Results 131 to 140 of about 746,055 (241)

The Importance of Neuropathology in a Complex Movement Disorder with Primary Familial Brain Calcification

open access: yes
Movement Disorders, EarlyView.
Ida Gugler   +3 more
wiley   +1 more source

Key Technical Fields and Future Outlooks of Space Manipulators: A Survey

open access: yesSmartBot, EarlyView.
This paper systematically reviews the technological development of space manipulators, emphasizing the unique challenges posed by space environments. It examines four areas: structural design, modeling, planning, and control, while introducing typical ground test platforms.
Gang Chen   +12 more
wiley   +1 more source

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

Model‐Based Systems Engineering in Space Applications: A Comprehensive Literature Review

open access: yesSystems Engineering, EarlyView.
ABSTRACT The growing complexity of space engineering is driving the demand to embrace the adoption of Model‐Based Systems Engineering (MBSE). Although the MBSE is well‐practiced in the space industry, the level of effort and need required to obtain the benefits of MBSE vastly differ across enterprises; this disparity presents a significant challenge to
Rehobot Bekele Buruso   +4 more
wiley   +1 more source

Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting

open access: yesSystems Engineering, EarlyView.
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley   +1 more source

Diversified Composite Prompting to Enhance Generalisation of Vision‐Language Models

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT In recent years, prompt learning has shown promise in transferring pretrained vision‐language models (VLMs) to downstream tasks. However, existing methods face two challenges in improving generalisation: (1) When leveraging the collaborative effect of multimodal prompts, it is often assumed that text and visual modalities share the same prompt
Xiaoyong Mei   +5 more
wiley   +1 more source

The company you keep: becoming one(self) in an Indonesian convent En bonne compagnie : devenir (quelqu’)un dans un couvent indonésien Pergaulan dalam biara di Indonesia: sebuah proses pembentukan diri*

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
This article investigates companionate processes of self‐making in a religious community of Catholic nuns in eastern Indonesia. I argue that the sociality of the convent establishes a unique context for understanding the effects of one's company on processes of self‐becoming.
Meghan Rose Donnelly
wiley   +1 more source

‘The Good Couscous That Pleases Us!’: The Meanings of Enduring Imperialist Imagery in Postcolonial French Food Advertising, 1970–2000

open access: yesGender &History, EarlyView.
ABSTRACT This article examines a wave of Orientalism‐inspired food commercials that appeared on television in France between 1975 and 2000. Older commercials for couscous were more banal, emphasizing a given product's superiority or affordability. Around 1975, however, there was a concerted shift in the advertising; new spots contained exoticized ...
Kelly Ricciardi Colvin
wiley   +1 more source

Home - About - Disclaimer - Privacy