Results 11 to 20 of about 2,778,607 (240)

Survey on Teleoperation Concepts for Automated Vehicles [PDF]

open access: yesIEEE International Conference on Systems, Man and Cybernetics, 2022
In parallel with the advancement of Automated Driving (AD) functions, teleoperation has grown in popularity over recent years. By enabling remote operation of automated vehicles, teleoperation can be established as a reliable fallback solution for ...
Domagoj Majstorovic   +5 more
semanticscholar   +1 more source

Blockchain-Fog Computing Integration Applications: A Systematic Review

open access: yesCybernetics and Information Technologies, 2023
The Fog computing concept has been introduced to aid in the data processing of Internet of things applications using Cloud computing. Due to the profitable benefits of this combination, several papers have lately been published proposing the deployment ...
Y. Alzoubi, A. Aljaafreh
semanticscholar   +1 more source

Identification of Rice Variety Using Geometric Features and Neural Network

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2019
 Indonesia has many food varieties, one of which is rice varieties. Each rice variety has physical characteristics that can be recognized through color, texture, and shape.
Wahyu Srimulyani, Aina Musdholifah
semanticscholar   +1 more source

Human-in-the-Loop Optimization of Wearable Robotic Devices to Improve Human–Robot Interaction: A Systematic Review

open access: yesIEEE Transactions on Cybernetics, 2022
This article presents a systematic review on wearable robotic devices that use human-in-the-loop optimization (HILO) strategies to improve human–robot interaction.
M. Díaz   +10 more
semanticscholar   +1 more source

Stafford Beer in memoriam – ‘an argument of change’ three decades on. [PDF]

open access: yes, 2005
Purpose This paper is written in memory of the late Stafford Beer. The paper engages with only one dimension of the whole man: Stafford Beer as the diagnostician and prognostician of the social conditions that he so keenly observed.
Thomas, Rod, van Zwanenberg, Nigel
core   +1 more source

Real-Time Deep Neurolinguistic Learning Enhances Noninvasive Neural Language Decoding for Brain–Machine Interaction

open access: yesIEEE Transactions on Cybernetics, 2022
Electroencephalogram (EEG)-based brain–machine interface (BMI) has been utilized to help patients regain motor function and has recently been validated for its use in healthy people because of its ability to directly decipher human intentions.
Ji-Hoon Jeong   +3 more
semanticscholar   +1 more source

A novel three-class ROC method for eQTL analysis [PDF]

open access: yes, 2010
The problem of identifying genetic factors underlying complex and quantitative traits such as height, weight and disease susceptibility in natural populations has become a major theme of research in recent years.
Chen, P, Hung, YS, Kung, SY, Xu, W
core   +1 more source

Systems Thinking in Design: Service Design and self-Services

open access: yesFORMakademisk, 2014
The purpose of this paper is twofold. Firstly, it seeks to use a practical real-world example to demonstrate the power of a systems thinking perspective in design, and more specifically in the design of services.
John Darzentas, Jenny Siobhane Darzentas
doaj   +1 more source

To the 90th Anniversary of G.P. Melnikov. Round Table “System Typology of Languages: Analysis and Synthesis in the Science of Language”, November 9, 2018

open access: yesPolylinguality and Transcultural Practices, 2019
This Round Table is dedicated to the memory of the outstanding Russian linguist, philosopher, and cultural scientist G.P. Melnikov. Gennady Prokopevich is a creator of the system-typological concept of language.
- -
doaj   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy