Call for a ban on gender-centric verbal violence through women-centric offensive abuses elicited in the names of mothers, sisters & daughters in the mass media and public spaces. [PDF]
Kumar R.
europepmc +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Lightweight authentication for IoT devices (LAID) in sustainable smart cities. [PDF]
Khalique A +3 more
europepmc +1 more source
Generative AI—the Transgression of Technology
ABSTRACT This article offers a systems‐theoretical analysis of generative artificial intelligence (GenAI) grounded in Niklas Luhmann's sociology of technology. It addresses a central conceptual problem: How GenAI can be understood within a theoretical framework that has traditionally defined technology as a means of stabilising action through causal ...
Jesper Tække
wiley +1 more source
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source
How situations are defined is a social process. This paper examines how users on YouTube make sense of the alleged sexual assault perpetrated by shock rocker Marilyn Manson in the 2007 “Heart Shaped‐Glasses (When the Heart Guides the Hand)” music video.
Stacey Hannem, Christopher J. Schneider
wiley +1 more source
A Novel Key Distribution for Mobile Patient Authentication Inspired by the Federated Learning Concept and Based on the Diffie-Hellman Elliptic Curve. [PDF]
AbuAlghanam O +4 more
europepmc +1 more source
Rehabilitation and release contribute to conservation efforts for threatened species. Ensuring that these efforts are effective requires a good understanding of the factors which determine survival and integration of released animals into wild populations.
Jessica Harvey‐Carroll +3 more
wiley +1 more source
Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques. [PDF]
Ko Y, Pawana IWAJ, You I.
europepmc +1 more source
Below the leaves: Integrating above‐ and below‐ground phenology for earth‐system predictability
Read the free Plain Language Summary for this article on the Journal blog. Abstract Almost every aspect of biological systems has phenology—a pattern in activity or function linked to annual cycles. Most terrestrial phenology research focusses on leaves, the onset of leaf out or senescence.
Kendalynn Morris, Richard Nair
wiley +1 more source

