Results 241 to 250 of about 66,369 (329)

Generative AI—the Transgression of Technology

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This article offers a systems‐theoretical analysis of generative artificial intelligence (GenAI) grounded in Niklas Luhmann's sociology of technology. It addresses a central conceptual problem: How GenAI can be understood within a theoretical framework that has traditionally defined technology as a means of stabilising action through causal ...
Jesper Tække
wiley   +1 more source

Normalizing the Shamed Self: Stigma, Neutralization and “Narrative Credibility” in Interviews on White‐Collar Transgression

open access: yesSymbolic Interaction, EarlyView.
In this article, I analyze my interviews with Mark (pseudonym), a social scientist who committed major academic fraud in over 50 top‐tier journal articles in the first decade of this century. I explain how stigma played a central role in how Mark and I shaped our interaction. I focus on how Mark, a former Professor and Dean with a distinguished career,
Thaddeus Müller
wiley   +1 more source

The Relationship Between Blood Lipids, Coagulation Indexes, Blood Homocysteine and Sudden Deafness: A Retrospective Study and Mendelian Randomization Analysis

open access: yesWorld Journal of Otorhinolaryngology - Head and Neck Surgery, EarlyView.
ABSTRACT Background Certain blood components, including blood lipids, coagulation parameters, and homocysteine, have been suggested to correlate with the incidence and prognosis of sudden sensorineural hearing loss (SSNHL). However, the nature of these associations remains controversial.
Feng‐Xin Yang   +8 more
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy