To see the other types of publications on this topic, follow the link: Reverse image search.

Journal articles on the topic 'Reverse image search'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Reverse image search.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Al-Lohibi, Hanaa, Tahani Alkhamisi, Maha Assagran, Amal Aljohani, and Asia Othaman Aljahdali. "Awjedni: A Reverse-Image-Search Application." ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal 9, no. 3 (September 13, 2020): 49–68. http://dx.doi.org/10.14201/adcaij2020934968.

Full text
Abstract:
The abundance of photos on the internet, along with smartphones that could implement computer vision technologies allow for a unique way to browse the web. These technologies have potential used in many widely accessible and globally available reverse-image search applications. One of these applications is the use of reverse-image search to help people finding items which they're interested in, but they can’t name it. This is where Awjedni was born. Awjedni is a reverse-image search application compatible with iOS and Android smartphones built to provide an efficient way to search millions of products on the internet using images only. Awjedni utilizes a computer vision technology through implementing multiple libraries and frameworks to process images, recognize objects, and crawl the web. Users simply upload/take a photo of a desired item and the application returns visually similar items and a direct link to the websites that sell them.
APA, Harvard, Vancouver, ISO, and other styles
2

Katasani, S. R., T. Rachepalli, N. Kamat, and M. Jadhav. "Similar Fashion Finder using Reverse Image Search." International Journal of Computer Sciences and Engineering 7, no. 5 (May 31, 2019): 1190–95. http://dx.doi.org/10.26438/ijcse/v7i5.11901195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sharifzadeh, Afsheen, and Gideon P. Smith. "Inaccuracy of Google reverse image search in complex dermatology cases." Journal of the American Academy of Dermatology 84, no. 1 (January 2021): 202–3. http://dx.doi.org/10.1016/j.jaad.2020.04.107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Araujo, Flavio H. D., Romuere R. V. Silva, Fatima N. S. Medeiros, Dilworth D. Parkinson, Alexander Hexemer, Claudia M. Carneiro, and Daniela M. Ushizima. "Reverse image search for scientific data within and beyond the visible spectrum." Expert Systems with Applications 109 (November 2018): 35–48. http://dx.doi.org/10.1016/j.eswa.2018.05.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, JianPu, WeiXing Wang, JianMin Yao, TaiLiang Guo, Enguo Chen, and Qun Frank Yan. "Fast multi-view image rendering method based on reverse search for matching." Optik 180 (February 2019): 953–61. http://dx.doi.org/10.1016/j.ijleo.2018.12.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Ke, and Zhao Gao. "The Technology of Fast 3D Reconstruction Based on Stereo Vision." Key Engineering Materials 579-580 (September 2013): 654–58. http://dx.doi.org/10.4028/www.scientific.net/kem.579-580.654.

Full text
Abstract:
Reverse engineering has become an independent research area in CAD/CAM system with the development of modern manufacturing. The 3D reconstruction technology of generating a digit model from physical model is an important part of reverse engineering. The 3D reconstruction technology based on stereo vision has advantages such as non-contact measurement, simple system structure, being fast and efficient. In this paper, a fast 3D reconstruction technology based on stereo vision is presented. Firstly, BP neural network is used to simulate the mapping relationship between the 3D object and its images. Then, the epipole positions and adjusting coefficients for epipolar lines are calculated according to the epipolar line constraint. After the rectification transformations on the left and right image planes is conducted, the pairs of conjugate epipolar lines become collinear and parallel to the horizontal image axis. Therefore, when the stereo correspondences between the left and right images are being performed, the search is done only along the horizontal lines of the rectified images, which is highly advantageous to fast image matching for stereo vision and 3D reconstruction of free-form surface.
APA, Harvard, Vancouver, ISO, and other styles
7

Amerini, Irene, Rudy Becarelli, Roberto Caldelli, and Matteo Casini. "A Feature-Based Forensic Procedure for Splicing Forgeries Detection." Mathematical Problems in Engineering 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/653164.

Full text
Abstract:
Nowadays, determining if an image appeared somewhere on the web or in a magazine or is authentic or not has become crucial. Image forensics methods based on features have demonstrated so far to be very effective in detecting forgeries in which a portion of an image is cloned somewhere else onto the same image. Anyway such techniques cannot be adopted to deal with splicing attack, that is, when the image portion comes from another picture that then, usually, is not available anymore for an operation of feature match. In this paper, a procedure in which these techniques could also be employed will be shown to get rid of splicing attack by resorting to the use of some repositories of images available on the Internet like Google Images or TinEye Reverse Image Search. Experimental results are presented on some real case images retrieved on the Internet to demonstrate the capacity of the proposed procedure.
APA, Harvard, Vancouver, ISO, and other styles
8

Hokka, Jenni, and Matti Nelimarkka. "Affective economy of national-populist images: Investigating national and transnational online networks through visual big data." New Media & Society 22, no. 5 (August 21, 2019): 770–92. http://dx.doi.org/10.1177/1461444819868686.

Full text
Abstract:
In our article, we investigate the affective economy of national-populist image circulation on Facebook. This is highly relevant, since social media has been an essential area for the spread of national-populist ideology. In our research, we analyse image circulation as affective practice, combining qualitative and quantitative methods. We use computational data analysis methods to examine visual big data: image fingerprints and reverse image search engines to track down the routes of thousands of circulated images as well as make discourse-historical analysis on the images that have gained most attention among supporters. Our research demonstrates that these existing tools allow social science research to make theory-solid approaches to understand the role of image circulation in creating and sustaining national and transnational networks on social media, and show how national-populist thinking is spread through images that catalyse and mobilise affects – fear, anger and resentment – thus creating an effective affective economy.
APA, Harvard, Vancouver, ISO, and other styles
9

Reitelshöfer, Sebastian, Sebastian Meister, and Jörg Franke. "Recognition and Description of Unknown Everyday Objects by Using an Image Based Meta-Search Engine for Service Robots." Advanced Engineering Forum 19 (October 2016): 132–38. http://dx.doi.org/10.4028/www.scientific.net/aef.19.132.

Full text
Abstract:
In future applications service robots will operate in complex and unstructured environments. While performing daily tasks such systems will have to recognize many different unknown objects in order to be able to conduct continuative processes. To support enhanced functionalities of a service robot system an image based meta-search engine that is accessible for a machine can be used. In this contribution the realization of an approach to determine reasonable identification results for single and multiple everyday objects by using the Google reverse image search system is described. In order to deliver convenient results for the communication of a robotic system with a human user the generated search results are post-processed and prepared in order to provide reasonable object descriptions. To enable an intuitive application, control a gesture based approach allows potential users to initialize a search procedure by pointing at an object of interest while being observed by a camera system. The performed experiments show a quite reliable detection behavior for a reasonably broad variety of everyday objects.
APA, Harvard, Vancouver, ISO, and other styles
10

Kunash, А. А. "Interpretation, topography and chronology of the greco-catholic medals of the XVII–XVIII centuries (according to archaeological research and analysis of private collections)." Proceedings of the National Academy of Sciences of Belarus, Humanitarian Series 66, no. 1 (February 25, 2021): 41–57. http://dx.doi.org/10.29235/2524-2369-2021-66-1-41-57.

Full text
Abstract:
The article provides an analysis and interpretation of 55 Greek Catholic medals of the 17th – 18th centuries. The search for information about Greek Catholic medals was carried out through the study of scientific literature, search in catalogs of private collections, monitoring of specialized sites dedicated to the subjects of Christian worship and Internet forums of “black” diggers, as well as Internet auctions. During archaeological research, only 4 Greek Catholic medals were identified (Belarus, Lithuania, Poland, Italy). The overwhelming majority of the medals under consideration (51 copies) were discovered during the illegal work of “black archaeologists” in Belarus, Ukraine, Poland and Spain. On the front side, the Greek Catholic medals contain images of the Mother of God Zhirovitskaya, Mother of God of Pochaev, Mother of God of Kholmskaya and Mother of God of Borunskaya. On the reverse side there are images of St. Andrew (apostle), St. Basil the Great, St. Joseph with the Christ Child, St. Josaphat Kuntsevich, St. Anufriy the Great. Most of the medals are labeled in Latin. The inscriptions on the medals with the image of Our Lady of Zhirovitskaya (subtype 3 (no. 5–26)) are made from a set of letters of the Greek, Latin and Church Slavonic alphabets.
APA, Harvard, Vancouver, ISO, and other styles
11

Srinivasa, K. G., N. Pramod, K. R. Venugopal, and L. M. Patnaik. "Effects of Information Filters." International Journal of Information Retrieval Research 2, no. 2 (April 2012): 1–12. http://dx.doi.org/10.4018/ijirr.2012040101.

Full text
Abstract:
In the Internet era, information processing for personalization and relevance has been one of the key topics of research and development. It ranges from design of applications like search engines, web crawlers, learning engines to reverse image searches, audio processed search, auto complete, etc. Information retrieval plays a vital role in most of the above mentioned applications. A part of information retrieval which deals with personalization and rendering is often referred to as Information Filtering. The emphasis of this paper is to empirically analyze the information filters commonly seen and to analyze their correctness and effects. The measure of correctness is not in terms of percentage of correct results but instead a rational approach of analysis using a non mathematical argument is presented. Filters employed by Google’s search engine are used to analyse the effects of filtering on the web. A plausible solution to the errors of filtering phenomenon is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Lianpo. "Deformation Measurement of Scaling and Rotation Objects Based on Digital Image Correlation Method with Color Information." Photonics 9, no. 4 (April 2, 2022): 237. http://dx.doi.org/10.3390/photonics9040237.

Full text
Abstract:
The digital image correlation (DIC) method is widely used in deformation measurement due to the advantages of being non-contact, high precision, full field measurement, and requiring simple experimental equipment. Traditionally, the grayscale speckle patterns captured by a monochromatic camera are used in the DIC method. With the growing development of consumer color cameras, there is a great potential for developing color information in the DIC method. This paper proposes a scaling- and rotation-invariant DIC (SRI-DIC) method based on the color speckle patterns. For the integer-pixel matching stage, the scaling- and rotation-invariant color histogram feature is used to estimate the initial value of the deformation parameters. For the sub-pixel matching stage, a new error function using the three-channel information of color camera is proposed to avoid the influence of illumination changes. In addition, this paper proposes a reverse retrieve strategy instead of the forward search to reduce the search time. Experiments show that the proposed SRI-DIC algorithm not only has scaling and rotation invariance, robustness, and high efficiency, but also that the average accuracy of the strain result can reach 0.1%.
APA, Harvard, Vancouver, ISO, and other styles
13

Kelly, Elizabeth Joan. "Reuse of Wikimedia Commons Cultural Heritage Images on the Wider Web." Evidence Based Library and Information Practice 14, no. 3 (September 11, 2019): 28–51. http://dx.doi.org/10.18438/eblip29575.

Full text
Abstract:
Abstract Objective – Cultural heritage institutions with digital images on Wikimedia Commons want to know if and how those images are being reused. This study attempts to gauge the impact of digital cultural heritage images from Wikimedia Commons by using Reverse Image Lookup (RIL) to determine the quantity and content of different types of reuse, barriers to using RIL to assess reuse, and whether reused digital cultural heritage images from Wikimedia Commons include licensing information. Methods – 171 digital cultural heritage Wikimedia Commons images from 51 cultural heritage institutions were searched using the Google images “Search by image” tool to find instances of reuse. Content analysis of the digital cultural heritage images and the context in which they were reused was conducted to apply broad content categories. Reuse within Wikimedia Foundation projects was also recorded. Results – A total of 1,533 reuse instances found via Google images and Wikimedia Commons’ file usage reports were analyzed. Over half of reuse occurred within Wikimedia projects or wiki aggregator and mirror sites. Notable People, people, historic events, and buildings and locations were the most widely reused topics of digital cultural heritage both within Wikimedia projects and beyond, while social, media gallery, news, and education websites were the most likely places to find reuse outside of wiki projects. However, the content of reused images varied slightly depending on the website type on which they were found. Very few instances of reuse included licensing information, and those that did often were incorrect. Reuse of cultural heritage images from Wikimedia Commons was either done without added context or content, as in the case of media galleries, or was done in ways that did not distort or mischaracterize the images being reused. Conclusion – Cultural heritage institutions can use this research to focus digitization and digital content marketing efforts in order to optimize reuse by the types of websites and users that best meet their institution’s mission. Institutions that fear reuse without attribution have reason for concern as the practice of reusing both Creative Commons and public domain media without rights statements is widespread. More research needs to be conducted to determine if notability of institution or collection affects likelihood of reuse, as preliminary results show a weak correlation between number of images searched and number of images reused per institution. RIL technology is a reliable method of finding image reuse but is a labour-intensive process that may best be conducted for selected images and specific assessment campaigns. Finally, the reused content and context categories developed here may contribute to a standardized set of codes for assessing digital cultural heritage reuse.
APA, Harvard, Vancouver, ISO, and other styles
14

Luo, Huadong, Jun Yan, Haifeng Ling, Guangna Zhang, Qing Wang, Hongchuan Luo, and Tao Zhu. "Research on target location of unmanned aerial vehicles in parallel path." MATEC Web of Conferences 309 (2020): 04002. http://dx.doi.org/10.1051/matecconf/202030904002.

Full text
Abstract:
This paper mainly studies how to use the stereo vision system that combines the monocular vision with parallel path search to locate the target. When the unmanned aerial vehicle (UAV) searches in the mission area according to the parallel path, the SSD image detection algorithm based on deep learning is adopted to detect and identify the target in the area. The image coordinate information is inversely calculated by using the pixel coordinate information fed back by machine vision. The auxiliary coordinate system is established according to the relationship of angle position between the track line and the basic coordinate system in the parallel path. Combining the position relation and the attitude direction information of UAV, the target position conversion relation between the imaging coordinate system and the auxiliary coordinate system is solved by using the direction cosine matrix. Combined with the coordinate information of UAV, the coordinate position of the target point in the basic coordinate system is finally solved through three coordinate conversion operations. In order to avoid the single calculating error of the target coordinates, the weighted average operation is carried out. On the basis of not changing the search trip of the parallel path, the target location function is preliminarily realized through the reverse solution and the weighted average operation of the target coordinates.
APA, Harvard, Vancouver, ISO, and other styles
15

Lovenduski, Joni, and Pippa Norris. "Labour and the Unions: After the Brighton Conference." Government and Opposition 29, no. 2 (April 1, 1994): 201–17. http://dx.doi.org/10.1111/j.1477-7053.1994.tb01251.x.

Full text
Abstract:
A Discussion of Last Autumn's Debate over Candidate selection in the British Labour Party and a consideration of the party's links with the trade unions may seem inappropriately provincial in an international journal of comparative politics. However, when viewed as an example of the continued search for political relevance by socialist parties in opposition, the issues raised by Labour's struggle to modernize take on more general interest. During long periods in the wilderness parties characteristically try to revive their fortunes by reforming organizational structures, ideological platforms and electoral strategies. For Labour, this started under the leadership of Neil Kinnock and continued with John Smith. The party has moved cautiously towards the centre ground, streamlined its election machine, modernized its communication strategy, and produced a more unified and moderate image. Labour's reforms of its relationship with the union movement are clearly part of this general attempt to reverse its electoral fortunes.
APA, Harvard, Vancouver, ISO, and other styles
16

Ali, Dina M., Lamiaa G. Zake, and Nevine K. El Kady. "Role of Chest Computed Tomography versus Real Time Reverse Transcription Polymerase Chain Reaction for Diagnosis of COVID-19: A Systematic Review and Meta-Analysis." Interdisciplinary Perspectives on Infectious Diseases 2021 (May 28, 2021): 1–12. http://dx.doi.org/10.1155/2021/8798575.

Full text
Abstract:
Background. The current global pandemic of COVID-19 is considered a public health emergency. The diagnosis of COVID-19 depends on detection of the viral nucleic acid by real time reverse transcription polymerase chain reaction (RT-PCR). However, false-negative RT-PCR tests are reported and could hinder the control of the pandemic. Chest computed tomography could achieve a more reliable diagnosis and represent a complementary diagnostic tool. Aim. To perform a meta-analysis and systematic review to find out the role of chest computed tomography versus RT-PCR for precise diagnosis of COVID-19 infection. Methods. We searched three electronic databases (PubMed, ScienceDirect, and Scopus) from April 1 to April 20, 2020, to find out articles including the accuracy of chest computed tomography scan versus RT-PCR for diagnosis of SARS-CoV-2 infection. Observational studies, case series, and case reports were included. Results. A total of 238 articles were retrieved from the search strategy. Following screening, 39 articles were chosen for full text assessment and finally 35 articles were included for qualitative and quantitative analysis. Chest computed tomography showed a wide range of sensitivity varied from 12%–100%. Conclusion. Chest computed tomography is playing a key role for diagnosis and detection of COVID-19 infection. Computed tomography image findings may precede the initially positive RT-PCR assay.
APA, Harvard, Vancouver, ISO, and other styles
17

Kovačević, Marijana. "Olipski fragment gotičkoga srebrnog ophodnog križa s prikazom Sv. Stošije." Ars Adriatica, no. 3 (January 1, 2013): 103. http://dx.doi.org/10.15291/ars.463.

Full text
Abstract:
This paper discusses an interesting silver fragment showing an image of a saint which was found a few years ago in the rectory of the island of Olib. Based on a thorough comparison of the fragment with similar liturgical objects from the wider area of Zadar, especially with the processional cross from Vlašići (Pag), the authoress proposes that the fragment once belonged to a Gothic proccessional cross dating from the end of the 14th century and that it was nailed as the middle part of its reverse side. The image of the saint depicted on this fragment is identified, based partly on the place of its discovery, with the patron saint of the parish of Olib, St.Anastasia. This identification is further strenghtened also by an iconographical analysis of various depictions of St. Ananstasia in Romanesque and Gothic art of Zadar and its area, especially in goldsmiths’ work of the time, where there are relatively many of her images considering that St. Anastasia was the patron saint of Zadar cathedral, where her relic was treasured for centuries, and also one of four main patron saints of this important Adriatic city. That analysis led to the conclusion that there was a certain evolutive change in the depiction of the saintly patroness during that era, and that, starting form ourfragment and the end of the 14th century, she is more often adorned with a book as her standard attribute.It was also noted that the image depicted on the Olib fragment may, perhaps, be identified with St. Catherine of Alexandria who was also often depicted with a book. Namely, she was the patron saint of a church in Novigrad, a small medieval town situated in the hinterland of Zadar,whence its inhabitants could have brought a whole cross, or solely this fragment, centuries after its making, as C. F. Bianchi recorded thet they brought to Olib a worshipped painting when fleeing from the Turks. This move of the local treasure from Novigrad to Olib in times of crisis and flight would thus coincide with the same practice of the move of the processional cross from Gorica to Pašman, as proposed by N. Jakšić. The stumbling stone of this theory is, of, course, the existence of the 14th century processional cross in Novigrad, with very similar image of St. Catherine on its reverse. Although she is iconographically coherent with the saintly image on the fragment from Olib, it is rather difficult toexplain the making of two similar processional crosses in such a short period of time, since the evident stylistic and tehnical differences between the two images allow only for a short time difference. On the other hand, if the saint on the Olib fragment indeed is St. Anastasia, this would mean that the parish church of Olib regularly refurbished its liturgical equipment during the period of less than two centuries, since one processional cross from Olib older than our fragment has also survived, still partly Romanesque in its morphology and iconography, as well as has survived the late 15th century cross attributed to Toma Martinov, goldsmith from Zadar, whose style is already Rennaissance in many aspects. In course of the search for the images of St. Anastasia in the medieval goldsmiths’ work of Zadar it was also observed that the long established iconographical identification of the figures depicted on the luxurious bishop’s staff of the archbishop Maffeo Vallaresso (1460) has to be partially revised.
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Yuxia, Wenzhu Yang, Tongtong Yuan, and Qian Li. "An Improved Object Detection Method using Feature Map Refinement and Anchor Optimization." International Journal of Circuits, Systems and Signal Processing 15 (June 8, 2021): 541–49. http://dx.doi.org/10.46300/9106.2021.15.60.

Full text
Abstract:
Lower detection accuracy and insufficient detection ability for small objects are the main problems of the region-free object detection algorithm. Aiming at solving the abovementioned problems, an improved object detection method using feature map refinement and anchor optimization is proposed. Firstly, the reverse fusion operation is performed on each of the object detection layer, which can provide the lower layers with more semantic information by the fusion of detection features at different levels. Secondly, the self-attention module is used to refine each detection feature map, calibrates the features between channels, and enhances the expression ability of local features. In addition, the anchor optimization model is introduced on each feature layer associated with anchors, and the anchors with higher probability of containing an object and more closely match the location and size of the object are obtained. In this model, semantic features are used to confirm and remove negative anchors to reduce search space of the objects, and preliminary adjustments are made to the locations and sizes of anchors. Comprehensive experimental results on PASCAL VOC detection dataset demonstrate the effectiveness of the proposed method. In particular, with VGG-16 and lower dimension 300×300 input size, the proposed method achieves a mAP of 79.1% on VOC 2007 test set with an inference speed of 24.7 milliseconds per image.
APA, Harvard, Vancouver, ISO, and other styles
19

Adikara, Putra Pandu, Sigit Adinugroho, and Yuita Arum Sari. "Pencarian Produk yang Mirip Melalui Automatic Online Annotation dari Web dan Berbasiskan Konten dengan Color Histogram Bin dan Surf Descriptor." Jurnal Teknologi Informasi dan Ilmu Komputer 5, no. 1 (March 3, 2018): 104. http://dx.doi.org/10.25126/jtiik.201851630.

Full text
Abstract:
Banyaknya situs <em>e-commerce</em> memberikan kemudahan bagi pengguna yang ingin mencari dan membeli suatu produk, misalnya membeli makanan, obat, alat elektronik, kebutuhan sehari-hari, dan lain-lain. Pencarian suatu produk terhadap beberapa situs<em> e-commerce</em> akan menjadi sulit karena banyaknya pilihan situs, banyaknya penjual (merchant/seller) yang menjual barang yang sama, dan waktu yang lama karena harus berpindah-pindah situs hingga menemukan produk yang diinginkan. Selain itu dengan adanya teknologi <em>smartphone</em> berkamera, <em>augmented reality</em>, <em>query </em>pencarian bisa jadi hanya berupa citra, namun pencarian produk dengan menggunakan citra pada umumnya tidak diakomodasi di situs<em> e-commerce</em>. Dalam penelitian ini dikembangkan sistem meta <em>search-engine</em> yang menggunakan <em>query</em> berupa citra dan berbasiskan konten untuk menggabungkan hasil pencarian dari beberapa situs<em> e-commerce</em>. Citra <em>query</em> yang tidak diketahui namanya dibangkitkan <em>tag</em> atau kata kuncinya melalui Google <em>reverse</em> <em>image search engine. </em>Kata kunci ini kemudian diberikan ke masing-masing situs<em> e-commerce</em> untuk dilakukan pencarian. Fitur yang digunakan dalam pencocokan <em>query</em> dengan produk adalah fitur tekstual, <em>color histogram bin</em>, dan keberadaan citra objek yang dicari menggunakan SURF <em>descriptor</em>. Fitur-fitur ini digunakan untuk menentukan relevansi terhadap hasil penelusuran. Sistem ini dapat memberikan hasil yang baik dengan <em>precision@20</em> dan <em>recall</em> hingga 1 dengan rata-rata <em>precision@20</em> dan <em>recall </em>masing-masing sebesar 0,564 dan 0,608, namun juga bisa gagal dengan <em>precision@20</em> dan <em>recall</em> sebesar 0. Hasil yang kurang baik ini dikarenakan <em>tag</em> yang dibangkitkan terlalu umum dan situs<em> e-commerce</em>-pun memberikan hasil yang umum juga
APA, Harvard, Vancouver, ISO, and other styles
20

Konstantinova, Elena Yu. "PAVEL FLORENSKY’S CONCEPT OF THE ICON." Scientific and analytical journal Burganov House. The space of culture 16, no. 4 (December 10, 2020): 19–32. http://dx.doi.org/10.36340/2071-6818-2020-16-4-19-32.

Full text
Abstract:
This article is an analysis of the concept of the icon as seen by Pavel Florensky, a priest, philosopher of religion, and theologian. He expressed his views on the art of icon painting in the articles The Church Ritual as a Synthesis of the Arts, Devotional Icons of St. Sergius of Radonezh, and Reverse Perspective, as well as his work Iconostasis. Florensky’s theory is of great interest for art history, contributing to it not only by highly evaluating Russian icons of the 14th and 15th centuries but also by offering a new approach to realism in art. Yet as his concept is complex, it is also controversial. Viewing the icon as a work of art and following Plato’s philosophy, Florensky believes the objective reality of the Realm of Ideas to be the basis of artistic creativity in general and icon painting in particular. According to him, the creation of art is not an artist’s subjective search for the ways of self-expression but the result of the soul’s ascent to the truth, the world of prototypes. The icon reflects divine reality and is thus realistic in nature. Highly evaluating the icon painting in the 14–15 century Russia, he believes Andrei Rublev’s Holy Trinity to be an art masterpiece. However, developing his concept, Florensky discards the term “image”: for him, the icon is merely a symbol pointing to the prototype. The artistic image is born in the artist’s soul and exists independently from the icon, and can then be born in the soul of the beholder, who is guided to the prototype by the symbol. This is how the icon, as a result of artistic creation, is reproduced in the person viewing it. Florensky underlines the importance of aesthetics in assessing an icon, for a work’s artistic perfection is inseparable from its ability to testify to the prototype, and beauty is measured with the truthfulness of this testimony. Yet by acknowledging the fact that all icons created according to the canon are of the same value, he renounces the artistic criterion and makes the masterpieces of icon painting equal to many other artworks of average quality. For Florensky, the icon is an integral part of a synthetic work of art – the church ritual – and its existence as an art phenomenon is dependent on certain conditions: if these are not met, it “dies” as art.
APA, Harvard, Vancouver, ISO, and other styles
21

Tsai, Michaela L., Joel E. Money, Marsha J. Finkelstein, Tamera J. Lillemoe, Barbara Susnik, Erin V. Grimm, Sung-hae L. Kang, and Karen K. Swenson. "Utility of Oncotype DX risk assessment in patients with invasive lobular carcinoma (ILC)." Journal of Clinical Oncology 32, no. 26_suppl (September 10, 2014): 28. http://dx.doi.org/10.1200/jco.2014.32.26_suppl.28.

Full text
Abstract:
28 Background: Oncotype DX (Genomic Health, Redwood City, CA) is a breast cancer assay that uses reverse transcriptase polymerase chain reaction (RT-PCR) to measure gene expression in paraffin-embedded tumor tissue, which correlates with recurrence risk. This test is used to guide chemotherapy decisions in patients with estrogen receptor-positive breast cancer. Invasive lobular carcinoma (ILC) is a distinct histologic subtype, inherently estrogen receptor rich, that has not been the unique focus of prior studies validating Oncotype DX. The study purpose was to determine if there are certain features of ILC that predict uniformly low Oncotype DX Recurrence Scores (RS) such that Oncotype DX testing may be unnecessary, saving patients time and financial resources. Methods: A search was conducted of all ILC cases having Oncotype DX testing in our hospital pathology database. The Oncotype DX RS, histologic tumor characteristics (including subtype and grade), immunohistochemical (IHC) analyses of estrogen receptor (ER)/progesterone receptor (PR) percent (by image analysis), E-cadherin expression, and Ki-67 levels were obtained for each case. Discriminant analysis was used to test the hypothesis that tumors classified as low or high risk based on the Oncotype DX RS would differ significantly on a linear combination of selected variables. Results: From 2006 to 2013, 158 cases of ILC having Oncotype DX testing were identified; 90 low risk (RS <18), 66 intermediate risk (RS 18 – 30) and 2 high risk (RS > 30). Discriminant analysis showed that PR% followed by Ki-67 provided the greatest contribution to discriminating between low versus high RS. A subset of 57 cases (~ 36%) with predicted probabilities > 86% for either low or high RS yielded 96.5% correct classification, 92.3% sensitivity, and 97.7% specificity. Conclusions: Our analytical model may be useful in predicting high versus low recurrence risk in some patients with ILC. If validated, this provides a faster and less expensive alternative to Oncotype DX testing in certain patients with ILC.
APA, Harvard, Vancouver, ISO, and other styles
22

Dziuba, Elena V., and Irina Yu Ryabova. "Transfer of Legal Knowledge to the Narrative Space of a Work of Fiction." Izvestia of the Ural federal university. Series 2. Humanities and Arts 23, no. 4 (2021): 297–317. http://dx.doi.org/10.15826/izv2.2021.23.4.080.

Full text
Abstract:
The object of this study is hybrid discourse as a result of the integration of language markers and concepts of legal discourse and literary narrative. The subject of the study is the techniques, mechanisms, and means of transfer involved in the formation of hybrid discourse. The transfer of legal knowledge into a literary text is the process of transmitting knowledge marked by the legal sphere into the narrative space of a literary text in order to model the image of a female judge, identify professionally significant personality characteristics and internal contradictions integrated into a personalised concept of morality. The purpose of this work is to study verbal tools of the knowledge transfer, implemented by the language markers of legal discourse and units of a literary text in the process of formation of a heterogeneous text that is the result of functioning of hybrid discourse. The study is conducted with regard to linguistic, psycholinguistic, cultural, logical-philosophical, and cognitive-discursive approaches to the analysis of knowledge transfer and involving the structural-semantic method, methods of contextual and conceptual analysis, as well as more specific methods of profiling, component analysis, etymological analysis, etc. The authors refer to The Children Act, a novel by the British writer Ian McEwan. The thematic core of this work is the moral issues of family law and religious differences between representatives of different confessions and Judge Fiona May’s personified moral and psychological search, dealing with issues of law, personality and society, parenting, life and death. The personal model of behaviour is reconstructed in this study and it reflects professional knowledge and skills, speech characteristics, ethical and moral prerequisites of behaviour, and relationships with others that become a conceptual component of the judge’s activity. This model is regarded from the perspective of the theory of transfer of legal knowledge in the space of a literary text. The authors identify the knowledge transfer mechanisms (inference, (de)focusing, metaphorisation, adjectivisation), the main transfer techniques — textual (reverse editing, syntactic dominant, perspectivisation, antithesis, emphasis) and lexical-semantic (transformation of word meanings, semantic implications, actualisation of word etymology, profiling of individual components of meaning), and means of transfer — linguistic realities (extended context, sentence, word, seme). The selected techniques and mechanisms of transfer manifest themselves at different levels of language: semantic, syntactic, and linguo-pragmatic. The inclusion of linguistic markers and concepts of legal discourse in the space of a literary text creates a single heterogeneous context in which the significant semantic and axiological characteristics of the personified model of the morality of the judge of England are represented. The authors make a conclusion about the mutual influence of the two marked discourses.
APA, Harvard, Vancouver, ISO, and other styles
23

Holtz, Timothy H., and Mary D. Nettleman. "Emporiatrics: Diarrhea in Travelers." Infection Control & Hospital Epidemiology 11, no. 11 (November 1990): 606–10. http://dx.doi.org/10.1086/646104.

Full text
Abstract:
The litany of scatalogical euphemisms describing travelers’ diarrhea sounds more like a line-up for a horse race: turista, Aztec two-step, Ramses’ revenge, Casablanca crud, Bombay runs, Delhi belly and Tokyo trots. While the winner in this race is uncertain, the loser is the poor traveler whose most memorable image of an expensive, exotic vacation was a desperate search for bathrooms or confinement to a hotel room while others were enjoying the sights. Though self-limited and relatively mild compared to some diseases acquired abroad, the impact of travelers’ diarrhea on the traveler should not be underestimated.
APA, Harvard, Vancouver, ISO, and other styles
24

Ledermann, Florian. "Classifying Cartographic Projections Based on Dynamic Analysis of Program Code." Abstracts of the ICA 2 (October 9, 2020): 1. http://dx.doi.org/10.5194/ica-abs-2-38-2020.

Full text
Abstract:
Abstract. Analyzing a given map to identify its projection and other geometrical properties has long been an important aspect of cartographic analysis. If explicit information about the projection used in a particular map is not available, the properties of the cartographic transformation can sometimes be reconstructed from the map image. However, such a process of projection analysis requires significant manual labor and oversight.For digital maps, we usually expect the projection from geographic space to map space to have been calculated by a computer program. Such a program can be expected to contain the implementation of the mathematical rules of the projection and subsequent coordinate transformations such as translation and scaling. The program code, therefore, contains information that would allow an analyst to reliably identify map projections and other geometrical transformations applied to the input data.In the case of interactive online maps, the code generating the map is in fact delivered to the map user and could be used for cartographic analysis. The core idea of our novel method proposed for map analysis is to apply reverse engineering techniques on the code implementing the cartographic transformations in order to retrieve the properties of the applied map projection. However, automatic reasoning about computer code by way of static analysis (analyzing the source code without running it) is provably limited – for example, the code delivered to the map user may contain a whole library of different map projections, of which only a specific one may be actually used at runtime. Instead, we propose a dynamic analysis approach to observe and monitor the operations performed by the code as the program runs, and to retrieve the mathematical operations that have been used to calculate the coordinates of every graphical element on the map.The presented method produces, for every graphical element of the map, a transformation graph consisting of low-level mathematical operations. Cartographic projections can be identified as distinctive patterns in the transformation graph, and can be distinguished in a fully automatic way by matching a set of predefined patterns against a particular graph.Projections vary widely in their arithmetic structure, and therefore by the structure of the corresponding transformation graphs extracted from program code. Some projections can be computed directly using continuous equations involving trigonometric functions. Other projections involve solving nonlinear equations, which need to be solved by approximation. Composite projections use different projections depending on some threshold value. Yet other projections, such as the Robinson projection, define a table of predefined values, between which interpolation is used etc.. In each of these cases, we expect to find the operations corresponding to the mathematical structure of the projection in the transformation graph extracted by the presented method.For verifying the method, we have implemented the patterns of several well-known cartographic projections based on the literature and have used it on the transformation graphs extracted from a variety of sample programs. To ensure a diversity of implementations, we have evaluated programs using different and independent JavaScript implementations of projections, including the open source libraries D3.js, proj4js, Leaflet, OpenLayers, and informal implementations of example programs found online. For these case studies, we could successfully identify many projections based on identifying patterns in the transformation graph in a fully automated, unsupervised manner.In the future, the proposed method may be further developed for many innovative application scenarios, such as building a “cartographic search engine” or constructing novel tools for semi-automatic cartographic analysis and review.
APA, Harvard, Vancouver, ISO, and other styles
25

Cortés Pellicer, Pascual, and Faustino Alarcón Valero. "Identification of reverse logistics decision types from mathematical models." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 239. http://dx.doi.org/10.3926/jiem.2530.

Full text
Abstract:
Purpose: The increase in social awareness, politics and environmental regulation, the scarcity of raw materials and the desired “green” image, are some of the reasons that lead companies to decide for implement processes of Reverse Logistics (RL). At the time when incorporate new RL processes as key business processes, new and important decisions need to be made. Identification and knowledge of these decisions, including the information available and the implications for the company or supply chain, will be fundamental for decision-makers to achieve the best results. In the present work, the main types of RL decisions are identified.Design/methodology/approach: This paper is based on the analysis of mathematical models designed as tools to aid decision making in the field of RL. Once the types of interest work to be analyzed are defined, those studies that really deal about the object of study are searched and analyzed. The decision variables that are taken at work are identified and grouped according to the type of decision and, finally, are showed the main types of decisions used in mathematical models developed in the field of RL. Findings: The principal conclusion of the research is that the most commonly addressed decisions with mathematical models in the field of RL are those related to the network’s configuration, followed by tactical/operative decisions such as the selections of product’s treatments to realize and the policy of returns or prices, among other decisions.Originality/value: The identification of the main decisions types of the reverse logistics will allow the managers of these processes to know and understand them better, while offer an integrated vision of them, favoring the achievement of better results.
APA, Harvard, Vancouver, ISO, and other styles
26

van der Eijk, Yvette, Patricia A. McDaniel, Stanton A. Glantz, and Stella A. Bialous. "United Nations Global Compact: an ‘Inroad’ into the UN and reputation boost for the tobacco industry." Tobacco Control 27, e1 (November 2, 2017): e66-e69. http://dx.doi.org/10.1136/tobaccocontrol-2017-054055.

Full text
Abstract:
BackgroundThe United Nations Global Compact (UNGC), a UN initiative to engage corporations in supporting the UN’s mission, sets out principles that companies should follow for more ethical business practices. Since its inception in 2000, at least 13 tobacco companies, subsidiaries and tobacco industry affiliates joined the UNGC. In a September 2017 integrity review, the UNGC Board excluded from UNGC participation companies who derive revenue from tobacco production or manufacturing.ObjectiveTo determine, from the tobacco industry’s perspective, tobacco companies’ motives for joining the UNGC.MethodTobacco industry documents search using the Truth Tobacco Industry Documents Library, and search of published reports and documents on the tobacco industry and the UNGC.ResultsTobacco companies sought to join the UNGC for two reasons: (1) to improve their reputation, in keeping with other corporate social responsibility efforts; (2) to gain proximity to UN agencies and weaken the WHO’s influence, part of an overall strategy to undermine the WHO Framework Convention on Tobacco Control.ConclusionsExcluding tobacco manufacturers from UNGC participation is an important step to limit the tobacco industry’s ability to influence the UN and promote its image and, by extension, its deadly products. It is important to monitor enforcement of this policy and resist the engagement of tobacco industry front groups, such as industry-funded foundations, with the UNGC.
APA, Harvard, Vancouver, ISO, and other styles
27

Ochoa-Maganda, Verónica Yadira, Itzia Azucena Rangel-Castañeda, Daniel Osmar Suárez-Rico, Rafael Cortés-Zárate, José Manuel Hernández-Hernández, Armando Pérez-Rangel, Natalia Chiquete-Félix, et al. "Antigiardial Activity of Acetylsalicylic Acid Is Associated with Overexpression of HSP70 and Membrane Transporters." Pharmaceuticals 13, no. 12 (December 3, 2020): 440. http://dx.doi.org/10.3390/ph13120440.

Full text
Abstract:
Giardia lamblia is a flagellated protozoan responsible for giardiasis, a worldwide diarrheal disease. The adverse effects of the pharmacological treatments and the appearance of drug resistance have increased the rate of therapeutic failures. In the search for alternative therapeutics, drug repositioning has become a popular strategy. Acetylsalicylic acid (ASA) exhibits diverse biological activities through multiple mechanisms. However, the full spectrum of its activities is incompletely understood. In this study we show that ASA displayed direct antigiardial activity and affected the adhesion and growth of trophozoites in a time-dose-dependent manner. Electron microscopy images revealed remarkable morphological alterations in the membrane, ventral disk, and caudal region. Using mass spectrometry and real-time quantitative reverse transcription (qRT-PCR), we identified that ASA induced the overexpression of heat shock protein 70 (HSP70). ASA also showed a significant increase of five ATP-binding cassette (ABC) transporters (giABC, giABCP, giMDRP, giMRPL and giMDRAP1). Additionally, we found low toxicity on Caco-2 cells. Taken together, these results suggest an important role of HSPs and ABC drug transporters in contributing to stress tolerance and protecting cells from ASA-induced stress.
APA, Harvard, Vancouver, ISO, and other styles
28

Dare-Idowu, Oluwakemi, Igo Paulino, Cosme A. O. B. Figueiredo, Amauri F. Medeiros, Ricardo A. Buriti, Ana Roberta Paulino, and Cristiano M. Wrasse. "Investigation of sources of gravity waves observed in the Brazilian equatorial region on 8 April 2005." Annales Geophysicae 38, no. 2 (April 16, 2020): 507–16. http://dx.doi.org/10.5194/angeo-38-507-2020.

Full text
Abstract:
Abstract. On 8 April 2005, strong gravity wave (GW) activity (over a period of more than 3 h) was observed in São João do Cariri (7.4∘ S, 36.5∘ W). These waves propagated to the southeast and presented different spectral characteristics (wavelength, period and phase speed). Using hydroxyl (OH) airglow images, the characteristics of the observed GWs were calculated; the wavelengths ranged between 90 and 150 km, the periods ranged from ∼26 to 67 min and the phase speeds ranged from 32 to 71 m s−1. A reverse ray-tracing analysis was performed to search for the possible sources of the waves that were detected. The ray-tracing database was composed of temperature profiles from the Naval Research Laboratory Mass Spectrometer Incoherent Scatter (NRLMSISE-00) model and SABER measurements as well as wind profiles from the Horizontal Wind Model (HWM) and meteor radar data. According to the ray tracing result, the likely source of these observed gravity waves was the Intertropical Convergence Zone, which caused intense convective processes to take place in the northern part of the observatory. Also, the observed preferential propagation direction of the waves to the southeast could be explained using blocking diagrams, i.e. due to the wind filtering process.
APA, Harvard, Vancouver, ISO, and other styles
29

Вишневская, Екатерина, Ekaterina Vishnevskaya, Татьяна Климова, Tatyana Klimova, Светлана Стенюшкина, and Svetlana Stenyushkina. "Event as a unique tool of tourism development (experience of Belgorod region)." Service & Tourism: Current Challenges 9, no. 3 (September 4, 2015): 105–12. http://dx.doi.org/10.12737/12889.

Full text
Abstract:
The article discusses the significance of the events in the development of the tourism industry and in the formation of the image of the regions. It is noted that the regional tourism authorities in the search for new forms of PR-activity are beginning to use the possibility of the development of event tourism. The Belgorod region is no exception. Event tourism in the Belgorod region is in its infancy. The article highlights the most important events taking place in the territory of the Belgorod region. Despite the apparent activity in this area, a lot of the activities that take place in the regions of our country can hardly be attributed to the field of event tourism. For the most part, it this local events that do not have good policies to promote them, often missing factor of the cyclicity and regularity of their carrying out, not always takes place getting revenue and efficiency of their organization. A lot of events are not generating the tourist flow, because focused on the inhabitants of the territory, rather than tourists. In order to these activities moved into the category of event and would attract tourists to the region, it is necessary to consolidate the efforts of specialists in various spheres, including the sphere of public communication, culture, tourism, regional authorities to solution the urgent tasks of development of event tourism and creating a positive image of Russian regions. The result of this interaction must be not just the festival events but new event tourism products, which will create effect of immersion of tourists in the atmosphere of celebration and will be the points of tourist attraction. With the right approach to the organization of event tourism products successfully solves the problem of socio-cultural formation of the image of the region, not only domestically, but also abroad, and as a consequence, increases the tourist flow and the financial inflow of participants of the tourist market.
APA, Harvard, Vancouver, ISO, and other styles
30

Ashraf, Dr Rumana. "Representation of Kashmiri Women in Naseem Shifaee’s Selected Poems." SMART MOVES JOURNAL IJELLH 9, no. 1 (January 28, 2021): 123–35. http://dx.doi.org/10.24113/ijellh.v9i1.10885.

Full text
Abstract:
The paper undertakes examination of selected poems of Naseem Shifaee’s translated in English by Neerja Mattoo by focusing on female identity . Literature looks at humanity with a questioning as well as affirmative gaze, disapproving and approving at the same time, reaffirming stereotypes as well as breaking them. Throughout ages narratives in Kashmir have revealed the inbuilt discrimination and biases against women. Cultural space for women is highly restricted in Kashmir. In spite of their marginalized position Kashmiri women made themselves heard ,undeterred by established womanly restraints interrogated the patriarchal practices and refused to live in a culture of silence . Naseem Shifaee is a powerful women voice acclaimed internationally with the publication of her first poetry collection Darichi Matsrith (windows thrown open) highlighted the existing reality of women in contemporary Kashmir. The paper will explore the incongruity between the societal image of female poetic persona and her own instincts about her true nature .It will be argued how poetic persona is trapped in male allotted and confined space, persuaded to look at herself continually in terms of social conventions according to which women are denigrated by patriarchal supremacy .The bewildered state of mind leads her to undertake the obsessive search for her authentic self identity. She questions what if roles were reversed? In other two poems Naseem questions patriarchal traditions Naseem Shifaee assume the role of the medium in establishing female non being into self-realized person.
APA, Harvard, Vancouver, ISO, and other styles
31

Leonardo-Loayza, Richard Angelo. "Desposeídos y perversos. Una relectura de “El cobrador” de Rubem Fonseca / Dispossessed and Wicked. A Rereading of “El Cobrador” by Rubem Fonseca." O Eixo e a Roda: Revista de Literatura Brasileira 30, no. 4 (January 6, 2022): 198. http://dx.doi.org/10.17851/2358-9787.30.4.198-219.

Full text
Abstract:
Resumen: El artículo aborda “El cobrador” de Rubem Fonseca. Se pretende demostrar que este relato evidencia la materialidad del malestar de los grupos subalternos, ante la exclusión que experimentan por parte de los grupos de poder en Brasil. Lo interesante de este texto no estriba sencillamente en el reclamo y la búsqueda de igualdad, sino en elaborar una ética que tiene como fundamento la venganza y la rapiña, sustentadas en una promesa incumplida: la repartición equitativa de los bienes (materiales y simbólicos). Asimismo, se desea probar que este cuento denuncia como falsa la imagen de un Brasil en armonía social y presenta, por el contrario, un país sesgado por la violencia, en el que los marginales ya no están dispuestos a seguir soportando más las desigualdades sociales. De otro lado, también se sostiene que este texto muestra la emergencia de un sujeto excluido, pero entendido como un exceso propio del capitalismo tardío, un sujeto perverso y violento.Palabras clave: Rubem Fonseca; “El cobrador”; capitalismo tardío; violencia; perversiónAbstract: The article analyzes “El cobrador”, by Rubem Fonseca. It is intended to show that this story evidences the materiality of the discomfort of subordinate groups, in the face of the exclusion they experience from power groups in Brazil. What is interesting about this text does not simply lie in the claim and the search for equality, but in elaborating an ethic that is based on revenge and robbery, supported by an unfulfilled promise: the equitable distribution of goods (material and symbolic). Likewise, we want to prove that this story denounces as false the image of a Brazil in social harmony and presents, on the contrary, a country biased by violence, in which the marginalized are no longer willing to continue to endure social inequalities. On the other hand, it is also argued that this text shows the emergence of an excluded subject, but understood as an excess typical of late capitalism, a perverse and violent subject, a product of the demands to which contemporary society invites and, at the same time, demands to be an integral part.Keywords: Rubem Fonseca; “El cobrador”; late capitalism; violence; perversion.
APA, Harvard, Vancouver, ISO, and other styles
32

Jassim, Jinan Waheed. "Medea Revisited: Marina Carr's By the Bog of Cats… and the Modern Defiant Mother." لارك 3, no. 34 (July 16, 2019): 447–57. http://dx.doi.org/10.31185/lark.vol3.iss34.1103.

Full text
Abstract:
Abstract;Marina Carr, one of the prominent Irish feminist playwrights, deviates from the mainstream patriarchal portrayal of women in her modern plays. She moves away from the stereotypical image of Irish mother as an emblem of the nation and the land, hence, seen as a selfless, loving, sacrificing woman who identifies herself with the motherhood. Instead Carr introduces broken, maltreated, and defiant women to the modern Irish stage. Her adaptation of the myth of Medea for her play By the Bog of Cats…is considered as a challenge to the classical Greek and Irish drama. Both Medea and Hester Swane are outsiders, betrayed by husbands, outcast from their homeland and community. Their search for identity and independence lead them to commit unspeakable actions. Yet, while Medea was driven by her desire to revenge on a betraying husband, Hester reacted to ongoing fear of abandonment and loss. This paper highlights Carr's talent in portraying modern ordinary mothers who defy the male-dominated society and seek a social status in her own right. Mothers who show an untraditional love for their children; a mother who are ready to sacrifice herself for the welfare of her daughter, saving her from a bleak future with a selfish father, dysfunctional grandmother, and immature step mother. Thus, Hester Swane represents new unconventional Irish mother who is willing to defy the norms to prove herself.
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Wei, Nathalie Burg, Spandana Vootukuri, and Barry S. Coller. "Systemic Activation of Platelet-Derived TGF-β1 Leads to Increased Smad2/3 Phosphorylation in Circulating Leukocytes and Platelet-Leukocyte Aggregates in a Mouse Model of Aortic Valve Stenosis." Blood 124, no. 21 (December 6, 2014): 2756. http://dx.doi.org/10.1182/blood.v124.21.2756.2756.

Full text
Abstract:
Abstract Shear stress (SS) can activate platelets, leading to exposure of surface P-selectin and development of platelet-leukocyte aggregates (PLAs). Increased numbers of PLAs has been reported in the circulation of patients with aortic valve stenosis (AS), who have high SS across the stenotic valves, and aortic valve replacement decreases the SS and number of PLAs. Activated platelets release their granule contents, which includes transforming growth factor-β1 (TGF-β1). Our lab has reported that SS can activate latent TGF-β1 released from platelets both in vitro and in in vivo mouse models of AS. Since current assays are not sensitive enough to detect activated TGF-β1 in plasma, we searched for evidence of active TGF-β1 in a mouse model of AS by assessing the level of phosphorylated Smad2/3, a downstream mediator of the classical TGF-β1 signaling pathway, in both circulating leukocytes free of platelets and PLAs. We studied Ldlr-/-Apob100/100/Mttpfl/fl/Mx1Cre+/+ mice (“Reversa”), which spontaneously develop AS when fed a western diet (WD) (n=13), and compared them to the same mice fed a chow diet (n=13), who do not develop AS, and wild type (WT) mice (n=13). We identified leukocytes with an antibody to CD45 (clone 30-F11), platelets with an antibody to CD41 (clone MWReg30), PLAs by double staining, and p-Smad2/3 with an antibody to p-Smad2 (pS465/pS467)/Smad3 (pS423/pS425) (clone O72-670). Leukocytes and PLAs were analyzed by both a flow cytometer and an instrument that combines digital fluorescence microscopy with flow cytometry (ImageStream-X). Reversa mice on WD for 3 months developed AS with increased SS across the valves and increased plasma total TGF-β1 levels in circulation as we previously reported (Wang et al., ATVB, 2014). Reversa mice on WD also had a significantly increased percentage of PLAs compared to the other two groups (both p<0.05; Table), suggesting platelet activation under high SS. The intensity of p-Smad2/3 staining in leukocytes free of platelets of Reversa mice on a WD was greater than the intensity in the other two groups (both p<0.01). In all 3 groups, p-Smad2/3 in PLAs was higher than in leukocytes free of platelets (all p<0.001), but Reversa mice on a WD had the highest p-Smad2/3 levels in their PLAs (p<0.05 for both. Fluorescent microscopy showed that p-Smad2/3 was located primarily in the leukocytes of the PLAs (Figure 1). There was no correlation between p-Smad2/3 staining of PLAs and the number of platelets per leukocyte (p=0.78 for WT group, p=0.52 for Reversa chow diet, and p=0.15 for Reversa WD). In summary: (1) PLAs have more leukocyte p-Smad2/3 than leukocytes that are free of platelets, regardless of genotype/diet. (2) Leukocytes free of platelets in Reversa mice on a WD have more p-Smad2/3 than those in the other two groups. (3) Reversa mice on WD have both more PLAs and more leukocyte p-Smad2/3 in their PLAs. We conclude that the increased leukocyte p-Smad2/3 in Reversa mice on WD reflects increased TGF-β1 signaling through both: 1) direct platelet-leukocyte interactions and 2) release of TGF-β1 from platelets into plasma and its subsequent activation by high SS. TableGroupPLA (% of total leukocytes)p-Smad2/3 Mean Fluorescence Intensity (AU)Leukocytes free of plateletsPLAsWT16.9 ± 1.9173.9 ± 15.49204.7 ± 17.9 #Reversa (chow diet)16.4 ± 2.1172.3 ± 15.24200.8 ± 15.9 #Reversa (WD)26.1 ± 3.1*^237.5 ± 17.42*^268.9 ± 17.1 *^# * p<0.05 Reversa (WD) vs. WT; ^ p<0.05 Reversa (WD) vs. Reversa (chow diet); # p<0.001 PLA vs. leukocytes free of platelets. AU: arbitrary unit; WD: western diet Figure 1: Figure 1:. representative images of PLAs in each group from ImageStream-X. Disclosures No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
34

Bundies, Gabriel Luiz, and Himanshu Tyagi. "#3095 Rapid anti-obsessive treatments of obsessive-compulsive disorder: reviewing effects of ketamine in OCD." Journal of Neurology, Neurosurgery & Psychiatry 92, no. 8 (July 16, 2021): A10.1—A10. http://dx.doi.org/10.1136/jnnp-2021-bnpa.24.

Full text
Abstract:
Objectives/AimsObsessive-Compulsive Disorder (OCD) is a common neuropsychiatric condition characterised by persistent endogenous repetitive and intrusive anxiogenic thoughts, feelings, or images often followed by anxiolytic mental or physical actions. Serotonin reuptake inhibitors (SRIs) are the mainstay of OCD treatment, used both as first line (SSRIs) and second line (Clomipramine) approaches. Despite their effectiveness in treatment of OCD, their anti-obsessive effects only start at eight to 12 weeks into treatment (Pittenger & Bloch, 2014), leaving an effectiveness time gap between diagnosis and treatment. Various treatment strategies have been tried but there is no consensus on the most effective approach. A single pharmacological agent with rapid anti-obsessive action would be an ideal candidate to manage this treatment gap. One such agent may be ketamine with its novel mechanism of action.Ketamine is assumed to increase neuroplasticity by synthesising neurotrophins in the cortex and has demonstrated to have rapid-onset anti-depressant effects (Bjrkholm & Monteggia, 2016). We reviewed the state of evidence for similar rapidly emerging anti- obsessive effects and report our findings here.MethodsEmbase, MEDLINE(R), and PsycINFO were searched to identify studies investigating rapid anti-obsessive effects of ketamine in humans, available in English. ClinicalTrials.org was further searched for grey literature. Other reviews were excluded.Results181 studies were identified after deduplication of which nine studies met inclusion criteria. Eight studies revealed rapid anti-obsessive effects, five of which display statistical significance. Combined, OCD scores decline by approximately 49.7% during the first hour following intravenous ketamine administration. Furthermore, a significant reduction of depressive symptoms and suicidality were reported in studies further investigating comorbid depression. Contrary to depression scores, anti-obsessive effects were not sustained. OCD scores increased within three hours post-administration and reversed back to baseline within seven days. One trial reported an extended length and margin of effect when combined with cognitive behavioural therapy.All studies were of small scale as the literature search primarily yielded pilot trials and case reports, suggesting statistical imprecision and reflecting the topics novelty.ConclusionsOur review points out the presence of preliminary research evidence to support the presence of anti-obsessive effects of ketamine and a potential for its usefulness as a rapidly acting intervention for OCD, thereby plugging an important gap in clinical management of OCD. However, as such effects are unsustained, their potential to complement existing pharmacological strategies may be limited.Greater awareness and randomised controlled trials are required before recommending the use of ketamine in OCD treatment.References Bjrkholm C, Monteggia LM. BDNF a key transducer of antidepressant effects. Neuropharmacology 2016;102. doi:10.1016/j.neuropharm.2015.10.034 Pittenger C, Bloch MH. Pharmacological treatment of obsessive-compulsive disorder. The Psychiatric clinics of North America 2014;37(3):375391. doi:10.1016/j.psc.2014.05.006
APA, Harvard, Vancouver, ISO, and other styles
35

Szurlej, Tatiana. "From Heroic Durga to the Next Victim of an Oppressive Patriarchal Indian Culture: Too Many Variants of Phoolan Devi’s Biography." Cracow Indological Studies 20, no. 2 (December 31, 2018): 257–80. http://dx.doi.org/10.12797/cis.20.2018.02.12.

Full text
Abstract:
Phoolan Devi (10.08.1963–25.07.2001), the famous Bandit Queen still appears in stories about famous Indian women. However, while in India, mainly among poor villagers, she is usually described as a heroic defender of the poorest, in the West Phoolan is seen primarily as another victim of Indian patriarchal culture. Moreover, although most of books about Phoolan are based on interviews with her, every version of her biography differs from one another, which raises the question whether these differences are the consequence of a conscious manipulation of a person who tries to justify certain dark aspects of her life, since the famous dacoit owes her fame to her bloody act of revenge on Thakurs in the Behmai village, which was the biggest crime committed by bandits in India until then. The most popular story about Phoolan’s life is the film Bandit Queen made in 1994 by Shekhar Kapur, based on the book India’s Bandit Queen. The True Story of Phoolan Devi by Mala Sen, who is also the author of the screenplay. The autobiography of Phoolan Devi, who tried to stop the release of the Bandit Queen, claiming that it shows a false story, was written in response to those two works. By constructing her image in the autobiography, Phoolan Devi tries to appear as a very strong woman who could achieve a lot, in spite of adverse conditions. Yet it is hard to resist the impression that the autobiography of Phoolan Devi, despite of its very realistic elements, is to some extent a false testimony. The question remains whether it was the publisher, who decided to construct the story this way to satisfy the tastes of the Western readers and respond to their needs, just like the movie of Shekhar Kapur, or maybe Phoolan, deliberately or unknowingly, presented herself as a victim in search of sympathy after the massacre in Behmai.
APA, Harvard, Vancouver, ISO, and other styles
36

Levytska, I. V., and T. D. Mykytsei. "Current state of the tourism industry in Ukraine: problems of development and ways of improvement." Bioeconomics and Agrarian Business 11, no. 1 (May 29, 2020): 67–75. http://dx.doi.org/10.31548/bioeconomy2020.01.067.

