Results 41 to 50 of about 5,088 (260)
ABSTRACT As part of the special issue Centering Affect and Emotion Toward Justice and Dignity in Science Education, this paper analyzes participants' experiences playing an immersive virtual reality (VR) experience that explores gender and sexuality‐based marginalization in STEM fields.
Dylan Paré
wiley +1 more source
Abstract Self‐healing concrete, with its ability to autonomously repair damages, holds promise in enhancing its structural durability and resilience. Research on self‐healing concrete in the past decade has advanced in understanding the mechanisms behind healing, exploring various healing agents, and assessing their effectiveness in concrete structures.
Shan He+9 more
wiley +1 more source
Erving Goffman at 100: A Chameleon Seen as a Rorschach Test within a Kaleidoscope
The 100th anniversary of Erving Goffman's birth was in 2022. Drawing on his work, the Goffman archives, the secondary literature, and personal experiences with him and those in his university of Chicago cohort, I reflect on some implications of his work and life, and the inseparable issues of understanding society.
Gary T. Marx
wiley +1 more source
UNIDECOR: A Unified Deception Corpus for Cross-Corpus Deception Detection [PDF]
Verbal deception has been studied in psychology, forensics, and computational linguistics for a variety of reasons, like understanding behaviour patterns, identifying false testimonies, and detecting deception in online communication. Varying motivations across research fields lead to differences in the domain choices to study and in the ...
arxiv
ABSTRACT Multi‐purpose large language models (LLMs), a subset of generative artificial intelligence (AI), have recently made significant progress. While expectations for LLMs to assist systems engineering (SE) tasks are paramount; the interdisciplinary and complex nature of systems, along with the need to synthesize deep‐domain knowledge and ...
Taylan G. Topcu+3 more
wiley +1 more source
Woodward and Hoffmann. Hoffmann and Woodward. A Close Collaboration Had Yet to Begin**
Roald Hoffmann's laboratory notebooks and letters provide an inside glimpse into his relationship with R. B. Woodward and the history of the Woodward‐Hoffmann rules. Abstract In 1965, R. B. Woodward and Roald Hoffmann published five communications in the Journal of the American Chemical Society in which they outlined the mechanisms of ...
Jeffrey I. Seeman
wiley +1 more source
Boosted unsupervised feature selection for tumor gene expression profiles
Abstract In an unsupervised scenario, it is challenging but essential to eliminate noise and redundant features for tumour gene expression profiles. However, the current unsupervised feature selection methods treat all samples equally, which tend to learn discriminative features from simple samples.
Yifan Shi+5 more
wiley +1 more source
Deception Jamming for Squint SAR Based on Multiple Receivers
A deception jamming method for synthetic aperture radar (SAR) based on multiple receivers is proposed. This method deals with the parameters of hostile SAR as a whole for deception jamming. By measuring the range differences between different receivers, higher accuracy can be achieved than detecting each of the parameters directly.
Bo Zhao, Zheng Bao, Feng Zhou
openaire +2 more sources
OFDM-based JCAS under Attack: The Dual Threat of Spoofing and Jamming in WLAN Sensing [PDF]
This study reveals the vulnerabilities of Wireless Local Area Networks (WLAN) sensing, under the scope of joint communication and sensing (JCAS), focusing on target spoofing and deceptive jamming techniques. We use orthogonal frequency-division multiplexing (OFDM) to explore how adversaries can exploit WLAN's sensing capabilities to inject false ...
arxiv +1 more source
Cyber Deception for Computer and Network Security: Survey and Challenges [PDF]
Cyber deception has recently received increasing attentions as a promising mechanism for proactive cyber defense. Cyber deception strategies aim at injecting intentionally falsified information to sabotage the early stage of attack reconnaissance and planning in order to render the final attack action harmless or ineffective.
arxiv