Results for 'detectable difference'

953 found
Order:
  1. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused attention (...)
    Download  
     
    Export citation  
     
    Bookmark   92 citations  
  2. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s prediction (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. The Undetectable Difference: An Experimental Look at the ‘Problem’ of p-Values.William M. Goodman - 2010 - Statistical Literacy Website/Papers: Www.Statlit.Org/Pdf/2010GoodmanASA.Pdf.
    In the face of continuing assumptions by many scientists and journal editors that p-values provide a gold standard for inference, counter warnings are published periodically. But the core problem is not with p-values, per se. A finding that “p-value is less than α” could merely signal that a critical value has been exceeded. The question is why, when estimating a parameter, we provide a range (a confidence interval), but when testing a hypothesis about a parameter (e.g. µ = x) we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  48
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  43
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Using Deep Learning to Detect the Quality of Lemons.Mohammed B. Karaja & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):97-104.
    Abstract: Lemons are an important fruit that have a wide range of uses and benefits, from culinary to health to household and beauty applications. Deep learning techniques have shown promising results in image classification tasks, including fruit quality detection. In this paper, we propose a convolutional neural network (CNN)-based approach for detecting the quality of lemons by analysing visual features such as colour and texture. The study aims to develop and train a deep learning model to classify lemons based on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  8.  43
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Ontology-based error detection in SNOMED-CT.Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Proceedings of Medinfo 2004:482-6.
    Quality assurance in large terminologies is a difficult issue. We present two algorithms that can help terminology developers and users to identify potential mistakes. We demon­strate the methodology by outlining the different types of mistakes that are found when the algorithms are applied to SNOMED-CT. On the basis of the results, we argue that both formal logical and linguistic tools should be used in the development and quality-assurance process of large terminologies.
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  10. Evidence and presumptions for analyzing and detecting misunderstandings.Fabrizio Macagno - 2018 - Pragmatics and Cognition 24 (2):263-296.
    The detection and analysis of misunderstandings are crucial aspects of discourse analysis, and presuppose a twofold investigation of their structure. First, misunderstandings need to be identified and, more importantly, justified. For this reason, a classification of the types and force of evidence of a misunderstanding is needed. Second, misunderstandings reveal differences in the interlocutors’ interpretations of an utterance, which can be examined by considering the presumptions that they use in their interpretation. This paper proposes a functional approach to misunderstandings grounded (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Can We Detect Bias in Political Fact-Checking? Evidence from a Spanish Case Study.David Teira, Alejandro Fernandez-Roldan, Carlos Elías & Carlos Santiago-Caballero - 2023 - Journalism Practice 10.
    Political fact-checkers evaluate the truthfulness of politicians’ claims. This paper contributes to an emerging scholarly debate on whether fact-checkers treat political parties differently in a systematic manner depending on their ideology (bias). We first examine the available approaches to analyze bias and then present a new approach in two steps. First, we propose a logistic regression model to analyze the outcomes of fact-checks and calculate how likely each political party will obtain a truth score. We test our model with a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. A Minimal Turing Test: Reciprocal Sensorimotor Contingencies for Interaction Detection.Pamela Barone, Manuel G. Bedia & Antoni Gomila - 2020 - Frontiers in Human Neuroscience 14:481235.
    In the classical Turing test, participants are challenged to tell whether they are interacting with another human being or with a machine. The way the interaction takes place is not direct, but a distant conversation through computer screen messages. Basic forms of interaction are face-to-face and embodied, context-dependent and based on the detection of reciprocal sensorimotor contingencies. Our idea is that interaction detection requires the integration of proprioceptive and interoceptive patterns with sensorimotor patterns, within quite short time lapses, so that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. No cross-cultural differences in the Gettier car case intuition: A replication study of Weinberg et al. 2001.Minsun Kim & Yuan Yuan - 2015 - Episteme 12 (3):355-361.
    In “Normativity and Epistemic Intuitions”, Weinberg, Nichols and Stich famously argue from empirical data that East Asians and Westerners have different intuitions about Gettier -style cases. We attempted to replicate their study about the Car case, but failed to detect a cross - cultural difference. Our study used the same methods and case taken verbatim, but sampled an East Asian population 2.5 times greater than NEI’s 23 participants. We found no evidence supporting the existence of cross - cultural (...) about the intuition concerning the Gettier car case. Taken together with the failures of both of the existing replication studies, our results provide strong evidence that the purported cross - cultural difference in Gettier intuitions does not exist. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  14. Detection and Mathematical Modeling of Anxiety Disorder Based on Socioeconomic Factors Using Machine Learning Techniques.Razan Ibrahim Alsuwailem & Surbhi Bhatia - 2022 - Human-Centric Computing and Information Sciences 12:52.
    The mental risk poses a high threat to the individuals, especially overseas demographic, including expatriates in comparison to the general Arab demographic. Since Arab countries are renowned for their multicultural environment with half of the population of students and faculties being international, this paper focuses on a comprehensive analysis of mental health problems such as depression, stress, anxiety, isolation, and other unfortunate conditions. The dataset is developed from a web-based survey. The detailed exploratory data analysis is conducted on the dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. A Garden of One's Own, or Why Are There No Great Lady Detectives?Shelby Moser & Michel-Antoine Xhignesse - 2023 - Feminist Philosophy Quarterly 9 (1):1-20.
    Although the character of the “lady detective”is a staple of the cozy mystery genre, we contend that there are no great lady detectives to rival Holmes or Poirot. This is not because there are no clever or interesting lady detective characters, but ratherbecause the concept of greatness is sociallyconstructed and, like coolness, depends on public acclaim and perception. We explore the mechanics of genre formation, arguing that the very structure of cozy mysteries precludes female greatness. To create a “great”character,theauthor cannot (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Mistakes in medical ontologies: Where do they come from and how can they be detected?Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Studies in Health and Technology Informatics 102:145-164.
    We present the details of a methodology for quality assurance in large medical terminologies and describe three algorithms that can help terminology developers and users to identify potential mistakes. The methodology is based in part on linguistic criteria and in part on logical and ontological principles governing sound classifications. We conclude by outlining the results of applying the methodology in the form of a taxonomy different types of errors and potential errors detected in SNOMED-CT.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  17.  28
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  22
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Hidden figures: epistemic costs and benefits of detecting (invisible) diversity in science.Uwe Peters - 2021 - European Journal for Philosophy of Science 11 (1):1-21.
    Demographic diversity might often be present in a group without group members noticing it. What are the epistemic effects if they do? Several philosophers and social scientists have recently argued that when individuals detect demographic diversity in their group, this can result in epistemic benefits even if that diversity doesn’t involve cognitive differences. Here I critically discuss research advocating this proposal, introduce a distinction between two types of detection of demographic diversity, and apply this distinction to the theorizing on diversity (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  21
    A Different Approach for Clique and Household Analysis in Synthetic Telecom Data Using Propositional Logic.Sandro Skansi, Kristina Šekrst & Marko Kardum - 2020 - In Marko Koričić (ed.), 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO). IEEE Explore. pp. 1286-1289.
    In this paper we propose an non-machine learning artificial intelligence (AI) based approach for telecom data analysis, with a special focus on clique detection. Clique detection can be used to identify households, which is a major challenge in telecom data analysis and predictive analytics. Our approach does not use any form of machine learning, but another type of algorithm: satisfiability for propositional logic. This is a neglected approach in modern AI, and we aim to demonstrate that for certain tasks, it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  38
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), sulfur (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Gender Differences in Response to a School-Based Mindfulness Training Intervention for Early Adolescents.Y. Kang, H. Rahrig, K. Eichel, H. F. Niles, Tomas Rocha, N. Lepp, J. Gold & W. B. Britton - 2018 - Journal of School Psychology 68:163-176.
    Mindfulness training has been used to improve emotional wellbeing in early adolescents. However, little is known about treatment outcome moderators, or individual differences that may differentially impact responses to treatment. The current study focused on gender as a potential moderator for affective outcomes in response to school-based mindfulness training. Sixth grade students (N = 100) were randomly assigned to either the six weeks of mindfulness meditation or the active control group as part of a history class curriculum. Participants in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Tracking Early Differences in Tetris Perfomance Using Eye Aspect Ratio Extracted Blinks.Gianluca Guglielmo, Michal Klincewicz, Elisabeth Huis in 'T. Veld & Pieter Spronck - 2023 - IEEE Transactions on Games 1:1-8.
    This study aimed to evaluate if eye blinks can be used to discriminate players with different performance in a session of Nintendo Entertainment System (NES) Tetris. To that end, we developed a state-of-the-art method for blink extraction from EAR measures, which is robust enough to be used with data collected by a low-grade webcam such as the ones widely available on laptop computers. Our results show a significant decrease in blink rate per minute (blinks/m) during the first minute of playing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Frequencies Dominations for Different Rating of Distribution Transformer under Transients.Haseeb Faisal, Dr Kashif Imdad, Najeeb Hussain & Faisal Sharif - 2020 - International Journal of Engineering Works 7 (04):211-216.
    Power transients faults on high voltage lines are prominently due to high frequency transients. These transients affect the predicted life and efficiency of equipment. The Fast Fourier Transform (FFT) is helpful in analysing the effect of high frequencies and Frequency Response Analysis (FRA) provide support in diagnosis and detection of deformation in a transformers. The major aim of this study is to analyse the incorporation of frequencies based on resonating core of a particular transformer. Using transfer function method an impedance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. 15 Deleuze's philosophical heritage: unity, difference, and onto-theology.Henry Somers-Hall - 2012 - In Daniel W. Smith & Henry Somers-Hall (eds.), The Cambridge companion to Deleuze. New York: Cambridge University Press.
    In this paper, I want to look at Deleuze’s philosophical heritage in two different senses. In the first part of the paper, I explore his relationship to perhaps the most influential philosopher of the twentieth century, Martin Heidegger. Heidegger plays a central role in Deleuze’s early philosophy, and even when in his later collaborations with Guattari their explicit references to Heidegger are dismissive, Heidegger’s influence can clearly be detected, particularly in their critiques of other philosophers. In the second part of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Omissive Overdetermination: Why the Act-Omission Distinction Makes a Difference for Causal Analysis.Yuval Abrams - 2022 - University of Western Australia Law Review 1 (49):57-86.
    Analyses of factual causation face perennial problems, including preemption, overdetermination, and omissions. Arguably, the thorniest, are cases of omissive overdetermination, involving two independent omissions, each sufficient for the harm, and neither, independently, making a difference. A famous example is Saunders, where pedestrian was hit by a driver of a rental car who never pressed on the (unbeknownst to the driver) defective (and, negligently, never inspected) brakes. Causal intuitions in such cases are messy, reflected in disagreement about which omission mattered. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Great Minds do not Think Alike: Philosophers’ Views Predicted by Reflection, Education, Personality, and Other Demographic Differences.Nick Byrd - 2023 - Review of Philosophy and Psychology 14 (Cultural Variation in Cognition):647-684.
    Prior research found correlations between reflection test performance and philosophical tendencies among laypeople. In two large studies (total N = 1299)—one pre-registered—many of these correlations were replicated in a sample that included both laypeople and philosophers. For example, reflection test performance predicted preferring atheism over theism and instrumental harm over harm avoidance on the trolley problem. However, most reflection-philosophy correlations were undetected when controlling for other factors such as numeracy, preferences for open-minded thinking, personality, philosophical training, age, and gender. Nonetheless, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. Hidden constraints in classical conclusions: loudness inferred from bounded Fechnerian integration will return initial stipulations about loudness-difference size only for linear loudness.Lance Nizami - 2020 - In Audio Engineering Society 149th Convention. New York, NY, USA: pp. 1-15.
    A major question in sensory science is how a sensation of magnitude F (such as loudness) depends upon a sensory stimulus of physical intensity I (such as a sound-pressure-wave of root-mean-square sound-pressure-level). An empirical just-noticeable sensation difference (∆F)_j at F_j specifies a just-noticeable intensity difference (∆I)_j at I_j. Classically, intensity differences accumulate from a stimulus-detection threshold I_th up to a desired intensity I. The corresponding sensation differences likewise accumulate up to F(I) from F(I_th ), the non-zero sensation (as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Sensation-growth equations for non-zero threshold sensation, evaluated using non-traditional, bounded Fechnerian integration, for Fechner’s Law and for Ekman’s Law, using 12 different Weber Fractions.Lance Nizami - 2020 - In InterNoise 2020. Seoul, South Korea: pp. 1-16.
    An ongoing mystery in sensory science is how sensation magnitude F(I), such as loudness, increases with increasing stimulus intensity I. No credible, direct experimental measures exist. Nonetheless, F(I) can be inferred algebraically. Differences in sensation have empirical (but non-quantifiable) minimum sizes called just-noticeable sensation differences, ∆F, which correspond to empirically-measurable just-noticeable intensity differences, ∆I. The ∆Is presumably cumulate from an empirical stimulus-detection threshold I_th up to the intensity of interest, I. Likewise, corresponding ∆Fs cumulate from the sensation at the stimulus-detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. On Normativity and Epistemic Intuitions: Failure of Replication.Hamid Seyedsayamdost - 2015 - Episteme 12 (1):95-116.
    In one of the earlier influential papers in the field of experimental philosophy titled Normativity and Epistemic Intuitions published in 2001, Jonathan M. Weinberg, Shaun Nichols and Stephen Stich reported that respondents answered Gettier type questions differently depending on their ethnic background as well as socioeconomic status. There is currently a debate going on, on the significance of the results of Weinberg et al. (2001) and its implications for philosophical methodology in general and epistemology in specific. Despite the debates, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   66 citations  
  32. (1 other version)The Reality of Achieving the Requirements of Total Quality Management in University Colleges.Abdalqader A. Msallam, Amal A. Al Hila, Samy S. Abu Naser & Mazen J. Al Shobaki - 2020 - International Journal of Academic Management Science Research (IJAMSR) 4 (8):67-90.
    The study aimed to identify the reality of total quality management in university colleges in Gaza Strip, through its dimensions, which are (commitment of senior management; organizational building; employee empowerment; continuous improvement; focus on beneficiaries; management by facts), and to detect differences in the responses of sample members according to For personal variables (type; educational qualification; college; nature of work; years of service). The researchers used the descriptive analytical method, and used a main tool to collect information: the questionnaire consisted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  43
    AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Controlling for performance capacity confounds in neuroimaging studies of conscious awareness.Jorge Morales, Jeffrey Chiang & Hakwan Lau - 2015 - Neuroscience of Consciousness 1:1-11.
    Studying the neural correlates of conscious awareness depends on a reliable comparison between activations associated with awareness and unawareness. One particularly difficult confound to remove is task performance capacity, i.e. the difference in performance between the conditions of interest. While ideally task performance capacity should be matched across different conditions, this is difficult to achieve experimentally. However, differences in performance could theoretically be corrected for mathematically. One such proposal is found in a recent paper by Lamy, Salti and Bar-Haim (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  35. Glocalization challenges and the contemporary architecture: systematic review of common global indicators in Aga Khan Award’s winners.Safa Salkhi Khasraghi & Asma Mehan - 2023 - Journal of Architecture and Urbanism 47 (2):135–145.
    Local reports from different international societies have considered the achievement of the successful Glocalized architecture model in line with the 2030 UN Sustainable Development Goals (SDGs). The Aga Khan Cultural Foundation’s International Program for Islamic Architecture has also prioritized the understanding of the success drivers in architectural projects. This study aimed to detect the potentials of the common global indicators to access qualitative design assessment through analyzing the Aga Khan Award’s reports. The selected methodology in the present study is a (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  36. Low attention impairs optimal incorporation of prior knowledge in perceptual decisions.Jorge Morales, Guillermo Solovey, Brian Maniscalco, Dobromir Rahnev, Floris P. de Lange & Hakwan Lau - 2015 - Attention, Perception, and Psychophysics 77 (6):2021-2036.
    When visual attention is directed away from a stimulus, neural processing is weak and strength and precision of sensory data decreases. From a computational perspective, in such situations observers should give more weight to prior expectations in order to behave optimally during a discrimination task. Here we test a signal detection theoretic model that counter-intuitively predicts subjects will do just the opposite in a discrimination task with two stimuli, one attended and one unattended: when subjects are probed to discriminate the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Argumentation profiles and the manipulation of common ground. The arguments of populist leaders on Twitter.Fabrizio Macagno - 2022 - Journal of Pragmatics 191:67-82.
    The detection of hate speech and fake news in political discourse is at the same time a crucial necessity for democratic societies and a challenge for several areas of study. However, most of the studies have focused on what is explicitly stated: false article information, language that expresses hatred, derogatory expressions. This paper argues that the explicit dimension of manipulation is only one – and the least problematic – of the risks of political discourse. The language of the unsaid is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Occam's Razor For Big Data?Birgitta Dresp-Langley - 2019 - Applied Sciences 3065 (9):1-28.
    Detecting quality in large unstructured datasets requires capacities far beyond the limits of human perception and communicability and, as a result, there is an emerging trend towards increasingly complex analytic solutions in data science to cope with this problem. This new trend towards analytic complexity represents a severe challenge for the principle of parsimony (Occam’s razor) in science. This review article combines insight from various domains such as physics, computational science, data engineering, and cognitive science to review the specific properties (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The Neural Substrates of Conscious Perception without Performance Confounds.Jorge Morales, Brian Odegaard & Brian Maniscalco - forthcoming - In Felipe De Brigard & Walter Sinnott-Armstrong (eds.), Anthology of Neuroscience and Philosophy.
    To find the neural substrates of consciousness, researchers compare subjects’ neural activity when they are aware of stimuli against neural activity when they are not aware. Ideally, to guarantee that the neural substrates of consciousness—and nothing but the neural substrates of consciousness—are isolated, the only difference between these two contrast conditions should be conscious awareness. Nevertheless, in practice, it is quite challenging to eliminate confounds and irrelevant differences between conscious and unconscious conditions. In particular, there is an often-neglected confound (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Spatial facilitation by color and luminance edges: boundary, surface, and attentional factors.Birgitta Dresp & Stephen Grossberg - 1995 - Vision Research 39 (20):3431-3443.
    The thresholds of human observers detecting line targets improve significantly when the targets are presented in a spatial context of collinear inducing stimuli. This phenomenon is referred to as spatial facilitation, and may reflect the output of long-range interactions between cortical feature detectors. Spatial facilitation has thus far been observed with luminance-defined, achromatic stimuli on achromatic backgrounds. This study compares spatial facilitation with line targets and collinear, edge-like inducers defined by luminance contrast to spatial facilitation with targets and inducers defined (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Moral hazards and solar radiation management: Evidence from a large-scale online experiment.Philipp Schoenegger & Kian Mintz-Woo - 2024 - Journal of Environmental Psychology 95:102288.
    Solar radiation management (SRM) may help to reduce the negative outcomes of climate change by minimising or reversing global warming. However, many express the worry that SRM may pose a moral hazard, i.e., that information about SRM may lead to a reduction in climate change mitigation efforts. In this paper, we report a large-scale preregistered, money-incentivised, online experiment with a representative US sample (N = 2284). We compare actual behaviour (donations to climate change charities and clicks on climate change petition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. CONTRACT CHEATING IN ISRAEL DURING THE COVID-19 PANDEMIC.Yovav Eshet - 2022 - European Conference on Academic Integrity and Plagiarism 2022.
    Academic integrity is an essential pillar of any educational system. It is defined as acting in a manner consistent with the values and accepted standards of ethical practices in teaching, learning, and scholarship (Fishman, 2015). Contract cheating, or ghostwriting, is currently one of the most severe violations of academic integrity. It involves students engaging a third party, usually an online essay writing service, to complete their academic works on their behalf (Draper et al., 2021). Some of these services offer pre-written (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. sLob dpon gyis bśad pa: Explanation by the Master The Teachings on Meditation of an Unknown Byaṅ-cub-klu-dbaṅ.Krishna Del Toso - 2016 - Annali di Ca’ Foscari. Serie Orientale 52:99-144.
    In the Dunhuang manuscript IOL Tib J 709, which is a collection of writings concerning meditation, we come across a short text attributed to a Tibetan master called Byaṅ-cub-klu-dbaṅ (allegedly eighth-ninth centuries CE). In his work, Byaṅ-cub-klu-dbaṅ exposes a method of meditation that seems to be strongly indebted to Indian Mahāyāna scriptural sources. Besides, also a Chinese Chan influence is here detectable. Therefore, the method of meditation taught by Byaṅ-cub-klu-dbaṅ seems to represent a commingling of different elements from different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Credit Score Classification Using Machine Learning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (5):1-10.
