Search

Results: 61
Transferring cognitive talent across domains to reduce the disposition effect in investment.
We consider Theory of Mind (ToM), the ability to correctly predict the intentions of others. To an important degree, good ToM function requires abstraction from one's own particular circumstances. Here, we posit that such...
Published by:
The search for active learning
This article suggests that the concept of ‘active learning’ has different meanings. These meanings are created in the dynamic and variable relationships between the uses of learning technologies and approaches to pedagogy....
The search for active learning
This article suggests that the concept of ‘active learning’ has different meanings. These meanings are created in the dynamic and variable relationships between the uses of learning technologies and approaches to pedagogy....
Recent advances in functional neuroimaging analysis for cognitive neuroscience.
Functional magnetic resonance imaging and electro-/magneto-encephalography are some of the main neuroimaging technologies used by cognitive neuroscientists to study how the brain works. However, the methods for analysing the...
Published by:
Integration of Multi-Class Service Paradigm With Generic Trust Mechanism for Innovation, Customization and Adaptability in MANETs
Trust-based mechanisms are widely used in wireless networks of different kinds for providing security against attack. Trust mechanism provides security from various attacks using both detective and preventive manner. This paper...
Application of Machine Learning Algorithm in Managing Deviant Consumer Behaviors and Enhancing Public Service.
Consumer-deviant behavior costs global utility firms USD 96 billion yearly, attributable to Non-Technical Losses (NTLs). NTLs affect the operations of power systems by overloading lines and transformers, resulting in voltage...
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection
An autoencoder has the potential to overcome the limitations of current intrusion detection methods by recognizing benign user activity rather than differentiating between benign and malicious activity. However, the line...
Short-Term Wind Power Prediction Using Hybrid Auto Regressive Integrated Moving Average Model and Dynamic Particle Swarm Optimization
With the upsurge in restructuring of the power markets, wind power has become one of the key factors in power generation in the smart grids and gained momentum in the recent years. The accurate wind power forecasting is highly...
Advanced Object Detection in Bio-Medical X-Ray Images for Anomaly Detection and Recognition
The human vision system is mimicked in the format of videos and images in the area of computer vision. As humans can process their memories, likewise video and images can be processed and perceptive with the help of computer...
Quantify the Behaviour Intention of Individuals to Control SC Performance by Exploring Cloud Storage Services
The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is explored as a theoretical background to build extended UTAUT2 model with relevant variables for examining the cloud storage services technology acceptance at...
Embedding Recovery to Transform Inpatient Mental Health Care
OBJECTIVE: The 333 model is a radical redesign of acute mental health care. Time-limited inpatient pathways for assessment (≤3 days), treatment (≤3 weeks), and recovery (≤3 months) replaced traditional geographical-sector wards....
Published by:
An Integrated Remote Control-Based Human-Robot Interface for Education Application
Portable interfaced robot arms equipped with mobile user interactions are significantly being utilized in modern world. The application of teaching robotics is being used in challenging pandemic situation but it is still...
Advanced Object Detection in Bio-Medical X-Ray Images for Anomaly Detection and Recognition
The human vision system is mimicked in the format of videos and images in the area of computer vision. As humans can process their memories, likewise video and images can be processed and perceptive with the help of computer...

|<

<

1

2

3

>

>|