Results for 'Phishing Detection Framework'

980 found
Order:
  1.  75
    Ethical framework for the detection, management and communication of incidental findings in imaging studies, building on an interview study of researchers’ practices and perspectives.Eline M. Bunnik, Lisa van Bodegom, Wim Pinxten, Inez D. de Beaufort & Meike W. Vernooij - 2017 - BMC Medical Ethics 18 (1):10.
    As thousands of healthy research participants are being included in small and large imaging studies, it is essential that dilemmas raised by the detection of incidental findings are adequately handled. Current ethical guidance indicates that pathways for dealing with incidental findings should be in place, but does not specify what such pathways should look like. Building on an interview study of researchers’ practices and perspectives, we identified key considerations for the set-up of pathways for the detection, management and (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  2.  42
    Attack Detection/Isolation via a Secure Multisensor Fusion Framework for Cyberphysical Systems.Arash Mohammadi, Chun Yang & Qing-wei Chen - 2018 - Complexity 2018:1-8.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3. An Aristotelian-Thomistic Framework for Detecting Covert Consciousness in Unresponsive Persons.Matthew Owen, Aryn D. Owen & Anthony G. Hudetz - 2024 - In Mihretu P. Guta & Scott B. Rae (eds.), Taking Persons Seriously: Where Philosophy and Bioethics Intersect. Eugene, Oregon.: Pickwick Publications, Wipf and Stock Publishers.
    In this chapter, it is argued that the Mind-Body Powers model of neural correlates of consciousness provides a metaphysical framework that yields the theoretical possibility of empirically detecting consciousness. Since the model is informed by an Aristotelian-Thomistic hylomorphic ontology rather than a physicalist ontology, it provides a philosophical foundation for the science of consciousness that is an alternative to physicalism. Our claim is not that the Mind-Body Powers model provides the only alternative, but rather that it provides a sufficient (...)
    No categories
     
    Export citation  
     
    Bookmark   3 citations  
  4.  18
    A composite framework for supporting user emotion detection based on intelligent taxonomy handling.Alfredo Cuzzocrea & Giovanni Pilato - 2021 - Logic Journal of the IGPL 29 (2):207-219.
    One of the most relevant issues of a social robot is its capability of catching the attention of a new acquaintance and empathize with her. The first steps towards a system which can be used by a social robot in order to be empathetic are illustrated in this paper. The system can analyze the Twitter ID of the new acquaintance, trying to detect the IAB Tier 1 categories that possibly can let arise in him/her a joyful feeling. Furthermore, it can (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  25
    Detection Analysis of Epileptic EEG Using a Novel Random Forest Model Combined With Grid Search Optimization.Xiashuang Wang, Guanghong Gong, Ni Li & Shi Qiu - 2019 - Frontiers in Human Neuroscience 13:424082.
    In the automatic detection of epileptic seizures, the monitoring of critically ill patients with time varying EEG signals is an essential procedure in intensive care units. There is an increasing interest in using EEG analysis to detect seizure, and in this study we aim to get a better understanding of how to visualize the information in the EEG time-frequency feature, and design and train a novel random forest algorithm for EEG decoding, especially for multiple-levels of illness. Here, we propose (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  16
    An Efficient Traffic Incident Detection and Classification Framework by Leveraging the Efficacy of Model Stacking.Zafar Iqbal, Majid I. Khan, Shahid Hussain & Asad Habib - 2021 - Complexity 2021:1-17.
    Automatic incident detection plays a vital role among all the safety-critical applications under the parasol of Intelligent Transportation Systems to provide timely information to passengers and other stakeholders in smart cities. Moreover, accurate classification of these incidents with respect to type and severity assists the Traffic Incident Management Systems and stakeholders in devising better plans for incident site management and avoiding secondary incidents. Most of the AID systems presented in the literature are incident type-specific, i.e., either they are designed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  95
    Detecting Honest People’s Lies in Handwriting: The Power of the Ten Commandments and Internalized Ethical Values.Thomas Li-Ping Tang - 2012 - Journal of Business Ethics 106 (4):389-400.
    Can managers detect honest people’s lies in a handwritten message? In this article, I will briefly discuss graphology and a basic model of interpersonal communication. I will then develop a fundamental theoretical framework of eight principles for detecting lies based on the basic communication model, handwriting analyses, and the following assumptions: For most people, it is easier to tell the truth than to tell lies. This applies to handwritings also. When most honest people lie, they try to hide their (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  8. Signal-Detection, Threshold, and Dual-Process Models of Recognition Memory: ROCs and Conscious Recollection.Andrew P. Yonelinas, Ian Dobbins, Michael D. Szymanski, Harpreet S. Dhaliwal & Ling King - 1995 - Consciousness and Cognition 5 (4):418-441.
    Threshold- and signal-detection-based models have dominated theorizing about recognition memory. Building upon these theoretical frameworks, we have argued for a dual-process model in which conscious recollection and familiarity contribute to memory performance. In the current paper we assessed several memory models by examining the effects of levels of processing and the number of presentations on recognition memory receiver operating characteristics . In general, when the ROCs were plotted in probability space they exhibited an inverted U shape; however, when they (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  9.  90
    Community Detection Based on Density Peak Clustering Model and Multiple Attribute Decision-Making Strategy TOPSIS.Jianjun Cheng, Xu Wang, Wenshuang Gong, Jun Li, Nuo Chen & Xiaoyun Chen - 2021 - Complexity 2021:1-18.
    Community detection is one of the key research directions in complex network studies. We propose a community detection algorithm based on a density peak clustering model and multiple attribute decision-making strategy, TOPSIS. First, the two-dimensional dataset, which is transformed from the network by taking the density and distance as the attributes of nodes, is clustered by using the DBSCAN algorithm, and outliers are determined and taken as the key nodes. Then, the initial community frameworks are formed and expanded (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  15
    Local and Deep Features Based Convolutional Neural Network Frameworks for Brain MRI Anomaly Detection.Sajad Einy, Hasan Saygin, Hemrah Hivehch & Yahya Dorostkar Navaei - 2022 - Complexity 2022:1-11.
    A brain tumor is an abnormal mass or growth of a cell that leads to certain death, and this is still a challenging task in clinical practice. Early and correct diagnosis of this type of cancer is very important for the treatment process. For this reason, this study aimed to develop computer-aided systems for the diagnosis of brain tumors. In this research, we proposed three different end-to-end deep learning approaches for analyzing effects of local and deep features for brain MRI (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  56
    Detection of Incompatible Properties in a Double-Slit Experiment.A. Sestito - 2008 - Foundations of Physics 38 (10):935-958.
    In this work we show that, within the framework of double-slit experiment, it is possible to ascertain simultaneously more incompatible properties together with the measurement of the position of the final impact-point. A wide family of solutions is concretely found and an ideal experiment realizing such a detection is designed, relatively to the detection of two incompatible properties. In the case of three incompatible properties, general conditions for the existence of solutions are singled out and a particular (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  23
    Feel Your Reach: An EEG-Based Framework to Continuously Detect Goal-Directed Movements and Error Processing to Gate Kinesthetic Feedback Informed Artificial Arm Control.Gernot R. Müller-Putz, Reinmar J. Kobler, Joana Pereira, Catarina Lopes-Dias, Lea Hehenberger, Valeria Mondini, Víctor Martínez-Cagigal, Nitikorn Srisrisawang, Hannah Pulferer, Luka Batistić & Andreea I. Sburlea - 2022 - Frontiers in Human Neuroscience 16.
    Establishing the basic knowledge, methodology, and technology for a framework for the continuous decoding of hand/arm movement intention was the aim of the ERC-funded project “Feel Your Reach”. In this work, we review the studies and methods we performed and implemented in the last 6 years, which build the basis for enabling severely paralyzed people to non-invasively control a robotic arm in real-time from electroencephalogram. In detail, we investigated goal-directed movement detection, decoding of executed and attempted movement trajectories, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  19
    The art of community detection.Natali Gulbahce & Sune Lehmann - 2008 - Bioessays 30 (10):934-938.
    Networks in nature possess a remarkable amount of structure. Via a series of data‐driven discoveries, the cutting edge of network science has recently progressed from positing that the random graphs of mathematical graph theory might accurately describe real networks to the current viewpoint that networks in nature are highly complex and structured entities. The identification of high order structures in networks unveils insights into their functional organization. Recently, Clauset, Moore, and Newman,1 introduced a new algorithm that identifies such heterogeneities in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  57
    The (un)detectability of absolute Newtonian masses.Niels C. M. Martens - 2019 - Synthese 198 (3):2511-2550.
    Absolutism about mass claims that mass ratios obtain in virtue of absolute masses. Comparativism denies this. Dasgupta, Oxford studies in metaphysics, Oxford University Press, Oxford, 2013) argues for comparativism about mass, in the context of Newtonian Gravity. Such an argument requires proving that comparativism is empirically adequate. Dasgupta equates this to showing that absolute masses are undetectable, and attempts to do so. This paper develops an argument by Baker to the contrary: absolute masses are in fact empirically meaningful, that is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  15.  36
    Decision making from economic and signal detection perspectives: development of an integrated framework.Spencer K. Lynn, Jolie B. Wormwood, Lisa F. Barrett & Karen S. Quigley - 2015 - Frontiers in Psychology 6.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  4
    Anomaly detection and facilitation AI to empower decentralized autonomous organizations for secure crypto-asset transactions.Yuichi Ikeda, Rafik Hadfi, Takayuki Ito & Akihiro Fujihara - forthcoming - AI and Society:1-12.
    This proposal introduces a novel decision-making framework to advance safe economic activities in cyberspace. We focus on identifying anomalies within crypto-asset trading, recognized as potential sources of criminal activity, severely undermining the credibility of such assets. Detecting and mitigating such anomalies holds significant societal implications, particularly in fostering trust within blockchain networks. We aim to bolster the “social trust” inherent to blockchain technology by facilitating informed economic activities in cyberspace. To achieve this, we propose integrating two artificial intelligence (AI) (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  39
    Detecting tax evasion: a co-evolutionary approach.Erik Hemberg, Jacob Rosen, Geoff Warner, Sanith Wijesinghe & Una-May O’Reilly - 2016 - Artificial Intelligence and Law 24 (2):149-182.
    We present an algorithm that can anticipate tax evasion by modeling the co-evolution of tax schemes with auditing policies. Malicious tax non-compliance, or evasion, accounts for billions of lost revenue each year. Unfortunately when tax administrators change the tax laws or auditing procedures to eliminate known fraudulent schemes another potentially more profitable scheme takes it place. Modeling both the tax schemes and auditing policies within a single framework can therefore provide major advantages. In particular we can explore the likely (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  60
    Detecting Fraud: The Role of the Anonymous Reporting Channel.Elka Johansson & Peter Carey - 2016 - Journal of Business Ethics 139 (2):391-409.
    The purpose of this paper is to examine whether anonymous reporting channels are effective in detecting fraud against companies. Fraud, which comprises predominantly asset misappropriation, represents a key operational risk and a major cost to organisations. The fraud triangle provides a framework for developing our understanding of how ARCs can increase detection of fraud. Using publicly listed company survey data collected by KPMG in Australia—where ARCs are not mandated—we find a positive association between ARCs and reported fraud. These (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  19.  14
    Using AI to detect panic buying and improve products distribution amid pandemic.Yossiri Adulyasak, Omar Benomar, Ahmed Chaouachi, Maxime C. Cohen & Warut Khern-Am-Nuai - 2024 - AI and Society 39 (4):2099-2128.
    The COVID-19 pandemic has triggered panic-buying behavior around the globe. As a result, many essential supplies were consistently out-of-stock at common point-of-sale locations. Even though most retailers were aware of this problem, they were caught off guard and are still lacking the technical capabilities to address this issue. The primary objective of this paper is to develop a framework that can systematically alleviate this issue by leveraging AI models and techniques. We exploit both internal and external data sources and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Introspection Is Signal Detection.Jorge Morales - forthcoming - British Journal for the Philosophy of Science.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  21.  24
    Modeling of attack detection system based on hybridization of binary classifiers.Beley O. I. & Kolesnyk K. K. - 2020 - Artificial Intelligence Scientific Journal 25 (3):14-25.
    The study considers the development of methods for detecting anomalous network connections based on hybridization of computational intelligence methods. An analysis of approaches to detecting anomalies and abuses in computer networks. In the framework of this analysis, a classification of methods for detecting network attacks is proposed. The main results are reduced to the construction of multi-class models that increase the efficiency of the attack detection system, and can be used to build systems for classifying network parameters during (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22. (1 other version)Detecting Epistemic Vice in Higher Education Policy: Epistemic Insensibility in the Seven Solutions and the REF.Heather Battaly - 2013 - Journal of Philosophy of Education 47 (2):263-280.
    This article argues that the Seven Solutions in the US, and the Research Excellence Framework in the UK, manifest the vice of epistemic insensibility. Section I provides an overview of Aristotle's analysis of moral vice in people. Section II applies Aristotle's analysis to epistemic vice, developing an account of epistemic insensibility. In so doing, it contributes a new epistemic vice to the field of virtue epistemology. Section III argues that the (US) Seven Breakthrough Solutions and, to a lesser extent, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  23.  17
    Stable Anatomy Detection in Multimodal Imaging Through Sparse Group Regularization: A Comparative Study of Iron Accumulation in the Aging Brain.Matthew Pietrosanu, Li Zhang, Peter Seres, Ahmed Elkady, Alan H. Wilman, Linglong Kong & Dana Cobzas - 2021 - Frontiers in Human Neuroscience 15.
    Multimodal neuroimaging provides a rich source of data for identifying brain regions associated with disease progression and aging. However, present studies still typically analyze modalities separately or aggregate voxel-wise measurements and analyses to the structural level, thus reducing statistical power. As a central example, previous works have used two quantitative MRI parameters—R2* and quantitative susceptibility —to study changes in iron associated with aging in healthy and multiple sclerosis subjects, but failed to simultaneously account for both. In this article, we propose (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  43
    Detecting bots with temporal logic.Mina Young Pedersen, Marija Slavkovik & Sonja Smets - 2023 - Synthese 202 (3):1-39.
    Social bots are computer programs that act like human users on social media platforms. Social bot detection is a rapidly growing field dominated by machine learning approaches. In this paper, we propose a complementary method to machine learning by exploring bot detection as a model checking problem. We introduce Temporal Network Logic (TNL) which we use to specify social networks where agents can post and follow each other. Using this logic, we formalize different types of social bot behavior (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  61
    Detection Model Based on Representation of Quantum Particles by Classical Random Fields: Born’s Rule and Beyond. [REVIEW]Andrei Khrennikov - 2009 - Foundations of Physics 39 (9):997-1022.
    Recently a new attempt to go beyond quantum mechanics (QM) was presented in the form of so called prequantum classical statistical field theory (PCSFT). Its main experimental prediction is violation of Born’s rule which provides only an approximative description of real probabilities. We expect that it will be possible to design numerous experiments demonstrating violation of Born’s rule. Moreover, recently the first experimental evidence of violation was found in the triple slit interference experiment, see Sinha, et al. (Foundations of Probability (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  26. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  59
    On the detection of emotional facial expressions: Are girls really better than boys?Vanessa LoBue, Judy S. DeLoache & Jacob Miguel Vigil - 2009 - Behavioral and Brain Sciences 32 (5):397.
    One facet of Vigil's socio-relational framework of expressive behaviors (SRFB) suggests that females are more sensitive to facial expressions than are males, and should detect facial expressions more quickly. A re-examination of recent research with children demonstrates that girls do detect various facial expressions more quickly than do boys. Although this provides support for SRFB, further examination of SRFB in children would lend important support this evolutionary-based theory.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  20
    Brain Vital Signs Detect Cognitive Improvements During Combined Physical Therapy and Neuromodulation in Rehabilitation From Severe Traumatic Brain Injury: A Case Report.Shaun D. Fickling, Trevor Greene, Debbie Greene, Zack Frehlick, Natasha Campbell, Tori Etheridge, Christopher J. Smith, Fabio Bollinger, Yuri Danilov, Rowena Rizzotti, Ashley C. Livingstone, Bimal Lakhani & Ryan C. N. D’Arcy - 2020 - Frontiers in Human Neuroscience 14:560042.
    Using a longitudinal case study design, we have tracked the recovery of motor function following severe traumatic brain injury (TBI) through a multimodal neuroimaging approach. In 2006, Canadian Soldier Captain (retired) Trevor Greene (TG) was attacked with an axe to the head while on tour in Afghanistan. TG continues intensive daily rehabilitation, which recently included the integration of physical therapy (PT) with neuromodulation using translingual neurostimulation (TLNS) to facilitate neuroplasticity. Recent findings with PT+TLNS demonstrated that recovery of motor function occurred (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. Responsible Innovation in Social Epistemic Systems: The P300 Memory Detection Test and the Legal Trial.John Danaher - forthcoming - In Van den Hoven (ed.), Responsible Innovation Volume II: Concepts, Approaches, Applications. Springer.
    Memory Detection Tests (MDTs) are a general class of psychophysiological tests that can be used to determine whether someone remembers a particular fact or datum. The P300 MDT is a type of MDT that relies on a presumed correlation between the presence of a detectable neural signal (the P300 “brainwave”) in a test subject, and the recognition of those facts in the subject’s mind. As such, the P300 MDT belongs to a class of brain-based forensic technologies which have proved (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  49
    Miserliness in human cognition: the interaction of detection, override and mindware.Keith E. Stanovich - 2018 - Thinking and Reasoning 24 (4):423-444.
    ABSTRACTHumans are cognitive misers because their basic tendency is to default to processing mechanisms of low computational expense. Such a tendency leads to suboptimal outcomes in certain types of hostile environments. The theoretical inferences made from correct and incorrect responding on heuristics and biases tasks have been overly simplified, however. The framework developed here traces the complexities inherent in these tasks by identifying five processing states that are possible in most heuristics and biases tasks. The framework also identifies (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   41 citations  
  31.  20
    Automated Multiclass Artifact Detection in Diffusion MRI Volumes via 3D Residual Squeeze-and-Excitation Convolutional Neural Networks.Nabil Ettehadi, Pratik Kashyap, Xuzhe Zhang, Yun Wang, David Semanek, Karan Desai, Jia Guo, Jonathan Posner & Andrew F. Laine - 2022 - Frontiers in Human Neuroscience 16.
    Diffusion MRI is widely used to investigate neuronal and structural development of brain. dMRI data is often contaminated with various types of artifacts. Hence, artifact type identification in dMRI volumes is an essential pre-processing step prior to carrying out any further analysis. Manual artifact identification amongst a large pool of dMRI data is a highly labor-intensive task. Previous attempts at automating this process are often limited to a binary classification of the dMRI volumes or focus on detecting a single type (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  14
    (1 other version)Mental State Detection Using Riemannian Geometry on Electroencephalogram Brain Signals.Selina C. Wriessnegger, Philipp Raggam, Kyriaki Kostoglou & Gernot R. Müller-Putz - 2021 - Frontiers in Human Neuroscience 15.
    The goal of this study was to implement a Riemannian geometry -based algorithm to detect high mental workload and mental fatigue using task-induced electroencephalogram signals. In order to elicit high MWL and MF, the participants performed a cognitively demanding task in the form of the letter n-back task. We analyzed the time-varying characteristics of the EEG band power features in the theta and alpha frequency band at different task conditions and cortical areas by employing a RG-based framework. MWL and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  15
    The Ethical Detective: Moral Philosophy and Detective Fiction.Rachel Haliburton - 2018 - Lexington Books.
    This book works within the neo-Aristotelian ethical framework to make the case that moral philosophers ought to see detective fiction as a source of ethical insight and as a tool to spark the moral imagination. It also critiques contemporary moral philosophy and proposes what autonomy might look like if understood in neo-Aristotelian terms.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  30
    Voice Activity Detection Algorithm Using Zero Frequency Filter Assisted Peaking Resonator and Empirical Mode Decomposition.R. Kumaraswamy, V. Kamakshi Prasad & M. S. Rudramurthy - 2013 - Journal of Intelligent Systems 22 (3):269-282.
    In this article, a new adaptive data-driven strategy for voice activity detection using empirical mode decomposition is proposed. Speech data are decomposed using an a posteriori, adaptive, data-driven EMD in the time domain to yield a set of physically meaningful intrinsic mode functions. Each IMF preserves the nonlinear and nonstationary property of the speech utterance. Among a set of IMFs, the IMF that contains source information dominantly called characteristic IMF can be identified and extracted by designing a zero-frequency filter-assisted (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  10
    Effective Human Oversight of AI-Based Systems: A Signal Detection Perspective on the Detection of Inaccurate and Unfair Outputs.Markus Langer, Kevin Baum & Nadine Schlicker - 2024 - Minds and Machines 35 (1):1-30.
    Legislation and ethical guidelines around the globe call for effective human oversight of AI-based systems in high-risk contexts – that is oversight that reliably reduces the risks otherwise associated with the use of AI-based systems. Such risks may relate to the imperfect accuracy of systems (e.g., inaccurate classifications) or to ethical concerns (e.g., unfairness of outputs). Given the significant role that human oversight is expected to play in the operation of AI-based systems, it is crucial to better understand the conditions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36. (1 other version)Models of recognition, repetition priming, and fluency: Exploring a new framework.Christopher J. Berry, David R. Shanks, Maarten Speekenbrink & Richard N. A. Henson - 2011 - Psychological Review 24.
    We present a new modeling framework for recognition memory and repetition priming based on signal detection theory. We use this framework to specify and test the predictions of 4 models: (a) a single-system (SS) model, in which one continuous memory signal drives recognition and priming; (b) a multiple-systems-1 (MS1) model, in which completely independent memory signals (such as explicit and implicit memory) drive recognition and priming; (c) a multiple-systems-2 (MS2) model, in which there are also 2 memory (...)
     
    Export citation  
     
    Bookmark   3 citations  
  37.  41
    Ethics of early detection of disease risk factors: A scoping review.Sammie N. G. Jansen, Bart A. Kamphorst, Bob C. Mulder, Irene van Kamp, Sandra Boekhold, Peter van den Hazel & Marcel F. Verweij - 2024 - BMC Medical Ethics 25 (1):1-16.
    Background Scientific and technological advancements in mapping and understanding the interrelated pathways through which biological and environmental exposures affect disease development create new possibilities for detecting disease risk factors. Early detection of such risk factors may help prevent disease onset or moderate the disease course, thereby decreasing associated disease burden, morbidity, and mortality. However, the ethical implications of screening for disease risk factors are unclear and the current literature provides a fragmented and case-by-case picture. Methods To identify key ethical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  20
    Computational frameworks for zoonotic disease control in Society 5.0: opportunities, challenges and future research directions. [REVIEW]Anil Kumar Bag & Diganta Sengupta - forthcoming - AI and Society:1-30.
    This study investigates the intersection of existing computational frameworks for zoonotic disease control within the emerging societal paradigm, Society 5.0. Technologies in human-centric computing can facilitate real-time data collection and analysis, enabling early detection and rapid response to zoonotic disease outbreaks, thereby enhancing surveillance and containment efforts for public health protection. It aims to explore challenges and opportunities within these frameworks and delineate future research directions to serve as a benchmark. Conducting a three-layered analysis, the study identifies high-level technologies, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  18
    An innovative framework for supporting content-based authorship identification and analysis in social media networks.José Gaviria de la Puerta, Iker Pastor-López, Alberto Tellaeche, Borja Sanz, Hugo Sanjurjo-González, Alfredo Cuzzocrea & Pablo G. Bringas - 2024 - Logic Journal of the IGPL 32 (4):589-604.
    Content-based authorship identification is an emerging research problem in online social media networks, due to a wide collection of issues ranging from security to privacy preservation, from radicalization to defamation detection, and so forth. Indeed, this research has attracted a relevant amount of attention from the research community during the past years. The general problem becomes harder when we consider the additional constraint of identifying the same false profile over different social media networks, under obvious considerations. Inspired by this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  18
    Towards enhanced monitoring framework with smart predictions.Antonello Calabrò, Said Daoudagh & Eda Marchetti - 2024 - Logic Journal of the IGPL 32 (2):321-333.
    Context: Predicting security and trust vulnerabilities and issues is crucial for IoT interconnected systems and ecosystems, especially when integrating new, third-party or open-source components. Objective: One way to ensure timely predictions is by using a smart monitoring framework to continuously verify functional and non-functional property violations during the executions of the systems and their components. Method: This paper presents a set of guidelines for the Smart Monitoring Framework definition and its application process. Results and Conclusion: The paper provides (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  19
    E-commerce Review System to Detect False Reviews.Manjur Kolhar - 2018 - Science and Engineering Ethics 24 (5):1577-1588.
    E-commerce sites have been doing profitable business since their induction in high-speed and secured networks. Moreover, they continue to influence consumers through various methods. One of the most effective methods is the e-commerce review rating system, in which consumers provide review ratings for the products used. However, almost all e-commerce review rating systems are unable to provide cumulative review ratings. Furthermore, review ratings are influenced by positive and negative malicious feedback ratings, collectively called false reviews. In this paper, we proposed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  24
    Policing Cultural Traffic: Charlie Chan and Hawai'i Detective Fiction.Konrad Gar-Yeu Ng - 2002 - Cultural Values 6 (3):309-316.
    This essay articulates one way to conduct a cultural intervention from the Asia/Pacific region that recognizes the cultural governance of “Other” traffics. I investigate the discursive framework of Charlie Chan and Hawai'i detective fiction to inform the ways in which nation-states police cultural difference and enact geo-cultural homogeneity. I contend that Charlie Chan acts as a narrative of containment by inscribing and transcribing those spaces, times and bodies that would otherwise disrupt the national field of America. In particular, the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  32
    USAD: An Intelligent System for Slang and Abusive Text Detection in PERSO-Arabic-Scripted Urdu.Nauman Ul Haq, Mohib Ullah, Rafiullah Khan, Arshad Ahmad, Ahmad Almogren, Bashir Hayat & Bushra Shafi - 2020 - Complexity 2020:1-7.
    The use of slang, abusive, and offensive language has become common practice on social media. Even though social media companies have censorship polices for slang, abusive, vulgar, and offensive language, due to limited resources and research in the automatic detection of abusive language mechanisms other than English, this condemnable act is still practiced. This study proposes USAD, a lexicon-based intelligent framework to detect abusive and slang words in Perso-Arabic-scripted Urdu Tweets. Furthermore, due to the nonavailability of the standard (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  23
    Towards a Framework for Acquisition and Analysis of Speeches to Identify Suspicious Contents through Machine Learning.Md Rashadur Rahman, Mohammad Shamsul Arefin, Md Billal Hossain, Mohammad Ashfak Habib & A. S. M. Kayes - 2020 - Complexity 2020:1-14.
    The most prominent form of human communication and interaction is speech. It plays an indispensable role for expressing emotions, motivating, guiding, and cheering. An ill-intentioned speech can mislead people, societies, and even a nation. A misguided speech can trigger social controversy and can result in violent activities. Every day, there are a lot of speeches being delivered around the world, which are quite impractical to inspect manually. In order to prevent any vicious action resulting from any misguided speech, the development (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  17
    An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system.Veer Sain Dixit & Akanksha Bansal Chopra - 2022 - Journal of Intelligent Systems 31 (1):1133-1149.