    Abstract: Ensuring the proactive detection of transaction risks is paramount for financial institutions, particularly in the context of managing credit scores. In this study, we compare different machine learning algorithms to effectively and efficiently. The algorithms used in this study were: MLogisticRegressionCV, ExtraTreeClassifier,LGBMClassifier,AdaBoostClassifier, GradientBoostingClassifier,Perceptron,RandomForestClassifier,KNeighborsClassifier,BaggingClassifier, DecisionTreeClassifier, CalibratedClassifierCV, LabelPropagation, Deep Learning. The dataset was collected from Kaggle depository. It consists of 164 rows and 8 columns. The best classifier with unbalanced dataset was the LogisticRegressionCV. The Accuracy 100.0%, precession 100.0%,Recall100.0% and the F1-score (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Photographic Evidence and the Problem of Theory-Ladenness.Nicola Mößner - 2013 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 44 (1):111–125.
    Scientists use visualisations of different kinds in a variety of ways in their scientific work. In the following article, we will take a closer look at the use of photographic pictures as scientific evidence. In accordance with Patrick Maynard’s thesis, photography will be regarded as a family of technologies serving different purposes in divergent contexts. One of these is its ability to detect certain phenomena. Nonetheless, with regard to the philosophical thesis of theory-ladenness of observation, we encounter certain reservations concerning (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. METODOLOGIA E MANEJO REPRODUTIVO APLICADO EM BOVINOS LEITEIROS.Bruna Cardoso Lemes, Gabriel Destefani de Souza, Jaqueline Aparecida Sousa Pereira, Jéssica Elizei Dande, Marcelo de Figueiredo Filiardi Filho, Vinícius de Moura Ribeiro Monticeli & Elizângela Guedes - 2022 - Revista Agroveterinária Do Sul de Minas 4 (1):153-172.
    Resumo: Sabe-se que a pecuária é uma parcela do agronegócio que move a economia do país, e incluso está a produção leiteira, que tem, a cada ano seu desenvolvimento elevado, de forma em que é priorizado a eficiência no aumento de sua produção, com o objetivo de suprir a demanda, e a maior rentabilidade do produtor. Diante disso, medidas de manejo reprodutivo e alimentar são adotadas, sendo estas capazes de elevar a produtividade com o menor custo possível. O trabalho objetivou (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Hollow Hunt for Harms.Jacob Stegenga - 2016 - Perspectives on Science 24 (5):481-504.
    Harms of medical interventions are systematically underestimated in clinical research. Numerous factors—conceptual, methodological, and social—contribute to this underestimation. I articulate the depth of such underestimation by describing these factors at the various stages of clinical research. Before any evidence is gathered, the ways harms are operationalized in clinical research contributes to their underestimation. Medical interventions are first tested in phase 1 ‘first in human’ trials, but evidence from these trials is rarely published, despite the fact that such trials provide the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  49. Does Perceptual Consciousness Overflow Cognitive Access? The Challenge from Probabilistic, Hierarchical Processes.Steven Gross & Jonathan Flombaum - 2017 - Mind and Language 32 (3):358-391.
    Does perceptual consciousness require cognitive access? Ned Block argues that it does not. Central to his case are visual memory experiments that employ post-stimulus cueing—in particular, Sperling's classic partial report studies, change-detection work by Lamme and colleagues, and a recent paper by Bronfman and colleagues that exploits our perception of ‘gist’ properties. We argue contra Block that these experiments do not support his claim. Our reinterpretations differ from previous critics' in challenging as well a longstanding and common view of visual (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  50. Seeing, sensing, and scrutinizing.Ronald A. Rensink - 2000 - Vision Research 40:1469-1487.
    Large changes in a scene often become difficult to notice if made during an eye movement, image flicker, movie cut, or other such disturbance. It is argued here that this _change blindness_ can serve as a useful tool to explore various aspects of vision. This argument centers around the proposal that focused attention is needed for the explicit perception of change. Given this, the study of change perception can provide a useful way to determine the nature of visual attention, and (...)
    Download  
     
    Export citation  
     
    Bookmark   67 citations  
1 — 50 / 953