Results 171 to 180 of about 219,753 (266)
Schematic representation of artificial intelligence approaches in enzyme catalysis, integrating bibliometric analysis, emerging research trends, and machine learning tools for enzyme design, prediction, and industrial biocatalytic applications. Abstract This study systematically explores the applications of artificial intelligence (AI) in enzyme ...
Misael Bessa Sales +6 more
wiley +1 more source
Robust Deep Active Learning via Distance-Measured Data Mixing and Adversarial Training. [PDF]
Song S, Wang X, Dong S, Jiang J.
europepmc +1 more source
From Custom to Court: The Evolution of Mediation in European Legal Systems
ABSTRACT This article traces how European mediation has repeatedly rebalanced three variables—(1) the source of mediator authority, (2) the degree of institutionalization, and (3) the operative meaning of voluntariness—from antiquity to the present. Using three periods—Proto‐Mediation (c. 500 BCE–c. 1750), Classical Mediation (c.
Viktoriia Hamaiunova
wiley +1 more source
An incremental adversarial training method enables timeliness and rapid new knowledge acquisition. [PDF]
Ge Y, Dong Y, Sun H, Liu Y, Wang C.
europepmc +1 more source
Log Sequence Anomaly Detection Method Based on Contrastive Adversarial Training and Dual Feature Extraction. [PDF]
Wang Q, Zhang X, Wang X, Cao Z.
europepmc +1 more source
ABSTRACT While corporate social responsibility (CSR) scholarship assumes that organizational consistency signals effectiveness, there remains a knowledge gap about how MNCs navigate competing institutional logics between headquarters and subsidiaries. This study investigates how managerial sensemaking mediates the effects of institutional pressures on ...
Charles Antony Diab, Wendy Stubbs
wiley +1 more source
Deep Convolutional Neural Network With Adversarial Training for Denoising Digital Breast Tomosynthesis Images. [PDF]
Gao M, Fessler JA, Chan HP.
europepmc +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training. [PDF]
Huang W +5 more
europepmc +1 more source
This review elucidates the velocity–dispersion–attenuation coupling mechanisms of wave propagation in rock masses, compares six representative models, and reveals how pressure, temperature, mineral composition, and anisotropy jointly control dynamic responses in complex geological media.
Jiajun Shu +8 more
wiley +1 more source

