Results 61 to 70 of about 71,438 (359)
Abstract Whatever the circumstances, the separation of infants from their mothers at birth is a traumatic experience for all concerned. The paper reports on a study designed to improve practice in this highly sensitive area. An analysis of data collected through semi‐structured interviews with 38 mothers who had experienced removal at birth identified ...
Claire Mason+2 more
wiley +1 more source
Exploring Machine Learning and Transformer-based Approaches for Deceptive Text Classification: A Comparative Analysis [PDF]
Deceptive text classification is a critical task in natural language processing that aims to identify deceptive o fraudulent content. This study presents a comparative analysis of machine learning and transformer-based approaches for deceptive text classification.
arxiv
A vectorial dual‐beam system, comprising control and signal beams generated by a single metasurface chip and combined with thermal atoms, offers an innovative method for facilitating intensity clipping. By adjusting the incident power and polarization state of the control light, the intensity distribution of the signal beams can be significantly ...
Chen Qing+3 more
wiley +1 more source
Lying about the valence of affective pictures: an fMRI study. [PDF]
The neural correlates of lying about affective information were studied using a functional magnetic resonance imaging (fMRI) methodology. Specifically, 13 healthy right-handed Chinese men were instructed to lie about the valence, positive or negative, of
Tatia M C Lee+3 more
doaj +1 more source
Deception is a complex and cognitively draining dyadic process that simultaneously involves cognitive and emotional processes, both of which demand/capture attentional resources.
Jing Liang+4 more
doaj +1 more source
AI Deception: A Survey of Examples, Risks, and Potential Solutions [PDF]
This paper argues that a range of current AI systems have learned how to deceive humans. We define deception as the systematic inducement of false beliefs in the pursuit of some outcome other than the truth. We first survey empirical examples of AI deception, discussing both special-use AI systems (including Meta's CICERO) built for specific ...
arxiv
Inverse Design of Active‐Source Metamaterials for Thermal Camouflage with Arbitrary Active Sources
Active‐source metamaterials (ASM) revolutionize thermal camouflage by enabling the precise manipulation of heat signatures, transforming any active source into a desired thermal pattern. This breakthrough technology holds immense potential for infrared stealth, advanced thermal management, and energy‐efficient architecture, offering unprecedented ...
Xianrong Cao+9 more
wiley +1 more source
CeiTEA: Adaptive Hierarchy of Single Cells with Topological Entropy
CeiTEA, a novel hierarchical clustering algorithm based on topological entropy, effectively captures complex structures underlying data. By constructing an adaptive multi‐nary partition tree, CeiTEA reveals hierarchical structures and local diversifications, outperforming existing methods in clustering accuracy and consistency and providing the ...
Bowen Tan+3 more
wiley +1 more source
The Deceptive Human and the Detection of Deception [PDF]
Publikacja recenzowana / Peer-reviewed ...
openaire +3 more sources
This work explores the development of highly dense sulfur electrodes with a vascular pore network and low tortuosity using a shear‐force densification method. The study investigates how this innovative approach improves electrode performance, enhancing both volumetric energy density and cycling stability for lithium─sulfur batteries.
Lili Shi+15 more
wiley +1 more source