Full text
Abstract:
The paper deals with justifying the importance of the tourism industry as an effective component of the development of social, cultural, economic, political spheres of a region and a country. The purpose of the paper is to investigate the current state of the tourism sector in Ukraine; identify major problems of the tourism sector; suggest effective ways of its further development. It is proved that the development of tourism services, both domestically and internationally, requires high quality of such services and search for ways of its effective functioning. The paper touches upon the role of tourism in the economy, current state of tourism operations, distinguishes factors influencing the development of this industry. The object of research is the tourism industry in Ukraine. The subject of the study is the current state of the tourism industry in Ukraine: problems of development and ways of improvement. The methodology of the study is based on using such methods as scientific abstraction, analogies and theoretical generalization – to study theories regarding tourism sector in Ukraine, determination of its role in the economy; system analysis – to study current state of domestic tourism sector; graphic method – to represent visually the theoretical and practical results of the research; structural-logical – to construct the study logically; theoretical generalization – tohighlight the specific features of tourism industry improvement process on both regional and state levels. The study covers main indicators of tourist industry development in Ukraine as well as analysis of tourist tax revenue and tax payments to the state budget of Ukraine. The paper also explores the main problems that hinder the effective development of tourism in Ukraine, particularly in environmental, social, economic, political spheres which need to be addressed. The factors that reduce the volume of foreign tourist inflow to Ukraine and negatively affect the active promotion of the tourism product are identified. The paper proposes ways of improving the socio-economic development of both the tourism sector as well as the region and the state as a whole. The article emphasizes the creation of a positive image of Ukraine as a tourist state and this process should be based on the infrastructure modernization of tourism, resort, and recreational spheres. Among the effective ways to improve the tourism business efficiency in Ukraine, the article proposes stimulation of travel companies to promote inbound tourism, which will help to generate high profits and replenish the state budget regularly. Based on the results of the study, the main ways of solving tourism sphere issues in Ukraine and active promotion of tourism services should be: improvement of regulatory-legal framework for development of tourist and recreational services in Ukraine; close cooperation of authorities with scientific organizations; stimulation of domestic tourism development; state support of social tourism through the development and improvement of appropriate national programs which will guarantee e benefits for setting up of tourism businesses; investments in tourism industry development; facilitation of competitive advantages development; improvement of tourism safety; participation in international tourism industry development programs. Furt her research will revitalization of tourism in Ukraine is one of the high priority directions of domestic economy development. Solving problems that currently hinder tourism development will increase economic income to the state budget. Taking into account the fact that Ukraine has a strong tourism and recreation potential, active promotion of the tourism product will increase employment levels and create conditions for rapid economic development. Stimulation of travel entitiesfor inbound tourism development will generate high profits not only for tourism industry but also other sectors of the economy and the country. That is why development of effective strategic plans and improvement of regulatory framework can enhance Ukraine's tourism image, accelerate the tourism industry, and increase budget income.
APA, Harvard, Vancouver, ISO, and other styles
37

Busettini, C., F. A. Miles, and R. J. Krauzlis. "Short-latency disparity vergence responses and their dependence on a prior saccadic eye movement." Journal of Neurophysiology 75, no. 4 (April 1, 1996): 1392–410. http://dx.doi.org/10.1152/jn.1996.75.4.1392.

Full text
Abstract:
1. A dichoptic viewing arrangement was used to study the initial vergence eye movements elicited by brief horizontal disparity steps applied to large textured patterns in three rhesus monkeys. Disconjugate steps (range, 0.2-10.9 degrees) were applied to the patterns at selected times (range, 13-303 ms) after 10 degrees leftward saccades into the center of the pattern. The horizontal and vertical positions of both eyes were recorded with the electromagnetic search coil technique. 2. Without training or reinforcement, disparity steps of suitable amplitude consistently elicited vergence responses at short latencies. For example, with 1.8 degrees crossed-disparity steps applied 26 ms after the centering saccade, the mean latency of onset of convergence for each of the three monkeys was 52.2 +/- 3.8 (SD) ms, 52.3 +/- 5.2 ms, and 53.4 +/- 4.1 ms. 3. Experiments in which the disparity step was confined to only one eye indicated that each eye was not simply tracking the apparent motion that is saw. For example, when crossed-disparity steps were confined to the right eye (which saw leftward steps), the result was (binocular) convergence in which the left eye moved to the right even though that eye had seen only a stationary scene. This movement of the left eye cannot have resulted from independent monocular tracking and indicates that the vergences here derived from the binocular misalignment of the two retinal images. 4. The initial vergence responses to crossed-disparity steps had the following main features. 1) They were always in the correct (i.e., convergent) direction over the full range of stimuli tested, the initial vergence acceleration increasing progressively with increases in disparity until reaching a peak with steps of 1.4-2.4 degrees and declining thereafter to a nonzero asymptote as steps exceeded 5-7 degrees. 2) They showed transient postsaccadic enhancement whereby steps applied in the immediate wake of a saccadic eye movement resulted in much higher initial vergence accelerations than the same steps applied some time later. The response decline in the wake of a saccade was roughly exponential with time constants of 67 +/- 5 (SD) ms, 35 +/- 2 ms, and 54 +/- 4 ms for the three animals. 3) That the postsaccadic enhancement might have resulted in part from the visual stimulation associated with the prior saccade was suggested by the finding that enhancement could also be observed when the disparity steps were applied in the wake of (conjugate) saccadelike shifts of the textured pattern. However, this visual enhancement did not reach a peak unit 17-37 ms after the end of the "simulated" saccade, and the peak enhancement averaged only 45% of that after a "real" saccade. 4) Qualitatively similar transient enhancements in the wake of real and simulated saccades have also been reported for initial ocular following responses elicited by conjugate drifts of the visual scene. We replicated the enhancement effects on ocular following to allow a direct comparison with the enhancement effects on disparity vergence using the same animals and visual stimulus patterns and, despite some clear quantitative differences, we suggest that the enhancement effects share a similar etiology. 5. Initial vergence responses to uncrossed-disparity steps had the following main features. 1) They were in the correct (i.e., divergent) direction only for very small steps (< 1.5-2.5 degrees), and then only when postsaccadic delays were small; when the magnitude of the steps was increased beyond these levels, responses declined to zero and thereafter reversed direction, eventually reaching a nonzero (convergent) asymptote similar to that seen with large crossed-disparity steps; convergent responses were also seen with larger vertical disparity steps, suggesting that they represent default responses to any disparity exceeding a few degrees. 2) As the postsaccadic delay was increased, responses to small steps (1.8 degrees) declined to zero and thereafter re
APA, Harvard, Vancouver, ISO, and other styles
38

Kathrein, Katie L., Hsuan-Ting Huang, Abby Barton, Zachary Gitlin, Yue-Hua Huang, Thomas P. Ward, Oliver Hofmann, et al. "A Network Of Epigenetic Regulators Guide Developmental Hematopoiesis In Vivo." Blood 122, no. 21 (November 15, 2013): 1174. http://dx.doi.org/10.1182/blood.v122.21.1174.1174.

Full text
Abstract:
Abstract Long-term hematopoietic stem cells (HSCs) are capable of self-renewal and differentiation into all mature hematopoietic lineages. This process is regulated by transcription factors interact with co-factors to orchestrate chromatin structure and facilitate gene expression. To generate a compendium of factors that establish the epigenetic code in HSCs, we have undertaken the first large-scale in vivo reverse genetic screen targeting chromatin factors. We have designed and injected antisense morpholinos to knockdown expression of 488 zebrafish orthologs of conserved human chromatin factors. The resultant morphants were analyzed by whole embryo in situ hybridization at 36 hours post fertilization for expression of two HSC marker genes, c-myb and runx1, which are expressed in the developing blood stem cells. Morphants were categorized into five groups based on HSC marker expression, ranging from no change to mild, intermediate, or strong reduction in expression or an increase in expression. 29 morpholinos caused a complete or near complete knockdown of HSC marker expression, while 4 were found to increase HSC marker expression. As ubiquitous knockdown of chromatin factors could interfere with vascular development and the establishment of proper arterial identity, a crucial upstream event for HSC formation, we subsequently analyzed morphants with the most robust HSC phenotypes using two vascular markers: kdr for overall vasculogenesis and ephrinb2a for arterial formation. We found that of the 29 morpholinos that caused reduced marker expression, only 9 showed reduced overall vascular or arterial marker staining, suggesting that the majority of morphants with HSC phenotypes are specific to HSC formation. For the 4 morphants with increased HSC marker expression, vasculature appeared normal. These factors likely function as potent negative regulators of HSC development. Several genes known to be essential for HSC self-renewal and maintenance were identified in the screen. For example, knockdown of Mll or Dot1, which are also present in leukemia fusion proteins, fail to specify HSCs, as indicated by a nearly complete reduction in expression of the HSC markers in embryos tested. Of the remaining hits, many represent factors with no previous function ascribed in hematopoiesis. By incorporating protein interaction data, we have defined a handful of complexes necessary for HSC specification, including the SWI/SNF, ISWI, SET1/MLL, CBP/P300/HBO1/NuA4, HDAC/NuRD, and Polycomb complexes. As chromatin factors associated with the same complex likely share target binding sites, we analyzed 34 published ChIP-seq datasets in K562 erythroleukemia cells of chromatin factors tested in the screen, including hits from our screen: SIN3A, CHD4, HDAC1, TAF1, and JARID1C associated with the HDAC/NuRD complex and RNF2, SUZ12, CBX2, and CBX8 from the Polycomb complexes. We ranked triplet combinations of these factors together with all other groups of three factors based on the percent overlap of target genes. The HDAC/NuRD and PRC1/2 complex combinations predicted from our screen fell within the top 20% of all possible combinations of 3 factors, suggesting that our screen has identified chromatin factors that function in distinct complexes to regulate hematopoietic development. Our work has been compiled into a web-based database that will be made publicly available upon publication. Within this database, users can search by gene names and aliases, chromatin domain names and human or zebrafish genes. All experimental data, including experimental design, materials, protocols, images, and all further analyses of the 33 most robust morphants is included. Our large-scale genetic analysis of chromatin factors involved in HSC development provides a comprehensive view of the programs involved in epigenetic regulation of the blood program, offering new avenues to pursue in the study of histone modifications in HSCs and for therapeutic alternatives for patients with blood disorders and leukemia. Disclosures: Zon: FATE Therapeutics, Inc: Consultancy, Equity Ownership, Founder Other, Membership on an entity’s Board of Directors or advisory committees, Patents & Royalties; Stemgent, Inc: Consultancy, Membership on an entity’s Board of Directors or advisory committees, Stocks, Stocks Other; Scholar Rock: Consultancy, Equity Ownership, Founder, Founder Other, Membership on an entity’s Board of Directors or advisory committees, Patents & Royalties.
APA, Harvard, Vancouver, ISO, and other styles
39

Вархотов, Тарас Александрович. "IMAGINATION AS A BORDERLINE OF UNDERSTANDING: THE FUNCTION OF IMAGINATION IN THOUGHT EXPERIMENTS." ΠΡΑΞΗMΑ. Journal of Visual Semiotics, no. 2(24) (July 27, 2020): 199–224. http://dx.doi.org/10.23951/2312-7899-2020-2-199-224.

Full text
Abstract:
Статья посвящена эпистемологии воображения и мысленного эксперимента. Отправной точкой является метафорическое определение мысленного эксперимента как «лаборатории разума», данное Дж. Брауном. Отталкиваясь от этого оксюморона, соединяющего экспериментальную (конкретно- инженерную) и теоретическую деятельность в одно понятие, проводится исследование воображения как средства осуществления мысленных экспериментов. В начале рассматриваются эпистемологические отношения лабораторного и мысленного эксперимента в связи с характерной для современного модельного подхода в философии науки тенденцией сближать эти методы на основании структурно-функционального сходства теоретического моделирования и экспериментальных практик. Демонстрируется, что мысленный эксперимент не является экспериментом и решает иные задачи, связанные не столько с производством предметного знания (о реальности), сколько с поиском самих способов опредмечивания задач и прояснением их отношений между собой. Для этого используется концепт themata, предложенный Дж. Холтоном в его концепции «научного воображения». Неясно определенные Холтоном themata интерпретируются как машины конвертации, позволяющие схематизировать перцептивное содержание и придавать ему модельную форму с сохранением момента наглядности, т. е. возможности обратной конвертации (движения от теоретической модели к эксперименту). Мысленные эксперименты, в свою очередь, обнаруживают границы и характер отношений между themata. Для прояснения механизма работы воображения с ненаглядными объектами использована теория прототипов Э. Рош. Выстраиваемая воображением схема опредмечивания в этой ситуации основывается на семиотической связи ненаглядного означающего с наглядным означаемым (прототипом), а семиозис обеспечивается «натурализацией» метафоры, набрасывающей связанную с прототипом схему опредмечивания (правила построения образов) на не размеченную (новую) или требующую обновления разметки в связи с новыми обстоятельствами предметную область (задачу). Работающее таким образом воображение является естественной границей понимания – понять значит вообразить, а мысленный эксперимент позволяет картографировать работу воображения и с помощью полученных карт анализировать принципы его работы. Поэтому, хотя мысленный эксперимент не позволяет решить вопрос об эмпирической адекватности полученных в нем результатов, он репрезентативен и надежен при исследовании эпистемологических установок и связанных с ними машин конвертации, т. е. воображения. Карта ничего не говорит о существовании изображенной на ней местности, но зато многое способна рассказать об устройстве воображения картографа. The article is devoted to the epistemology of imagination and thought experiment. The starting point is the metaphorical definition of a thought experiment as a "laboratory of the mind" given by J. Brown. Based on this oxymoron, which combines experimental (material and manipulative) and theoretical activity into one concept, a study of imagination is carried out as a means for providing mental experiments. Firstly, the epistemological relations of the laboratory and thought experiment are examined in connection with the approach to bring these methods closer together on the basis of the structural and functional similarity of theoretical modeling and experimental practices, which is characteristic for the modern model approach in the philosophy of science. It is demonstrated that a thought experiment is not an experiment and solves different problems associated not with the production of concrete knowledge (about reality), but rather with the search for ways to objectify the scientific problems themselves and clarify their relationships with each other. For this, the themata concept proposed by J. Holton in his theory of “scientific imagination” is used. Themata, which are not clearly enough defined by Holton, are interpreted as machines of conversion that allow one to schematize perceptual content and give it a model-like form while maintaining the moment of visibility, i.e. the possibility of reverse conversion (the movement from a theoretical model to an experiment). Thought experiments, in turn, reveal the boundaries and nature of the relationship between themata. To clarify the mechanism of how the imagination works with non-visualizable objects, the prototype theory of E. Rosch was engaged. The imagination’s scheme of objectification in this context is based on the semiotic connection of the non-visualizable signifier with the visible signified (prototype), and semiosis is ensured by the “naturalization” of the metaphor, which throws the objectification scheme (rules for constructing images) associated with the prototype onto an unmarked (new) or requiring markup updating because of new circumstances subject area (task). The work of imagination here is the natural boundary of understanding – to understand is (at least to have an ability) to imagine, and a thought experiment allows you to map the work of the imagination and use the obtained maps to analyze the principles of its work. Therefore, although a thought experiment does not allow solving the question of the empirical adequacy of the results obtained in it, it is representative and reliable in the study of epistemological attitudes and associated conversion machines, i.e. imagination. The map does not say anything about the existence of the terrain depicted on it, but much can tell about the cartographer’s imagination.
APA, Harvard, Vancouver, ISO, and other styles
40

K K A, Abdullah, Robert A B C, and Adeyemo A B. "August 2016 VOLUME 5, ISSUE 8, AUGUST 2016 5th Generation Wi-Fi Shatha Ghazal, Raina S Alkhlailah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5801 ECG Arrhythmia Detection Using Choi-Williams Time-Frequency Distribution and Artificial Neural Network Sanjit K. Dash, G. Sasibhushana Rao Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5802 Data Security using RSA Algorithm in Cloud Computing Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5803 Detection Algorithms in Medical Imaging Priyanka Pareek, Pankaj Dalal Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5804 A Review Study on the CPU Scheduling Algorithms Shweta Jain, Dr. Saurabh Jain Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5805 Healthcare Biosensors - A Paradigm Shift To Wireless Technology Taha Mukhtar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5806 Congestion Control for Peer to Peer Application using Random Early Detection Algorithm Sonam Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5807 Quantitative and Qualitative Analysis of Milk Parameters using Arduino Controller Y.R. Bhamare, M.B. Matsagar, C.G. Dighavkar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5808 Ardunio Based Security and Safety using GSM as Fault Alert System for BTS (Base Transceiver Station) Umeshwari Khot, Prof. Venkat N. Ghodke Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5809 Automatic Single and Multi Topic Summarization and Evolution to Generate Timeline Mrs. V. Meenakshi, Ms. S. Jeyanthi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5810 Data Hiding in Encrypted HEVC/AVC Video Streams Saltanat Shaikh, Prof. Shahzia Sayyad Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5811 A Study of Imbalanced Classification Problem P. Rajeshwari, D. Maheshwari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5812 Design of PTL based Area Efficient and Low Power 4-bit ALU Saraabu Narendra Achari, Mr. C. Pakkiraiah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5813 The Design of Driver Safety Awareness and Assistance System through Sleep Activated and Auto Brake System for Vehicle Control D. Sivabalaselvamani, Dr. A. Tamilarasi, L. Rahunathan and A.S. Harishankher Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5814 Parameters Selection, Applications & Convergence Analysis of PSO Algorithms Sachin Kumar, Mr. N.K. Gupta Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5815 Effective Pattern Deploying Model for the Document Restructuring and Classification Niketa, Jharna Chopra Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5816 Cataloging Telugu Sentences by Hidden Morkov Techniques V. Suresh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5817 Biometrics for Cell Phone Safety Jyoti Tiwari, Santosh Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5818 Digital Image Watermarking using Modified DWT&DCT Combination and Bi Linear Interpolation Yannam .Nagarjuna, K. Chaitanya Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5819 Comparative Study and Analysis on the Techniques of Web Mining Dipika Sahu, Yamini Chouhan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5820 A Review of MIL-STD-1553 Bus Trends and Future K. Padmanabham, Prabhakar Kanugo, Dr. K. Nagabhushan Raju, M. Chandrashekar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5821 Design of QPSK Digital Modulation Scheme Using Turbo Codes for an Air Borne System D. Sai Brunda, B. Geetha Rani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5822 An Efficient Locally Weighted Spectral Cluster for Automatic Image Segmentation Vishnu Priya M, J Santhosh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5823 An Efficient Sliding Window Based Micro Cluster Over Data Streams Nancy Mary, A. Venugopal Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5824 Comparative Analysis of Traditional Frequency Reuse Techniques in LTE Network Neelam Rani, Dr. Sanjeev Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5825 Score Level Integration of Fingerprint and Hand Geometry Biometrics Jyoti Tiwari, Santosh Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5826 CHARM: Intelligently Cost and Bandwidth Detection for FTP Servers using Heuristic Algorithm Shiva Urolagin Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5827 Image Enhancement Using Modified Exposure Based Histogram SK. Nasreen, N. Anupama Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5828 Human Gesture Based Recognition and Classification Using MATLAB Suman, Er. Kapil Sirohi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5829 Image Denoising- A Novel Approach Dipali D. Sathe, Prof. K.N. Barbole Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5830 Design of Low Pass Digital FIR Filter Using Nature Inspired Technique Nisha Rani, Balraj Singh, Darshan Singh Sidhu Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5831 Issues and Challenges in Software Quality Assurance Himangi, Surender singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5832 Hybridization of GSA and AFSA to Detect Black Hole Attack in Wireless Sensor Network Soni Rani, Charanjit Singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5833 Reversible Watermarking Technique for Data Hiding, Accurate Tamper Detection in ROI and Exact Recovery of ROI Y. Usha Madhuri, K. Chaitanya Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5834 Fault Tolerance and Concurrency Control in Heterogeneous Distributed Database Systems Sagar Patel, Meghna Burli, Nidhi Shah, Prof. (Mrs.) Vinaya Sawant Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5835 Collection of Offline Tamil Handwriting Samples and Database Creation D. Rajalakshmi, Dr. S.K. Jayanthi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5836 Overview of Renewable Energy in Maharashtra Mr. Sagar P. Thombare, Mr. Vishal Gunjal, Miss. Snehal Bhandarkar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5837 Comparative Analysis of Efficient Image Steganographic Technique with the 2-bit LSB Algorithm for Color Images K. S. Sadasiva Rao, Dr A. Damodaram Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5838 An Efficient Reverse Converter Design for Five Moduli Set RNS Y. Ayyavaru Reddy, B. Sekhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5839 VLSI Design of Area Efficient High Performance SPMV Accelerator using VBW-CBQCSR Scheme N. Narasimharao, A. Mallaiah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5840 Customer Retention of MCDR using 3SCDM Approaches Suban Ravichandran, Chandrasekaran Ramasamy Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5841 User Privacy and Data Trustworthiness in Mobile Crowd Sensing Ms. T. Sharadha, Dr. R. Vijaya Bhanu Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5842 A Safe Anti-Conspiracy Data Model For Changing Groups in Cloud G. Ajay Kumar, Devaraj Verma C Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5843 Scope and Adoption of M-Commerce in India Anurag Mishra, Sanjay Medhavi, Khan Shah Mohd, P.C. Mishra Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5844 A Secure Data Hiding Scheme For Color Image Mrs. S.A. Bhavani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5845 A Study of Different Content Based Image Retrieval Techniques C. Gururaj, D. Jayadevappa, Satish Tunga Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5846 Cache Management for Big Data Applications: Survey Kiran Grover, Surender Singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5847 Survey on Energy Efficient Protocols and Challenges in IOT Syeda Butool Fatima, Sayyada Fahmeeda Sultana, Sadiya Ansari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5848 Educational Data Mining For Evaluating Students Performance Sampreethi P.K, VR. Nagarajan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5849 Iterative Pareto Principle for Software Test Case Prioritization Manas Kumar Yogi, G. Vijay Kumar, D. Uma Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5850 Localization Techniques in Wireless Sensor Networks: A Review Abhishek Kumar, Deepak Prashar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5851 Ensemble Averaging Filter for Noise Reduction Tom Thomas Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5852 Survey Paper on Get My Route Application Shubham A. Purohit, Tushar R. Khandare, Prof. Swapnil V. Deshmukh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5853 Design and Implementation of Smart Car with Self-Navigation and Self-Parking Systems using Sensors and RFID Technology Madhuri M. Bijamwar, Prof. S.G. Kole, Prof. S.S. Savkare Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5854 Comparison Study of Induction Motor Drives using Microcontroller and FPGA Sooraj M S, Sreerag K T V Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5855 A Survey on Text Categorization Senthil Kumar B, Bhavitha Varma E Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5856 Multirate Signal Reconstruction Using Two Channel Orthogonal Filter Bank Sijo Thomas, Darsana P Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5857 The Multi-keyword Synonym Search for Encrypted Cloud Data Using Clustering Method Monika Rani H G, Varshini Vidyadhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5858 A Review on Various Speech Enhancement Techniques Alugonda Rajani, Soundarya .S.V.S Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5859 A Survey on Various Spoofing Attacks and Image Fusion Techniques Pravallika .P, Dr. K. Satya Prasad Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5860 Non-Invasive Vein Detection using Infra-red Rays Aradhana Singh, Dr. S.C. Prasanna Kumar, Dr. B.G. Sudershan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5861 Boundary-Polygons for Minutiae based Fingerprinst Recognition Kusha Maharshi, Prashant Sahai Saxena Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5862 Image Forgery Detection on Digital Images Nimi Susan Saji, Ranjitha Rajan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5863 Enhancing Information Security in Big Data Renu Kesharwani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5864 Secure Multi-Owner Data Sharing for Dynamic Groups in Cloud Ms. Nilophar M. Masuldar, Prof. V. P. Kshirsagar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5865 Compact Microstrip Octagonal Slot Antenna for Wireless Communication Applications Thasneem .H, Midhun Joy Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5866 ‘Aquarius’- Smart IOT Technology for Water Level Monitoring System Prof. A. M. Jagtap, Bhaldar Saniya Sikandar, Shinde Sharmila Shivaji, Khalate Vrushali Pramod, Nirmal Kalyani Sarangdhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5867 Future of Results in Select Search Engine Peerzada Mohammad Iqbal, Dr. Abdul Majid Baba, Aasim Bashir Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5868 Semantic Indexing Techniques on Information Retrieval of Web Content." IJARCCE 5, no. 8 (August 30, 2016): 347–52. http://dx.doi.org/10.17148/ijarcce.2016.5869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

"REVERSE IMAGE SEARCH." International Journal of Advance Engineering and Research Development 4, no. 04 (April 30, 2017). http://dx.doi.org/10.21090/ijaerd.56290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Bitirim, Yıltan. "Retrieval Effectiveness of Google on Reverse Image Search." Journal of Imaging Science and Technology, 2021. http://dx.doi.org/10.2352/j.imagingsci.technol.2022.66.1.010506.

Full text
Abstract:
This study investigates the reverse image search performance of Google, in terms of Average Precisions (APs) and Average Normalized Recalls (ANRs) at various cut-off points,on finding out similar images by using fresh Image Queries (IQs) from the five categories “Fashion,” “Computer,” “Home,” “Sports,” and “Toys.” The aim is to have an insight about retrieval effectiveness of Google on reverse image search and then motivate researchers and inform users. Five fresh IQs with different main concepts were created for each of the five categories. These 25 IQs were run on the search engine, and for each, the first 100 images retrieved were evaluated with binary relevance judgment. At the cut-off points 20, 40, 60, 80, and 100, both APs and ANRs were calculated for each category and for all 25 IQs. The AP range is from 41.60% (Toys—cut-off point 100) to 71% (Home—cut-off point 20). The ANR range is from 47.21% (Toys—cut-off point 20) to 71.31% (Computer—cut-off point 100). If the categories are ignored; when more images were evaluated, the performance of displaying relevant images in higher ranks increased, whereas the performance of retrieving relevant images decreased. It seems that the information retrieval effectiveness of Google on reverse image search needs to be improved.
APA, Harvard, Vancouver, ISO, and other styles
43

Mamrosh, Jennifer L., and David D. Moore. "Using Google Reverse Image Search to Decipher Biological Images." Current Protocols in Molecular Biology 111, no. 1 (July 2015). http://dx.doi.org/10.1002/0471142727.mb1913s111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sharifzadeh, Afsheen, Shinjita Das, and Gideon P. Smith. "Google reverse image search using dermatology eConsult cases." Dermatologic Therapy 33, no. 6 (October 20, 2020). http://dx.doi.org/10.1111/dth.14372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

"Exploring Google Reverse Image Search to Detect Visual Plagiarism in Interior Design." Journal of Higher Education Theory and Practice 21, no. 10 (September 30, 2021). http://dx.doi.org/10.33423/jhetp.v21i10.4634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Jorge, Ana, Lidia Marôpo, and Filipa Fernandes Neto. "‘WHEN YOU REALISE YOUR DAD IS CRISTIANO RONALDO’: CELEBRITY SHARENTING AND CHILDREN'S DIGITAL IDENTITY." AoIR Selected Papers of Internet Research, September 15, 2021. http://dx.doi.org/10.5210/spir.v2021i0.12190.

Full text
Abstract:
Sharing of parenthood experiences can be performed by ordinary users, to influencers and celebrities. This paper seeks to understand the digital identity of a child of a global celebrity through their presentation on social media, and to analyse qualitatively the visual formats of children’s representation in a platformised digital environment. It focuses on the representation of Cristiano Ronaldo’s children, especially his oldest son (Junior), through his Instagram account, his wife’s and his mother’s, in a two-year period. After identifying the main forms of representation of the children, we searched for images of Cristiano Junior across image search engines, social media platforms, sites and repositories; then, we used reverse image search for the identified memes. Ronaldo’s children are represented at home and family moments, playing and amidst luxury; 10-year-old Junior is presented as the ‘natural successor’ to Ronaldo’s talent for football, and also takes part in social or business events in public places. Visual representations created by Ronaldo’s sharenting are specially appropriated into memes that mock the football celebrity’s narcissism; or the fact that the child doesn’t know how to pose for selfies. Cristiano’s children’s digital identity and Junior’s, in particular, is populated with images as shared by parents and wider family, as well as constructed through participatory culture. An archaeological approach to visual social media content is not without difficulties, but proved to be fruitful to unpack the tensions of this wide visibility and the meanings it creates for the (digital) identity of the child.
APA, Harvard, Vancouver, ISO, and other styles
47

D'Andréa, Carlos Frederico de Brito, and André Goes Mintz. "STUDYING 'LIVE' CROSS-PLATFORM CIRCULATION OF IMAGES WITH A COMPUTER VISION API: AN EXPERIMENT BASED ON A SPORTS MEDIA EVENTd'Andréa, Carlos Frederico de Brito (Federal University of Minas Gerais, Brazil)." AoIR Selected Papers of Internet Research, February 2, 2020. http://dx.doi.org/10.5210/spir.v2018i0.10477.

Full text
Abstract:
Considering the importance of cross-platform circulation of web contents for digital methods-oriented research, in this study we aim to expand the types of digital objects used as ‘traffic tags’ by focusing on static images as traces of online associations. We pursue this goal through a methodological experiment with Google Cloud Vision API, a computing framework for visual content analysis. Its Web Detection module pairs typical computer vision operations with Google’s search mechanism, partly performing as a more specialized batch reverse image search engine. This feature thus allows to potentially retrieve images’ spread across the web. We discuss the implications of this non-verbal methodological approach by tracking the 'live' cross-platform circulation of images shared on Twitter in the context of 2018 FIFA World Cup Final Draw ceremony, held on December 2017. Following a novel methodological protocol, we ran several iterations of Vision API processing, thus generating a time series of URLs pointing to pages in which images matching the ones being processed were found. The study analyses in depth the circulation of four popular images about the broadcasted media event, observing their ‘live’ spreading dynamics as well as the computer vision API performance. Among the findings, we point out the adoption of images as 'traffic tags' for cross-platform analysis as a promising approach to study web circulation beyond language barriers and mainstream platforms. Also, we find relevant data to discuss the specificities of the API’s algorithms and its opacity as inherent issues of the digital methods approach.
APA, Harvard, Vancouver, ISO, and other styles
48

Wong, Ching-Chang, Hsuan Ming Feng, Yu-Cheng Lai, and Hsiang-Yun Chen. "Manipulator system designs for drawing random objects through point cloud posture estimation." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, March 29, 2021, 095440542097946. http://dx.doi.org/10.1177/0954405420979461.

Full text
Abstract:
This paper designed a 7-DOF redundant robot manipulator that can flexibly and efficiently pick-up random objects. The developed 7-DOF machine with an additional redundancy achieved great progress in terms of flexibility and efficiency in the operational space. A robot operating system (ROS) was used to configure the manipulator system’s software modules, supporting convenient system interface, appropriate movement control policy, and powerful hardware device management for better regulation of the manipulator’s motions. A 3D type Point Cloud Library (PCL) was utilized to perform a novel point cloud image pre-processing method that did not only reduce the point cloud number but also maintained the original quality. The results of the experiment showed that the estimation speed in object detection and recognition procedure improved significantly. The redundant robot manipulator architecture with the two-stage search algorithm was able to find the optimal null space. Suitable parameters in D-H transformation of forward kinematics were selected to efficiently control and position the manipulator in the right posture. Meanwhile, the reverse kinematics estimated all angles of the joints through the known manipulator position, orientation, and redundancy. Finally, motion panning implementation of manipulator rapidly and successfully reached the random object position and automatically drew it up to approximate the desired target.
APA, Harvard, Vancouver, ISO, and other styles
49

Fang, Fang, Caili Hu, and Ting Ting Yan. "Research on bra component design and perceptual image prediction." International Journal of Clothing Science and Technology ahead-of-print, ahead-of-print (February 16, 2021). http://dx.doi.org/10.1108/ijcst-12-2019-0186.

Full text
Abstract:
PurposeThe purpose of this paper is to apply the theory of perceptual image to clothing, study the effect of bra components on the perceptual image of Chinese female consumers aged 18 to 27, explore the relationship between them, promote the computer-aided bra design to be more rapid and accurate and meet consumer's needs better.Design/methodology/approachIn this paper, cognitive psychology and mathematical analysis methods were used, and two experiments were conducted. A reaction time experiment was conducted based on 3D virtual bra samples, proving that bra components have an effect on the consumer's perceptual image and obtaining a revised bra component design indicator system by multi-dimensional Scaling (MDS). A projection experiment was conducted to study what kind of relationship exists between the two, and a prediction model was constructed by the quantitative I-class theory.FindingsIt is found that bra components have an effect on perceptual image of Chinese female consumers aged 18 to 27. A total of five important components (cup area, center front height, torso width, side wing width and center back shape) that affect the consumer's perceptual image were identified by MDS and references analysis, and then a bra perceptual image space composed of five pairs of words was constructed by subjective evaluation and cluster analysis. What is more, a prediction model was obtained by the quantitative I-class theory; after testing, the model can visually and effectively predict consumer's perceptual image according to bra components indicators, which provide a convenience for the positive design of bras.Research limitations/implicationsIn this article, the authors just studied bra components, but did not take fabric, color and other factors that also affect the perceptual image into consideration. Further research can use this method to study other important influential factors as well as their comprehensive impact. Also, the subjects are Chinese young women; consumers of other age or from other countries are not involved, and more extensive research can be done in the future.Practical implicationsThe bra component indicator system can help to build a more systematic and clearer bra design library, which provides convenience for designers to search and use them quickly, improving the efficiency of bra design. The prediction model is also helpful to bra designers and companies. When they already design a bra, they can use this model to predict consumer's perceptual image, thus carry out more accurate market positioning and promotion. When they want to satisfy consumers or design a specific effect, they can also refer to this model to reverse design of components. In general, the outcomes of this paper can help companies to quickly establish a computer-aided bra design system, which is conducive to designers to accurately design and better meet market's needs, and the method is also a good attempt to apply the theory of perceptual image in psychology to clothing and can be extended to other relevant fields in the future.Originality/valueBased on cognitive psychology, this paper attempts to apply the theory of perceptual image in psychology into clothing and takes bra as an example to study the relationship between bra components and consumer's perceptual image. The prediction model constructed here is conducive to the development of bra design and to meet personalized needs of consumers. This method can also be extended to other fields in the future.
APA, Harvard, Vancouver, ISO, and other styles
50

Al-Rawi, Ahmed, Carmen Celestini, Nicole Stewart, and Nathan Worku. "How Google Autocomplete Algorithms about Conspiracy Theorists Mislead the Public." M/C Journal 25, no. 1 (March 21, 2022). http://dx.doi.org/10.5204/mcj.2852.

Full text
Abstract:
Introduction: Google Autocomplete Algorithms Despite recent attention to the impact of social media platforms on political discourse and public opinion, most people locate their news on search engines (Robertson et al.). When a user conducts a search, millions of outputs, in the form of videos, images, articles, and Websites are sorted to present the most relevant search predictions. Google, the most dominant search engine in the world, expanded its search index in 2009 to include the autocomplete function, which provides suggestions for query inputs (Dörr and Stephan). Google’s autocomplete function also allows users to “search smarter” by reducing typing time by 25 percent (Baker and Potts 189). Google’s complex algorithm is impacted upon by factors like search history, location, and keyword searches (Karapapa and Borghi), and there are policies to ensure the autocomplete function does not contain harmful content. In 2017, Google implemented a feedback tool to allow human evaluators to assess the quality of search results; however, the algorithm still provides misleading results that frame far-right actors as neutral. In this article, we use reverse engineering to understand the nature of these algorithms in relation to the descriptive outcome, to illustrate how autocomplete subtitles label conspiracists in three countries. According to Google, these “subtitles are generated automatically”, further stating that the “systems might determine that someone could be called an actor, director, or writer. Only one of these can appear as the subtitle” and that Google “cannot accept or create custom subtitles” (Google). We focused our attention on well-known conspiracy theorists because of their influence and audience outreach. In this article we argue that these subtitles are problematic because they can mislead the public and amplify extremist views. Google’s autocomplete feature is misleading because it does not highlight what is publicly known about these actors. The labels are neutral or positive but never negative, reflecting primary jobs and/or the actor’s preferred descriptions. This is harmful to the public because Google’s search rankings can influence a user’s knowledge and information preferences through the search engine manipulation effect (Epstein and Robertson). Users’ preferences and understanding of information can be manipulated based upon their trust in Google search results, thus allowing these labels to be widely accepted instead of providing a full picture of the harm their ideologies and belief cause. Algorithms That Mainstream Conspiracies Search engines establish order and visibility to Web pages that operationalise and stabilise meaning to particular queries (Gillespie). Google’s subtitles and blackbox operate as a complex algorithm for its search index and offer a mediated visibility to aspects of social and political life (Gillespie). Algorithms are designed to perform computational tasks through an operational sequence that computer systems must follow (Broussard), but they are also “invisible infrastructures” that Internet users consciously or unconsciously follow (Gran et al. 1779). The way algorithms rank, classify, sort, predict, and process data is political because it presents the world through a predetermined lens (Bucher 3) decided by proprietary knowledge – a “secret sauce” (O’Neil 29) – that is not disclosed to the general public (Christin). Technology titans, like Google, Facebook, and Amazon (Webb), rigorously protect and defend intellectual property for these algorithms, which are worth billions of dollars (O’Neil). As a result, algorithms are commonly defined as opaque, secret “black boxes” that conceal the decisions that are already made “behind corporate walls and layers of code” (Pasquale 899). The opacity of algorithms is related to layers of intentional secrecy, technical illiteracy, the size of algorithmic systems, and the ability of machine learning algorithms to evolve and become unintelligible to humans, even to those trained in programming languages (Christin 898-899). The opaque nature of algorithms alongside the perceived neutrality of algorithmic systems is problematic. Search engines are increasingly normalised and this leads to a socialisation where suppositions are made that “these artifacts are credible and provide accurate information that is fundamentally depoliticized and neutral” (Noble 25). Google’s autocomplete and PageRank algorithms exist outside of the veil of neutrality. In 2015, Google’s photos app, which uses machine learning techniques to help users collect, search, and categorise images, labelled two black people as ‘gorillas’ (O’Neil). Safiya Noble illustrates how media and technology are rooted in systems of white supremacy, and how these long-standing social biases surface in algorithms, illustrating how racial and gendered inequities embed into algorithmic systems. Google actively fixes algorithmic biases with band-aid-like solutions, which means the errors remain inevitable constituents within the algorithms. Rising levels of automation correspond to a rising level of errors, which can lead to confusion and misdirection of the algorithms that people use to manage their lives (O’Neil). As a result, software, code, machine learning algorithms, and facial/voice recognition technologies are scrutinised for producing and reproducing prejudices (Gray) and promoting conspiracies – often described as algorithmic bias (Bucher). Algorithmic bias occurs because algorithms are trained by historical data already embedded with social biases (O’Neil), and if that is not problematic enough, algorithms like Google’s search engine also learn and replicate the behaviours of Internet users (Benjamin 93), including conspiracy theorists and their followers. Technological errors, algorithmic bias, and increasing automation are further complicated by the fact that Google’s Internet service uses “2 billion lines of code” – a magnitude that is difficult to keep track of, including for “the programmers who designed the algorithm” (Christin 899). Understanding this level of code is not critical to understanding algorithmic logics, but we must be aware of the inscriptions such algorithms afford (Krasmann). As algorithms become more ubiquitous it is urgent to “demand that systems that hold algorithms accountable become ubiquitous as well” (O’Neil 231). This is particularly important because algorithms play a critical role in “providing the conditions for participation in public life”; however, the majority of the public has a modest to nonexistent awareness of algorithms (Gran et al. 1791). Given the heavy reliance of Internet users on Google’s search engine, it is necessary for research to provide a glimpse into the black boxes that people use to extract information especially when it comes to searching for information about conspiracy theorists. Our study fills a major gap in research as it examines a sub-category of Google’s autocomplete algorithm that has not been empirically explored before. Unlike the standard autocomplete feature that is primarily programmed according to popular searches, we examine the subtitle feature that operates as a fixed label for popular conspiracists within Google’s algorithm. Our initial foray into our research revealed that this is not only an issue with conspiracists, but also occurs with terrorists, extremists, and mass murderers. Method Using a reverse engineering approach (Bucher) from September to October 2021, we explored how Google’s autocomplete feature assigns subtitles to widely known conspiracists. The conspiracists were not geographically limited, and we searched for those who reside in the United States, Canada, United Kingdom, and various countries in Europe. Reverse engineering stems from Ashby’s canonical text on cybernetics, in which he argues that black boxes are not a problem; the problem or challenge is related to the way one can discern their contents. As Google’s algorithms are not disclosed to the general public (Christin), we use this method as an extraction tool to understand the nature of how these algorithms (Eilam) apply subtitles. To systematically document the search results, we took screenshots for every conspiracist we searched in an attempt to archive the Google autocomplete algorithm. By relying on previous literature, reports, and the figures’ public statements, we identified and searched Google for 37 Western-based and influencial conspiracy theorists. We initially experimented with other problematic figures, including terrorists, extremists, and mass murderers to see whether Google applied a subtitle or not. Additionally, we examined whether subtitles were positive, neutral, or negative, and compared this valence to personality descriptions for each figure. Using the standard procedures of content analysis (Krippendorff), we focus on the manifest or explicit meaning of text to inform subtitle valence in terms of their positive, negative, or neutral connotations. These manifest features refer to the “elements that are physically present and countable” (Gray and Densten 420) or what is known as the dictionary definitions of items. Using a manual query, we searched Google for subtitles ascribed to conspiracy theorists, and found the results were consistent across different countries. Searches were conducted on Firefox and Chrome and tested on an Android phone. Regardless of language input or the country location established by a Virtual Private Network (VPN), the search terms remained stable, regardless of who conducted the search. The conspiracy theorists in our dataset cover a wide range of conspiracies, including historical figures like Nesta Webster and John Robison, who were foundational in Illuminati lore, as well as contemporary conspiracists such as Marjorie Taylor Greene and Alex Jones. Each individual’s name was searched on Google with a VPN set to three countries. Results and Discussion This study examines Google’s autocomplete feature associated with subtitles of conspiratorial actors. We first tested Google’s subtitling system with known terrorists, convicted mass shooters, and controversial cult leaders like David Koresh. Garry et al. (154) argue that “while conspiracy theories may not have mass radicalising effects, they are extremely effective at leading to increased polarization within societies”. We believe that the impact of neutral subtitling of conspiracists reflects the integral role conspiracies plays in contemporary politics and right-wing extremism. The sample includes contemporary and historical conspiracists to establish consistency in labelling. For historical figures, the labels are less consequential and simply reflect the reality that Google’s subtitles are primarily neutral. Of the 37 conspiracy theorists we searched (see Table 1 in the Appendix), seven (18.9%) do not have an associated subtitle, and the other 30 (81%) have distinctive subtitles, but none of them reflects the public knowledge of the individuals’ harmful role in disseminating conspiracy theories. In the list, 16 (43.2%) are noted for their contribution to the arts, 4 are labelled as activists, 7 are associated with their professional affiliation or original jobs, 2 to the journalism industry, one is linked to his sports career, another one as a researcher, and 7 have no subtitle. The problem here is that when white nationalists or conspiracy theorists are not acknowledged as such in their subtitles, search engine users could possibly encounter content that may sway their understanding of society, politics, and culture. For example, a conspiracist like Alex Jones is labeled as an “American Radio Host” (see Figure 1), despite losing two defamation lawsuits for declaring that the shooting at Sandy Hook Elementary School in Newtown, Connecticut, was a ‘false flag’ event. Jones’s actions on his InfoWars media platforms led to parents of shooting victims being stalked and threatened. Another conspiracy theorist, Gavin McInnes, the creator of the far-right, neo-fascist Proud Boys organisation, a known terrorist entity in Canada and hate group in the United States, is listed simply as a “Canadian writer” (see Figure 1). Fig. 1: Screenshots of Google’s subtitles for Alex Jones and Gavin McInnes. Although subtitles under an individual’s name are not audio, video, or image content, the algorithms that create these subtitles are an invisible infrastructure that could cause harm through their uninterrogated status and pervasive presence. This could then be a potential conduit to media which could cause harm and develop distrust in electoral and civic processes, or all institutions. Examples from our list include Brittany Pettibone, whose subtitle states that she is an “American writer” despite being one of the main propagators of the Pizzagate conspiracy which led to Edgar Maddison Welch (whose subtitle is “Screenwriter”) travelling from North Carolina to Washington D.C. to violently threaten and confront those who worked at Comet Ping Pong Pizzeria. The same misleading label can be found via searching for James O’Keefe of Project Veritas, who is positively labelled as “American activist”. Veritas is known for releasing audio and video recordings that contain false information designed to discredit academic, political, and service organisations. In one instance, a 2020 video released by O’Keefe accused Democrat Ilhan Omar’s campaign of illegally collecting ballots. The same dissembling of distrust applies to Mike Lindell, whose Google subtitle is “CEO of My Pillow”, as well as Sidney Powell, who is listed as an “American lawyer”; both are propagators of conspiracy theories relating to the 2020 presidential election. The subtitles attributed to conspiracists on Google do not acknowledge the widescale public awareness of the negative role these individuals play in spreading conspiracy theories or causing harm to others. Some of the selected conspiracists are well known white nationalists, including Stefan Molyneux who has been banned from social media platforms like Twitter, Twitch, Facebook, and YouTube for the promotion of scientific racism and eugenics; however, he is neutrally listed on Google as a “Canadian podcaster”. In addition, Laura Loomer, who describes herself as a “proud Islamophobe,” is listed by Google as an “Author”. These subtitles can pose a threat by normalising individuals who spread conspiracy theories, sow dissension and distrust in institutions, and cause harm to minority groups and vulnerable individuals. Once clicking on the selected person, the results, although influenced by the algorithm, did not provide information that aligned with the associated subtitle. The search results are skewed to the actual conspiratorial nature of the individuals and associated news articles. In essence, the subtitles do not reflect the subsequent search results, and provide a counter-labelling to the reality of the resulting information provided to the user. Another significant example is Jerad Miller, who is listed as “American performer”, despite the fact that he is the Las Vegas shooter who posted anti-government and white nationalist 3 Percenters memes on his social media (SunStaff), even though the majority of search results connect him to the mass shooting he orchestrated in 2014. The subtitle “performer” is certainly not the common characteristic that should be associated with Jerad Miller. Table 1 in the Appendix shows that individuals who are not within the contemporary milieux of conspiracists, but have had a significant impact, such as Nesta Webster, Robert Welch Junior, and John Robison, were listed by their original profession or sometimes without a subtitle. David Icke, infamous for his lizard people conspiracies, has a subtitle reflecting his past football career. In all cases, Google’s subtitle was never consistent with the actor’s conspiratorial behaviour. Indeed, the neutral subtitles applied to conspiracists in our research may reflect some aspect of the individuals’ previous careers but are not an accurate reflection of the individuals’ publicly known role in propagating hate, which we argue is misleading to the public. For example, David Icke may be a former footballer, but the 4.7 million search results predominantly focus on his conspiracies, his public fora, and his status of being deplatformed by mainstream social media sites. The subtitles are not only neutral, but they are not based on the actual search results, and so are misleading in what the searcher will discover; most importantly, they do not provide a warning about the misinformation contained in the autocomplete subtitle. To conclude, algorithms automate the search engines that people use in the functions of everyday life, but are also entangled in technological errors, algorithmic bias, and have the capacity to mislead the public. Through a process of reverse engineering (Ashby; Bucher), we searched 37 conspiracy theorists to decode the Google autocomplete algorithms. We identified how the subtitles attributed to conspiracy theorists are neutral, positive, but never negative, which does not accurately reflect the widely known public conspiratorial discourse these individuals propagate on the Web. This is problematic because the algorithms that determine these subtitles are invisible infrastructures acting to misinform the public and to mainstream conspiracies within larger social, cultural, and political structures. This study highlights the urgent need for Google to review the subtitles attributed to conspiracy theorists, terrorists, and mass murderers, to better inform the public about the negative nature of these actors, rather than always labelling them in neutral or positive ways. Funding Acknowledgement This project has been made possible in part by the Canadian Department of Heritage – the Digital Citizen Contribution program – under grant no. R529384. The title of the project is “Understanding hate groups’ narratives and conspiracy theories in traditional and alternative social media”. References Ashby, W. Ross. An Introduction to Cybernetics. Chapman & Hall, 1961. Baker, Paul, and Amanda Potts. "‘Why Do White People Have Thin Lips?’ Google and the Perpetuation of Stereotypes via Auto-Complete Search Forms." Critical Discourse Studies 10.2 (2013): 187-204. Benjamin, Ruha. Race after Technology: Abolitionist Tools for the New Jim Code. Polity, 2019. Bucher, Taina. If... Then: Algorithmic Power and Politics. OUP, 2018. Broussard, Meredith. Artificial Unintelligence: How Computers Misunderstand the World. MIT P, 2018. Christin, Angèle. "The Ethnographer and the Algorithm: Beyond the Black Box." Theory and Society 49.5 (2020): 897-918. D'Ignazio, Catherine, and Lauren F. Klein. Data Feminism. MIT P, 2020. Dörr, Dieter, and Juliane Stephan. "The Google Autocomplete Function and the German General Right of Personality." Perspectives on Privacy. De Gruyter, 2014. 80-95. Eilam, Eldad. Reversing: Secrets of Reverse Engineering. John Wiley & Sons, 2011. Epstein, Robert, and Ronald E. Robertson. "The Search Engine Manipulation Effect (SEME) and Its Possible Impact on the Outcomes of Elections." Proceedings of the National Academy of Sciences 112.33 (2015): E4512-E4521. Garry, Amanda, et al. "QAnon Conspiracy Theory: Examining its Evolution and Mechanisms of Radicalization." Journal for Deradicalization 26 (2021): 152-216. Gillespie, Tarleton. "Algorithmically Recognizable: Santorum’s Google Problem, and Google’s Santorum Problem." Information, Communication & Society 20.1 (2017): 63-80. Google. “Update your Google knowledge panel.” 2022. 3 Jan. 2022 <https://support.google.com/knowledgepanel/answer/7534842?hl=en#zippy=%2Csubtitle>. Gran, Anne-Britt, Peter Booth, and Taina Bucher. "To Be or Not to Be Algorithm Aware: A Question of a New Digital Divide?" Information, Communication & Society 24.12 (2021): 1779-1796. Gray, Judy H., and Iain L. Densten. "Integrating Quantitative and Qualitative Analysis Using Latent and Manifest Variables." Quality and Quantity 32.4 (1998): 419-431. Gray, Kishonna L. Intersectional Tech: Black Users in Digital Gaming. LSU P, 2020. Karapapa, Stavroula, and Maurizio Borghi. "Search Engine Liability for Autocomplete Suggestions: Personality, Privacy and the Power of the Algorithm." International Journal of Law and Information Technology 23.3 (2015): 261-289. Krasmann, Susanne. "The Logic of the Surface: On the Epistemology of Algorithms in Times of Big Data." Information, Communication & Society 23.14 (2020): 2096-2109. Krippendorff, Klaus. Content Analysis: An Introduction to Its Methodology. Sage, 2004. Noble, Safiya Umoja. Algorithms of Oppression. New York UP, 2018. O'Neil, Cathy. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown, 2016. Pasquale, Frank. The Black Box Society. Harvard UP, 2015. Robertson, Ronald E., David Lazer, and Christo Wilson. "Auditing the Personalization and Composition of Politically-Related Search Engine Results Pages." Proceedings of the 2018 World Wide Web Conference. 2018. Staff, Sun. “A Look inside the Lives of Shooters Jerad Miller, Amanda Miller.” Las Vegas Sun 9 June 2014. <https://lasvegassun.com/news/2014/jun/09/look/>. Webb, Amy. The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity. Hachette UK, 2019. Appendix Table 1: The subtitles of conspiracy theorists on Google autocomplete Conspiracy Theorist Google Autocomplete Subtitle Character Description Alex Jones American radio host InfoWars founder, American far-right radio show host and conspiracy theorist. The SPLC describes Alex Jones as "the most prolific conspiracy theorist in contemporary America." Barry Zwicker Canadian journalist Filmmaker who made a documentary that claimed fear was used to control the public after 9/11. Bart Sibrel American producer Writer, producer, and director of work to falsely claim the Apollo moon landings between 1969 and 1972 were staged by NASA. Ben Garrison American cartoonist Alt-right and QAnon political cartoonist Brittany Pettibone American writer Far-right, political vlogger on YouTube and propagator of #pizzagate. Cathy O’Brien American author Cathy O’Brien claims she was a victim of a government mind control project called Project Monarch. Dan Bongino American radio host Stakeholder in Parler, Radio Host, Ex-Spy, Conspiracist (Spygate, MAGA election fraud, etc.). David Icke Former footballer Reptilian humanoid conspiracist. David Wynn Miller (No subtitle) Conspiracist, far-right tax protester, and founder of the Sovereign Citizens Movement. Jack Posobiec American activist Alt-right, alt-lite political activist, conspiracy theorist, and Internet troll. Editor of Human Events Daily. James O’Keefe American activist Founder of Project Veritas, a far-right company that propagates disinformation and conspiracy theories. John Robison Foundational Illuminati conspiracist. Kevin Annett Canadian writer Former minister and writer, who wrote a book exposing the atrocities to Indigenous Communities, and now is a conspiracist and vlogger. Laura Loomer Author Far-right, anti-Muslim, conspiracy theorist, and Internet personality. Republican nominee in Florida's 21st congressional district in 2020. Marjorie Taylor Greene United States Representative Conspiracist, QAnon adherent, and U.S. representative for Georgia's 14th congressional district. Mark Dice American YouTuber Right-wing conservative pundit and conspiracy theorist. Mark Taylor (No subtitle) QAnon minister and self-proclaimed prophet of Donald Trump, the 45th U.S. President. Michael Chossudovsky Canadian economist Professor emeritus at the University of Ottawa, founder of the Centre for Research on Globalization, and conspiracist. Michael Cremo(Drutakarmā dāsa) American researcher Self-described Vedic creationist whose book, Forbidden Archeology, argues humans have lived on earth for millions of years. Mike Lindell CEO of My Pillow Business owner and conspiracist. Neil Patel English entrepreneur Founded The Daily Caller with Tucker Carlson. Nesta Helen Webster English author Foundational Illuminati conspiracist. Naomi Wolf American author Feminist turned conspiracist (ISIS, COVID-19, etc.). Owen Benjamin American comedian Former actor/comedian now conspiracist (Beartopia), who is banned from mainstream social media for using hate speech. Pamela Geller American activist Conspiracist, Anti-Islam, Blogger, Host. Paul Joseph Watson British YouTuber InfoWars co-host and host of the YouTube show PrisonPlanetLive. QAnon Shaman (Jake Angeli) American activist Conspiracy theorist who participated in the 2021 attack on Capitol Hil. Richard B. Spencer (No subtitle) American neo-Nazi, antisemitic conspiracy theorist, and white supremacist. Rick Wiles (No subtitle) Minister, Founded conspiracy site, TruNews. Robert W. Welch Jr. American businessman Founded the John Birch Society. Ronald Watkins (No subtitle) Founder of 8kun. Serge Monast Journalist Creator of Project Blue Beam conspiracy. Sidney Powell (No subtitle) One of former President Trump’s Lawyers, and renowned conspiracist regarding the 2020 Presidential election. Stanton T. Friedman Nuclear physicist Original civilian researcher of the 1947 Roswell UFO incident. Stefan Molyneux Canadian podcaster Irish-born, Canadian far-right white nationalist, podcaster, blogger, and banned YouTuber, who promotes conspiracy theories, scientific racism, eugenics, and racist views Tim LaHaye American author Founded the Council for National Policy, leader in the Moral Majority movement, and co-author of the Left Behind book series. Viva Frei (No subtitle) YouTuber/ Canadian Influencer, on the Far-Right and Covid conspiracy proponent. William Guy Carr Canadian author Illuminati/III World War Conspiracist Google searches conducted as of 9 October 2021.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography