Results for 'Detection'

992 found
Order:
  1. Estimation Des signaux (exercices et problèmes corrigés).A. Quinquis Détection - forthcoming - Hermes.
    No categories
     
    Export citation  
     
    Bookmark  
  2. Introspection Is Signal Detection.Jorge Morales - forthcoming - British Journal for the Philosophy of Science.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise ratio) (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  3. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   90 citations  
  4. Automatic detection of emotion from vocal expression. Devillers, L., Vidrascu, Layachi & O. - 2010 - In Klaus R. Scherer, Tanja Bänziger & Etienne Roesch (eds.), A Blueprint for Affective Computing: A Sourcebook and Manual. Oxford University Press.
     
    Export citation  
     
    Bookmark  
  5.  42
    Conflict detection, dual processes, and logical intuitions: Some clarifications.Wim De Neys - 2014 - Thinking and Reasoning 20 (2):169-187.
  6.  25
    Human Detection Using Partial Least Squares Analysis.W. R. Schwartz, Aniruddha Kembhavi, David Harwood & L. S. Davis - 2009 - Analysis.
    Significant research has been devoted to detecting people in images and videos. In this paper we describe a human de- tection method that augments widely used edge-based fea- tures with texture and color information, providing us with a much richer descriptor set. This augmentation results in an extremely high-dimensional feature space (more than 170,000 dimensions). In such high-dimensional spaces, classical machine learning algorithms such as SVMs are nearly intractable with respect to training. Furthermore, the number of training samples is much (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  9
    Using AI to detect panic buying and improve products distribution amid pandemic.Yossiri Adulyasak, Omar Benomar, Ahmed Chaouachi, Maxime C. Cohen & Warut Khern-Am-Nuai - forthcoming - AI and Society:1-30.
    The COVID-19 pandemic has triggered panic-buying behavior around the globe. As a result, many essential supplies were consistently out-of-stock at common point-of-sale locations. Even though most retailers were aware of this problem, they were caught off guard and are still lacking the technical capabilities to address this issue. The primary objective of this paper is to develop a framework that can systematically alleviate this issue by leveraging AI models and techniques. We exploit both internal and external data sources and show (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  13
    Detecting contract cheating in essay and report submissions: process, patterns, clues and conversations.Ann M. Rogerson - 2017 - International Journal for Educational Integrity 13 (1).
    Detecting contract cheating in written submissions can be difficult beyond direct plagiarism detectable via technology. Successfully identifying potential cases of contract cheating in written work such as essays and reports is largely dependent on the experience of assessors and knowledge of student. It is further dependent on their familiarity with the patterns and clues evident in sections of body text and reference materials to identify irregularities. Consequently, some knowledge of what the patterns and clues look like is required. This paper (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  9.  27
    Detecting Errors that Result in Retractions.Line Edslev Andersen & K. Brad Wray - 2019 - Social Studies of Science 46 (6):942-954.
    We present a taxonomy of errors in the scientific literature and an account of how the errors are distributed over the categories. We have developed the taxonomy by studying substantial errors in the scientific literature as described in retraction notices published in the journal Science over the past 35 years. We then examine how the sorts of errors that lead to retracted papers can be prevented and detected, considering the perspective of collaborating scientists, journal editors and referees, and readers of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  10.  75
    Detecting Honest People’s Lies in Handwriting: The Power of the Ten Commandments and Internalized Ethical Values.Thomas Li-Ping Tang - 2012 - Journal of Business Ethics 106 (4):389-400.
    Can managers detect honest people’s lies in a handwritten message? In this article, I will briefly discuss graphology and a basic model of interpersonal communication. I will then develop a fundamental theoretical framework of eight principles for detecting lies based on the basic communication model, handwriting analyses, and the following assumptions: For most people, it is easier to tell the truth than to tell lies. This applies to handwritings also. When most honest people lie, they try to hide their stressful (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  11. Detecting Causal Chains in Small-N Data.Michael Baumgartner - 2013 - Field Methods 25:3-24.
    The first part of this paper shows that Qualitative Comparative Analysis (QCA)--also in its most recent forms as presented in Ragin (2000, 2008)--, does not correctly analyze data generated by causal chains, which, after all, are very common among causal processes in the social sciences. The incorrect modeling of data originating from chains essentially stems from QCA’s reliance on Quine-McCluskey optimization to eliminate redundancies from sufficient and necessary conditions. Baumgartner (2009a,b) has introduced a Boolean methodology, termed Coincidence Analysis (CNA), that (...)
     
    Export citation  
     
    Bookmark   1 citation  
  12.  4
    Detecting and Quantifying Mind Wandering during Simulated Driving.Carryl L. Baldwin, Daniel M. Roberts, Daniela Barragan, John D. Lee, Neil Lerner & James S. Higgins - 2017 - Frontiers in Human Neuroscience 11.
  13. Detection of negative energy: 4-dimensional examples.Paul Davies - manuscript
    We study the response of switched particle detectors to static negative energy densities and negative energy fluxes. It is demonstrated how the switching leads to excitation even in the vacuum and how negative energy can lead to a suppression of this excitation. We obtain quantum inequalities on the detection similar to those obtained for the energy density by Ford and co-workers and in an ‘‘operational’’ context by Helfer. We reexamine the question ‘‘Is there a quantum equivalence principle?’’ in terms (...)
     
    Export citation  
     
    Bookmark   2 citations  
  14. Detecting racial bias in algorithms and machine learning.Nicol Turner Lee - 2018 - Journal of Information, Communication and Ethics in Society 16 (3):252-260.
    Purpose The online economy has not resolved the issue of racial bias in its applications. While algorithms are procedures that facilitate automated decision-making, or a sequence of unambiguous instructions, bias is a byproduct of these computations, bringing harm to historically disadvantaged populations. This paper argues that algorithmic biases explicitly and implicitly harm racial groups and lead to forms of discrimination. Relying upon sociological and technical research, the paper offers commentary on the need for more workplace diversity within high-tech industries and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  15. Detection of self: The perfect algorithm.J. S. Watson - 1994 - In S. T. Parker, R. Mitchell & M. L. Boccia (eds.), Self-Awareness in Animals and Humans: Developmental Perspectives. Cambridge University Press.
  16.  21
    Conflict detection and social perception: bringing meta-reasoning and social cognition together.André Mata - 2019 - Thinking and Reasoning 26 (1):140-149.
    Research on implicit conflict detection suggests that people are sensitive to violations of logical principles. When they make reasoning errors, their epistemic radar presumably detects an anomaly....
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  32
    Police Detectives, Criminal Investigations and Collective Moral Responsibility.Seumas Miller - 2014 - Criminal Justice Ethics 33 (1):21-39.
    In this paper my concern is with the collective moral responsibility of criminal investigators for the outcomes of their investigations, bearing in mind that it is important to distinguish collective moral responsibility from, and relate it to, individual moral responsibility. In what sense, if any, are police detectives individually and collectively morally responsible for their success (or, for that matter, their failure) in gathering sufficient evidence to identify, arrest, and charge an offender who has committed a serious crime? Alternatively, in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  19.  17
    Facilitated detection of angry faces: Initial orienting and processing efficiency.Manuel G. Calvo, Pedro Avero & Daniel Lundqvist - 2006 - Cognition and Emotion 20 (6):785-811.
  20. Face detection in peripheral vision.V. Brown, D. Huey & J. M. Findlay - 1996 - In Enrique Villanueva (ed.), Perception. Ridgeview. pp. 89-89.
  21. Face detection in natural scenes.H. Hill & R. Watt - 1996 - In Enrique Villanueva (ed.), Perception. Ridgeview. pp. 25.
  22. Human detection of contrast gradient gratings with and without external noise.A. Syvaejaervi, J. Rovamo & R. Naesaenen - 1996 - In Enrique Villanueva (ed.), Perception. Ridgeview. pp. 81-82.
  23. Detecting change in angle independent of change in orientation.M. J. Wright - 1996 - In Enrique Villanueva (ed.), Perception. Ridgeview. pp. 87-87.
  24.  9
    Il detective melanconico e altri saggi filosofici.Marco Bertozzi - 2008 - Milano: Feltrinelli.
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  11
    Signal detection theory with finite mixture distributions: Theoretical developments with applications to recognition memory.Lawrence T. DeCarlo - 2002 - Psychological Review 109 (4):710-721.
  26. Detecting awareness in the conscious state.Adrian M. Owen, Martin R. Coleman, Melanie Boly, Matthew H. Davis, Steven Laureys, Dietsje Jolles & John D. Pickard - 2006 - Science 313:1402.
  27.  14
    Detection Analysis of Epileptic EEG Using a Novel Random Forest Model Combined With Grid Search Optimization.Xiashuang Wang, Guanghong Gong, Ni Li & Shi Qiu - 2019 - Frontiers in Human Neuroscience 13:424082.
    In the automatic detection of epileptic seizures, the monitoring of critically ill patients with time varying EEG signals is an essential procedure in intensive care units. There is an increasing interest in using EEG analysis to detect seizure, and in this study we aim to get a better understanding of how to visualize the information in the EEG time-frequency feature, and design and train a novel random forest algorithm for EEG decoding, especially for multiple-levels of illness. Here, we propose (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  60
    Visual detection in monkeys with blindsight.Alan Cowey & Petra Stoerig - 1997 - Neuopsychologia 35:929-39.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  4
    Anomaly Detection of Highway Vehicle Trajectory under the Internet of Things Converged with 5G Technology.Ketao Deng - 2021 - Complexity 2021:1-12.
    The gradual increase in the density of highway vehicles and traffic flow makes the abnormal driving state of vehicles an indispensable tool for assisting traffic dispatch. Intelligent transportation systems can detect and track vehicles in real time, acquire characteristics such as vehicle traffic, vehicle speed, vehicle flow density, and vehicle trajectory, and further perform advanced tasks such as vehicle trajectory. The detection of abnormal vehicle trajectory is an important content of vehicle trajectory understanding. And the development of the Internet (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  73
    Detection of GPT-4 Generated Text in Higher Education: Combining Academic Judgement and Software to Identify Generative AI Tool Misuse.Mike Perkins, Jasper Roe, Darius Postma, James McGaughran & Don Hickerson - 2024 - Journal of Academic Ethics 22 (1):89-113.
    This study explores the capability of academic staff assisted by the Turnitin Artificial Intelligence (AI) detection tool to identify the use of AI-generated content in university assessments. 22 different experimental submissions were produced using Open AI’s ChatGPT tool, with prompting techniques used to reduce the likelihood of AI detectors identifying AI-generated content. These submissions were marked by 15 academic staff members alongside genuine student submissions. Although the AI detection tool identified 91% of the experimental submissions as containing AI-generated (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  11
    Detection and Adaptive Video Processing of Hyperopia Scene in Sports Video.Qingjie Chen & Minkai Dong - 2021 - Complexity 2021:1-13.
    In the research of motion video, the existing target detection methods are susceptible to changes in the motion video scene and cannot accurately detect the motion state of the target. Moving target detection technology is an important branch of computer vision technology. Its function is to implement real-time monitoring, real-time video capture, and detection of objects in the target area and store information that users are interested in as an important basis for exercise. This article focuses on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32. On the failure to detect changes in scenes across saccades.John A. Grimes - 1996 - In Kathleen Akins (ed.), Perception. Oxford University Press.
  33. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  14
    Life detection in a universe of false positives.Harrison B. Smith & Cole Mathis - 2023 - Bioessays 45 (12):2300050.
    Astrobiology aims to determine the distribution and diversity of life in the universe. But as the word “biosignature” suggests, what will be detected is not life itself, but an observation implicating living systems. Our limited access to other worlds suggests this observation is more likely to reflect out‐of‐equilibrium gasses than a writhing octopus. Yet, anything short of a writhing octopus will raise skepticism about what has been detected. Resolving that skepticism requires a theory to delineate processes due to life and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  29
    Detection of change in shape: an advantage for concavities.Elan Barenholtz, Elias H. Cohen, Jacob Feldman & Manish Singh - 2003 - Cognition 89 (1):1-9.
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  21
    Anomaly detection based on one-class intelligent techniques over a control level plant.Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Dragan Simić, Juan-Albino Méndez-Pérez & José Luis Calvo-Rolle - 2020 - Logic Journal of the IGPL 28 (4):502-518.
    A large part of technological advances, especially in the field of industry, have been focused on the optimization of productive processes. However, the detection of anomalies has turned out to be a great challenge in fields like industry, medicine or stock markets. The present work addresses anomaly detection on a control level plant. We propose the application of different intelligent techniques, which allow to obtain one-class classifiers using real data taken from the correct plant operation. The performance of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  37.  47
    Signal detection theory, the exclusion failure paradigm and weak consciousness—Evidence for the access/phenomenal distinction?Elizabeth Irvine - 2009 - Consciousness and Cognition 18 (2):551-560.
    Block [Block, N. . Two neural correlates of consciousness. Trends in Cognitive Science, 9, 46–52] and Snodgrass claim that a signal detection theory analysis of qualitative difference paradigms, in particular the exclusion failure paradigm, reveals cases of phenomenal consciousness without access consciousness. This claim is unwarranted on several grounds. First, partial cognitive access rather than a total lack of cognitive access can account for exclusion failure results. Second, Snodgrass’s Objective Threshold/Strategic model of perception relies on a problematic ‘enable’ approach (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  38.  64
    Detecting extrasolar planets.Peter Kosso - 2006 - Studies in History and Philosophy of Science Part A 37 (2):224-236.
    The detection of extrasolar planets presents a good case in which to clarify the distinction between observation and inference from evidence. By asking whether these planets have been observed or inferred from evidence, and by using the scientific details to answer the question, we will get a clearer understanding of the epistemic difference between these two forms of information. The issue of scientific realism pivots on this distinction, and the results of this case will help to articulate the epistemically (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  39. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game addictions (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Signal-Detection, Threshold, and Dual-Process Models of Recognition Memory: ROCs and Conscious Recollection.Andrew P. Yonelinas, Ian Dobbins, Michael D. Szymanski, Harpreet S. Dhaliwal & Ling King - 1995 - Consciousness and Cognition 5 (4):418-441.
    Threshold- and signal-detection-based models have dominated theorizing about recognition memory. Building upon these theoretical frameworks, we have argued for a dual-process model in which conscious recollection and familiarity contribute to memory performance. In the current paper we assessed several memory models by examining the effects of levels of processing and the number of presentations on recognition memory receiver operating characteristics . In general, when the ROCs were plotted in probability space they exhibited an inverted U shape; however, when they (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  41.  18
    Detection and nudge-intervention on sensitive information in social networks.J. Alemany, V. Botti-Cebriá, E. Del Val & A. García-Fornes - 2022 - Logic Journal of the IGPL 30 (6):942-953.
    Detecting sensitive information considering privacy is a relevant issue on Online Social Networks (OSNs). It is often difficult for users to manage the privacy associated with their posts on social networks taking into account all the possible consequences. The aim of this work is to provide information about the sensitivity of the content of a publication when a user is going to share it in OSN. For this purpose, we developed a privacy-assistant agent that detects sensitive information. Based on this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  8
    Detecting your depression with your smartphone? – An ethical analysis of epistemic injustice in passive self-tracking apps.Mirjam Faissner, Eva Kuhn, Regina Müller & Sebastian Laacke - 2024 - Ethics and Information Technology 26 (2):1-14.
    Smartphone apps might offer a low-threshold approach to the detection of mental health conditions, such as depression. Based on the gathering of ‘passive data,’ some apps generate a user’s ‘digital phenotype,’ compare it to those of users with clinically confirmed depression and issue a warning if a depressive episode is likely. These apps can, thus, serve as epistemic tools for affected users. From an ethical perspective, it is crucial to consider epistemic injustice to promote socially responsible innovations within digital (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  84
    Community Detection Based on Density Peak Clustering Model and Multiple Attribute Decision-Making Strategy TOPSIS.Jianjun Cheng, Xu Wang, Wenshuang Gong, Jun Li, Nuo Chen & Xiaoyun Chen - 2021 - Complexity 2021:1-18.
    Community detection is one of the key research directions in complex network studies. We propose a community detection algorithm based on a density peak clustering model and multiple attribute decision-making strategy, TOPSIS. First, the two-dimensional dataset, which is transformed from the network by taking the density and distance as the attributes of nodes, is clustered by using the DBSCAN algorithm, and outliers are determined and taken as the key nodes. Then, the initial community frameworks are formed and expanded (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  11
    Detection of Ludic Patterns in Two Triadic Motor Games and Differences in Decision Complexity.Miguel Pic Aguilar, Vicente Navarro-Adelantado & Gudberg K. Jonsson - 2018 - Frontiers in Psychology 8.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  45. Privileged detection of conspecifics: Evidence from inversion effects during continuous flash suppression.Timo Stein, Philipp Sterzer & Marius V. Peelen - 2012 - Cognition 125 (1):64-79.
  46. True Detective: Buddhism, Pessimism or Philosophy?Finn Janning - 2014 - Journal of Philosophy of Life 4 (4).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  97
    Detecting Epistemic Vice in Higher Education Policy: Epistemic Insensibility in the Seven Solutions and the REF.Heather Battaly - 2013 - Journal of Philosophy of Education 47 (2):263-280.
    This article argues that the Seven Solutions in the US, and the Research Excellence Framework in the UK, manifest the vice of epistemic insensibility. Section I provides an overview of Aristotle's analysis of moral vice in people. Section II applies Aristotle's analysis to epistemic vice, developing an account of epistemic insensibility. In so doing, it contributes a new epistemic vice to the field of virtue epistemology. Section III argues that the (US) Seven Breakthrough Solutions and, to a lesser extent, the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  48.  37
    Detecting olfactory rivalry.Richard J. Stevenson & Mehmet K. Mahmut - 2013 - Consciousness and Cognition 22 (2):504-516.
    Olfactory rivalry can occur when a binary mixture is sniffed repeatedly, with one percept dominating then the other. Experiment 1 demonstrated olfactory rivalry using several new techniques. Experiments 2 and 3 examined whether participants can notice rivalry. Participants received trials composed of odor pairs: either a mixture followed by the same mixture; or a pure odor followed by the same pure odor. On some trials participants judged whether the two stimuli were the same or different, to see if they could (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  16
    Visual detection of compound motion.L. T. Alexander & A. S. Cooperband - 1966 - Journal of Experimental Psychology 71 (6):816.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  29
    Detection of motion during binocular rivalry suppression.Robert Fox & Ronald Check - 1968 - Journal of Experimental Psychology 78 (3p1):388.
1 — 50 / 992