Results 51 to 60 of about 76,072 (189)
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi +3 more
wiley +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Summary Introduction Demand for surgical treatment is growing and patient complexity is increasing. The NHS England standard contract now requires that pre‐operative services risk stratify and optimise patients awaiting surgery. However, current pre‐operative workflows (whether electronic or paper‐based) remain based primarily on resource‐intensive ...
Alwyn Kotzé +7 more
wiley +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley +1 more source
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
Localization With Approximate Nearest Neighbour Search
Localization and place recognition are crucial in fields like autonomous driving and robotics, but real‐time performance is challenging with exact nearest neighbour search methods in large‐scale scenarios. The authors propose using an approximate nearest neighbour search method, specifically the hierarchical navigable small world (HNSW) structure ...
Roland Kotroczó +4 more
wiley +1 more source
This paper presents a robust reversible watermarking algorithm based on Chebyshev moments, employing a two‐stage embedding mechanism. The proposed method leverages image block partitioning to embed the copyright watermark and the reversible watermark into non‐overlapping regions located inside and outside the inscribed circle of the image, respectively.
Wenjing Sun, Ling Zhang, Hongjun Zhang
wiley +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source

