Results 41 to 50 of about 5,088 (260)

Reorienting Toward LGBTQ+ Belonging in Science, Technology, Engineering, and Mathematics by Feeling and Thinking With a Queer and Nonbinary Person in Virtual Reality

open access: yesScience Education, EarlyView.
ABSTRACT As part of the special issue Centering Affect and Emotion Toward Justice and Dignity in Science Education, this paper analyzes participants' experiences playing an immersive virtual reality (VR) experience that explores gender and sexuality‐based marginalization in STEM fields.
Dylan Paré
wiley   +1 more source

Perspectives on the incorporation of self‐healing in the design practice of reinforced concrete structures

open access: yesStructural Concrete, EarlyView.
Abstract Self‐healing concrete, with its ability to autonomously repair damages, holds promise in enhancing its structural durability and resilience. Research on self‐healing concrete in the past decade has advanced in understanding the mechanisms behind healing, exploring various healing agents, and assessing their effectiveness in concrete structures.
Shan He   +9 more
wiley   +1 more source

Erving Goffman at 100: A Chameleon Seen as a Rorschach Test within a Kaleidoscope

open access: yesSymbolic Interaction, EarlyView.
The 100th anniversary of Erving Goffman's birth was in 2022. Drawing on his work, the Goffman archives, the secondary literature, and personal experiences with him and those in his university of Chicago cohort, I reflect on some implications of his work and life, and the inseparable issues of understanding society.
Gary T. Marx
wiley   +1 more source

UNIDECOR: A Unified Deception Corpus for Cross-Corpus Deception Detection [PDF]

open access: yesarXiv, 2023
Verbal deception has been studied in psychology, forensics, and computational linguistics for a variety of reasons, like understanding behaviour patterns, identifying false testimonies, and detecting deception in online communication. Varying motivations across research fields lead to differences in the domain choices to study and in the ...
arxiv  

Trust at Your Own Peril: A Mixed Methods Exploration of the Ability of Large Language Models to Generate Expert‐Like Systems Engineering Artifacts and a Characterization of Failure Modes

open access: yesSystems Engineering, EarlyView.
ABSTRACT Multi‐purpose large language models (LLMs), a subset of generative artificial intelligence (AI), have recently made significant progress. While expectations for LLMs to assist systems engineering (SE) tasks are paramount; the interdisciplinary and complex nature of systems, along with the need to synthesize deep‐domain knowledge and ...
Taylan G. Topcu   +3 more
wiley   +1 more source

Woodward and Hoffmann. Hoffmann and Woodward. A Close Collaboration Had Yet to Begin**

open access: yesThe Chemical Record, EarlyView.
Roald Hoffmann's laboratory notebooks and letters provide an inside glimpse into his relationship with R. B. Woodward and the history of the Woodward‐Hoffmann rules. Abstract In 1965, R. B. Woodward and Roald Hoffmann published five communications in the Journal of the American Chemical Society in which they outlined the mechanisms of ...
Jeffrey I. Seeman
wiley   +1 more source

Boosted unsupervised feature selection for tumor gene expression profiles

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract In an unsupervised scenario, it is challenging but essential to eliminate noise and redundant features for tumour gene expression profiles. However, the current unsupervised feature selection methods treat all samples equally, which tend to learn discriminative features from simple samples.
Yifan Shi   +5 more
wiley   +1 more source

Deception Jamming for Squint SAR Based on Multiple Receivers

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2015
A deception jamming method for synthetic aperture radar (SAR) based on multiple receivers is proposed. This method deals with the parameters of hostile SAR as a whole for deception jamming. By measuring the range differences between different receivers, higher accuracy can be achieved than detecting each of the parameters directly.
Bo Zhao, Zheng Bao, Feng Zhou
openaire   +2 more sources

OFDM-based JCAS under Attack: The Dual Threat of Spoofing and Jamming in WLAN Sensing [PDF]

open access: yes
This study reveals the vulnerabilities of Wireless Local Area Networks (WLAN) sensing, under the scope of joint communication and sensing (JCAS), focusing on target spoofing and deceptive jamming techniques. We use orthogonal frequency-division multiplexing (OFDM) to explore how adversaries can exploit WLAN's sensing capabilities to inject false ...
arxiv   +1 more source

Cyber Deception for Computer and Network Security: Survey and Challenges [PDF]

open access: yesarXiv, 2020
Cyber deception has recently received increasing attentions as a promising mechanism for proactive cyber defense. Cyber deception strategies aim at injecting intentionally falsified information to sabotage the early stage of attack reconnaissance and planning in order to render the final attack action harmless or ineffective.
arxiv  

Home - About - Disclaimer - Privacy