Results 71 to 80 of about 5,757 (274)

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Steganographic model to conceal the secret data in audio files utilizing a fourfold paradigm: Interpolation, multi-layering, optimized sample space, and smoothing

open access: yesJournal of Safety Science and Resilience
Audio steganography techniques are evaluated using performance metrics such as payload capacity, stego audio file quality, and security (imperceptibility of hidden data). Increasing payload capacity often reduces stego image quality and security. However,
Daffa Tristan Firdaus   +4 more
doaj   +1 more source

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

open access: yes, 2015
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg   +3 more
core   +1 more source

MusicSwarm: Biologically Inspired Intelligence for Music Composition

open access: yesAdvanced Intelligent Systems, EarlyView.
Biologically inspired swarms of frozen foundation models self‐organize to compose complex music without fine‐tuning. By coordinating through stigmergic signals, decentralized agents dynamically evolve specialized roles and adapt to solve complex tasks.
Markus J. Buehler
wiley   +1 more source

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions

open access: yes, 2007
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Moulin, Pierre, Wang, Ying
core   +4 more sources

Gate‐Align‐SED: Semi‐Supervised Sound Event Detection via Adaptive Feature Gating and Cross‐Task Alignment in Situation Awareness

open access: yesAdvanced Intelligent Systems, EarlyView.
Overview of the proposed Gate‐Align‐SED, including two stages of training: (1) Mean‐Teacher SSL Training; and (2) Enhancer Model Training. In complex real‐world environments such as disaster monitoring, effective sound event detection (SED) is often hindered by the presence of noise and limited labeled data.
Jieli Chen   +4 more
wiley   +1 more source

A community‐driven approach to address substance use and create a Great Plains American Indian addiction and recovery research agenda

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract Substance use, specifically opioid and methamphetamine use, is of increasing concern among American Indian (AI) populations in the Great Plains. This community‐driven participatory study investigated the impacts of substance use and community‐defined needs in treating addiction.
Brynn Luger   +8 more
wiley   +1 more source

“Will you be there for me?” Social support from family and friends during cold case sexual assault prosecutions

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell   +4 more
wiley   +1 more source

An audio steganography algorithm based on segment-STC

open access: yesDianxin kexue, 2019
In steganography field, syndrome-trellis code is a state-of-the-art steganography algorithm. A steganography algorithm of Segment-STC was proposed. Segment-STC could locally optimize the distortion by segmentation.
Xueyuan ZHANG   +3 more
doaj   +2 more sources

Examining pathways by which socioeconomic instability in adolescence influence sexual health during emerging adulthood in an agricultural setting in California

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract This study investigates the longitudinal impact of socioeconomic instability on teen pregnancy and sexually transmitted infection (STI) diagnosis among adolescents and young adults (AYA) living in an agricultural region and examines pathways including supportive family and social structures, decision making autonomy in romantic relationships ...
Marie C. D. Stoner   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy