Results 61 to 70 of about 2,578,035 (249)

Third-Party Effects [PDF]

open access: yes, 2008
Most theories about effects of social embeddedness on trust define mechanisms that assume someone’s decision to trust is based on the reputation of the person to be trusted or on other available information.
Barrera, D   +5 more
core  

Sampling Strategy: An Overlooked Factor Affecting Artificial Intelligence Prediction Accuracy of Peptides’ Physicochemical Properties

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study reveals that sampling strategy (i.e., sampling size and approach) is a foundational prerequisite for building accurate and generalizable AI models in peptide discovery. Reaching a threshold of 7.5% of the total tetrapeptide sequence space was essential to ensure reliable predictions.
Meiru Yan   +3 more
wiley   +1 more source

Self‐Driving Laboratory Optimizes the Lower Critical Solution Temperature of Thermoresponsive Polymers

open access: yesAdvanced Intelligent Discovery, EarlyView.
A low‐cost, self‐driving laboratory is developed to democratize autonomous materials discovery. Using this "frugal twin" hardware architecture with Bayesian optimization, the platform rapidly converges to target lower critical solution temperature (LCST) values while self‐correcting from off‐target experiments, demonstrating an accessible route to data‐
Guoyue Xu, Renzheng Zhang, Tengfei Luo
wiley   +1 more source

Competing Platforms and Third Party Application Developers [PDF]

open access: yes
Technology firms often decide between being open or closed to third party application development. Building on a two-sided market model with competing platforms, I show that firms might prefer to restrict third party application development despite the ...
Joacim TÅG
core  

Zero Watermarking Using Convolutional Additive Self‐Attention Vision Transformer and Discrete Wavelet Transform‐Variance‐Based Feature Descriptor for Medical Image Security in Mobile Healthcare Services

open access: yesAdvanced Intelligent Systems, EarlyView.
A zero‐watermarking algorithm that combines a refined convolutional additive self‐attention vision transformer (CAS‐ViT) with a discrete wavelet transform variance‐based feature descriptor (DVFD) is proposed for protecting the privacy of medical images in mobile healthcare services.
Pei Liu   +6 more
wiley   +1 more source

Disentangling Aleatoric and Epistemic Uncertainty in Physics‐Informed Neural Networks: Application to Insulation Material Degradation Prognostics

open access: yesAdvanced Intelligent Systems, EarlyView.
Physics‐Informed Neural Networks (PINNs) provide a framework for integrating physical laws with data. However, their application to Prognostics and Health Management (PHM) remains constrained by the limited uncertainty quantification (UQ) capabilities.
Ibai Ramirez   +4 more
wiley   +1 more source

Design‐for‐Benchmarking in Soft Robotics: Navigating Component‐System Dichotomy

open access: yesAdvanced Intelligent Systems, EarlyView.
Soft robotics faces a profound evaluation challenge: the Component‐System Dichotomy, where isolated component tests fail to predict integrated performance. This article presents a systematic survey of critical reporting gaps across actuation, sensing, and control.
Matteo Lo Preti   +4 more
wiley   +1 more source

Third Parties and the Social Scaffolding of Forgiveness [PDF]

open access: yes, 2013
It is widely accepted that only the victim of a wrong can forgive that wrong. Several philosophers have recently defended “third-party forgiveness,” the scenario in which A, who is not the victim of a wrong in any sense, forgives B for a wrong B did to C.
Walker, Margaret Urban
core   +1 more source

VALIANT: A Vision‐Authenticity Language Framework Through Integrated Experts and Aligned Numerical‐Textual Descriptors for Citri Reticulatae Pericarpium

open access: yesAdvanced Intelligent Systems, EarlyView.
Visual features, numerical descriptors, and controlled textual attributes extracted from smartphone images of Chenpi are integrated by VALIANT, a tailored multimodal framework for simultaneous storage‐age classification and authenticity verification. The workflow distinguishes genuine products from suspicious standard operating procedure mimics while ...
Simon C. K. Chan   +5 more
wiley   +1 more source

Debate: Inside or Outside the Democratic Party [PDF]

open access: yes, 1994
[Excerpt] Since the New Deal, the dominant political strategy of American labor has been to work within the Democratic Party for legislative and other political aims.
Fletcher, Jr., Bill
core   +1 more source

Home - About - Disclaimer - Privacy