    Recommender system depends on the thoughts of numerous users to predict the favourites of potential consumers. RS is vulnerable to malicious information. Unsuitable products can be offered to the user by injecting a few unscrupulous “shilling” profiles like push and nuke attacks into the RS. Injection of these attacks results in the wrong recommendation for a product. The aim of this research is to develop a framework that can be widely utilized to make excellent recommendations for sales growth. This (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  14
    Influential Nodes in the OBOR Fossil Energy Trade Network Based on D-S Theory: Detection and Evolution Analysis.Cuixia Gao, Simin Tao, Kehu Li & Yuyang He - 2022 - Complexity 2022:1-16.
    The structure formed by fossil energy trade among countries can be divided into multiple subcommodity networks. However, the difference of coupling mode and transmission mechanism between layers of the multirelationship network will affect the measurement of node importance. In this paper, a framework of multisource information fusion by considering data uncertainty and the classical network centrality measures is build. Then, the evidential centrality indicator is proposed, by integrating Dempster–Shafer evidence theory and network theory, to empirically identify influential nodes of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  19
    Microscopy‐based assay for semi‐quantitative detection of SARS‐CoV‐2 specific antibodies in human sera.Constantin Pape, Roman Remme, Adrian Wolny, Sylvia Olberg, Steffen Wolf, Lorenzo Cerrone, Mirko Cortese, Severina Klaus, Bojana Lucic, Stephanie Ullrich, Maria Anders-Össwein, Stefanie Wolf, Berati Cerikan, Christopher J. Neufeldt, Markus Ganter, Paul Schnitzler, Uta Merle, Marina Lusic, Steeve Boulant, Megan Stanifer, Ralf Bartenschlager, Fred A. Hamprecht, Anna Kreshuk, Christian Tischer, Hans-Georg Kräusslich, Barbara Müller & Vibor Laketa - 2021 - Bioessays 43 (3):2000257.
    Emergence of the novel pathogenic coronavirus SARS‐CoV‐2 and its rapid pandemic spread presents challenges that demand immediate attention. Here, we describe the development of a semi‐quantitative high‐content microscopy‐based assay for detection of three major classes (IgG, IgA, and IgM) of SARS‐CoV‐2 specific antibodies in human samples. The possibility to detect antibodies against the entire viral proteome together with a robust semi‐automated image analysis workflow resulted in specific, sensitive and unbiased assay that complements the portfolio of SARS‐CoV‐2 serological assays. Sensitive, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  47
    The SOC framework and short-term memory.David J. Murray - 2002 - Behavioral and Brain Sciences 25 (3):347-348.
    Using a particular formula for quantifying the effortlessness that Perruchet & Vinter suggest accompanies the detection of repetition among a set of representations concurrently in consciousness, it is shown that both the Sternberg function and the Cavanagh function, associated with immediate probed recognition tasks and memory span tasks, can be predicted.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  49. A framework for the first‑person internal sensation of visual perception in mammals and a comparable circuitry for olfactory perception in Drosophila.Kunjumon Vadakkan - 2015 - Springerplus 4 (833):1-23.
    Perception is a first-person internal sensation induced within the nervous system at the time of arrival of sensory stimuli from objects in the environment. Lack of access to the first-person properties has limited viewing perception as an emergent property and it is currently being studied using third-person observed findings from various levels. One feasible approach to understand its mechanism is to build a hypothesis for the specific conditions and required circuit features of the nodal points where the mechanistic operation of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  20
    Cognitive Fitness Framework: Towards Assessing, Training and Augmenting Individual-Difference Factors Underpinning High-Performance Cognition.Eugene Aidman - 2020 - Frontiers in Human Neuroscience 13:497572.
    The aim of this article is to introduce the concept of Cognitive Fitness (CF), identify its key ingredients underpinning both real-time task performance and career longevity in high-risk occupations, and to canvas a holistic framework for their assessment, training, and augmentation. CF as a capacity to deploy neurocognitive resources, knowledge and skills to meet the demands of operational task performance, is likely to be multi-faceted and differentially malleable. A taxonomy of CF constructs derived from Cognitive Readiness (CR) and Mental (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 980