Results 101 to 110 of about 32,420 (268)

Reasoning‐optimised large language models reach near‐expert accuracy on board‐style orthopaedic exams: A multi‐model comparison on 702 multiple‐choice questions

open access: yesKnee Surgery, Sports Traumatology, Arthroscopy, Volume 34, Issue 2, Page 752-762, February 2026.
Abstract Purpose The purpose of this study was to compare the accuracy, calibration, reproducibility and operating cost of seven large language models (LLMs)—including four newer models capable of using advanced reasoning techniques to analyse complex medical information and generate accurate responses—on text‐only orthopaedic multiple‐choice questions
Pedro Diniz   +5 more
wiley   +1 more source

Chainspace: A Sharded Smart Contracts Platform

open access: yes, 2017
Chainspace is a decentralized infrastructure, known as a distributed ledger, that supports user defined smart contracts and executes user-supplied transactions on their objects.
Al-Bassam, Mustafa   +4 more
core  

Preventing financial ruin: How the West India trade fostered creativity in crisis lending by the Bank of England

open access: yesThe Economic History Review, Volume 79, Issue 1, Page 57-88, February 2026.
Abstract This paper contributes to the understanding of the complex relationship between British economic performance during the Napoleonic wars and the ‘West Indies’, as the Caribbean slave colonies were called. Not only did profits from slave‐based commerce provide financing for the growth of the financial sector, as has been claimed, but the risk of
Carolyn Sissoko, Mina Ishizu
wiley   +1 more source

Leveraging 3D Molecular Spatial Visual Information and Multi‐Perspective Representations for Drug Discovery

open access: yesAdvanced Science, Volume 13, Issue 2, 9 January 2026.
A deep learning framework called MolVisGNN is proposed to fuse 3D molecular visual information of drugs with multi‐source features, which proves the importance of 3D molecular visual information of drugs and the advancedness of this model in the field of drug discovery, and provides a reference for how to more comprehensively express small molecule ...
Zimai Zhang   +9 more
wiley   +1 more source

StarZIP: Streaming Graph Compression Technique for Data Archiving

open access: yesIEEE Access, 2019
The size of a streaming graph is possibly unbounded, and it is updated by a continuous sequence of edges over time. Due to numerous types of real-world interactions, the nature of edge arrival in a streaming graph is dynamic and holds different types of ...
Batjargal Dolgorsuren   +3 more
doaj   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels

open access: yesSensors, 2017
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a ...
Mike Burmester   +3 more
doaj   +1 more source

Quantitative Assessment Model for Technology Transfer Risks in University‐Enterprise Collaborative Innovation: Based on Multi‐Objective Optimization Strategy of Deep Adversarial Reinforcement Learning

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This study develops a deep adversarial reinforcement learning framework for dynamic technology transfer risk assessment. The research outcome DAGAN‐MORL has a misjudgment rate 6.3%, a delay of 1.8 h, and a profit error of 7.9%, leading at the industrial level, providing intelligent support for university‐enterprise collaborative innovation. ABSTRACT As
Guojun Wang
wiley   +1 more source

Selective Location Blinding Using Hash Chains (Transcript of Discussion) [PDF]

open access: yes, 2011
The work that I am reporting on is work that we recently started with a Luxembourgish company, itrust. Together with this company we are working on the design of a security architecture and security protocols to enable location-based services. The general architecture of the system consists of a satellite and a local user device, such as a mobile ...
openaire   +2 more sources

It's Not Just What You Say, but How You Say It: The Effects of Enterprise Social Media on Service Management, Through the Lens of Signaling Theory

open access: yesHuman Resource Management, Volume 65, Issue 1, Page 193-218, January/February 2026.
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley   +1 more source

Home - About - Disclaimer - Privacy