Results 91 to 100 of about 478,328 (290)

Characterizing Phishing Threats with Natural Language Processing

open access: yes, 2015
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core   +1 more source

Grounding Large Language Models for Robot Task Planning Using Closed‐Loop State Feedback

open access: yesAdvanced Robotics Research, EarlyView.
BrainBody‐Large Language Model (LLM) introduces a hierarchical, feedback‐driven planning framework where two LLMs coordinate high‐level reasoning and low‐level control for robotic tasks. By grounding decisions in real‐time state feedback, it reduces hallucinations and improves task reliability.
Vineet Bhat   +4 more
wiley   +1 more source

Continual Learning for Multimodal Data Fusion of a Soft Gripper

open access: yesAdvanced Robotics Research, EarlyView.
Models trained on a single data modality often struggle to generalize when exposed to a different modality. This work introduces a continual learning algorithm capable of incrementally learning different data modalities by leveraging both class‐incremental and domain‐incremental learning scenarios in an artificial environment where labeled data is ...
Nilay Kushawaha, Egidio Falotico
wiley   +1 more source

Analyzing Knowledge Retrieval Impairments Associated with Alzheimer’s Disease Using Network Analyses

open access: yesComplexity, 2019
A defining characteristic of Alzheimer’s disease is difficulty in retrieving semantic memories, or memories encoding facts and knowledge. While it has been suggested that this impairment is caused by a degradation of the semantic store, the precise ways ...
Jeffrey C. Zemla, Joseph L. Austerweil
doaj   +1 more source

ASAP: Automatic Semantics-Aware Analysis of Network Payloads

open access: yes, 2011
Automatic inspection of network payloads is a prerequisite for effective analysis of network communication. Security research has largely focused on network analysis using protocol specifications, for example for intrusion detection, fuzz testing and forensic analysis. The specification of a protocol alone, however, is often not sufficient for accurate
Krämer, Nicole   +2 more
openaire   +3 more sources

Semantic analysis on social networks: A survey

open access: yesInternational Journal of Communication Systems, 2020
SummaryAs social networks are getting more and more popular day by day, large numbers of users becoming constantly active social network users. In this way, there is a huge amount of data produced by users in social networks. While social networking sites and dynamic applications of these sites are actively used by people, social network analysis is ...
Sumeyye Bayrakdar   +3 more
openaire   +3 more sources

Challenges and Future Directions in Assessing the Quality and Completeness of Advanced Materials Safety Data for Re‐Usability: A Position Paper From the Nanosafety Community

open access: yesAdvanced Sustainable Systems, EarlyView.
Nanosafety data provide a guiding example for establishing best practices in data management, aligning with FAIR principles and quality criteria. This review explores existing quality assessment approaches for reliability, relevance, and completeness, emphasizing the need for harmonization and adaptation to nanomaterials and advanced materials. The aim
Verónica I. Dumit   +43 more
wiley   +1 more source

Semantic industrial categorisation based on search engine index [PDF]

open access: yes, 2009
Analysis of specialist language is one of the most pressing problems when trying to build intelligent content analysis system. Identifying the scope of the language used and then understanding the relationships between the language entities is a key ...
Bal, Jay, Ma, Xiao
core  

Interests Diffusion in Social Networks

open access: yes, 2015
Understanding cultural phenomena on Social Networks (SNs) and exploiting the implicit knowledge about their members is attracting the interest of different research communities both from the academic and the business side.
D'Agostino, Gregorio   +3 more
core   +1 more source

Machine‐Learning Decomposition Identifies a Big Two Structure in Human Personality with Distinct Neurocognitive Profiles

open access: yesAdvanced Science, EarlyView.
Using machine learning on a mega‐scale global dataset (n = 1,336,840) reveals a robust personality trait architecture beyond the Big Five. A Big Two model, broadly capturing social engagement and internal mentation, defines a geometric space that links personality to neurocognitive profiles.
Kaixiang Zhuang   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy