Results 81 to 90 of about 30,718 (224)

Shapley Additive Explanation for Local Class Differentiation: Local Explainability for Class Differentiation in Classification Models

open access: yesAdvanced Intelligent Systems, EarlyView.
An instance‐level, model‐agnostic explanation of class differentiation is introduced through SHAP‐LCD, linking probability shifts to feature‐wise Shapley contributions. The method operates on tabular and image data and is released in a fully reproducible implementation, offering a transparent way to examine, at each instance, why predictive models ...
Roxana M. Romero Luna   +2 more
wiley   +1 more source

Development of a Mathematical Model of Operation Reliability of Mine Hoisting Plants

open access: yesMathematics
The work analyzes the performance assurance of mine hoisting machines, including the problem of the quality of performance of the functions. The quality of functioning allows evaluation of a set of properties of the process of lifting loads, designed to ...
Pavel V. Shishkin   +6 more
doaj   +1 more source

Innovative Artificial Intelligence‐Assisted Systems for Social Science Research: Architecture Design and Applied Practice

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid advancement of large language model (LLM) technology is profoundly transforming the practice of social science research. Scholarly discussions on Artificial Intelligence (AI)'s role in social science research can be organised into three levels: AI as a research tool, AI as a methodological infrastructure and AI as a quasi‐cognitive ...
Jie Xiong
wiley   +1 more source

The Economics of Credence Goods: On the Role of Liability, Verifiability, Reputation and Competition [PDF]

open access: yes
Credence goods markets are characterized by asymmetric information between sellers and consumers that may give rise to inefficiencies, such as under- and overtreatment or market break-down.
Dulleck, Uwe   +2 more
core  

k‐Selective Electrical‐to‐Magnon Transduction with Finite‐Element‐Resolved Sub‐Micron Nanoantennas

open access: yesAdvanced Physics Research, EarlyView.
We introduce a coupled finite‐element‐finite‐difference framework that links impedance‐matched nanoantenna geometries to propagating spin‐wave dynamics, capturing skin effects, proximity effects, and taper leakage beyond uniform‐current models. Applied to coplanar‐waveguide and stripline nanoantennas on yttrium‐iron‐garnet, the simulations achieve ...
Andreas Höfinger   +11 more
wiley   +1 more source

SEAIS: Secure and Efficient Agricultural Image Storage Combining Blockchain and Satellite Networks

open access: yesMathematics
The image integrity of real-time monitoring is crucial for monitoring crop growth, helping farmers and researchers improve production efficiency and crop yields. Unfortunately, existing schemes just focus on ground equipment and drone imaging, neglecting
Haotian Yang   +4 more
doaj   +1 more source

An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption

open access: yesIEEE Access, 2019
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often ...
Zhidan Li   +4 more
doaj   +1 more source

Risk‐aware safe reinforcement learning for control of stochastic linear systems

open access: yesAsian Journal of Control, EarlyView.
Abstract This paper presents a risk‐aware safe reinforcement learning (RL) control design for stochastic discrete‐time linear systems. Rather than using a safety certifier to myopically intervene with the RL controller, a risk‐informed safe controller is also learned besides the RL controller, and the RL and safe controllers are combined together ...
Babak Esmaeili   +2 more
wiley   +1 more source

Security of Verifiable Threshold Quantum Secret Sharing With Sequential Communication

open access: yesIEEE Access, 2019
A verifiable (t, n) threshold quantum secret sharing scheme with sequential communication was proposed recently. In this work, we analyze its security and then give two new participant attacks.
Xiaoqiu Cai   +3 more
doaj   +1 more source

Recovering Quantum Logic within an Extended Classical Framework

open access: yes, 2011
We present a procedure which allows us to recover classical and nonclassical logical structures as \emph{concrete logics} associated with physical theories expressed by means of classical languages. This procedure consists in choosing, for a given theory
Garola, Claudio, Sozzo, Sandro
core   +1 more source

Home - About - Disclaimer - Privacy