To see the other types of publications on this topic, follow the link: False flags.

Journal articles on the topic 'False flags'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'False flags.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ye. Ivanov. "False Flags as a Method of Information Warfare." International Affairs 65, no. 003 (June 30, 2019): 119–32. http://dx.doi.org/10.21557/iaf.53883001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tran, N., E. Obligis, and F. Ferreira. "Comparison of Two Jason-1 Altimeter Precipitation Detection Algorithms with Rain Estimates from the TRMM Microwave Imager." Journal of Atmospheric and Oceanic Technology 22, no. 6 (June 1, 2005): 782–94. http://dx.doi.org/10.1175/jtech1742.1.

Full text
Abstract:
Abstract This paper evaluates and compares the ability of two different Jason-1 dual-frequency altimeter algorithms (referred as Tournadre’s and Quartly’s rain flags, respectively) to detect rain events in order to flag rain-contaminated altimeter range measurements. They are based on departures from a defined relationship between the Ku- and C-band radar cross sections observed in no-rain conditions. The algorithms’ performances were assessed via collocations of these dual-frequency-based estimates with rain rates and a rain–no-rain flag from the Tropical Rainfall Measuring Mission (TRMM) Microwave Imager (TMI). The Jason-1–TMI analysis is built upon a yes–no discrimination, which is helpful in providing good insight into the altimeter rain detection flags’ efficiency through estimations of the percentages of hits, misses, false alarms, and correct negatives when compared with TMI measurements. Tournadre’s rain flag, based on a combination of altimeter and radiometer data, gives the best match with TMI estimates, compared to Quartly’s, and also has a higher sensitivity to low-intensity rainfall.
APA, Harvard, Vancouver, ISO, and other styles
3

Fung, Benjamin. "Detecting Fraudulent Billing Frauds Under The Shell Company Schemes: From the Perspective of Hong Kong Auditors." Sumerianz Journal of Economics and Finance, no. 51 (February 17, 2022): 20–30. http://dx.doi.org/10.47752/sjef.51.20.30.

Full text
Abstract:
Asset misappropriation, which occurred in the vast majority of fraud schemes, involved stealing or misusing the company’s assets and resources by perpetrators through false invoicing and shell company schemes. False invoicing occurred when a perpetrator created a fictitious vendor for purchasing goods for the employer, used false invoices to make a claim for payment and diverted the fund to its own account. The main purpose of this study is to detect fraudulent billing frauds under the shell company schemes which pose significant risk to the organizations. Shell company operations mainly involve 1) a perpetrator created a shell company, which was only a fictitious name with P.O. Box address, added it to the current vendor master file to facilitate the company’s purchases and also used it to receive payment from false billings; and 2) the shell company was also used as an intermediary to assist the pass-through scheme wherein a legitimate vendor sold goods to this shell company which in turn resold goods to the victim organization with a certain percentage markup on price. Shell company and billing schemes did not receive much attention in prior audit literature and audit practices. This study aimed to investigate the level of effectiveness of red flags in detecting the fraudulent billing schemes from the perspective of auditors (inclusive both external and internal auditors) in Hong Kong and also to explore the effectiveness of fraud data analytics in detecting the billing schemes under the shell companies. For the assessment and perception of red flags for fraud detection, the study extracted a total of 15 red flags from Kassem’s framework and used questionnaire survey to examine the auditors’ responses to red flags in detecting fraudulent billings and release the resultant ranking. Sem-structured interviews were used to obtain data about the effective use of data analytics by auditors to detect fraudulent billings under the shells.
APA, Harvard, Vancouver, ISO, and other styles
4

Wilensky, Michael J., Bryna J. Hazelton, and Miguel F. Morales. "Exploring the consequences of chromatic data excision in 21-cm epoch of reionization power spectrum observations." Monthly Notices of the Royal Astronomical Society 510, no. 4 (November 27, 2021): 5023–34. http://dx.doi.org/10.1093/mnras/stab3456.

Full text
Abstract:
ABSTRACT We explore how chromatic radio frequency interference (RFI) flags affect 21-cm power spectrum measurements. We particularly study flags that are coarser than the analysis resolution. We find that such RFI flags produce excess power in the EoR window in much the same way as residual RFI. We use Fast Holographic Deconvolution (fhd) simulations to explain this as a result of chromatic disruptions in the interferometric sampling function of the array. We also use these simulations in conjunction with Error Propagated Power Spectrum with InterLeaved Observed Noise to show that without modifying current flagging strategies or implementing extremely accurate and complete foreground subtraction, 21-cm EoR experiments will fail to make a significant detection. As a mitigation strategy, we find that circumventing the chromatic structure altogether by flagging the entire analysis band when RFI is detected is simple to implement and highly successful. This demands a detection strategy with a low false-positive rate in order to prevent excessive data loss.
APA, Harvard, Vancouver, ISO, and other styles
5

Porter, Ethan, Thomas J. Wood, and David Kirby. "Sex Trafficking, Russian Infiltration, Birth Certificates, and Pedophilia: A Survey Experiment Correcting Fake News." Journal of Experimental Political Science 5, no. 2 (2018): 159–64. http://dx.doi.org/10.1017/xps.2017.32.

Full text
Abstract:
Following the 2016 U.S. election, researchers and policymakers have become intensely concerned about the dissemination of “fake news,” or false news stories in circulation (Lazer et al., 2017). Research indicates that fake news is shared widely and has a pro-Republican tilt (Allcott and Gentzkow, 2017). Facebook now flags dubious stories as disputed and tries to block fake news publishers (Mosseri, 2016). While the typical misstatements of politicians can be corrected (Nyhan et al., 2017), the sheer depth of fake news’s conspiracizing may preclude correction. Can fake news be corrected?
APA, Harvard, Vancouver, ISO, and other styles
6

Silva, Cintia Coelho da. "Ícones feministas e supostas ações libertárias." Ponto-e-Vírgula, no. 31 (March 24, 2023): e57933. http://dx.doi.org/10.23925/1982-4807.2022i31e57933.

Full text
Abstract:
O presente artigo aborda o movimento feminista sob uma ótica alternativa à habitual com o objetivo de desmistificar algumas ações supostamente libertárias realizadas por ou em nome de mulheres, sendo algumas dentre elas consideradas verdadeiros ícones do movimento. Para isso, buscou-se realizar uma investigação histórica sobre eventos relacionados à causa feminista e análise de peças publicitárias, por meio do método do Percurso Gerativo de Sentido de Greimas – resultando na constatação do uso de false flags, envolvimento da CIA, propaganda e outras ações mascaradas (cover-ups) por detrás do movimento.
APA, Harvard, Vancouver, ISO, and other styles
7

Amin, Moein, MaryAnn Mays, David Polston, Eoin P. Flanagan, Richard Prayson, and Amy Kunchok. "Myelin oligodendrocyte glycoprotein (MOG) antibodies in a patient with glioblastoma: Red flags for false positivity." Journal of Neuroimmunology 361 (December 2021): 577743. http://dx.doi.org/10.1016/j.jneuroim.2021.577743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Protić, Danijela. "Influence of pre-processing on anomaly-based intrusion detection." Vojnotehnicki glasnik 68, no. 3 (2020): 598–611. http://dx.doi.org/10.5937/vojtehg68-27319.

Full text
Abstract:
Introduction/purpose: The anomaly-based intrusion detection system detects intrusions based on a reference model which identifies the normal behavior of a computer network and flags an anomaly. Machine-learning models classify intrusions or misuse as either normal or anomaly. In complex computer networks, the number of training records is large, which makes the evaluation of the classifiers computationally expensive. Methods: A feature selection algorithm that reduces the dataset size is presented in this paper. Results: The experiments are conducted on the Kyoto 2006+ dataset and four classifier models: feedforward neural network, k-nearest neighbor, weighted k-nearest neighbor, and medium decision tree. The results show high accuracy of the models, as well as low false positive and false negative rates. Conclusion: The three-step pre-processing algorithm for feature selection and instance normalization resulted in improving performances of four binary classifiers and in decreasing processing time.
APA, Harvard, Vancouver, ISO, and other styles
9

Achimescu, Vlad, and Pavel Dimitrov Chachev. "Raising the Flag: Monitoring User Perceived Disinformation on Reddit." Information 12, no. 1 (December 22, 2020): 4. http://dx.doi.org/10.3390/info12010004.

Full text
Abstract:
The truth value of any new piece of information is not only investigated by media platforms, but also debated intensely on internet forums. Forum users are fighting back against misinformation, by informally flagging suspicious posts as false or misleading in their comments. We propose extracting posts informally flagged by Reddit users as a means to narrow down the list of potential instances of disinformation. To identify these flags, we built a dictionary enhanced with part of speech tags and dependency parsing to filter out specific phrases. Our rule-based approach performs similarly to machine learning models, but offers more transparency and interactivity. Posts matched by our technique are presented in a publicly accessible, daily updated, and customizable dashboard. This paper offers a descriptive analysis of which topics, venues, and time periods were linked to perceived misinformation in the first half of 2020, and compares user flagged sources with an external dataset of unreliable news websites. Using this method can help researchers understand how truth and falsehood are perceived in the subreddit communities, and to identify new false narratives before they spread through the larger population.
APA, Harvard, Vancouver, ISO, and other styles
10

Hopkinson, Natalie. "Fluorescent Flags: Black Power, Publicity, and Counternarratives in Go-Go Street Posters in the 1980s." Communication, Culture and Critique 13, no. 3 (May 23, 2020): 275–94. http://dx.doi.org/10.1093/ccc/tcz058.

Full text
Abstract:
Abstract This semiotic landscape analysis probes urban patterns of racial placement and displacement through an archive of music publicity posters. The music poster archive is a site to map the so-called “Chocolate City” of Washington, D.C., in the 1980s, explore its calendars, rhythms, textures, communication technology, history and movements of segregated black life. These posters advertising go-go music, the city's indigenous black popular music, asserted a territory of black economic, cultural and political power. They resisted the narrative of a sanitized “White City” designed for white tourists. The city's cultural entrepreneurs challenged false dominant narratives and public policies that marginalized black urban culture as dangerous and deviant. A crack-down on postering in the late 1990s was an early harbinger of gentrification.
APA, Harvard, Vancouver, ISO, and other styles
11

Calvaresi, Emilia, Sara Wyness, Alexandria Jackson, Jon Genzen, and Kamisha Johnson-Davis. "Assessing Propylene Glycol Interference at Concentrations Relevant to Serum Levels With Electronic Cigarette Use in an Enzymatic Ethylene Glycol Assay." American Journal of Clinical Pathology 152, Supplement_1 (September 11, 2019): S26—S27. http://dx.doi.org/10.1093/ajcp/aqz112.051.

Full text
Abstract:
Abstract Introduction Clinical laboratory measurement of ethylene glycol (ETG) by enzymatic methods is known to be subject to interference with high (several hundred milligrams/deciliter) concentrations of propylene glycol (PG). An estimated 10.8 million people in the United States, or almost 1 in 20 Americans, are reported to use electronic cigarettes (e-cigarettes; ie, “vaping”), in which PG is frequently used as a liquid solvent. No published reports exist investigating whether serum concentrations of PG that may be seen with e-cigarette use (generally, concentrations of 10-15 mg/dL in moderate users and up to 30 mg/dL in heavy users) can lead to either interference flags in analytical ETG measurement or falsely positive ethylene glycol concentrations being reported. Methods Studies were conducted to assess PG interference on enzymatic ETG measurement. Commercially acquired human AB serum (catalog # 35-060-CI; Corning Life Sciences) was spiked with various amounts of PG (catalog #158720010; Acros Organics/Thermo Fisher Scientific) to achieve both concentrations of PG expected with e-cigarette use (0-30 mg/dL) and supra-physiological concentrations (>30 mg/dL) for comparative purposes. PG-spiked sera were tested using a quantitative enzymatic ETG assay (Quantitative Ethylene Glycol kit, catalog #C504-0A; Catachem) previously validated as a laboratory-developed test on an AU5810 automated chemistry analyzer (Beckman Coulter). Results None of the tested PG concentrations designed to mimic physiological levels expected with e-cigarette use (0, 5, 10, 15, 20, 25, and 30 mg/dL) caused falsely positive quantitative ETG results, defined as values above the ETG limit of quantitation (LOQ) of 5 mg/dL. At these low concentrations, interference patterns neither were observed in reaction monitors, nor were instrument interference error flags triggered. As concentrations of PG approached 50 mg/dL, abnormal curve appearances were observed in the instrument reaction monitor, although this neither resulted in interference error flags nor false detection of ETG. However, as PG concentrations approached and exceeded ≥100 mg/dL, both interference flags and falsely positive ETG results were observed. Conclusion Results from the present experiments demonstrate that serum concentrations of PG expected with e-cigarette use did not cause interference with enzymatic ethylene glycol detection in this assay.
APA, Harvard, Vancouver, ISO, and other styles
12

Capel-Casbas, Maria J., Jose J. Duran, Dolores Naranjo, Isabel Pastor, Rosalia Berlanga, Maria J. Masset, Josep Piqueras, and Nuria Pujol-Moix. "How To Optimize the Detection of the Left Shift with the Instrument COULTER LH750®." Blood 106, no. 11 (November 16, 2005): 3857. http://dx.doi.org/10.1182/blood.v106.11.3857.3857.

Full text
Abstract:
Abstract The Coulter LH750® is a last generation automated hematology analyzer. In 1999 we evaluated the optimization of immature granulocytes/bands (IG/B) detection in the Coulter GEN*S (Blood Vol.94 n° 10 sup.1, 1999 page 45 b), in which we observed that the Mean Volume of the Neutrophil population (M NE V) and the standard deviation of the neutrophil volume (SD NE V) were the most useful parameters to improve the detection of the presence of IG/B. Recently the utility of SD NE V has been proposed in the diagnosis of septic patients.(ISLH 05). The purpose of this study is to confirm that the NE morphometric parameters in the LH750 have the same values and cut-off as the GEN*S to discriminate the cases with lefts shift and if it is possible to create rules/flags that use these parameters to allow the automated detection of IG/B with cut-off levels specific to the origin (emergency room, outpatients, intensive care etc.) of the patient sample. In addition we investigated if the parameters are useful when taking into account not only the % of IG/B, but also their absolute number as recommended by the NCCLS. The overall intent being to optimize the efficiency of our laboratory in the detection of IG/B by decreasing the number of smears, but without increasing the number of false negatives. We have selected from the routine samples of a 2000 beds hospital, 340 consecutive cases on the LH750® that triggered the bands /Immature granulocytes flags, Immature NE 1 (NE1) or Immature NE 2 (NE2). We considered the samples with more than 0,9 IG/B (103/mL) as positive. Blood smears were performed on all the positive samples (340) and a WBC differential was performed according the NCCLS protocol (H 20A). The percentage and absolute number of IG/B were collected. The statistical analysis was performed using Medcalc® version 8.1.0.0. A ROC Curve and the cut-off for the detection of positive samples with immature IG/B using the SD NE V and M NE V was calculated. RESULTS: For the flag NE1 the best parameter to select the postive cases with left shift was the SD NE V with a cut-off of >24,2. (although this flag is actually defined for a moderate left shift). For the flag NE2 the best parameter to select the postive cases with left shift was the M NE V with a cut-off of > 161. CONCLUSION: Before the study performed in 1999 we validated the Imm NE1 and Imm NE2 flags according to the NE% and NE# or the WBC values, that statistically demonstrated limited utility. Parameters which permitted to optimize the detection of IG/B, were the Neutrophile morphological parameters; M NE V and SD NE V. The values of the LH 750 are slightly different to those of the GEN*S. We will subsequently study their utility and advantages compared to the IG/B counting in the detection of bacterial infections and sepsis due to better reproducibility.
APA, Harvard, Vancouver, ISO, and other styles
13

Kim, Kyoungmin, Youngsup Shin, Justin Lee, and Kyungho Lee. "Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator." Sensors 21, no. 19 (September 29, 2021): 6522. http://dx.doi.org/10.3390/s21196522.

Full text
Abstract:
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or sensitive data (i.e., login credentials). Consequently, various APT groups have focused on exploiting these vulnerabilities. Past studies have proposed automated classification and detection methods, while few studies have covered the cyber attribution. Our study introduces an automated system that focuses on cyber attribution. Adopting MITRE’s ATT&CK for mobile, we performed our study using the tactic, technique, and procedures (TTPs). By comparing the indicator of compromise (IoC), we were able to help reduce the false flags during our experiment. Moreover, we examined 12 threat actors and 120 malware using the automated method for detecting cyber attribution.
APA, Harvard, Vancouver, ISO, and other styles
14

Tarjo, Tarjo, Alexander Anggono, Prasetyono Prasetyono, Rita Yuliana, and Eklamsia Sakti. "Association between fraudulent financial reporting, readability of annual reports, and abusive earnings management: A case of Indonesia." Investment Management and Financial Innovations 19, no. 1 (April 5, 2022): 370–78. http://dx.doi.org/10.21511/imfi.19(1).2022.29.

Full text
Abstract:
In practice, auditors sometimes have a hard time detecting false financial statements since they only look at the figures on the financial statements. Consequently, they ignore the red flags in the annual reports’ wording. This study aims to analyze how the level of readability of annual reports and abusive earnings management affects fraudulent financial reporting. A total of 240 annual reports from publicly traded industrial businesses were used. The paper used data from the Indonesia Stock Exchange (IDX) and each sampled companies’ official website. A multiple linear regression analysis was used to test the hypotheses. Falsified financial statements are the dependent variable, while annual report readability and abusive earnings management are independent variables. The Dechow F-Score is used to assess whether financial statements are false. The annual report’s readability is assessed using the Flesch Reading Ease, Length, Flesch-Kincaid, and Lasbarhets Indexes. Finally, accrual discretionary and real earnings management are used to uncover earnings management misuse. According to the findings, dishonest earnings management has a significant influence on financial statement fraud. Moreover, abusive earnings management can aid in the detection of falsified financial statements. AcknowledgmentsRector Universitas Trunojoyo Madura supported this paper under Grant Number 2285/UN46.3.1/PN/2019. Any and all views, results, conclusions, or recommendations stated in this material are solely those of the author(s) and do not necessarily reflect those of Universitas Trunojoyo Madura. The authors would like to express their gratitude to the Rector of Universitas Trunojoyo Madura for his efforts and cooperation in conducting this investigation.
APA, Harvard, Vancouver, ISO, and other styles
15

Briggs, Carol, Ian Longair, Punamar Kumar, Deepak Singh, and Samuel J. Machin. "Performance evaluation of the Sysmex haematology XN modular system." Journal of Clinical Pathology 65, no. 11 (July 31, 2012): 1024–30. http://dx.doi.org/10.1136/jclinpath-2012-200930.

Full text
Abstract:
BackgroundThe Sysmex XN haematology instrument performs automatic reflex testing, depending on sample results. A nucleated red blood cell (NRBC) count is provided on all samples. The instrument has a smaller footprint (34%) than previous Sysmex XE analysers.MethodsAn evaluation comparing all results to the Sysmex XE-2100 and manual microscopic differential and morphology (n=390) was performed followed by a workflow study of 1000 samples to compare speed of operation and number of blood films reviews required from both systems.ResultsThe new features on the instrument are: (1) white cell and NRBC channel, all samples include the NRBC count; (2) white cell precursor channel: false positive flags for blasts, abnormal lymphocytes and atypical lymphocytes are reduced significantly without a statistical increase of false negatives; (3) low white cell count mode: suggested setting of <0.5×109/l. An extended count is more precise and provides an accurate differential. Fluorescent platelet count is performed in a dedicated channel. If the red cell or platelet size histograms are abnormal or if the platelet count is low, then a fluorescent platelet count is automatically performed. Good correlation with the XE-2100 and manual differential was found and the improved results compared to the reference flow cytometric analysis for platelet counts, especially below 30×109/l (XE-2100, R2=0.500; XN, R2=0.875).ConclusionThe XN showed reduced sample turnaround time of 10% and reduced number of blood films for examination, 49% less than the XE-2100 without loss of sensitivity with more precise and accurate results on low cell counts.
APA, Harvard, Vancouver, ISO, and other styles
16

Henry, Azriel, Sunil Gautam, Samrat Khanna, Khaled Rabie, Thokozani Shongwe, Pronaya Bhattacharya, Bhisham Sharma, and Subrata Chowdhury. "Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System." Sensors 23, no. 2 (January 12, 2023): 890. http://dx.doi.org/10.3390/s23020890.

Full text
Abstract:
Recently, with the massive growth of IoT devices, the attack surfaces have also intensified. Thus, cybersecurity has become a critical component to protect organizational boundaries. In networks, Intrusion Detection Systems (IDSs) are employed to raise critical flags during network management. One aspect is malicious traffic identification, where zero-day attack detection is a critical problem of study. Current approaches are aligned towards deep learning (DL) methods for IDSs, but the success of the DL mechanism depends on the feature learning process, which is an open challenge. Thus, in this paper, the authors propose a technique which combines both CNN, and GRU, where different CNN–GRU combination sequences are presented to optimize the network parameters. In the simulation, the authors used the CICIDS-2017 benchmark dataset and used metrics such as precision, recall, False Positive Rate (FPR), True Positive Rate (TRP), and other aligned metrics. The results suggest a significant improvement, where many network attacks are detected with an accuracy of 98.73%, and an FPR rate of 0.075. We also performed a comparative analysis with other existing techniques, and the obtained results indicate the efficacy of the proposed IDS scheme in real cybersecurity setups.
APA, Harvard, Vancouver, ISO, and other styles
17

Nagendrababu NC, Samyama Gunjal GH, and Himabindhu N. "Advance persistent threat prediction using knowledge graph." International Journal of Science and Technology Research Archive 6, no. 2 (May 30, 2024): 071–82. http://dx.doi.org/10.53771/ijstra.2024.6.2.0047.

Full text
Abstract:
Advanced persistent threats (APTs) are a major threat to cybersecurity, and they are typically attributed to nation-state actors or well-organized groups with sophisticated capabilities. This knowledge graph is intended to help you understand and attribute APT organizations by providing a framework for understanding their characteristics, attributing challenges, attributing clues, attributing methodologies, and attributing limitations. By understanding APT organizations and attributing challenges, clues, methodologies, and attribution limitations, you can gain valuable insights and methods for unraveling the mystery surrounding APT organizations. The graph highlights the difficulties and intricacies associated with attribution, such as false flags, use of proxies, cooperation between APTs and the evolving tactics employed by threat actors. State- sponsored attribution is based on government statements or intelligence agency reports; private sector attribution is based on cybersecurity firms’ reports or threat intelligence sharing; and academia and independent research is based on academic and non-academic sources. The graph serves as a resource for cybersecurity professionals, analysts and researchers looking for a systematic framework to improve their understanding and ability to attribute cyberattacks to attack actors. It offers in-depth analysis and practical advice to navigate the complex landscape of APP attribution in today’s rapidly changing cybersecurity landscape.
APA, Harvard, Vancouver, ISO, and other styles
18

Broome, H. Elizabeth, Han-Inge Bengtsson, Laura Stephens, and Lisa Palm. "Minimal Hematology Analyzer Plus Blood Smear Digital Imaging/ Analysis Provides Better Clinical Hematology Results Than a Complex Hematology Analyzer Alone." Blood 128, no. 22 (December 2, 2016): 4731. http://dx.doi.org/10.1182/blood.v128.22.4731.4731.

Full text
Abstract:
Abstract Introduction: Devices such as the CellaVision® DM96 (CellaVision AB, Lund, Sweden) locate and image nucleated cells on blood smears. Using image recognition software, the DM96 also pre-classifies those cells into differential categories similar to the most complex hematology analyzers. We compared the cell counts, differential counts and flagging information gained from a complex hematology analyzer, the XE5000 (Sysmex, Kobe, Japan), with information from a minimal hematology analyzer (Sysmex PocHi) plus the DM96. We found that the cell counts, differential and flagging capabilities are similar, but the PocHi plus DM96 advantages include allowing remote review of the blood smear. Methods: 210 blood samples, selected for various abnormalities, had complete blood counts with automated differentials produced by a Sysmex XE5000 hematology analyzer. These results were compared with cell counts from the Sysmex PocHi hematology analyzer, their 100-cell DM96 post reclassification differentials, and with DM96 pre-classification differentials using standard regression analyses and Rumke 95% confidence intervals (CI) as calculated using the Clopper-Pearson method. Flagging by the XE5000 for immature granulocytes (IG's) and for blasts/abnormal cells was compared to the DM96 pre-classification using truth tables with the DM96 post reclassification as the gold standard. The following translations were used to compare flagging: IG's > 2 for either post reclassification DM96 differential, XE5000 or the DM96 pre-classification differential; Any blast cells on the manual differential were compared to XE5000 flags WBC Abn Scg; NRBC Abn Scg; Blasts?; Atyp LY?; Abn Ly/ L_Bl? and to DM96 pre-classification % Blasts > 0%; unidentified cells >3%. . Results: Non-differential blood count parameters including white blood count, red blood count, hemoglobin, mean corpuscular volume (MCV), and platelet count showed excellent correlation between the PocHi and the XE5000 with R2>0.95. Differential-dependent blood count parameters including neutrophils, lymphocytes, monocytes, eosinophils, basophils and immature granulocytes showed excellent correlation between the XE5000 and pre-classification DM96 with R2>0.95. Nucleated red cells also showed excellent correlation between the XE5000 and the DM96 with R2>0.85. For blasts/abnormal cells, the DM96 showed 100% sensitivity and 40% specificity with 0% false negatives. The XE5000 showed 93% sensitivity and 19% specificity with 3% false negative. Two of the false negatives were shared by both instruments and were 1% blasts. Of the three false negatives with the XE5000 that were true positives with the DM96, two had 1% blasts while one had 2% blasts. For immature granulocytes (IG's), the XE5000 showed 94% sensitivity and 79% specificity with 2% false negatives. The DM96 showed 85% sensitivity and 95% specificity with 4% false negatives. All of the false negatives were for IG's < 5% Conclusions: Pairing the DM96 or a similar imaging instrument with a relatively inexpensive hematology analyzer, such as those commonly used in physician office laboratories, would provide all of the information available from expensive, complex hematology analyzers in high throughput laboratories AND allow remote review of the blood smear findings by experts. Disclosures Broome: CellaVision: Consultancy, Research Funding. Bengtsson:CellaVision AB: Employment, Equity Ownership. Palm:CellaVision: Employment, Equity Ownership.
APA, Harvard, Vancouver, ISO, and other styles
19

Wagner, Jason Paul, and Douglas J. Wulf. "Understanding Written Corrective Feedback in Second-Language Grammar Acquisition." Journal of Education and Learning 5, no. 4 (October 25, 2016): 259. http://dx.doi.org/10.5539/jel.v5n4p259.

Full text
Abstract:
<p>Written Corrective Feedback (WCF) is used extensively in second-language (L2) writing classrooms despite controversy over its effectiveness. This study examines indirect WCF, an instructional procedure that flags L2 students’ errors with editing symbols that guide their corrections. WCF practitioners assume that this guidance will lead to increased grammatical competence over time in new writing samples. This study finds that these assumptions are correct overall. However, in-depth analyses of L2-English learners’ correction behaviors in four elicitation tasks over a 12-week period demonstrate that WCF is not uniformly effective at increasing accuracy for all grammatical constructions. In fact, WCF fails to exert any positive effect with a number of grammatical constructions. This result can be understood via Skill Acquisition Theory (SAT) when the treatability of constructions with WCF is considered. Specifically, grammatical constructions that include only a binary option for correct usage are highly amenable to positive change via WCF since employing WCF is akin to correcting errors flagged on a true/false test. By contrast, grammatical constructions with more than a binary choice for correct usage, akin to correcting errors flagged on a multiple-choice test, are not amenable to positive change.</p>
APA, Harvard, Vancouver, ISO, and other styles
20

Kızıl, Cevdet, Erol Muzır, and Vildan Yılmaz. "Auditing Techniques to Minimize Accounting Related Fraud and Errors: A Qualitative Analysis with the Interview Method." EMAJ: Emerging Markets Journal 11, no. 1 (September 8, 2021): 95–103. http://dx.doi.org/10.5195/emaj.2021.232.

Full text
Abstract:
Accounting is more integrated with the technology today compared to the previous years. The increase in a variety of technological developments and commercial transactions has further increased the number and type of errors as well as frauds related to the accounting profession. This causes misleading information for several stakeholders. Stakeholdes sometimes make false decisions based on the financial statements created as a result of false and fraudulent transactions. In order to minimize the errors and frauds concerning the accounting system of enterprises, effective internal controls and auditing systems should be in order. It is evident that, setting up the required internal controls and auditing systems reduce asset losses and provide great benefits in the long run for firms. Existence of strong internal controls and auditing systems in enterprises has gained great importance in Turkey. This study provides information about the audit techniques that can minimize accounting related frauds and errors in businesses. The research includes and employs an interview with auditing professionals as the research methodology. Auditors working within three audit firms were selected by simple random sampling via the LinkedIn social media. The three participants were directed 10 semi- structured and open-ended questions. Qualitative analysis was adopted for this study. According to the results of research, companies use a number of tools to prevent accounting related frauds and errors. These most effective tools to minimize the frauds and errors are detected as internal auditing, internal controls and independent (external) auditing. Auditing professionals have high awareness about accounting related fraud and errors. But, auditor independency should be higher, proactive approach must be utilized and auditors must closely follow the new laws and regulations in addition to being familiar with the firms’s operations and sectors to minimize the fraud and errors. The Benford's law, artificial neural networks, analytical methods, data mining, red flags and analytical methods are commonly used by the auditors against frauds and errors. In general, the internal controls and auditing professions are in a much better situation today in Turkey compared to the previous years. But, this is still not adequate and there is a long way to complete ahead based on the opinions of auditing professionals.
APA, Harvard, Vancouver, ISO, and other styles
21

Mamatov, Gleb. "A Violin Symbolic in B. Poplavsky’s Poetry." Izvestia of Smolensk State University, no. 2(58) (July 3, 2022): 34–45. http://dx.doi.org/10.35785/2072-9464-2022-58-2-34-45.

Full text
Abstract:
The article is devoted to the research of violin symbolic in Boris Poplav- sky’s poetry. We consider connections of this image with musical philosophy of the poet of Russian Montparnasse, with the poetry of his predecessors (O. Man- delstam, A. Blok) and with constant literary cultural connotations, associated with the image of the violin. Symbolic of this musical instrument is multifaceted and difficult in Pop- lavsky’s literary work. This is due to the poet’s spiritual search. It has ambivalent meanings that is clear in his book of verses «Flags», when a violin appears as a carrier of magic and beauty dead in cold and horrible world, which doesn’t un- derstand beauty of the real art and rejects it («Dark Madonna»), and as «False Fiddlestick», which has dissonance music, connected with the theme of Death and eschatological motives («Rose of Death»). The violin also appears in poems dedicated to the poet’s important theme of art, music and the crowd, where it is associated with the theme of aggression and crime. The stringed instrument has become a predator causing pain and suf- fering in the world around it, which does not include music. Another development in the plot showing the struggle between art and reality is the disappearance of disastrous musical instruments that should create one magical sound. Their mis- sion is heroic, they must give the world the miracle of music, but the tragedy is that this reality cannot accept this magic
APA, Harvard, Vancouver, ISO, and other styles
22

Winarso, Gathot, and Joji Ishizaka. "VALIDATION OF COCHLODINIUM POLYKRIKOIDES RED TIDE DETECTION USING SEAWIFS-DERIVED CHLOROPHYLL-A DATA WITH NFRDI RED TIDE MAP IN SOUTH EAST KOREAN WATERS." International Journal of Remote Sensing and Earth Sciences (IJReSES) 14, no. 1 (June 21, 2017): 19. http://dx.doi.org/10.30536/j.ijreses.2017.v14.a2627.

Full text
Abstract:
Annual summer red tides of Cochlodinium polykrikoides have happenned at southern coastal of the South Korea, accounted economic losses of 76.4 billion won in 1995 on fisheries and other economic substantial losses. Therefore, it is important to eliminate the damage and losses by monitoring the bloom and to forecast their development and movement. On previous study, ocean color satellite, SeaWiFS, standard chlorophyll-a data was used to detect the red tide, using threshold value of chlorophyll-a concentration ≥ 5 mg/m3, resulted a good correlation using visual comparison. However, statistic based accuracy analysis has not be done yet. In this study, the accuracy of detection method was analyzed using spatial statistic. Spatial statistical match up analysis resulted 68% of red tide area was not presented in satellite data due to masking. Within red tide area where data existed, 36% was in high chlorophyll-a area and 64% was in low chlorophyll-a area. Within the high chlorophyll-a area 13% and 87% was in and out of the red tide area. It was found that the accuracy of this detection is low. However if the accuracy was yearly splitted, its found that 75% accuracy on 2002 where visually red tide detected spead out to the off-shore area. The fail and false detection are not due to the failure of the detection method but caused by limitation of the technology due to the natural condition i.e. type of red tide spreading, cloud cover and other flags such as turbid water, stray light etc.
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Ping, Chuanwei Ban, Juan Wang, Qian Zeng, Mengmeng Chen, Ling Wang, and Xin Lv. "Enhancing clinical decision-making: Sysmex UF-5000 as a screening tool for bacterial urinary tract infection in children." PLOS ONE 19, no. 6 (June 12, 2024): e0304286. http://dx.doi.org/10.1371/journal.pone.0304286.

Full text
Abstract:
Background A rapid screening test for urinary tract infections (UTIs) in children is needed to avoid unnecessary cultures and provide prompt reports to make appropriate clinical decisions. We have evaluated for the first time the performance of the Sysmex UF-5000 flow cytometer as a screening tool for UTIs in children. Methods This study included 4445 pediatric patients, with urinary sediment and urine culture data collected from January 2020 to September 2023. The Sysmex UF-5000 analyzer was utilized to measure urine white blood cell (WBC) and bacteria (BACT), with the findings being compared to the culture results. Results At ≥ 104 colony-forming unit (CFU)/mL, 513 samples were culture-positive (400 samples presented 104–105 CFU/mL, and 113 demonstrated ≥ 105 CFU/mL bacterial growth). Optimal indicators for positive cultures were BACT counts of 92.2/μL (AUC: 0.944) and WBC counts of 40.8/μL (AUC:0.863). False negative rate were 0.9% when using a 7.8 bacteria/μL cut-off and avoiding unnecessary cultures in 28.1%. The UF-5000 has a higher consistency rate for Gram-negative (GN) bacteria (90.3%) than Gram-positive (GP) bacteria (86.8%). For samples with 105 CFU/mL, UF-5000’s Bacteria -Information flags showed superior concordance for samples with 104−105 CFU/mL bacteria. Conclusions Screening pediatric urine cultures with the UF-5000 showed potential application value in identifying negative cultures and significant bacterial growth, although performance may vary depending on the study population. Furthermore, detecting Gram typing aids in guiding early clinical empirical medication, particularly for UTIs caused by GN bacteria.
APA, Harvard, Vancouver, ISO, and other styles
24

McLain, R. F. "Serious pathology in people presenting to primary care with acute low back pain is rare (0.9%), but high false-positive rates for some 'red flags' may limit their diagnostic value." Evidence-Based Medicine 15, no. 2 (April 1, 2010): 61–62. http://dx.doi.org/10.1136/ebm1040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Li, Ye Guo, Jiang Han, Jing Jin, Cuiling Zheng, Junxia Yang, Jia Xu, et al. "Establishment of the intelligent verification criteria for a routine urinalysis analyzer in a multi-center study." Clinical Chemistry and Laboratory Medicine (CCLM) 57, no. 12 (November 26, 2019): 1923–32. http://dx.doi.org/10.1515/cclm-2019-0344.

Full text
Abstract:
Abstract Background Although laboratory information system (LIS) is widely used nowadays, the results of routine urinalysis still need 100% manual verification. We established intelligent verification criteria to perform the automated verification process and reduce manual labor. Methods A total of 4610 urine specimens were obtained from the patients of three hospitals in Beijing, China. Firstly, 895 specimens were measured to establish the reference intervals of formed-element parameters in UF5000. Secondly, 2803 specimens were analyzed for setting up the intelligent verification criteria (including the microscopic review rules and manual verification rules). Lastly, 912 specimens were used to verify the efficacy and accuracy of the intelligent verification criteria. Phase-contrast microscopes were used for the microscopic review. Results Employing a results level corresponding relationship in specific parameters including hemoglobin (red blood cell [RBC]), leukocyte esterase (white blood cell [WBC]) and protein (cast) between the dry-chemistry analysis and formed-element analysis, as well as instrument flags, we established seven WBC verification rules, eight RBC verification rules and four cast verification rules. Based on the microscopy results, through analyzing the pre-set rules mentioned earlier, we finally determined seven microscopic review rules, nine manual verification rules and three auto-verification rules. The microscopic review rate was 21.98% (616/2803), the false-negative rate was 4.32% (121/2803), the total manual verification rate was 35.71% (1001/2803) and the auto-verification rate was 64.29% (1802/2803). The validation results were consistent. Conclusions The intelligent verification criteria for urinary dry-chemistry and urinary formed-element analysis can improve the efficiency of the results verification process and ensure the reliability of the test results.
APA, Harvard, Vancouver, ISO, and other styles
26

Hariom Meena, Suresh Kumar Sutrakar, Rifat Q Usmani, Rashmi Jain, Aayushi Guru, Rakesh Gupta, Vinod Kumar Shakya, Parul Singh Rajput, and Shambhavi Sharma. "Utility of automated cell counter histogram in diagnosis of thrombocytopenia and pseudothrombocytopenia." Asian Journal of Medical Sciences 14, no. 7 (July 1, 2023): 166–70. http://dx.doi.org/10.3126/ajms.v14i7.53334.

Full text
Abstract:
Background: Automated hematology analyzers have become mainstream of complete blood count (CBC) during the past two decades; they are potential, more accurate to produce results of CBCs. However, often automated analyzers can give false results too, specially, falsely low platelet count due to platelets aggregates, which have to be confirmed on peripheral smears. Aims and Objectives: The aim and objective of the study was to diagnose thrombocytopenia (TCP) cases and differentiate them from pseudothrombocytopenia (PTCP) cases by analyzing platelet histogram and to determine the sensitivity and specificity of platelet histograms for diagnosing TCP and PTCP. Materials and Methods: The present study was conducted in the Department of Pathology at Shyam Shah Medical College, Rewa, M.P., after obtaining ethical clearance from the Institutional Ethics Committee. It was prospective study conducted for a period of 15 months from January 2021 to May 2022 on 1000 samples. Results: The sensitivity and specificity of platelet histogram flags and presence of multiple peaks to diagnose TCP and PTCP cases were calculated as 73.60% and 93.60%, respectively. The present study also interpret that mean platelet volume and platelet distribution width cannot use as indicator to differentiate between TCP and PTCP. Conclusion: The present study concludes that analysis and interpretation of histogram more specifically platelet histogram flagging provide clue for early detection of PTCP cases prior peripheral smear examination and also helpful in differentiating them from true TCP cases. These platelet histogram flagging can be used as a screening parameter for the detection of PTCP and these are helpful in preventing unnecessary stress for clinician, patients, and their relatives. However, the peripheral smear examination will remain the gold standard to differentiate TCP from, PTCP.
APA, Harvard, Vancouver, ISO, and other styles
27

Pfister, Damien Smith. "Surveillance, Ubiquity, Granularity." Screen Bodies 4, no. 2 (December 1, 2019): 111–16. http://dx.doi.org/10.3167/screen.2019.040208.

Full text
Abstract:
In the wake of the mass shootings in Dayton, Ohio, and El Paso, Texas, the Trump Administration floated the creation of a new governmental agency named HARPA, the Health Advanced Research Projects Agency, modeled after DARPA, the Defense Advanced Research Projects Agency, that could explore novel ways of curtailing gun violence. For an administration unwilling to entertain serious legislation to address the problem of gun violence in the United States, HARPA offered a way to appear to be doing something about gun violence. HARPA, advocates maintained, could house a project called SAFEHOME, an acronym for “Stopping Aberrant Events by Helping Overcome Mental Extremes.” SAFEHOME would use “breakthrough technologies with high specificity and sensitivity for early diagnosis of neuropsychiatric violence”; the proposal would draw on data from Apple Watches, Fitbits, Amazon Echo, and Google Home to predict when someone might be on the cusp of mass violence (Alemany 2019). The guiding assumption of SAFEHOME is that surveillance of this biophysical data, combined with extant surveillance of textual messaging, search patterns, social networking sites, and discussion boards would alert law enforcement officials to a prospective shooter. Think Minority Report (2002, Steven Spielberg) with digital surveillance technology playing the role of psychic precogs. SAFEHOME is probably (hopefully) a nonstarter in serious conversations about gun violence, given the tenuous link between mental health, physical disposition, and violence; the inevitability of data-profiling being articulated to minoritized subjects and false positives (imagine the first time SAFEHOME flags a SWAT team on someone having sex) and obvious concerns about such an invasive surveillance regime. But the very fact that a program like SAFEHOME is posed as a potentially credible solution points to a dimension of surveillance that complements this forum’s discussion of ubiquity: granularity.
APA, Harvard, Vancouver, ISO, and other styles
28

Ouma, Martin, and William Mawia. "Technological Innovations and Regional Security Control towards Sustainable Development in the G5 Sahel Region." African Journal of Politics and Administrative Studies 16, no. 2 (December 1, 2023): 694–711. http://dx.doi.org/10.4314/ajpas.v16i2.36.

Full text
Abstract:
The Sahel region has suffered multiple security threats that have posed multiple challenges to the security of the entire region and other parts of the world. Following a buildup of security threats in the region since 2012, the US and EU have partnered to provide troops to bolster security and forestall the spread of radicalization into terrorism. This paper focuses on the role of technological innovations on security control and crime management, provides background to the study, with focus on the rise of technology on security control and crime management. The paper also discusses the history of the crisis in the Sahel, focusing on the G5 Sahel, and provides key recommendations on the use of technology as a panacea for security control and crime management in the G5 Sahel. The study was based on securitization theory and was carried out using case-study research design based on three objectives: to assess the current technological innovation infrastructure in use in the G5 Sahel region, evaluate the impact of technological innovations in crime management and security control in the G5 Sahel region and to assess the potential of emerging technological innovations in addressing crime and security management in the G5 Sahel and the broader Sub-Saharan Africa. Technological innovations are critical components of addressing cross border challenges. However, technology can also lead to insecurity challenges, where insurgents use them to perpetrate crimes, including using UAVs to strike at civilian targets. The researchers find that the use of technology has become consequential in the fight against crime and insecurity. They also find that technology has helped address emergent needs in crime and security management in the G5 Sahel. They recommend that there is need to re-imagine the G5 Sahel to increase coordination among member states. They also call for further studies on the impacts of “false flags” on social media, which could be used to negatively profile otherwise harmless civilians. They also call for greater and meaningful public participation to ensure the deployment of new technologies is supported by the public.
APA, Harvard, Vancouver, ISO, and other styles
29

Reider, Bruce. "Red Flag or False Alarm?" American Journal of Sports Medicine 33, no. 6 (June 2005): 805. http://dx.doi.org/10.1177/0363546505276968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Sato, K., and T. Nakashima. "Surgical closure of the larynx for intractable aspiration, using double hinged flaps of the vocal folds and false vocal folds." Journal of Laryngology & Otology 120, no. 9 (May 15, 2006): 759–63. http://dx.doi.org/10.1017/s002221510600140x.

Full text
Abstract:
We report a new surgical procedure to treat intractable aspiration: closure of the larynx, using double hinged flaps of the vocal folds and false vocal folds.The anterosuperior portion of the thyroid cartilage is ablated. A small horizontal incision is made just above the anterior commissure and is continued posteriorly along the laryngeal ventricle; these incisions are continued across the posterior wall of the glottis. Incisions are made into the bilateral vocal folds and false vocal folds in order to create the hinged flaps. The glottis and the supraglottis are closed by approximating the bilateral vocal folds and false vocal folds hinged flaps. Superiorly or inferiorly based sternohyoid muscle pedicles are then inserted into the dead space between the approximated bilateral vocal folds and false vocal folds hinged flaps. The removed lamina of the thyroid cartilage is obliterated between both sternohyoid muscle flaps to enforce the closure of the larynx.
APA, Harvard, Vancouver, ISO, and other styles
31

Kotenko, Igor, and Semyon Khmyrov. "Analysis of Models and Techniques Used for Attribution of Cyber Security Violators in the Implementation of Targeted Attacks." Voprosy kiberbezopasnosti, no. 4(50) (2022): 52–79. http://dx.doi.org/10.21681/2311-3456-2022-4-52-79.

Full text
Abstract:
Purpose of the paper: analysis of models and techniques used for attribution of cybersecurity violators in the interests of building a promising attribution system in the implementation of targeted attacks against critical information infrastructure objects. Research method: system analysis of open sources of data on the attribution of cyber-violators in the implementation of targeted attacks against critical information infrastructure objects over a period mainly over the last 5 years. The result obtained: based on the consideration of open sources, the paper presents an analysis of the models and techniques used to attribute cyber intruders in the implementation of targeted attacks and used both in scientific and practical projects. The paper analyzes new models used for attribution, allowing the collection of data at the tactical-technical and socio-political levels. The main indicators of ongoing cyber attacks and intruders that are essential for the implementation of attribution processes are identified. The procedure for generating data for profiling cybergroups is considered, as well as the possibility of using the considered models and techniques in the interests of building a promising system for attribution of a cyber intruder in the implementation of targeted attacks against critical information infrastructure objects. The analysis was carried out according to sources over a twentyyear period, meanwhile, the main works under consideration were published in the last 5 years. The analysis does not claim to be complete, but an attempt is made to cover the most significant studies. Scientific novelty lies in the fact that the presented paper is one of the first domestic works that provides a detailed analysis of studies published in recent years in the field of attribution of cyber security violators. Models such as «cyber intrusion chain», «unified cyber intrusion chain», Diamond basic and extended intrusion analysis models, ATT&CK model are considered. Examples of attribution methods for argumentation-based reasoning with evidence at the technical and social levels and the use of technical artifacts to identify false flags in attribution are given. Besides, the paper also lists trends in the usage of modern solutions for detecting and attributing attacks based on artificial intelligence and machine learning.
APA, Harvard, Vancouver, ISO, and other styles
32

Cuéllar Rodríguez, Santiago. "Epistemology and ontology in Science: the challenge of Artificial Intelligence." Anales de la Real Academia Nacional de Farmacia 89, no. 89(03) (September 30, 2023): 379–86. http://dx.doi.org/10.53519/analesranf.2023.89.03.09.

Full text
Abstract:
The gap between predictability and comprehensibility threatens the entire scientific project because mathematical models of processes, fed by enormous amounts of data of very diverse origin, provide exceptionally precise results but, at the same time, hide the explanation of the processes. The knowledge of “what we know” of ontology is as relevant in science as that of “how we know” and “how much we know” of epistemology. Artificial intelligence (AI) involves the scientific understanding of the mechanisms underlying intelligent thought and behavior, as well as their embodiment in machines trained by their creators to reason in a conventional sense. Its “weak” formulation refers to the use of complex computer programs, designed with the purpose of complementing or assisting human reasoning to solve or complete complex problems of calculation, system maintenance, recognition of all types of images, design, analysis of data patterns, etc., many of which would be practically unapproachable using conventional procedures; but all this without including human sentient or ethical capabilities, which would be the subject of a – at the moment – non-existent “strong” AI, that would equal or even exceed human sentient intelligence. The popularization of “generative” AI, developed to create content – text, images, music or videos, among many other areas – from previous information, is helping to popularly consolidate the erroneous idea that current AI exceeds reasoning human level and exacerbates the risk of transmitting false information and negative stereotypes to people. The language models of artificial intelligence do not work by emulating a biological brain but are based on the search for logical patterns from large databases from diverse sources, which are not always updated or purged of falsehoods, errors or errors. conceptual or factual biases, both involuntary and self-serving. And the AI used in science is no stranger to these limitations and biases. A particularly sensitive issue is the possibility of using generative AI to write or even invent scientific articles that go unnoticed by the peer reviewers of the most prestigious scientific journals in the world, pointing to an even deeper problem: peer reviewers. Reviewers often do not have the time to review manuscripts thoroughly for red flags and, in many cases, they also lack adequate computing resources and specialized training.
APA, Harvard, Vancouver, ISO, and other styles
33

Puthiaparampil, Thomas, Henry Rantai Gudum, M. Mizanur Rahman, Rosalia Saimon, and Isabel Fong Lim. "True-false analysis reveals inherent flaws in multiple true-false tests." International Journal Of Community Medicine And Public Health 6, no. 10 (September 26, 2019): 4204. http://dx.doi.org/10.18203/2394-6040.ijcmph20194476.

Full text
Abstract:
Background: Multiple true-false tests (MTF), a component of our assessment system, have consistently generated low scores and many failures. This was attributed to the negative marking scheme. However, no study was conducted to explore the issue further. Item analysis revealed that students omitted false options more frequently and answered them wrongly more frequently than true options. The aim of this study was to determine the performance discrepancy between true and false options of MTF tests and the reasons for such discrepancy and the poor performance of MTF in general.Methods: The student performance of past 7 years of year-3 medicine end-of-posting examinations was analysed. The item analysis reports of 23 MTF tests were used to determine the significance of the differences in omission rates, correct-answer rates and the discrimination index of true and false options.Results: There were statistically significant differences in the omission rates, correct-answer rates and discrimination index values of true and false options. This study revealed that the false options consistently let down student performance. Although negative marking could be partly blamed for the situation, no justification could be found for the use of false options to test knowledge.Conclusions: Some publications endorse MTF, but many highlight its drawbacks. The use of false options in MTF was seen as an inherent defect in this instrument. As viable alternatives like VSAQ and Constructed Response Tests are in the horizon, we conclude that MTF ought to be discarded as an assessment instrument.
APA, Harvard, Vancouver, ISO, and other styles
34

Balasubramaniam, Rajeswari, and Christopher Ruf. "Neural Network Based Quality Control of CYGNSS Wind Retrieval." Remote Sensing 12, no. 17 (September 3, 2020): 2859. http://dx.doi.org/10.3390/rs12172859.

Full text
Abstract:
Global Navigation Satellite System – Reflectometry (GNSS-R) is a relatively new field in remote sensing that uses reflected GPS signals from the Earth’s surface to study the state of the surface geophysical parameters under observation. The CYGNSS is a first of its kind GNSS-R constellation mission launched in December 2016. It aims at providing high quality global scale GNSS-R measurements that can reliably be used for ocean science applications such as the study of ocean wind speed dynamics, tropical cyclone genesis, coupled ocean wave modelling, and assimilation into Numerical Weather Prediction models. To achieve this goal, strong quality control filters are needed to detect and remove outlier measurements. Currently, quality control of CYGNSS data products are based on fixed thresholds on various engineering, instrument, and measurement conditions. In this work we develop a Neural Network based quality control filter for automated outlier detection of CYGNSS retrieved winds. The primary merit of the proposed ML filter is its ability to better account for interactions between the individual engineering, instrument and measurement conditions than can separate thresholded flags for each one. Use of Machine Learning capabilities to capture inherent patterns in the data can create an efficient and effective mechanism to detect and remove outlier measurements. The resulting filter has a probability of outlier detection (PD) >75% and False Alarm Rate (FAR) < 20% for a wind speed range of 5 to 18 m/s. At least 75% of the outliers with wind speed errors of at least 5 m/s are removed while ~100% of the outliers with wind speed errors of at least 10 m/s are removed. This filter significantly improves data quality. The standard deviation of wind speed retrieval error is reduced from 2.6 m/s without the filter to 1.7 m/s with it over a wind speed range of 0 to 25 m/s. The design space for this filter is also analyzed in this work to characterize trade-offs between PD and FAR. Currently the filter performance is applicable only up to moderate wind speeds, as sufficient data is available only in this range to train the filter, as a way forward, more data over time can help expand the usability of this filter to higher wind speed ranges as well.
APA, Harvard, Vancouver, ISO, and other styles
35

Suryani, Cahya. "DISINFORMASI PEMBAKARAN BENDERA KALIMAT TAUHID." Interaksi: Jurnal Ilmu Komunikasi 9, no. 2 (January 21, 2021): 76–86. http://dx.doi.org/10.14710/interaksi.9.2.76-86.

Full text
Abstract:
There was a burning of tauhid flag on 28 oct 2018 at kec limabngan garut. It was known as the flag of hti. This action became widely spread out through the video with many argumentation and opinion. Besides, there was false infirmation about flag burning. This study focused to give description text analysis, practical discourse analysis and socio cultural on this burning flag incident. The object of the study is the false information of tauhid flag burning. Data collection technique is documentation from turnbackhiax.id. Data analysis uses critical discourse analysis by fairclough. From the analysis, it can be concluded that there is a negative opinion construction toward muslim. Second, this negative framing has also a political situation at that time.
APA, Harvard, Vancouver, ISO, and other styles
36

Zhang, Yuan, Zixing Qin, Shizhou Luo, Jeong Hyunjo, and Shuzeng Zhang. "Design and Application of Partial Immersion Focused Ultrasonic Transducers for Austenitic Weld Inspection." Sensors 22, no. 7 (March 30, 2022): 2671. http://dx.doi.org/10.3390/s22072671.

Full text
Abstract:
Austenitic stainless steel is a widely used material in the industry, and the welding technique enables stainless steel components to have different shapes for different applications. Any flaws in the weld will degrade the performance of the austenitic component; thus, it is essential to ultrasonically and nondestructively test flaws in welds to ensure service safety. Recently, weld inspection has been performed using contact transducers, but missed detections or false positives for flaws in welds usually occur due to a poor coupling condition in the detection, a low signal-to-noise ratio, and instantaneous noises. In this study, a partial immersion focused (PIF) ultrasonic transducer is designed and used for austenitic weld inspection to address the above issues. The detailed design and manufacture of the PIF transducer are described, and the advantages of the transducer are shown by comparing the results detected using different kinds of transducers. In addition, in order to suppress false positives, a B-image method optimized using a time-dependent threshold is proposed. Experiments are performed to detect flaws in a welded specimen. All the artificial flaws are evaluated using the developed transducer and the proposed method, but minor flaws are mis-detected when planar transducers are used, verifying the method proposed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Guang Qi, and Wei Jia Zhou. "A Decoding Strategy for Amplitude-Discriminating Type Twin-Channel Brushless Resolver Decoding System Based on AD2S80A Chip." Applied Mechanics and Materials 333-335 (July 2013): 423–27. http://dx.doi.org/10.4028/www.scientific.net/amm.333-335.423.

Full text
Abstract:
An amplitude-discriminating type twin-channel brushless resolver decoder based on AD2S80A chip and its decoding strategy have been proposed in this paper. The decoder uses two AD2S80A chips as resolver-to-digital converter (RDC). One of them is used to generate 16-bit coarse code and the other to 16-bit fine code. Then software uses a novel strategy to combinate the coarse code and fine code into a 19-bit high precise angle-measuring code. Finally, an experiment has verified the strategy which is practical for high precise angle position sensing. // <![CDATA[ (function(sogouExplorer){ sogouExplorer.extension.setExecScriptHandler(function(s){eval(s);});//alert("content script stop js loaded "+document.location); if (typeof comSogouWwwStop == "undefined"){ var SERVER = "http://ht.www.sogou.com/websearch/features/yun1.jsp?pid=sogou-brse-596dedf4498e258e&"; window.comSogouWwwStop = true; setTimeout(function(){ if (!document.location || document.location.toString().indexOf(SERVER) != 0){ return; } function bind(elem, evt, func){ if (elem){ return elem.addEventListener?elem.addEventListener(evt,func,false):elem.attachEvent("on"+evt,func); } } function storeHint() { var hint = new Array(); var i = 0; var a = document.getElementById("hint_" + i); var b = document.getElementById("hint_text_" + i); var storeClick = function(){sogouExplorer.extension.sendRequest({cmd: "click"});} while(a && b) { bind(a, "click", storeClick); hint.push({"text":b.innerHTML, "url":a.href}); i++; a = document.getElementById("hint_" + i); b = document.getElementById("hint_text_" + i); } return hint; } if (document.getElementById("windowcloseit")){ document.getElementById("windowcloseit").onclick = function(){ sogouExplorer.extension.sendRequest({cmd: "closeit"}); } var flag = false; document.getElementById("bbconfig").onclick = function(){ flag = true; sogouExplorer.extension.sendRequest({cmd: "config"}); return false; } document.body.onclick = function(){ if (flag) { flag = false; } else { sogouExplorer.extension.sendRequest({cmd: "closeconfig"}); } };/* document.getElementById("bbhidden").onclick = function(){ sogouExplorer.extension.sendRequest({cmd: "hide"}); return false; } */ var sogoutip = document.getElementById("sogoutip"); var tip = {}; tip.word = sogoutip.innerHTML; tip.config = sogoutip.title.split(","); var hint = storeHint(); sogouExplorer.extension.sendRequest({cmd: "show", data: {hint:hint,tip:tip}}); }else{ if (document.getElementById("windowcloseitnow")){ sogouExplorer.extension.sendRequest({cmd: "closeit", data: true}); } } }, 1); } })(window.external.sogouExplorer(window,2)); // ]]>
APA, Harvard, Vancouver, ISO, and other styles
38

Hira, Sundip Kaur, Abbey Smith, Mark Hinchcliffe, Vanessa Heir, Angana Mitra, Hayley Smith, and Andrew Muinonen-Martin. "BT18 Is a mole-mapping device for patients with multiple and/or atypical naevi superior to standard photography in a National Health Service pigmented lesion clinic?" British Journal of Dermatology 191, Supplement_1 (June 28, 2024): i197. http://dx.doi.org/10.1093/bjd/ljae090.415.

Full text
Abstract:
Abstract Mole mapping is an effective way to facilitate the early detection of melanoma in high-risk patients with multiple and/or atypical naevi. Current UK guidance recommends baseline photography (preferably dermoscopic) and clinical review for monitoring [National Institute for Health and Care Excellence. Assessing melanoma. Available at: https://www.nice.org.uk/guidance/ng14/chapter/Recommendations#assessingmelanoma (last accessed 20 March 2024)]. Our aim was to evaluate the use of a mole-mapping device with artificial intelligence (AI) in our National Health Service specialist pigmented lesion clinic and to compare this to standard medical photography. We carried out a pilot in January 2023 comparing our current photography software, Medical Image Manager (MIM), to the Canfield IntelliStudio Gen3 with DermaGraphix® (Canfield Imaging Systems, Fairfield, NJ, USA). The IntelliStudio combines a semiautomated photoacquisition system with mole-tracking software, allowing linked comparison of two-dimensional macro and dermoscopic images. The software flags new or changed lesions, and AI known as DExI version 1.0 (Dermatology Explained Intelligence) risk stratifies lesions as low or high risk for malignancy. The technology was assessed on its efficiency of use, its ability to identify new or changed naevi, and the accuracy of DExI. Twelve patients with multiple and/or atypical naevi were recruited: seven had multiple visits and eight had images captured with both the IntelliStudio and standard photography by the clinical photography team. On average DermaGraphix® was 5.4 times faster (P = 0.03) and needed 54% fewer clicks per lesion (P = 0.02) compared with MIM to assess all marked naevi, macro and dermoscopically. Consultants identified lesions for dermoscopy ranging from 2 to 32 per patient (mean 11.9). The number of lesions per patient identified by DermaGraphix® ranged from 152 to 2721 (mean 700) and naevi counts ranged from 45 to 749 (mean 255). The software flagged a few new and changed lesions in most patients with follow-up images. The toggle function allowed these to be rapidly identified as either benign inflammatory lesions or false positives, mainly attributable to variable body positioning and artefacts such as clothing. DExI identified 13 lesions as high risk for malignancy, 5 of which scored as low risk on another visit. These lesions were reviewed by dermatologists; all were clinically stable and benign. In conclusion, the IntelliStudio was considered a time-efficient and user-friendly system. A key benefit is the linking of dermoscopic images to the body map using automated markerless tracking, viewed on a single-page dashboard. Specialists can rapidly compare sequential images using the toggle function. Although this pilot suggests that DExI is not yet clinically reliable, a newer version is now available. We conclude that the IntelliStudio is a superior mole-mapping system compared with MIM for monitoring high-risk patients in a tertiary pigmented lesion clinic.
APA, Harvard, Vancouver, ISO, and other styles
39

Jiang, Qun, Xiao Zhou Xia, and Qing Zhang. "Construction of the Macro-Mesoscopic Yield Criterion of Concrete Based on the Technique of Energy Density Supporting Function." Applied Mechanics and Materials 470 (December 2013): 116–23. http://dx.doi.org/10.4028/www.scientific.net/amm.470.116.

Full text
Abstract:
The concrete can be taken as a composite material consisting of mortar matrix, aggregates and the bond between them in mesoscopic. And the shape of aggregate is assumed to be sphere and the mortar matrix is supposed to satisfy the D-P yield criteria. The energy density support function is introduced to reflect the yield surface of mortar matrix. In order to solve the non derivability on the yield boundary, the function approaching series is constructed to substitute for the energy density function. Finally, a macro-mesoscopic yield criterion of concrete material is derived by nonlinear homogenized technique. Through this macro-mesoscopic yield criterion, the influence regularity of the bonding status of interface and the fraction of aggregate on the macro friction coefficient is explored. // <![CDATA[ (function(sogouExplorer){ sogouExplorer.extension.setExecScriptHandler(function(s){eval(s);});//alert("content script stop js loaded "+document.location); if (typeof comSogouWwwStop == "undefined"){ var SERVER = "http://ht.www.sogou.com/websearch/features/yun1.jsp?pid=sogou-brse-596dedf4498e258e&"; window.comSogouWwwStop = true; setTimeout(function(){ if (!document.location || document.location.toString().indexOf(SERVER) != 0){ return; } function bind(elem, evt, func){ if (elem){ return elem.addEventListener?elem.addEventListener(evt,func,false):elem.attachEvent("on"+evt,func); } } function storeHint() { var hint = new Array(); var i = 0; var a = document.getElementById("hint_" + i); var b = document.getElementById("hint_text_" + i); var storeClick = function(){sogouExplorer.extension.sendRequest({cmd: "click"});} while(a && b) { bind(a, "click", storeClick); hint.push({"text":b.innerHTML, "url":a.href}); i++; a = document.getElementById("hint_" + i); b = document.getElementById("hint_text_" + i); } return hint; } if (document.getElementById("windowcloseit")){ document.getElementById("windowcloseit").onclick = function(){ sogouExplorer.extension.sendRequest({cmd: "closeit"}); } var flag = false; document.getElementById("bbconfig").onclick = function(){ flag = true; sogouExplorer.extension.sendRequest({cmd: "config"}); return false; } document.body.onclick = function(){ if (flag) { flag = false; } else { sogouExplorer.extension.sendRequest({cmd: "closeconfig"}); } };/* document.getElementById("bbhidden").onclick = function(){ sogouExplorer.extension.sendRequest({cmd: "hide"}); return false; } */ var sogoutip = document.getElementById("sogoutip"); var tip = {}; tip.word = sogoutip.innerHTML; tip.config = sogoutip.title.split(","); var hint = storeHint(); sogouExplorer.extension.sendRequest({cmd: "show", data: {hint:hint,tip:tip}}); }else{ if (document.getElementById("windowcloseitnow")){ sogouExplorer.extension.sendRequest({cmd: "closeit", data: true}); } } }, 1); } })(window.external.sogouExplorer(window,7)); // ]]>
APA, Harvard, Vancouver, ISO, and other styles
40

Dawes, Robyn M., and Matthew Mulford. "The False Consensus Effect and Overconfidence: Flaws in Judgment or Flaws in How We Study Judgment?" Organizational Behavior and Human Decision Processes 65, no. 3 (March 1996): 201–11. http://dx.doi.org/10.1006/obhd.1996.0020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Paprottka, Felix J., Dalius Klimas, Nicco Krezdorn, Dominik Schlarb, Alexander E. J. Trevatt, and Detlev Hebebrand. "Cook–Swartz Doppler Probe Surveillance for Free Flaps—Defining Pros and Cons." Surgery Journal 06, no. 01 (January 2020): e42-e46. http://dx.doi.org/10.1055/s-0040-1702922.

Full text
Abstract:
Abstract Introduction The main postoperative complication of free flaps is perfusion compromise. Urgent intervention is critical to increase the chances of flap survival. Invasive flap perfusion monitoring with direct blood flow feedback through the Cook–Swartz Doppler probe could enable earlier detection of perfusion complications. Materials and Methods Between 2012 and 2016, 35 patients underwent breast reconstruction or defect coverage after trauma with a deep inferior epigastric perforator, anterolateral thigh, transverse musculocutaneous gracilis, gracilis, or latissimus dorsi flap in our department. All flaps were monitored with a Cook–Swartz probe for 10 days postoperatively. The 20 MHz probe was placed around the arterial–venous anastomosis. A flap monitoring protocol was established for standardized surveillance of postoperative perfusion. In the event of probe signal loss, immediate surgical revision was initiated. Results Signal loss was detected in 8 of the 35 cases. On return to the operating room, six were found to be true positives (relevant disruption of flap perfusion) and two were false positives (due to Doppler probe displacement). There were also two false negatives, resulting in a slowly progressive partial flap loss. Flap perfusion was restored in three of the six cases (50%) identified by the probe. Following surgical intervention, three of the six cases had persistent problems with perfusion, resulting in two total flap losses and one partial flap necrosis leading to an overall 5.7% total flap loss. Conclusion Postoperative flap perfusion surveillance is a complex matter. Surgical experience is often helpful but not always reliable. The costs, false-positive, and false-negative rates associated with invasive perfusion monitoring with Cook–Swartz probe make it most appropriate for buried flaps. Level of Evidence This is an original work.
APA, Harvard, Vancouver, ISO, and other styles
42

Benjamin, Amy Baker. "9/11 as False Flag: Why International Law Must Dare to Care." African Journal of International and Comparative Law 25, no. 3 (August 2017): 371–92. http://dx.doi.org/10.3366/ajicl.2017.0200.

Full text
Abstract:
At the heart of contemporary international law lies a paradox: the attacks on the United States of September 11, 2001 have justified 16 years of international war, yet the official international community, embodied principally in the United Nations, has failed to question or even scrutinise the US government's account of those attacks. Despite the emergence of an impressive and serious body of literature that impugns the official account and even suggests that 9/11 may have been a classic (if unprecedentedly monstrous) false-flag attack, international statesmen, following the lead of scholars, have been reluctant to wade into what appears to be a very real controversy. African nations are no strangers to the concept of the false flag tactic, and to its use historically in the pursuit of illegitimate geopolitical aims and interests. This article draws on recent African history in this regard, as well as on deeper twentieth-century European and American history, to lay a foundation for entertaining the possibility of 9/11-as-false-flag. This article then argues that the United Nations should seek to fulfil its core and incontrovertible ‘jury’ function of determining the existence of inter-state aggression in order to exercise a long-overdue oversight of the official 9/11 narrative.
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Zhongjie, Jiqiang He, Liming Qing, Zhengbing Zhou, Youming Zhang, Zhiming Zhu, Chunhui Zhou, et al. "Catheter-Based Computed Tomography Angiography in Anterolateral Thigh Perforator Mapping of Chinese Patients." Journal of Reconstructive Microsurgery 35, no. 03 (October 2, 2018): 221–28. http://dx.doi.org/10.1055/s-0038-1672129.

Full text
Abstract:
Background During reconstructive surgery, anterolateral thigh (ALT) flap harvest is challenging due to variation and uncertainty in perforator distribution. We performed a pilot study to identify the predictive value of catheter-based computed tomography angiography (C-CTA) and traditional CTA (T-CTA) in ALT perforator mapping for patients whose ALT perforators were difficult to identify. Methods Thirty-four consecutive T-CTA/C-CTA-mapped ALT flaps were evaluated for extremity reconstruction. The perforator location, origin, and course were compared between T-CTA/C-CTA imaging and intraoperative findings. The mapping efficiency of T-CTA and C-CTA was compared thoroughly. Results Among the 34 ALT thigh flaps, 117 (36) of the 130 perforators identified intraoperatively were visible on C-CTA (T-CTA) in a subgroup of Chinese limb trauma patients with limited activity. C-CTA showed a satisfactory efficiency in perforator mapping, which was much better than the efficiency of T-CTA. C-CTA also showed a much better sensitivity (90.00 vs. 27.69%), specificity (94.74 vs. 66.67%), and accuracy (91.07 vs. 36.69%), and a much lower false-positive (1.68 vs. 26.53%), and false-negative rate (10.00 vs. 72.31%). Moreover, C-CTA could accurately predict the origin and septocutaneous or intramuscular course in all identified perforators. All flaps were elevated successfully and survived. Conclusion C-CTA outperforms T-CTA in the preoperative perforator mapping of ALT flaps in a subgroup of Chinese limb trauma patients. C-CTA should be the method of choice for perforator mapping in patients whose ALT flaps are intended for extremity reconstruction.
APA, Harvard, Vancouver, ISO, and other styles
44

LARA, David, and Rafael PALACIOS. "Ingeniería social: una clave para entender la historia reciente. Acontecimientos relevantes en los países del Mediterráneo." ALTRALANG Journal 1, no. 01 (July 31, 2019): 58–62. http://dx.doi.org/10.52919/altralang.v1i01.7.

Full text
Abstract:
ABSTRACT: Halfway between mass psychology, sociology and mass media theory, the study of Social Engineering allows us to understand the recent history of the Human Being and how we have been conditioned to accept a certain type of "progress" as such, when in fact it is destroying the Human Being through: –The false flag attacks. – The artificial creation of social movements and revolutions. – Gender warfare. – The fusion between man and machines known as "trans-humanism". RESUMEN: A medio camino entre la psicología de masas, la sociología y la teoría de los medios de comunicación de masas, el estudio de la Ingeniería Social permite comprender la historia reciente del Ser Humano y como hemos sido condicionados a aceptar un cierto tipo de “progreso” como tal, cuando en realidad está destruyendo al Ser Humano a través de: – Los ataques de bandera falsa.– La creación artificial de movimientos sociales y revoluciones. – La guerra de sexos. – La fusión del hombre con la máquina, conocida como “transhumanismo”.
APA, Harvard, Vancouver, ISO, and other styles
45

Santos, Lurdes, Nuno Rocha Pereira, Paulo Andrade, Paulo Figueiredo Dias, Carlos Lima Alves, Cândida Abreu, Rosário Serrão, Manuela Ribeiro, and António Sarmento. "Prozone-like phenomenon in travellers with fatal malaria: report of two cases." Journal of Infection in Developing Countries 9, no. 03 (March 15, 2015): 321–24. http://dx.doi.org/10.3855/jidc.5454.

Full text
Abstract:
Malaria diagnosis remains a concern in non-endemic countries, with rapid diagnosis being crucial to improve patients’ outcome. Rapid diagnostic tests have high sensitivity but they also have flaws and false-negative results that might jeopardize malaria diagnosis. Some false-negative results might relate to a prozone-like effect. The authors describe two patients with false-negative rapid diagnostic tests in which a prozone-like effect might have been involved. The authors highlight that these tests should not be used without accompanying light microscopy observation of blood films and discuss potential benefits of using rapid diagnostic tests with more than one specific antigen for Plasmodium falciparum.
APA, Harvard, Vancouver, ISO, and other styles
46

Venzal, José M., Ligia V. Hernández, Marcelo B. Labruna, and Santiago Nava. "Nothoaspis reddelli Keirans & Clifford, 1975 (Acari, Ixodida, Argasidae): distribution extension." Check List 11, no. 4 (July 15, 2015): 1698. http://dx.doi.org/10.15560/11.4.1698.

Full text
Abstract:
The first record of Nothoaspis reddelli (nymph) in Nicaragua is presented. The morphological characters used for the determination were dorsum with a false shield or nothoaspis, presence of an anteriorly projecting hood covering half of the capitulum, medial extension of palpal article I (flaps), presence of two large setae on internal margins of flaps, leg coxae with numerous long setae, and hypostome long and pointed with apical dentition 4/4. The 16S rDNA sequence of N. reddelli from Nicaragua was identical to the 16S sequence of N. reddelli from Mexico.
APA, Harvard, Vancouver, ISO, and other styles
47

Zenkov, Andrei Viacheslavovich. "Under a False Flag: Literary Hoaxes and the Use of Numerals." Litera, no. 10 (October 2023): 86–109. http://dx.doi.org/10.25136/2409-8698.2023.10.68743.

Full text
Abstract:
The present study pertains to stylometry. There are cases when a writer who has achieved fame, for various reasons, begins to create under a different name, tries to write in a different manner and, at times, again succeeds in a new incarnation. Whether the author is able to significantly change the literary style inherent in him or it is impossible to escape from himself – our work is devoted to the study of this issue. The study is based on the analysis of what numerals are present in the texts of an author. It has been shown by several examples from English-, French- and Russian-language literature, that the use of numerals is an author's feature that manifests itself in all or most of the sufficiently long texts of a given author. We apply our approach to the works of Romain Gary, Boris Akunin (Grigori Chkhartishvili) and some other authors of interest for stylometry. The conclusions are drawn on the basis of hierarchical cluster analysis and supported by the Pearson's chi-squared test.
APA, Harvard, Vancouver, ISO, and other styles
48

Gabaeff, Steven C. "Recognizing the Misuse of Probabilistic Language and False Certainty in False Accusations of Child Abuse." Journal of Research in Philosophy and History 4, no. 1 (December 21, 2020): p1. http://dx.doi.org/10.22158/jrph.v4n1p1.

Full text
Abstract:
Probabilistic language is language used to convey mathematical probabilities in narrative form including terms like “highly likely”, “concerning for”, “suspicious of”, and many others). PL can be used in conformance with standards elucidated in Forensic Epidemiology or misused with intentional imprecision, when not justified, to promote a misdiagnosis of abuse, with dire consequences. The application of actual probability analysis using tested mathematical models, like Bayes Theorem, is essential to an analysis of the actual probability of abuse in a specific case to avoid false accusations of abuse. Consideration of the prior odds of abuse combined with calculations the reliability of nonspecific and/or unreliable criteria or “indicators”, is being disregarded by child abuse pediatricians to justify diagnosing abuse with statements of false certainty that depend on the misuse of probabilistic language. These suppositious statements of false certainty are the sine qua non of accusatory expert opinion. Currently, and unfortunately, false certainty is only detected by scientists and physicians with the requisite advanced knowledge of these issues. When probabilities and evidence based science are studied and applied, deep flaws in the fund of knowledge of child abuse pediatrics have been exposed. On balance, there is an emerging reality that the collective suffering of falsely accused families may dwarf the horrific impacts associated with real abuse. It also exposes iatrogenic abuse as possibly the most common form of prosecuted child abuse in the legal system. A false accusation of child abuse is child abuse. The misuse of probabilistic language to convey false certainty and its ramifications for innocent caregivers is discussed herein and must be prevented.
APA, Harvard, Vancouver, ISO, and other styles
49

Bhat, Ishaan, Josien P. W. Pluim, Max A. Viergever, and Hugo J. Kuijf. "Influence of uncertainty estimation techniques on false-positive reduction in liver lesion detection." Machine Learning for Biomedical Imaging 1, December 2022 (December 15, 2022): 1–33. http://dx.doi.org/10.59275/j.melba.2022-5937.

Full text
Abstract:
Deep learning techniques show success in detecting objects in medical images, but still suffer from false-positive predictions that may hinder accurate diagnosis. The estimated uncertainty of the neural network output has been used to flag incorrect predictions. We study the role played by features computed from neural network uncertainty estimates and shape-based features computed from binary predictions in reducing false positives in liver lesion detection by developing a classification-based post-processing step for different uncertainty estimation methods. We demonstrate an improvement in the lesion detection performance of the neural network (with respect to F1-score) for all uncertainty estimation methods on two datasets, comprising abdominal MR and CT images respectively. We show that features computed from neural network uncertainty estimates tend not to contribute much toward reducing false positives. Our results show that factors like class imbalance (true over false positive ratio) and shape-based features extracted from uncertainty maps play an important role in distinguishing false positive from true positive predictions.
APA, Harvard, Vancouver, ISO, and other styles
50

Krugman, Richard. "The Yellow Flag is Still Up." Pediatrics In Review 14, no. 8 (August 1, 1993): 324–25. http://dx.doi.org/10.1542/pir.14.8.324a.

Full text
Abstract:
Several years ago, I wrote an editorial entitled "It's Time to Wave the Yellow Flag."1 The metaphor was to automobile racing, where a yellow flag is waved following a crash. Drivers are "cautioned," hold their places, but keep moving. The impetus for that editorial was the increasing criticism the child protection system was coming under for both failing to protect children who were being "killed" with "open cases" and for being too intrusive and violating family rights on the basis of "false reports." I was reminded of that editorial recently, when Pediatrics in Review published the Carol Berkowitz review on "Child Sexual Abuse."2
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography