Results for 'detectable difference'

1000+ found
Order:
  1. Sex Differences in Detecting Sexual Infidelity.Paul W. Andrews, Steven W. Gangestad, Geoffrey F. Miller, Martie G. Haselton, Randy Thornhill & Michael C. Neale - 2008 - Human Nature 19 (4):347-373.
    Despite the importance of extrapair copulation (EPC) in human evolution, almost nothing is known about the design features of EPC detection mechanisms. We tested for sex differences in EPC inference-making mechanisms in a sample of 203 young couples. Men made more accurate inferences (φmen = 0.66, φwomen = 0.46), and the ratio of positive errors to negative errors was higher for men than for women (1.22 vs. 0.18). Since some may have been reluctant to admit EPC behavior, we modeled how (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  11
    Detection of Ludic Patterns in Two Triadic Motor Games and Differences in Decision Complexity.Miguel Pic Aguilar, Vicente Navarro-Adelantado & Gudberg K. Jonsson - 2018 - Frontiers in Psychology 8.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  3.  36
    Detecting varieties of cheating: How do people navigate between different cheating ploys?Shahar Ayal & Yechiel Klar - 2014 - Thinking and Reasoning 20 (1):51-76.
  4.  18
    Sum-Difference Theory of Remembering and Knowing: A Two-Dimensional Signal-Detection Model.Caren M. Rotello, Neil A. Macmillan & John A. Reeder - 2004 - Psychological Review 111 (3):588-616.
  5.  9
    Detection of Relationship between Perfectionism and Classroom Climate and Differences in Level of Perfectionism in Middle School Aged Children.Dominika Doktorová & Patrícia Šomodiová - 2022 - Postmodern Openings 13 (4):513-530.
    This research study is focused on detection of relationship between perfectionism and classroom climate in middle school aged children. To detect the level of perfectionism we used the Frost multidimensional perfectionism scale (F-MPS) and for assessing of classroom climate we used My Class Inventory (MCI). In research we also focused on gender differences among each variable. Our research sample consisted of 240 children who attend primary schools and their age was between 10 – 12 years. There were 160 girls and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  10
    Signal-detection analysis of laterality differences: Some preliminary data, free of recall and report-sequence characteristics.Murray J. White - 1970 - Journal of Experimental Psychology 83 (1p1):174.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  6
    Implicit Detection Observation in Different Features, Exposure Duration, and Delay During Change Blindness.Wang Xiang - 2021 - Frontiers in Psychology 11.
    To investigate whether implicit detection occurs uniformly during change blindness with single or combination feature stimuli, and whether implicit detection is affected by exposure duration and delay, two one-shot change detection experiments are designed. The implicit detection effect is measured by comparing the reaction times of baseline trials, in which stimulus exhibits no change and participants report “same,” and change blindness trials, in which the stimulus exhibits a change but participants report “same.” If the RTs of blindness trials are longer (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  13
    Who detects and why: how do individual differences in cognitive characteristics underpin different types of responses to reasoning tasks?Nikola Erceg, Zvonimir Galić, Andreja Bubić & Dino Jelić - 2023 - Thinking and Reasoning 29 (4):594-642.
    One of the most famous problems in the decision-making literature is the “bat and a ball” problem from the cognitive reflection test (CRT; Frederick, 2005). The problem goes as follows: „A bat and...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  13
    Predicting individual differences in conflict detection and bias susceptibility during reasoning.Jakub Šrol & Wim De Neys - 2020 - Thinking and Reasoning 27 (1):38-68.
    A key component of the susceptibility to cognitive biases is the ability to monitor for conflict between intuitively cued “heuristic” answers and logical principles. While there is evidence that pe...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  10. Two Different Populations within the Healthy Elderly: Lack of Conflict Detection in Those at Risk of Cognitive Decline.Sergio M. Sánchez-Moguel, Graciela C. Alatorre-Cruz, Juan Silva-Pereyra, Sofía González-Salinas, Javier Sanchez-Lopez, Gloria A. Otero-Ojeda & Thalía Fernández - 2018 - Frontiers in Human Neuroscience 11.
  11.  10
    Detection of differences between visual textures with varying number of dots.Colin V. Newman - 1974 - Bulletin of the Psychonomic Society 4 (3):201-202.
  12.  21
    Different approaches for the detection of SSH anomalous connections.S. González, Á Herrero, J. Sedano, Urko Zurutuza & E. Corchado - 2016 - Logic Journal of the IGPL 24 (1).
  13.  13
    Visual detection threshold differences between psychiatric patients and normal controls.Salvatore Mannuzza, Bonnie J. Spring, Michael D. Gottlieb & Mitchell L. Kietzman - 1980 - Bulletin of the Psychonomic Society 15 (2):69-72.
  14.  6
    The Impact of Different System Call Representations on Intrusion Detection.Sarah Wunderlich, Markus Ring, Dieter Landes & Andreas Hotho - 2022 - Logic Journal of the IGPL 30 (2):239-251.
    Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data. This is particularly challenging for security-related, non-continuous data like system calls of an operating system. This work focuses on five different options to preprocess sequences of system calls so that they can be processed by neural networks. These input options are based on one-hot encodings and learning word2vec, GloVe or fastText representations of system calls. As (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  43
    Expert vs. novice differences in the detection of relevant information during a chess game: evidence from eye movements.Heather Sheridan & Eyal M. Reingold - 2014 - Frontiers in Psychology 5.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  16.  29
    Diffusion Tensor Imaging Detects Microstructural Differences of Visual Pathway in Patients With Primary Open-Angle Glaucoma and Ocular Hypertension.Xiang-Yuan Song, Zhen Puyang, Ai-hua Chen, Jin Zhao, Xiao-Jiao Li, Ya-Ying Chen, Wei-jun Tang & Yu-yan Zhang - 2018 - Frontiers in Human Neuroscience 12.
  17.  7
    Culture Blind Leadership Research: How Semantically Determined Survey Data May Fail to Detect Cultural Differences.Jan Ketil Arnulf & Kai R. Larsen - 2020 - Frontiers in Psychology 11:487924.
    Likert-scale surveys are frequently used in cross-cultural studies on leadership. Recent publications using digital text algorithms raise doubt about the source of variation in statistics from such studies to the extent that they are semantically driven. The Semantic Theory of Survey Response (STSR) predicts that in the case of semantically determined answers, the response patterns may also be predictable across languages. The Multifactor Leadership Questionnaire (MLQ) was applied to 11 different ethnic samples in English, Norwegian, German, Urdu and Chinese. Semantic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  52
    Brain Vital Signs Detect Information Processing Differences When Neuromodulation Is Used During Cognitive Skills Training.Christopher J. Smith, Ashley Livingstone, Shaun D. Fickling, Pamela Tannouri, Natasha K. J. Campbell, Bimal Lakhani, Yuri Danilov, Jonathan M. Sackier & Ryan C. N. D’Arcy - 2020 - Frontiers in Human Neuroscience 14.
  19. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused attention (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   90 citations  
  20. My right I: Deception detection and hemispheric differences in self-awareness.Sarah Malcolm & Julian Paul Keenan - 2003 - Social Behavior and Personality 31 (8):767-772.
  21.  75
    Detecting Honest People’s Lies in Handwriting: The Power of the Ten Commandments and Internalized Ethical Values.Thomas Li-Ping Tang - 2012 - Journal of Business Ethics 106 (4):389-400.
    Can managers detect honest people’s lies in a handwritten message? In this article, I will briefly discuss graphology and a basic model of interpersonal communication. I will then develop a fundamental theoretical framework of eight principles for detecting lies based on the basic communication model, handwriting analyses, and the following assumptions: For most people, it is easier to tell the truth than to tell lies. This applies to handwritings also. When most honest people lie, they try to hide their stressful (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  22.  18
    Unconscious inhibition and facilitation at the objective detection threshold: Replicable and qualitatively different unconscious perceptual.Michael Snodgrass & Howard Shevrin - 2006 - Cognition 101 (1):43-79.
  23. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s prediction (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  14
    Detection Analysis of Epileptic EEG Using a Novel Random Forest Model Combined With Grid Search Optimization.Xiashuang Wang, Guanghong Gong, Ni Li & Shi Qiu - 2019 - Frontiers in Human Neuroscience 13:424082.
    In the automatic detection of epileptic seizures, the monitoring of critically ill patients with time varying EEG signals is an essential procedure in intensive care units. There is an increasing interest in using EEG analysis to detect seizure, and in this study we aim to get a better understanding of how to visualize the information in the EEG time-frequency feature, and design and train a novel random forest algorithm for EEG decoding, especially for multiple-levels of illness. Here, we propose an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  18
    Detection and nudge-intervention on sensitive information in social networks.J. Alemany, V. Botti-Cebriá, E. Del Val & A. García-Fornes - 2022 - Logic Journal of the IGPL 30 (6):942-953.
    Detecting sensitive information considering privacy is a relevant issue on Online Social Networks (OSNs). It is often difficult for users to manage the privacy associated with their posts on social networks taking into account all the possible consequences. The aim of this work is to provide information about the sensitivity of the content of a publication when a user is going to share it in OSN. For this purpose, we developed a privacy-assistant agent that detects sensitive information. Based on this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  64
    Detecting extrasolar planets.Peter Kosso - 2006 - Studies in History and Philosophy of Science Part A 37 (2):224-236.
    The detection of extrasolar planets presents a good case in which to clarify the distinction between observation and inference from evidence. By asking whether these planets have been observed or inferred from evidence, and by using the scientific details to answer the question, we will get a clearer understanding of the epistemic difference between these two forms of information. The issue of scientific realism pivots on this distinction, and the results of this case will help to articulate the epistemically (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  27.  11
    Detection and Adaptive Video Processing of Hyperopia Scene in Sports Video.Qingjie Chen & Minkai Dong - 2021 - Complexity 2021:1-13.
    In the research of motion video, the existing target detection methods are susceptible to changes in the motion video scene and cannot accurately detect the motion state of the target. Moving target detection technology is an important branch of computer vision technology. Its function is to implement real-time monitoring, real-time video capture, and detection of objects in the target area and store information that users are interested in as an important basis for exercise. This article focuses on how to efficiently (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  68
    Detection of GPT-4 Generated Text in Higher Education: Combining Academic Judgement and Software to Identify Generative AI Tool Misuse.Mike Perkins, Jasper Roe, Darius Postma, James McGaughran & Don Hickerson - 2024 - Journal of Academic Ethics 22 (1):89-113.
    This study explores the capability of academic staff assisted by the Turnitin Artificial Intelligence (AI) detection tool to identify the use of AI-generated content in university assessments. 22 different experimental submissions were produced using Open AI’s ChatGPT tool, with prompting techniques used to reduce the likelihood of AI detectors identifying AI-generated content. These submissions were marked by 15 academic staff members alongside genuine student submissions. Although the AI detection tool identified 91% of the experimental submissions as containing AI-generated content, only (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  10
    Early Detection of Seasonal Outbreaks from Twitter Data Using Machine Learning Approaches.Samina Amin, Muhammad Irfan Uddin, Duaa H. alSaeed, Atif Khan & Muhammad Adnan - 2021 - Complexity 2021:1-12.
    Seasonal outbreaks have several different periods that occur primarily during winter in temperate regions, while influenza may occur throughout the year in tropical regions, triggering outbreaks more irregularly. Similarly, dengue occurs in the star of the rainy season in early May and reaches its peak in late June. Dengue and flu brought an impact on various countries in the years 2017–2019 and streaming Twitter data reveals the status of dengue and flu outbreaks in the most affected regions. This research work (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  4
    An Algorithm for Motion Estimation Based on the Interframe Difference Detection Function Model.Tengfei Zhang & Huijuan Kang - 2021 - Complexity 2021:1-12.
    In this paper, we simulate the estimation of motion through an interframe difference detection function model and investigate the spatial-temporal context information correlation filtering target tracking algorithm, which is complex and computationally intensive. The basic theory of spatiotemporal context information and correlation filtering is studied to construct a fast target tracking method. The different computational schemes are designed for the flow of multiframe target detection from background removal to noise reduction, to single-frame detection, and finally to multiframe detection, respectively. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  47
    Signal detection theory, the exclusion failure paradigm and weak consciousness—Evidence for the access/phenomenal distinction?Elizabeth Irvine - 2009 - Consciousness and Cognition 18 (2):551-560.
    Block [Block, N. . Two neural correlates of consciousness. Trends in Cognitive Science, 9, 46–52] and Snodgrass claim that a signal detection theory analysis of qualitative difference paradigms, in particular the exclusion failure paradigm, reveals cases of phenomenal consciousness without access consciousness. This claim is unwarranted on several grounds. First, partial cognitive access rather than a total lack of cognitive access can account for exclusion failure results. Second, Snodgrass’s Objective Threshold/Strategic model of perception relies on a problematic ‘enable’ approach (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  32.  21
    Anomaly detection based on one-class intelligent techniques over a control level plant.Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Dragan Simić, Juan-Albino Méndez-Pérez & José Luis Calvo-Rolle - 2020 - Logic Journal of the IGPL 28 (4):502-518.
    A large part of technological advances, especially in the field of industry, have been focused on the optimization of productive processes. However, the detection of anomalies has turned out to be a great challenge in fields like industry, medicine or stock markets. The present work addresses anomaly detection on a control level plant. We propose the application of different intelligent techniques, which allow to obtain one-class classifiers using real data taken from the correct plant operation. The performance of each classifier (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  33.  8
    Detecting your depression with your smartphone? – An ethical analysis of epistemic injustice in passive self-tracking apps.Mirjam Faissner, Eva Kuhn, Regina Müller & Sebastian Laacke - 2024 - Ethics and Information Technology 26 (2):1-14.
    Smartphone apps might offer a low-threshold approach to the detection of mental health conditions, such as depression. Based on the gathering of ‘passive data,’ some apps generate a user’s ‘digital phenotype,’ compare it to those of users with clinically confirmed depression and issue a warning if a depressive episode is likely. These apps can, thus, serve as epistemic tools for affected users. From an ethical perspective, it is crucial to consider epistemic injustice to promote socially responsible innovations within digital mental (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34. Change detection without awareness: Do explicit reports underestimate the representation of change in the visual system?Diego Fernandez-Duque & Ian Thornton - 2000 - Visual Cognition 7 (1):323-344.
    Evidence from many different paradigms (e.g. change blindness, inattentional blindness, transsaccadic integration) indicate that observers are often very poor at reporting changes to their visual environment. Such evidence has been used to suggest that the spatio-temporal coherence needed to represent change can only occur in the presence of focused attention. In four experiments we use modified change blindness tasks to demonstrate (a) that sensitivity to change does occur in the absence of awareness, and (b) this sensitivity does not rely on (...)
    Direct download  
     
    Export citation  
     
    Bookmark   45 citations  
  35.  36
    Detecting olfactory rivalry.Richard J. Stevenson & Mehmet K. Mahmut - 2013 - Consciousness and Cognition 22 (2):504-516.
    Olfactory rivalry can occur when a binary mixture is sniffed repeatedly, with one percept dominating then the other. Experiment 1 demonstrated olfactory rivalry using several new techniques. Experiments 2 and 3 examined whether participants can notice rivalry. Participants received trials composed of odor pairs: either a mixture followed by the same mixture; or a pure odor followed by the same pure odor. On some trials participants judged whether the two stimuli were the same or different, to see if they could (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36. Ontology-based error detection in SNOMED-CT.Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Proceedings of Medinfo 2004:482-6.
    Quality assurance in large terminologies is a difficult issue. We present two algorithms that can help terminology developers and users to identify potential mistakes. We demon­strate the methodology by outlining the different types of mistakes that are found when the algorithms are applied to SNOMED-CT. On the basis of the results, we argue that both formal logical and linguistic tools should be used in the development and quality-assurance process of large terminologies.
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  37.  23
    The face-to-face light detection paradigm: A new methodology for investigating visuospatial attention across different face regions in live face-to-face communication settings.Laura A. Thompson, Daniel M. Malloy, John M. Cone & David L. Hendrickson - 2010 - Interaction Studies 11 (2):336-348.
    We introduce a novel paradigm for studying the cognitive processes used by listeners within interactive settings. This paradigm places the talker and the listener in the same physical space, creating opportunities for investigations of attention and comprehension processes taking place during interactive discourse situations. An experiment was conducted to compare results from previous research using videotaped stimuli to those obtained within the live face-to-face task paradigm. A headworn apparatus is used to briefly display LEDs on the talker's face in four (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  38.  22
    The face-to-face light detection paradigm: A new methodology for investigating visuospatial attention across different face regions in live face-to-face communication settings.Laura A. Thompson, Daniel M. Malloy, John M. Cone & David L. Hendrickson - 2010 - Interaction Studiesinteraction Studies Social Behaviour and Communication in Biological and Artificial Systems 11 (2):336-348.
    We introduce a novel paradigm for studying the cognitive processes used by listeners within interactive settings. This paradigm places the talker and the listener in the same physical space, creating opportunities for investigations of attention and comprehension processes taking place during interactive discourse situations. An experiment was conducted to compare results from previous research using videotaped stimuli to those obtained within the live face-to-face task paradigm. A headworn apparatus is used to briefly display LEDs on the talker’s face in four (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39. The detection and generation of sequences as a key to cerebellar function: Experiments and theory.Valentino Braitenberg, Detlef Heck & Fahad Sultan - 1997 - Behavioral and Brain Sciences 20 (2):229-245.
    Starting from macroscopic and microscopic facts of cerebellar histology, we propose a new functional interpretation that may elucidate the role of the cerebellum in movement control. The idea is that the cerebellum is a large collection of individual lines (Eccles's : Eccles et al. 1967a) that respond specifically to certain sequences of events in the input and in turn produce sequences of signals in the output. We believe that the sequence-in/sequence-out mode of operation is as typical for the cerebellar cortex (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  40.  8
    Automatic Detection of Defects on Periodically Patterned Textures.P. Nagabhushan, N. U. Bhajantri & V. Asha - 2011 - Journal of Intelligent Systems 20 (3):279-303.
    Defect detection is a major concern in quality control of various products in industries. This paper presents two different machine-vision based methods for detecting defects on periodically patterned textures. In the first method, input defective image is split into several blocks of size same as the size of the periodic unit of the image and chi-square histogram distances of each periodic block with respect to itself and all other periodic blocks are calculated to get a dissimilarity matrix. This dissimilarity matrix (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  18
    XRIndex: a brief screening tool for individual differences in security threat detection in x-ray images.Elena Rusconi, Francesca Ferri, Essi Viding & Timothy Mitchener-Nissen - 2015 - Frontiers in Human Neuroscience 9.
  42.  15
    Detecting bots with temporal logic.Mina Young Pedersen, Marija Slavkovik & Sonja Smets - 2023 - Synthese 202 (3):1-39.
    Social bots are computer programs that act like human users on social media platforms. Social bot detection is a rapidly growing field dominated by machine learning approaches. In this paper, we propose a complementary method to machine learning by exploring bot detection as a model checking problem. We introduce Temporal Network Logic (TNL) which we use to specify social networks where agents can post and follow each other. Using this logic, we formalize different types of social bot behavior with formulas (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  12
    Early Detection of Parkinson’s Disease by Using SPECT Imaging and Biomarkers.Bhanu Prasad, T. N. Nagabhushan & Gunjan Pahuja - 2019 - Journal of Intelligent Systems 29 (1):1329-1344.
    Precise and timely diagnosis of Parkinson’s disease is important to control its progression among subjects. Currently, a neuroimaging technique called dopaminergic imaging that uses single photon emission computed tomography (SPECT) with 123I-Ioflupane is popular among clinicians for detecting Parkinson’s disease in early stages. Unlike other studies, which consider only low-level features like gray matter, white matter, or cerebrospinal fluid, this study explores the non-linear relation between different biomarkers (SPECT + biological) using deep learning and multivariate logistic regression. Striatal binding ratios (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  32
    Visual long-term memory and change blindness: Different effects of pre- and post-change information on one-shot change detection using meaningless geometric objects.Megumi Nishiyama & Jun Kawaguchi - 2014 - Consciousness and Cognition 30:105-117.
  45.  21
    A face detection bias for horizontal orientations develops in middle childhood.Benjamin J. Balas, Jamie Schmidt & Alyson Saville - 2015 - Frontiers in Psychology 6:144351.
    Faces are complex stimuli that can be described via intuitive facial features like the eyes, nose, and mouth, “configural” features like the distances between facial landmarks, and features that correspond to computations performed in the early visual system (e.g. oriented edges). With regard to this latter category of descriptors, adult face recognition relies disproportionately on information in specific spatial frequency and orientation bands: Many recognition tasks are performed more accurately when adults have access to mid-range spatial frequencies (8-16 cycles/face) and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  46.  73
    Automatic Detection of Focal Cortical Dysplasia Type II in MRI: Is the Application of Surface-Based Morphometry and Machine Learning Promising?Zohreh Ganji, Mohsen Aghaee Hakak, Seyed Amir Zamanpour & Hoda Zare - 2021 - Frontiers in Human Neuroscience 15.
    Background and ObjectivesFocal cortical dysplasia is a type of malformations of cortical development and one of the leading causes of drug-resistant epilepsy. Postoperative results improve the diagnosis of lesions on structural MRIs. Advances in quantitative algorithms have increased the identification of FCD lesions. However, due to significant differences in size, shape, and location of the lesion in different patients and a big deal of time for the objective diagnosis of lesion as well as the dependence of individual interpretation, sensitive approaches (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  12
    Detecting Authoritarianism Efficiently: Psychometric Properties of the Screening Instrument Authoritarianism – Ultra Short (A-US) in a German Representative Sample.Ayline Heller, Oliver Decker, Bjarne Schmalbach, Manfred Beutel, Jörg M. Fegert, Elmar Brähler & Markus Zenger - 2020 - Frontiers in Psychology 11.
    With right-wing-extremist and -populist parties and movements on the rise throughout the world, the concept of authoritarianism has proven to be particularly valuable to explain the psychological underpinnings of these tendencies. Even though many scales to measure the different dimensions of authoritarianism exist, no short screening instrument has been tested and validated on a large scale so far. The present study examines the psychometric properties of the screening instrument Authoritarianism – Ultrashort in three representative German samples. Using exploratory and confirmatory (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  10
    On not knowing the meanings of words we can detect: Crucial qualitative differences.J. A. Groeger - 1987 - Behavioral and Brain Sciences 10 (4):765.
  49.  8
    Working Memory as an Indicator for Comparative Cognition – Detecting Qualitative and Quantitative Differences.Lukas Alexander Hahn & Jonas Rose - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  11
    Flood Detection and Susceptibility Mapping Using Sentinel-1 Time Series, Alternating Decision Trees, and Bag-ADTree Models.Ayub Mohammadi, Khalil Valizadeh Kamran, Sadra Karimzadeh, Himan Shahabi & Nadhir Al-Ansari - 2020 - Complexity 2020:1-21.
    Flooding is one of the most damaging natural hazards globally. During the past three years, floods have claimed hundreds of lives and millions of dollars of damage in Iran. In this study, we detected flood locations and mapped areas susceptible to floods using time series satellite data analysis as well as a new model of bagging ensemble-based alternating decision trees, namely, bag-ADTree. We used Sentinel-1 data for flood detection and time series analysis. We employed twelve conditioning parameters of elevation, normalized (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000