline Samuel   +4 more
wiley   +1 more source

OSINT from a UK perspective: considerations from the law enforcement and military domains [PDF]

open access: yes, 2017
Both law enforcement and the military have incorporated the use of open source intelligence (OSINT) into their daily operations. Whilst there are observable similarities in how these organisations employ OSINT there are also differences between military ...
Gibson, Helen, Wells, Douglas
core  

Multidimensional Profiling of MRI‐Negative Temporal Lobe Epilepsy Uncovers Distinct Phenotypes

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Although hippocampal sclerosis (TLE‐HS) represents the most frequent cause of temporal lobe epilepsy (TLE), up to 30% of patients show no lesion on visual MRI inspection (TLE‐MRIneg). These cases pose diagnostic and therapeutic challenges and are underrepresented in surgical series.
Alice Ballerini   +28 more
wiley   +1 more source

Impact of Artificial Intelligence on Open-Source Software Development

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference
Open-source software has long been a catalyst for innovation. However, the rise of Artificial Intelligence (AI) is transforming the open source landscape, reshaping code development, project management, and community contributions among other aspects of
Vinod Kumar Ahuja   +2 more
doaj   +1 more source

E-Generalization Using Grammars [PDF]

open access: yes, 2017
We extend the notion of anti-unification to cover equational theories and present a method based on regular tree grammars to compute a finite representation of E-generalization sets.
Burghardt, Jochen
core  

Elevated Connectivity During Language Processing Is Associated With Cognitive Performance in SeLECTS

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Self‐Limited Epilepsy with Centrotemporal Spikes (SeLECTS) is associated with language impairments despite seizures originating in the motor cortex, suggesting aberrant cross‐network interactions. Here we tested whether functional connectivity in SeLECTS during language tasks predicts language performance.
Wendy Qi   +8 more
wiley   +1 more source

Securing the Web

open access: yesJournal of Information Security and Cybercrimes Research
In an era characterized by the ubiquity of the internet, the proliferation of online services, and the increasing frequency of cyber threats, the detection of look-alike domains has become a critical component of cybersecurity. The current paper presents
Ruchi Sharma   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy