Academic literature on the topic 'Cross-language re-use detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cross-language re-use detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cross-language re-use detection"

1

Flores, Enrique, Alberto Barrón-Cedeño, Lidia Moreno, and Paolo Rosso. "Cross-Language Source Code Re-Use Detection Using Latent Semantic Analysis." JUCS - Journal of Universal Computer Science 21, no. (13) (2015): 1708–25. https://doi.org/10.3217/jucs-021-13-1708.

Full text
Abstract:
Nowadays, Internet is the main source to get information from blogs, encyclopedias, discussion forums, source code repositories, and more resources which are available just one click away. The temptation to re-use these materials is very high. Even source codes are easily available through a simple search on the Web. There is a need of detecting potential instances of source code re-use. Source code re-use detection has usually been approached comparing source codes in their compiled version. When dealing with cross-language source code re-use, traditional approaches can deal only with the programming languages supported by the compiler. We assume that a source code is a piece of text ,with its syntax and structure, so we aim at applying models for free text re-use detection to source code. In this paper we compare a Latent Semantic Analysis (LSA) approach with previously used text re-use detection models for measuring cross-language similarity in source code. The LSA-based approach shows slightly better results than the other models, being able to distinguish between re-used and related source codes with a high performance.
APA, Harvard, Vancouver, ISO, and other styles
2

Mohtaj, Salar, and Habibollah Asghari. "A Corpus for Evaluation of Cross Language Text Re-use Detection Systems." Journal of Information Systems and Telecommunication (JIST) 10, no. 39 (2022): 169–79. http://dx.doi.org/10.52547/jist.33583.10.39.169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Jiang, Qiong Wu, Yiming Xu, Cheng Cao, Zheng Du, and Konstantinos Psounis. "Efficient Toxic Content Detection by Bootstrapping and Distilling Large Language Models." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (2024): 21779–87. http://dx.doi.org/10.1609/aaai.v38i19.30178.

Full text
Abstract:
Toxic content detection is crucial for online services to remove inappropriate content that violates community standards. To automate the detection process, prior works have proposed varieties of machine learning (ML) approaches to train Language Models (LMs) for toxic content detection. However, both their accuracy and transferability across datasets are limited. Recently, Large Language Models (LLMs) have shown promise in toxic content detection due to their superior zero-shot and few-shot in-context learning ability as well as broad transferability on ML tasks. However, efficiently designing prompts for LLMs remains challenging. Moreover, the high run-time cost of LLMs may hinder their deployments in production. To address these challenges, in this work, we propose BD-LLM, a novel and efficient approach to bootstrapping and distilling LLMs for toxic content detection. Specifically, we design a novel prompting method named Decision-Tree-of-Thought (DToT) to bootstrap LLMs' detection performance and extract high-quality rationales. DToT can automatically select more fine-grained context to re-prompt LLMs when their responses lack confidence. Additionally, we use the rationales extracted via DToT to fine-tune student LMs. Our experimental results on various datasets demonstrate that DToT can improve the accuracy of LLMs by up to 4.6%. Furthermore, student LMs fine-tuned with rationales extracted via DToT outperform baselines on all datasets with up to 16.9% accuracy improvement, while being more than 60x smaller than conventional LLMs. Finally, we observe that student LMs fine-tuned with rationales exhibit better cross-dataset transferability.
APA, Harvard, Vancouver, ISO, and other styles
4

Dr., K. Sravana Kumar. "MIDDLE CLASS MOVEMENTS." International Journal of Multidisciplinary Research and Modern Education 2, no. 2 (2016): 59–66. https://doi.org/10.5281/zenodo.61810.

Full text
Abstract:
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The middle class is placed between labour and capital. It neither directly awns the means of production that pumps out the surplus generated by wage labour power, nor does it, by its own labour, produce the surplus which has use and exchange value. Broadly speaking, this class consists of the petty bourgeoisie and the white-collar workers. The former are either self-employed or involved in the distribution of commodities and the latter are non-manual office workers, supervisors and professionals. Thus, in terms of occupation, shopkeepers, salesmen, brokers, government and non-government office-workers, writers, teachers, and self-employed professionals, such as engineers, pleaders, doctors, etc., constitute the middle class. Most of these occupations require at least some degree of formal education. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; This middle class is primarily a product of capitalist development and the expansion of the functions of the state in the nineteenth and twentieth centuries. Though the petty bourgeoisie and managers did exist in precapitalist society, they constituted a tiny class. Industrial development and expansion of markets require not only a larger managerial class than earlier, but also impel the state to shoulder the responsibilities of monitoring market competition and resolving the contradictions of capitalist development. This includes formation and implementation of welfare programmes to minimise tension in society. For carrying out these functions, the state also requires a managerial class. Formal education contributes to the expansion of this class. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; It is difficult to estimate the size of this class in contemporary India. It is certainly very large. According to the calculations made by Ranjit Sahu (1986), the number of white-collar employees is larger than that of industrial workers.&rsquo; A large majority of the members of the middle class belong to the upper and middle castes. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; While scanning literature on the subject, one is disappointed at the absence of studies on middle-class movements per se, whereas one finds studies on peasant, working-class or tribal movements. This is not because the middle-class movements are few in number, nor because scholars have an aversion towards the middle class. They do take cognisance of the role of the middle class in various movements. But these movements are primarily analysed in terms of the issues that they raise, such as social reform movements, the nationalist movement, human rights movements, ecology movements, and so on. Or, these movements are called &lsquo;mass movements&rsquo;, as the issues are not class specific, nor affecting mainly the middle class. The issues are posed as societal problems. The leaders of such movements, who belong to the middle class, mobilise other classes for support. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In this section, I shall deal with the studies on those movements in which I believe the middle class played a prominent role as initiators, and those where a majority of the participants belong to the middle class. Though students also belong to this class, we have dealt with their movements separately. British rule established and introduced a capitalist economy, a new administrative system and English education in the early nineteenth century. Consequently, a tiny educated class emerged in urban areas (Desai 1957; Mishra 1978). The members of this class were upper-caste Hindus. Muslims were, for a variety of reasons late in availing of an English education (Seal 1968). A few individuals in different parts of the country not only raised questions but also revolted against certain customs and traditions of the Hindu social system. These individuals, known as social and religious reformers, were all those who were advocates of alterations in social customs which would involve a break with traditionally accepted patterns; they were those who, convinced themselves that altered ways of thinking and behaving were positive values, sought to convince others to modify or entirely transform their ways of life&rsquo; (Heimsath 1964: 4). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The reformers took up several issues. They included elimination of or change in certain caste regulations and rituals: the sari system, widow remarriage, child marriage, status of women, girls&rsquo; education, prohibition, etc. Though a few talked against the caste hierarchy and untouchability, most of the reformers (except a few who led the anti-Brahmin movement), did not challenge the social structure. They adopted a gradualist approach. Heimsath argues, In India, social reform did not ordinarily mean a reorganisation of the structure of society at large, as it did in the West, for the benefit of underprivileged social economic classes. Instead it meant the infusion into the existing social structure of new ways of life and thought: the society would be preserved, while its members would be transformed (1964: 5). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The reformers either revolted individually or formed associations. These associations were of three types: general (or voluntary) associations; caste reform associations and religious reform bodies (generally called samaj) (Heimsath 1964). The Indian National Social Conference was formed in 1887. Social reform associations came into existence at provincial and local levels. Some of them were formed around one issue, such as widow remarriage or marriageable age, child marriage, whereas others took up general issues related to social reform, protesting against &lsquo;conservatism&rsquo;, including protests against religious heads, superstitions, caste restrictions for crossing the sea, etc. They were loose organisations whose activities were largely confined to programmes, conferences and passing resolutions. A few of them turned into charity organisations and undertook welfare programmes&mdash;particularly in education. Some reformers confined their activities to their caste. They formed caste associations and persuaded caste fellows to join for the reformation of certain unacceptable practices which they felt were either inhuman or did not fit in with the changing times. The most prominent associations were related to religious reforms. Raja Rammohan Roy, who protested against the sati system, formed the Brahmo Samaj which remained the centre for social reform activities in Bengal (Kopf 1979). The Prarthana Samaj came into existence in Bombay under the leadership of Mahadev Govind Ranade (Tucker 1977). The Arya Samaj, formed by Dayanand Saraswati, was the predominant influence in Punjab and north India (Jones 1968; Jordens 1977; Vable 1983). On the whole, social reform movements were weak in south India, despite the presence of a large number of western-educated persons. Heimsath observes that &lsquo;the region produced no reformer of national standing and only a few with lasting local influence&rsquo; (1964: 253). It should be noted that the backward-caste movement as an anti-Brahmin movement was prominent in the Madras Presidency; which we have dealt with later. The main thrust of the socio-religious reform movements was to revive or rejuvenate Hindu religion and society. This was, according to many scholars, to counter the impact of western culture and the efforts of proselytisation by Christian missionaries (Heimsath 1964; Jones 1968; Bhatt 1973; Sun 1977; Jordens 1977). K. P. Gupta (1974), in his study on the Ramakrishna Mission, refutes this position. He argues that the &lsquo;innovative potentiality&rsquo; of Hinduism was more responsible for its rejuvenation rather than the threat or impact of other religions or cultures. According to A.R. Desai, the traditional social structure and religion were not able to cope with the new economic structure which was based on individualism. The reformers were therefore striving &lsquo;to extend the principle of individual liberty to the sphere of religion (1957: 258). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The social reform movements among Hindus and Muslims contributed to the development of nationalism on regional and religious lines. There were several kinds of nationalisms competing with each other. Anil Seal argues, There were keen internal rivalries, but these were between caste and caste, community, not between class and class. Moreover, those groups which felt a similarity of interest were themselves more the product of bureaucratic initiative than of economic change. Since these groups can be largely identified with the men educated in western styles, and since it was these men whose hopes and fears went into the building of the new associations that emerged as the Indian National Congress, a conceptual system based on elites, rather than on classes, would seem more promising (1968: 341). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; These elite belong to the middle class. Granting that the initiative came from the bureaucracy, it was intended to bring about economic change in society in general and the middle class in particular. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The middle class participated at various stages of India&rsquo;s freedom movement. The major events of their collective action were the partition of Bengal in 1906, the non-cooperation campaign in the early 1920s, the anti-Simon agitation in the mid-1920s, Civil Disobedience movements in the early 1930s, and the Quit India movement in 1942. Besides this, there were a number of local-level campaigns&mdash;organised and spontaneous&mdash;against the British Raj. Though there are a large number of studies on the freedom movement, most of them are mainly focused on the leadership and their decisions. In his study on popular movements between 1945 and 1947, Sumit Sarkar argues that, &lsquo;in this as well as in other periods of modern Indian history, the decisions and actions of leaders, British or Indian, cannot really be understood without the counterpoint provided by pressures from below<sup>1</sup> (1982: 677). A few studies on the Bang-bhang movement, the Civil Disobedience movement and the Quit India movement, point out that there were close links between local politics and national agitations (Stoddart 1975). Use of religious and communal idioms and violence are examined by some other scholars (Irschick 1976; Hennigham 1979). The communal dimension of the participants has been highlighted by some studies. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Social reform among the Muslims began with the Aligarh movement led by Syed Ahmad Khan. The main thrust of the movement was to persuade the Muslim landed gentry to take an English education. Without English education, it was feared that the Muslims would be unable to compete with the Hindus and would remain backward. M.S.Jain (1965) argues that che spirit behind the Aligarh movement was to reassert Muslim superiority over the Hindus, which the former had lost during the early phase of the British rule. The movement generated the urge for a &lsquo;separate and independent status&rsquo; for the Muslims. The Ullama of Uttar Pradesh opposed the Aligarh movement and the subsequent demand for a separate state for Muslims (Faruqi 1963). The Khilafat movement (1919-24) led by the Muslim intelligentsia and the Ullama, mobilised a cross section of the Muslims. Their claim was that the Sultan of Turkey was the custodian and defender, the protector of the holy places known as Jazirat al-Arab. The movement was supported by all the Muslim groups and by the Indian National Congress (Dixit 1969; Hasan 1981). Religious symbols, like the mosque, the haji, sufi shrines, provided a sense of belonging to the common fraternity of Islam in India (Hasan 1981). Generally, the &lsquo;divide and rule&rsquo; policy of the British rulers, Muslim orthodoxy, and the educational and economic backwardness of the Muslims, are considered to be responsible for the growth of communal Muslim politics (Desai 1957; Smith 1963). Prabha Dixit (1974) argues that a search for power was responsible for communal politics (see also Broomfield 1968). It is the argument of many scholars that the nationalist movement failed to develop secular symbols. The nationalist movement was dominated by the Hindus who used Hindu religious symbols and idioms for the freedom movement (Smith 1963; Ahmad 1969). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Seal (1968) and Brass (1970) refute the general argument regarding the backwardness of the Muslims. They point out that they were far from being backward in the Muslim-minority provinces. Gopal Krishna argues that &lsquo;it would seem that sociologically the communal movement was a movement of the privileged rather than of the deprived sections of the Muslim population (1981: 55). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A number of Hindu and Muslim communal organisations have come into existence in post-independence India. Through various programmes, they strengthen communal identities and stereotypes for each other. Sensitive issues are raised and articulated. These organisations play an important role in rousing communal sentiments. The number of communal riots has increased since the 1950s. Apart from a large number of journalistic writings and government-appointed inquiry commissions&rsquo; reports, a few case studies by social scientists and activists are now available (Shah 1970; Engineer and Shakir 1985; Van der Veer 1987; Brass 1996, 1998; Horowitz 2001). They highlight not only communal antagonisms, but also economic factors in mobilising members of both communities against each other. Some studies focus on the manipulation of the elite in rousing sentiments leading to riots (Patel 1985). By now we have a good deal of documents on communal riots which include government reports and also reports by independent citizens as well as human rights groups and non-government organisations (NGOs). Systematic comparative studies on communally based mobilisation into riots need to be undertaken to understand the complexities of the phenomenon. There is a good deal of literature on secularisation, nationalism and communal politics. This requires a full-fledged review. We have excluded it from the scope of the present work. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The upper-caste Hindu middle class launched struggles in Bihar and Gujarat against reservation for the Scheduled Castes, Scheduled Tribes and other backward classes. Upper-caste government servants also launched agitations against the roster system which provided certain benefits to Scheduled Caste/Scheduled Tribe employees. These agitations were primarily the result of the conflict of economic interests between upper and deprived caste groups; the middle-class leaders of these agitations raised the issue of &lsquo;merit&rsquo;, &lsquo;secularism&rsquo; and &lsquo;efficiency&rsquo;. While analysing the 1981 anti-reservation agitation in Gujarat, I.P. Desai argues that the economic structure was not able to provide employment opportunities for the lower strata of the higher castes. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The higher castes therefore wish to prevent the mobility of lower castes and contain the discontent among the lower strata of higher castes by appealing to the concealed caste sentiment among them and speaking publicly against casteism, communalism, reservation and all that is particularistic, narrow and parochial. Thus although &ldquo;merit&rdquo; appears to be a progressive slogan, it is in fact a weapon for defending the moribund Hindu hierarchy and maintain [the] social economic status quo (1985: 135). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; By now, there are a few articles on the Gujarat anti-reservation agitation (Yagnik 1981; Bose 1985; Shah 1987) providing information about the socio-economic and political dimensions of the conflict between the upper castes and the deprived groups. Shah (1987) argues that these two agitations were essentially struggles within the middle class. They were fights between the upper- and middle-caste members on the one hand, and the new entrants from the low castes on the other. Some sections of the middle class&mdash;white-collar government employees, school and university teachers, etc.&mdash;launched movements on economic issues affecting them, such as, revision of pay scales, bonus, job security. Though there is no systematic study on the struggles, a few descriptive accounts and analyses of the demands are available. A few of the recent movements led by the middle class began with economic issues, like price rise, scarcity of essential commodities and unemployment. But in the course of the development of these movements, these issues were sidetracked and the movements raised populist issues, which appeal to various classes. They raise moral and cultural issues. They sometimes provide an ideological basis for &lsquo;democratic capitalism&rsquo; and sometimes also for &lsquo;non-capitalist development strategy&rsquo; (Khoros 1980). Take the case of the 1974 Gujarat movement, popularly known as the Nav Nirman (reconstruction) movement, and the Bihar movement known as the movement for total revolution. Though both these movements began with economic issues, they also raised the issues of corruption, democratic rights and social reform- These issues were not spelled out, nor were they linked with the economic and political structure of the society. They succeeded in ousting the chief minister in Gujarat and the Congress party in Bihar (Desai 1974; Wood 1975; Jones and Jones 1976; Barik 1977; Shah 1977). Ghanshyam Shah (1977) observes that they wanted more economic benefits by bringing about certain changes in the system. &lsquo;They do not believe in changing the basic aspects of the system. They have a stake in the system. To them Revolution is a slogan.&rsquo; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; At the end of the nineteenth century, the educated Hindu middle class of Bihar and Uttar Pradesh launched a series of agitations for the removal of Urdu and for its replacement by Hindi in the Devnagri script. Muslim intellectuals also launched a counter-agitation in defence of Urdu (Das Gupta 1970; Brass 1977). The middle class of south India launched struggles during the 1950s and 1960s against the &lsquo;imposition&rsquo; of Hindi and for the retention of English. For them it was a struggle against Hindu imperialism (Hardgrave 1965; Forrester 1966; and Rao 1979). The middle class of linguistic groups such as Marathi, Gujarati, Tclugu and Punjabi, demanded the formation of linguistic states in the 1950s. They launched agitations for these demands (Phadke l979; Nijhawan 1982). For maintenance of their cultural identity, the middle class among the Tamilian, the Punjabi, the Naga, the Mizo populations, the tribals of Chhota Nagpur area, spearheaded agitations for the formation of separate states within or outside the Indian Union. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; We have already discussed the demands of the Naga, the Mizo, and the tribals of Chhota Nagpur and other tribals for separate states or districts (see Chapter 3). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Dravidian movement in Tamil Nadu was a backward caste or non-Biahmin movement with which we have dealt earlier. It was also directed against north Indians, and demanded a separate state named &lsquo;Dravidisthan&rsquo;, i.e., homeland of the Dravidians outside the Indian Union (Hardgrave 1964, 1965, 1979; Irschick 1976; Ram 1979). Periyar E.V. Ramaswamy, a leader of the Dravidian movement said, &lsquo;Tamil Nadu was all along a nation and still it is a nation and that is known as Dravidian. Civilisation, customs and manners of Tamils are different from that of Bengalees and Bombayans.... Hindi language and literature are opposed to the interests of Tamilians in general and to all other non-Brahmins elsewhere, in particular.&rsquo; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Sikh community of Punjab also demanded a separate state called Khalistan. The Shri Anandpur Sahib Resolution demanded that one of the aims of the Akali Dal be &lsquo;maintaining the feeling of a separate independent entity of the Sikh Panth and creation of an environment in which the &ldquo;National Expression&rdquo; of the Sikhs can be full and satisfactory&rsquo; (Dhillon 1974; Puri 1981, 1983; Kumar et al. 1984; Kumar 1984). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Assam agitation, which began in the late 1970s with the formation of the All Assam Students&rsquo; Union, also raised issues regarding the identity of the Assamese and the development of Assam. In a sense, it was a &lsquo;nationality&rsquo; movement (Mira 1982; Gohain 1985, Basu 1992). Regional or linguistic identities have been sharpened in India since independence and they have become a potential force in mobilising the middle class which faces competition from other classes in the economic field. Robert Hardgrave asserts: Regionalism is rooted in India&rsquo;s cultural and linguistic diversity. Projected in geographical terms, it is at the state level both an ethnic and economic phenomenon. It is an expression of heightened political consciousness, expanding participation and increasing competition for scarce resources.... Economic grievances expressed in charges of unfairness, discrimination or Centre neglect may be fused with cultural anxiety over language status and ethnic balance. It is this fusion that gives regionalism its potency. Language and culture, like religion, are at the core of an individual&rsquo;s identity and when politicized take a potentially virulent form (1983: 1171). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Most social scientists have seen these movements as &lsquo;dysfunctional&rsquo; or a threat to national &lsquo;unity&rsquo; and &lsquo;integration&rsquo;. They believe that the Indian nation state should maintain its boundaries and hold its territory together. Therefore, they are unable to view these struggles as movements for &lsquo;self-determination&rsquo; (Mohanty 1982). <strong>Nativism:</strong> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; There is a very thin line between &lsquo;nativism&rsquo; and &lsquo;nationalism&rsquo;: Katzenstein argues, &lsquo;Nativism ... is distinct from movements of ethnic, linguistic or regional subnationalism, and is specifically anti-migrant. Sub-national movements, such as in India the Akali Dal or Dravida Munnetia Kazhagam, may contain nativist elements, similarly, the mobilisation of anti-migrant sentiment may rely on ethnic, linguistic or regional loyalties&rsquo; (1976: 44). According to Myron Weiner, nativism is one form of ethnic politics. Nativism is that form of ethnic identity that seeks to exclude those who are not members of the local or indigenous ethnic groups from residing and/or working in a territory because they are not native to the country or region: nativism is anti-migrant. To the extent that the D.M.K., the Akali Dal, the Andhra Mahasabha, and the Samyukta Maharashtra Samiti were not anti-migrant, they should not be classified as nativist (1978: 296). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Nativist movements are not of recent origin, there were a few such movements before independence. For instance, the movement against the non-mulki developed in Hyderabad soon after World War I, when the local educated population expressed its opposition to the government policy of recruiting Muslims from northern India into the state administrative services (Weiner 1978; Reddy and Sharma 1979). Similarly, the anti-Bengali movement in Assam protested against the domination of their educational and administrative services by Bengali Hindus (Weiner 1978; Das 1982). In post-independence India, the widely known movements are: the Telengana Nativist movement, the Shiv Sena movement in Maharashtra and the Assam movement- The Telengana nativist agitation began in 1969. Initially, the agitation was aimed at the continuance of Telengana &lsquo;safeguards&rsquo; and mulki rules formulated at the time of the formation of Andhra Pradesh in 1956. At a later stage, it demanded separation of the region from the rest of Andhra Pradesh (Reddy and Sharma 1979). The Shiv Sena (i.e., the army of Shivaji) movement was initiated in 1966 in Bombay. It demanded that as Bombay was the capital of Maharashtra, Maharashtrians should be given the opportunity to make the most of what their capital city had to offer. They asked that 80 per cent of all jobs and economic opportunities in Bombay should be reserved for Maharashtrian; (Joshi 1970; Katzenstein 1976; Gupta 1982). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Assam movement began in 1978. Its main demands included the detection, deportation and deletion of foreigners&rsquo; names from electoral rolls. The movement aimed at the ouster of the Bengali middle class which enjoyed a major share in government jobs (Weiner 1978; Das 1982). Similarly, during the late 1960s the Kannada Chaluvaligar (i.e., agitation) demanded restrictions against Tamil, Malayali, and Telugu migrants to Bangalore and preference for the local Kannada-speaking population (Weiner 1978). The underlying reason for the issue of nativism is competition for government jobs between the natives and the migrants. The cities and regions where nativist movements took place have the following characteristics: The locale contains a substantial number of middle-class migrants belonging to culturally distinguishable ethnic groups originating from another section of the country; There is a native middle class, expanding under the impetus of a growth in secondary and higher education; There is a highly competitive labour market in which the native middle class seeks employment in private and public sector firms and in government, where middle-class positions are already held by migrants or their descendents; There are limited opportunities for the native middle class to find employment outside their own locale (Weiner 1978: 293). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A small section of the urban middle-class intelligentsia&mdash;university and college teachers, researchers and lawyers&mdash;has formed organisations at state and national levels for the protection of &lsquo;civil&rsquo; and &ldquo;democratic<sup>1</sup> rights. They raise issues related to violation of &lsquo;civil<sup>1</sup> and democratic rights of various strata of society, including the oppressed classes (Desai 1986). The existing constitutional channels, such as the judiciary, the state assemblies and Parliament are used for challenging the government&rsquo;s decisions and the power of vested interests. The media is used to highlight issues and create public opinion. Fact-finding committees are appointed. The intelligentsia has also raised ecological issues. They organise conferences, publish reports and submit memoranda to the government. Studies on these organisations and their mobilisation efforts are many (Ray 1986). We shall discuss the studies on human rights movements <strong>Participants:</strong> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Students and intellectuals have provided leadership to most middle-class movements. Though some of the populist, national and nativist movements draw support from peasants and other sections of society when they raise emotional and general issues; they continue to be dominated by the middle class. Myron Weiner observed, &lsquo;nativism is largely a middle-class sentiment, not a movement among the industrial labour force or the peasantry, even though there are culturally distinguishable migrants in the industrial labour force in many cities and in some rural areas&rsquo; (1978: 293). Some scholars argue that political leaders excite regional or nativist sentiments in the middle class for their political ends. Iqbal Narain asserts that the political elite exploits situations of regional deprivation and unrest and converts them into movements to forge and strengthen its individual and factional support bases (1984). While studying regionalism in Telengana, Ram Reddy and Sharma observed that factional politics exploited the regional sentiments of the people of Telengana for strengthening their political positions. Similarly, Subrarnanyam argues, Political leaders, when they feel that their due share is not received and they are being overshadowed and ignored, search for some kind of spontaneous rationale to infuse emotions among the people and project themselves as the protectors of public interests, and thus tensions and conflicts are created in an unparallel community in a democratic polity (1984:130). &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; However, Javed Alam propounds another theory. He argues, &lsquo;Re-gionalistic demands get flared up because of contradictions among the ruling classes.... The locally placed ruling classes seek greater power to further their own interests when such interests are perceived as not being served by the all India classes&rsquo; (1984: 17). He does not support his argument with evidence. As a result of their assumptions that these movements are created by the political elite, scholars do not examine the mobilisation aspect of the movement. They study primarily the decision-making process among the elite. Y.D. Phadke&rsquo;s study on the Samyukta Maharashtra movement (1979) is a case in point. Those who adhere to such conspiracy theories do not explain why political leaders succeed in arousing nativist emotions in certain states and why they fail in others. Most studies on middle-class movements discussed above are brief. Some deal with the political decision-making process and the factors responsible for the movement. Some of the movements were &lsquo;spontaneous&rsquo; and short-lived. They did not have an organisational structure, whereas some movements were well-organised. Many scholars do not analyse the organisational aspects of the movements. The studies on the Shiv Sena by Dipankar Gupta, the Nav Nirman and the Bihar movements by Ghan-shyam Shah and the Nav Nirman movement by P.M. Sheth, analyse the organisational structure of these movements. At this stage of our knowledge, it is difficult to find a pattern in organisational structures in different types of middle-class movements
APA, Harvard, Vancouver, ISO, and other styles
5

Hong, Gibong, Veronica Hindle, Nadine M. Veasley, Hannah D. Holscher, and Halil Kilicoglu. "DiMB-RE: mining the scientific literature for diet-microbiome associations." Journal of the American Medical Informatics Association, March 27, 2025. https://doi.org/10.1093/jamia/ocaf054.

Full text
Abstract:
Abstract Objectives To develop a corpus annotated for diet-microbiome associations from the biomedical literature and train natural language processing (NLP) models to identify these associations, thereby improving the understanding of their role in health and disease, and supporting personalized nutrition strategies. Materials and Methods We constructed DiMB-RE, a comprehensive corpus annotated with 15 entity types (eg, Nutrient, Microorganism) and 13 relation types (eg, increases, improves) capturing diet-microbiome associations. We fine-tuned and evaluated state-of-the-art NLP models for named entity, trigger, and relation extraction as well as factuality detection using DiMB-RE. In addition, we benchmarked 2 generative large language models (GPT-4o-mini and GPT-4o) on a subset of the dataset in zero- and one-shot settings. Results DiMB-RE consists of 14 450 entities and 4206 relationships from 165 publications (including 30 full-text Results sections). Fine-tuned NLP models performed reasonably well for named entity recognition (0.800 F1 score), while end-to-end relation extraction performance was modest (0.445 F1). The use of Results section annotations improved relation extraction. The impact of trigger detection was mixed. Generative models showed lower accuracy compared to fine-tuned models. Discussion To our knowledge, DiMB-RE is the largest and most diverse corpus focusing on diet-microbiome interactions. Natural language processing models fine-tuned on DiMB-RE exhibit lower performance compared to similar corpora, highlighting the complexity of information extraction in this domain. Misclassified entities, missed triggers, and cross-sentence relations are the major sources of relation extraction errors. Conclusion DiMB-RE can serve as a benchmark corpus for biomedical literature mining. DiMB-RE and the NLP models are available at https://github.com/ScienceNLP-Lab/DiMB-RE.
APA, Harvard, Vancouver, ISO, and other styles
6

Van Eecke, Paul, Katrien Beuls, Jérôme Botoko Ekila, and Roxana Rădulescu. "Language games meet multi-agent reinforcement learning: A case study for the naming game." Journal of Language Evolution, April 18, 2023. http://dx.doi.org/10.1093/jole/lzad001.

Full text
Abstract:
Abstract Today, computational models of emergent communication in populations of autonomous agents are studied through two main methodological paradigms: multi-agent reinforcement learning (MARL) and the language game paradigm. While both paradigms share their main objectives and employ strikingly similar methods, the interaction between both communities has so far been surprisingly limited. This can to a large extent be ascribed to the use of different terminologies and experimental designs, which sometimes hinder the detection and interpretation of one another’s results and progress. Through this paper, we aim to remedy this situation by (1) formulating the challenge of re-conceptualising the language game experimental paradigm in the framework of MARL, and by (2) providing both an alignment between their terminologies and an MARL−based reformulation of the canonical naming game experiment. Tackling this challenge will enable future language game experiments to benefit from the rapid and promising methodological advances in the MARL community, while it will enable future MARL experiments on learning emergent communication to benefit from the insights and results gained through language game experiments. We strongly believe that this cross-pollination has the potential to lead to major breakthroughs in the modelling of how human-like languages can emerge and evolve in multi-agent systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Mogili, Poojitha. "Blockchain Fault Transaction Detection using ML & Solidity." April 9, 2025. https://doi.org/10.5281/zenodo.15179713.

Full text
Abstract:
<strong>Blockchain Fault Transaction Detection Using ML &amp; Solidity</strong> <strong>Mr. G. Rajesh</strong> Assistant Professor, PBR VITS, Kavali, Nellore &ndash; 524201 <strong>MVN Poojitha</strong>, <strong>CVSL Bhavana</strong>, <strong>P Prathyusha</strong>, <strong>G Manospandana</strong> UG Students, Department of CSE, PBR VITS, Kavali, Nellore &ndash; 524201 <strong>Abstract</strong> This paper proposes an intelligent and secure solution for detecting fraudulent transactions in blockchain networks by combining machine learning (ML) algorithms with blockchain technology. The system integrates <strong>XGBoost</strong> and <strong>Random Forest</strong> models to classify Bitcoin transactions as fraudulent or legitimate. A <strong>Solidity-based smart contract</strong> logs transactions on-chain and acts as a gatekeeper for high-risk activities. The application features a user-friendly interface using Streamlit, supports real-time analysis, and performs advanced security assessments to prevent known blockchain threats like re-entrancy and DoS attacks. Experimental results indicate high precision and robust security, offering a scalable approach for fraud prevention in decentralized environments. <strong>Keywords</strong> Bitcoin, Blockchain, Machine Learning, Fraud Detection, XGBoost, Random Forest, Solidity, Smart Contracts, Re-entrancy Attack, DoS Attack, Anomaly Detection <strong>1. Introduction</strong> The growing use of cryptocurrencies and decentralized finance (DeFi) platforms has made blockchain networks a prime target for fraudulent transactions and cyberattacks. Traditional fraud detection systems rely on static rules or manual auditing, which lack adaptability to evolving patterns. This paper presents a <strong>novel hybrid system</strong> that integrates <strong>intelligent ML-based detection models</strong> with <strong>blockchain-based smart contract enforcement</strong> to deliver real-time fraud classification and secure transaction logging. <strong>2. Literature Review</strong> Several studies have analyzed fraud detection using machine learning models. While XGBoost and Random Forest are frequently used in financial anomaly detection, their integration with blockchain systems remains limited. Works such as [3] explored detection in Ethereum, but did not employ on-chain smart contract enforcement. This research bridges that gap by embedding AI decisions into blockchain mechanisms using Solidity. <strong>3. Problem Statement</strong> Current fraud detection methods suffer from: Poor adaptability to new fraud strategies Lack of real-time classification Absence of blockchain-AI integration Vulnerability to smart contract attacks (e.g., re-entrancy) <strong>4. Objectives</strong> Develop accurate ML models (XGBoost &amp; RF) for fraud detection Build a tamper-proof smart contract for transaction verification Provide real-time fraud alerts and transparency Simulate attacker models and conduct security audits <strong>5. Proposed System Architecture</strong> 5.1 Machine Learning Models Historical transaction data is preprocessed using <strong>Pandas</strong> and <strong>NumPy</strong>, extracting features like sender, receiver, timestamp, gas fee, and amount. Models are trained and tested to distinguish fraud with high precision. 5.2 Blockchain &amp; Smart Contracts Smart contracts written in <strong>Solidity</strong> interact with the ML component to block or allow transactions. Fraudulent activities are logged on-chain for auditability. 5.3 Frontend Integration A <strong>Streamlit-based frontend</strong> allows users to input transaction details, view fraud scores, and visualize prediction confidence with interactive charts. <strong>6. Implementation</strong> 6.1 Tools &amp; Technologies <strong>Language</strong>: Python, Solidity <strong>ML Libraries</strong>: Scikit-learn, XGBoost <strong>Frontend</strong>: Streamlit <strong>Visualization</strong>: Matplotlib, Seaborn <strong>API Integration</strong>: Etherscan, Web3.py <strong>Security Testing</strong>: Attack simulations on Remix IDE 6.2 Smart Contract Design Contracts were designed to: Log fraud detection outcomes Prevent double-spending or unauthorized fund transfer Detect re-entrancy or high-gas attack attempts <strong>7. Results &amp; Performance Evaluation</strong> Metric XGBoost Random Forest Accuracy 94.5% 91.2% Precision 96.1% 93.4% AUC Score 0.97 0.92 The system effectively identified suspicious patterns and blocked high-risk transactions. Smart contracts successfully prevented common vulnerabilities during simulation. <strong>8. Security Analysis</strong> Threat Type Status Reentrancy Attack Mitigated DoS Attack Prevented Front-running Detected Attackers models were simulated using Remix and custom scripts. No bypasses were recorded in hardened smart contract versions. <strong>9. Future Work</strong> Integration of <strong>Graph Neural Networks</strong> and <strong>Autoencoders</strong> Cross-chain fraud detection (Ethereum, BSC, Polygon) Compliance tools for KYC/AML integration Deployment on testnets (Goerli, Sepolia) for public auditing <strong>10. Conclusion</strong> This paper presents a secure and intelligent blockchain fraud detection system using a synergy of <strong>ML and smart contracts</strong>. Real-time classification, on-chain auditing, and threat simulations demonstrate a robust defense against blockchain fraud. The architecture is scalable and adaptable, ensuring relevance in rapidly evolving decentralized environments. <strong>11. References</strong> Allen, F., Gu, X., &amp; Jagtiani, J. (2022). Fintech, Cryptocurrencies, and CBDC... Raja Santhi, A., &amp; Muthuswamy, P. (2022). Influence of Blockchain in Logistics... Farrugia, S., Ellul, J., &amp; Azzopardi, G. (2020). Detection of illicit accounts... Bains, P. (2022). Blockchain Consensus Mechanisms... Hassan, M. U., Rehmani, M. H., &amp; Chen, J. (2023). Anomaly Detection in Blockchain Networks... Huang, Y., &amp; Mayer, M. (2022). Digital currencies and U.S.&ndash;China power competition... Volety, T., et al. (2019). Cracking Bitcoin wallets...
APA, Harvard, Vancouver, ISO, and other styles
8

Koolvisoot, Ajchara, and Sasamon Chumjang. "Prevalence of cognitive impairment and cognitive improvement in patients with systemic lupus erythematosus during a 6-month follow-up study." Lupus, August 17, 2023. http://dx.doi.org/10.1177/09612033231196215.

Full text
Abstract:
Objectives The Montreal Cognitive Assessment (MoCA) is a simple and reliable screening tool for early detection for cognitive impairment in systemic lupus erythematosus (SLE). Most previous studies were cross-sectional with small samples. Research on long-term cognitive changes and reversibility is limited. This study aimed to establish the prevalence of cognitive impairment and changes in SLE patients after 6 months and the associated factors. Methods A prospective study was conducted in 200 patients with SLE between April 2021 and March 2022. Demographic data, disease activity, and medications were recorded. MoCA was administered at baseline and 6 months; for Thais, scores 17–24 indicate mild cognitive impairment, while ≤16 signifies severe impairment. Multivariate analysis identified factors associated with cognitive impairment and improvement. Results The patients’ median age was 44 years (range: 19–73), 96% were female, and 55% had &lt; 12 years of education. The median disease duration was 11 years (range: 0–51.8), and 79% of patients had inactive disease. Cognitive impairment was found in 70% of patients (mild, 63%; severe, 7%). The most often affected domains were delayed recall (82%), abstraction (80.5%), language (76%) and visuospatial/executive function (70.5%), whereas orientation and naming were the least involved. Factors significantly associated with cognitive impairment were age &gt; 40 years (OR, 3.71; 95% CI, 1.72–8.00), formal education &lt; 12 years (OR, 3.11; 95% CI, 1.45–6.63), and prednisolone use (OR, 2.21; 95% CI, 1.08–4.51). Sixty-six (38.2%) of 173 patients completing the 6-month re-evaluation exhibited cognitive changes (52 [30.1%] improved; 14 [8.1%] deteriorated). Except for delayed recall, all commonly affected domains showed significant improvement. Disease activity, prednisolone, antimalarials, or immunosuppressant use did not predict cognitive improvement. Conclusions Mild cognitive impairment is prevalent among patients with SLE. Due to the possibility of reversibility, early recognition and additional research to identify relevant factors are required.
APA, Harvard, Vancouver, ISO, and other styles
9

V.Lakshmi, chaitanya, Nafisa Afreen S., Veena K., Gayathri P., Pavitra S., and Aparna M. "Plagiarism detection process using AI." April 25, 2023. https://doi.org/10.5281/zenodo.7894600.

Full text
Abstract:
ISSN (Print): 2395-4752 Plagiarism Detection Process Using AI <strong>Lakshmi Chaitanya, S. Nafisa Afreen, K. Veena, P. Gayathri, S. Pavitra , M. Aparna</strong> Department of Computer Science &amp; Engineering Santhiram Engineering College, India &nbsp; <strong>Abstract- Plagiarism relates to the act of taking information or ideas of someone else and demands it as your own. Basically, it reproduces the existing information in modified format. In every field of education, it becomes a serious issue. Various techniques and tools are derived these days to detect plagiarism.</strong> <strong>Various types of plagiarism are there like text matching, copy paste, grammar based method etc. This</strong> <strong>project</strong> <strong>proposes a new method implemented in a prog </strong>same order in each string. As there are many <strong>ning</strong> <strong>ram. Here we put the concept of a machine lear</strong> <strong>techniques i.e. Longest Common Subsequence (LCS) and Five Modulus Method (FMM). This project helps</strong> <strong>us to identify whether text or image is plagiarized or not.</strong> documents to be compared, so this may take a lot of <strong>Keywords- FMM, LCS etc.</strong> time. So, to solve this problem clustering is used. &nbsp; I.INTRODUCTION 1.Artificial Intelligence Artificial Intelligenceis a branch of Computer Science and Engineering which is used to make the machine to think like human and act like human. These machines consists of sensors and actuators. Sensors helps to sense the surrounding information and the actuators act according to the information sensed by the sensors, i.e., the environment of the system is observed by intelligent agents through sensors and actuators are components through which energy is converted into motion. &nbsp; They perform the role of controlling and moving a system.AI can automate workflows and processes or work independently and autonomously from a human team, it can eliminate manual errors in data processing, analytics, assembly in manufacturing, and other tasks through automation and algorithms that follow the same processes every single time, it can be used to perform repetitive tasks, freeing human capital to work on higher impact problems, AI can process more information more quickly than a human. The various applications of AI are speech recognition, image recognition, translation, productive modelling, data analytics and cyber security. 2.Longest Common Subsequence (Lcs) The LCS (Longest Common Subsequence) method finds the longest string between two given strings that are common between the two groups and in the &nbsp; &nbsp; Here a cluster is created which mainly contain those files which are similar to the document to be compared by Longest Common Subsequence Method.Take two strings x and y and then we have to initialize a matrix of x.length *y.length. If i=0 or j=0 then the resultant value is zero. If I and j are equal then the resultant value is 1+[i-1,j-1], otherwise the resultant value is max([i-1][j],[i][j-1]). These method is used to find the longest string between the two given strings that are common between the two groups and in same order. &nbsp; 3.Five Modulus Method (Fmm) The FMM (Five Modulus Method) converts a random image into 8*8 block matrix. The block matrix is divided by 5 which reduces the size of the image. Clearly, we know that each pixel is a numberbetween 0 to 255for each of the Red, Green, and Blue arrays. Therefore, if we can transform each number in that range into a number divisible by 5, then this will not affect the Human Visual System (HVS). &nbsp; Mathematically speaking, any number divided by 5 will give a remainder ranges from 0-4 (e.g., 15 mod 5 is 0, 17 mod 5 is 2, 201 mod 5 is 1, 187 mod 5 is 2 and so on). Here, we have proposed a new formula to transform any number in the range 0-255 into a number that when divided by 5 the result is always lying between 0-4. Actually, any number in the range0-4 (which is the remainder of dividing 0-255 by 5) can be transformed as follows 0&rarr;(same pixel), &nbsp; &nbsp; &copy; V. Lakshmi Chaitanya. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. &nbsp; 1&rarr;(-1), 2&rarr;(-2), 3&rarr;(+2), 4&rarr;(+1).We have used FMM for compression as the intended data which is required is not lost in this method. It also reduces the size of the image from higher intensity to lower intensity which helps to compare images more rapidly. FMM firstly converts the input image into gray scaled image and then compress using threshold value. &nbsp; II.EXISTING SYSTEM &nbsp; Plagiarism is a mistake mostly in academic field. It takes others contributions without their permission and does not give honour to the originator. Reprobates are rewarded though they are not deserved for that. We can observe plagiarism occur in various fields like literature, academic, science, music vastly.Plagiarism detection techniques are there, which are classified into character based method, structural-based method, classification or cluster based method, syntax-based methods, cross language-based methods, semantic-based methods and citation- based methods. These methods deal with plagiarism act on the text and ignore images. &nbsp; A survey was carried out for plagiarism detection in 2006, which focused on text-based plagiarism detection and described some plagiarism detection tools with test cases and results. In the following year, another survey was done by Lukashenko et al., which focused on a general way of minimizes plagiarism and discussed metrics for calculating similarity scores. Although this study only showed a few attributes of seven plagiarism detection tools, this paper did not comprehensively analysis tools, detection algorithms and techniques. In 2011, Garg conducted a study that briefly discussed plagiarism and described two source code plagiarism detection tools and six natural language plagiarism detection tools. &nbsp; III.DISADVANTAGES OF EXISTING SYSTEM: &nbsp; The existing system can detect the text-based plagiarism and can&rsquo;t be able to detect the image- based plagiarism. Images also contain a wide range of information and hence the image-based plagiarism should be detected. This is the major disadvantage of the existing system. &nbsp; As we need to compare each and every string at each instance it consumes a lot of time. Hence, it is the time consuming process. We can&rsquo;t predict the output due to the comple manual computations, these may cause errors and also affects the accuracy. The accuracy is very less due to the computational errors. &nbsp; IV.PROPOSED SYSTEM &nbsp; We thought about the issue involved with plagiarism detection and try to make it easy to find. We have used the LCS method to detect the plagiarism of a paper in terms of text, which not only find plagiarism but also show the percentage of plagiarism held. The images contain a very wide range of information, we have used FMM method to examine the plagiarism of a paper in terms of images. &nbsp; The images contain a very wide range and especially in the computer literature to be found a lot flowchart images, the purpose of this project is to examine the plagiarism of a paper in terms of used flowchart images plagiarism using FMM. These images have been tested FMM method. The recognition accuracy average of flowchart test images that have not been tampered in terms of structure, nodes and edges in the proposed method with 81.91 percent is indicating the high success of this method and increase of recognition. &nbsp; V.WORKING PRINCIPLE &nbsp; In its present form, the system&#39;s primary function is to serve as a platform for training and examination. The Histogram is used during the training phase for recognition, and the network&#39;s modelling is used for testing. The analysis is based on the percentages of similarity between the photographs requested and those already present in the database.This method chooses pictures that have the highest correlations with the one you&#39;re looking for. At this stage, the expert is responsible for interpreting the findings of the correlation analysis to determine whether or not the tested images were plagiarized. &nbsp; &nbsp; &nbsp; &nbsp; Fig.1 Proposed system Architecture. &nbsp; VI.ADVANTAGES OF PROPOSED SYSTEM &nbsp; In comparison to other models that we looked at in the literature, the proposed system&#39;s accuracy is 81.91 percent, and this model ended up providing thebest accuracy. The output can be predicted and also consumes less time for computing, computational errors will be reduced. Our approach additionally includes a method which can identify the image-based plagiarism along with the text-based plagiarism. &nbsp; VII.RESULTS &nbsp; Our model is more accurate (82.91%) than the other models we analysed. The plagiarism is predicted more accurately in terms of both text-based and image-based. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fig.2 Home page. &nbsp; Fig.3 Signup Page. &nbsp; &nbsp; &nbsp; &nbsp; Fig.4 Login Page. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fig.5 Upload Test File. &nbsp; Fig.6 Text-based Plagiarism Detected. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fig.7 Upload Test Image. &nbsp; &nbsp; &nbsp; Fig.8 Graphs showing Image-based Plagiarism Detected. &nbsp; Fig.9 Image-based Plagiarism Detected. &nbsp; VIII.CONCLUSION &nbsp; We introduced an image-based plagiarism detection approach that adapts itself to forms of image similarity found in academic work. The approach is achieved by including methods that analyse heterogeneous image features, selectively employing analysis methods depending on their suitability for the input image, using a flexible procedure to determine suspicious image similarities, and enabling easy inclusion of additional analysis methods in the future. &nbsp; REFERENCES &nbsp; V Lakshmi Chaitanya, &ldquo;Machine Learning Based Predictive Model for Data Fusion Based Intruder Alert System&rdquo;, journal of algebraic statistics, Vol. 13,no. 2,pages. 2477-2483, June 2022. V Lakshmi Chaitanya,&rsquo;&rsquo; Apriori vs Genetic algorithms for Identifying Frequent Item Sets&rsquo;&rsquo;, International journal of Innovative Research &amp;Development,Vol.3,no.6,pages. 249-254,June 2014. Sunar mohammed Farooq,&rsquo;&rsquo; Static Peers for Peer- to-Peer Live Video Streaming&rsquo;&rsquo;,Inter national journal of Scientific Engineering and Technology &nbsp; Research, Vol.05,No.34, Pages:7055-7064, October-2016. Farooq Sunar Mahammad, P Bhaskar, A Prudvi, N Yugandhar Reddy, P Jaswanth Reddy, &ldquo;Prediction Of Covid-19 Infection Based on Lifestyle Habits Employing Random Forest Algorithm&rdquo;, journal of algebraic statistics,Vol.13,No.3,pages.40-45,June 2022 Sunar Mohammed Farook, K NageswaraReddy,&rsquo;&rsquo; Implementation of Intrusion Detection Systems for High Performance Computing Environment Applications&rsquo;&rsquo;, International journal of Scientific Engineering and Technology Research ,Vol.04, N0.41, Pages:8958-8963, October 2015. MV Subramanyam, &ldquo;Automatic feature based image registration using SIFT algorithm&rdquo;, conference of 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT&#39;12), pages. 1-5, July 2012. MV Subramanyam, Mahesh, &ldquo;Feature based image registration using steerable filters and Harris algorithm&rdquo;,pages. 95-99, January 2012. MV Subramanyam, K Satya Prasad, PV Gopi Krishna Rao,&rsquo;&rsquo;Robust control of steam turbine system speed using improved IMC tuned PID controller&rsquo;&rsquo;, Procedia Engineering, Vol.38,Pages. 1450- 1456,January 2012. MV Subramanyam, Giri Prasad,&rsquo;&rsquo; A New Approach for SAR Image Denoising&rsquo;&rsquo;, International Journal of Electrical and Computer Engineering,Vol.5,No.5, Pages. 984-991, October 2015. 10.M. Sharmila Devi, Farooq Sunar Mahammad, D. Bhavana, D. Sukanya, TV. Sai Thanusha, M. Chandrakala, P. VenkataSwathi &ldquo;Machine Learning Based Classification and Clustering Analysis of Efficiency of Exercise Against Covid- 19 Infection&rdquo; , JOURNAL OF ALGEBRAIC STATISTICS, Vol. 13, no. 3,pages. 112-117, June 2022. 11.M. Sharmila Devi, &ldquo;A comparative Study of Classification Algorithm for Printed Telugu Character Recognition&rdquo;, International Journal of Electronics Communication and Computer Engineering,Vol.3,no.3,pages.633-641,2012. 12.B.Swarajya Lakshmi, &ldquo;Fire detection using Image processing&rdquo;,Asian Journal of Computer Science and Technology ISSN: 2249-0701 Vol.10 No.2, 2021, pp.14-19, 2021. 13.B.Swarajya Lakshmi, ―&rdquo;Identity-Based Proxy- Oriented Data Uploading and Remote Data Integrity checking in Public Cloud&rdquo;, International &nbsp; Journal of Research Vol. 5, no.22,pages. 744-757, 2018. &lt; &gt;SalhaAlzahrani, Vasile Palade, Naomie Salim, and Ajith Abraham. 2011. Using Structural Information and Citation Evidence to Detect Significant Plagiarism Cases in Scientific Publications. JASIST 63(2) (2011).Yaniv Bernstein and Justin Zobel. 2004. A Scalable System for Identifying Coderivative Documents. In Proc. SPIRE. LNCS, Vol. 3246. Springer.Teddi Fishman. 2009. &ldquo;We know it when we see it&quot;? is not good enough: toward a standard definition of plagiarism that transcends theft, fraud, and copyright. In Proc. Asia Pacific Conf. on Educational Integrity.Cristian Grozea and Marius Popescu. 2011. The Encoplot&nbsp;&nbsp;&nbsp;&nbsp; Similarity&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Measure&nbsp;&nbsp;&nbsp; for&nbsp;&nbsp;&nbsp; Automatic Detection of Plagiarism. In Proc. PAN WS at CLEF. 18.AzharHadmi, William Puech, Brahim Ait Es Said, and Abdellah Ait Ouahman. 2012. Watermarking.Vol. 2, InTech, Chapter Perceptual Image Hashing. &nbsp; &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
10

Marshall, Jonathan. "Resistances of Gender." M/C Journal 6, no. 4 (2003). http://dx.doi.org/10.5204/mcj.2232.

Full text
Abstract:
Online life is embedded within the complexes, organisations, power ratios, and conceptualisations of offline life. The ambiguities of the interaction between online and offline - the testing and questioning, asking and affirming of their match - make a vital part of their current phenomenology. One factor which seems to exert resistance - some form of implacability - however unexpectedly, is that of gender. Other categories, such as politics and nationality, seem to have similar, but more direct, effects. Online folklore is quite specific, and the folklore can be academic as analysts are affected by the same forces and experiences as other people. Firstly, it is claimed that gender is unimportant online - that you are free to be yourself, or whomsoever you choose. Mark Poster, who is not alone, claims: "one may experience directly the opposite gender by assuming it and enacting it in conversations" (1997: 223), which seems to confuse a temporary imagining with a long term imposed. Secondly, however, there are the repeated tales that online life is full of cross-gender impersonation and that, as a result, it is full of potential betrayal and disillusionment. Kolko writes: The stories of online cross-dressing that abound… often culminate in narratives of betrayal. In this accumulated body of scholarship, participants talk of how their notions of the world and their selves and others has been destabilized, rocked beyond recognition, until they are left feeling adrift, at sea, that they 'cannot trust anyone,' that 'everything online can be a lie,' that 'no one tells who they really are.' (1997: np). These stories seem a little contradictory. If gender is unimportant online, then how come it is such a source of anxiety? Often the anxiety seems concealed under a discourse of futurity, in which attention is given to what life online might become - with contradictions deleted - rather than giving attention to what actually happens or has happened. This move maintains the theory that the Internet is free of the effects of offline life, perhaps in compensation for increasing restrictions and insecurities in offline life. It also keeps the Internet in the realm of science fiction, where it is without history, and is cutting edge by default. People generally seem sure they can detect the gender of others (Suler 1996). A person might use a lot of emoticons and be female (Witmer &amp; Katzman 1998: 6, 9), they might flame and be male (Baym 1995: 158, Herring 1994), they might not know American pantyhose sizes and be male (irrespective of if they come from a country which uses different sizings - most of the rest of the world - or are a woman who does not wear pantyhose). People read books by academics describing how the sexes use language differently in order to detect these differences - while, at the same time, others read them in order to fake better (Wright 2000). If people select gender neutral pronouns in a MOO, then others will not assume they do not have a gender, they will generally attempt to work it out (Kendall 1996: 217), and some research suggests that if a person refuses to reveal their offline gender then they will be dropped from interactions (O'Brien 1999: 90). Most of these ways of determining 'real gender', use offline gender clichés to make that detection, or to manufacture that production. Thus McRae, after arguing in favour of absolute gender freedom, remarks that if someone plays a woman and wants to "attract partners as 'female' [they] must craft a description within the realm of what is considered attractive" (1996: 250). They are likely to exaggerate conventions of gender (as with plastic surgery). As Kendall writes: "choosing one gender or another does nothing to change the expectations attached to particular gender identifications" (1996: 217). In fact, as people online can ignore the gender of those contradicting their expectations of gender, then those expectations may grow stronger. Categories of gender might strengthen rather than weaken. A performance which follows rules and conventions in order to convey a message, which to some extent any successful performance must, may not challenge the accepted conceptual order at all. As not all the rules and conventions of performance may be conscious or understood by performers, their performance may unintentionally harden those conventions. This is especially so as in Western online social practice, whatever the complexity of our theory, gender seems to be treated as an 'essential' and equated with an offline body. Further, gender impersonation appears to happen in specific circumstances, namely on IRC, or MOOs, or in games. It rarely if ever happens on Mailing Lists, where anonymity is rarer (names are often given in addresses, and email often signed with a gendered name), and people try to manifest real authentic identities, rather than play with possible identities. An experimental mailing list I was involved in, in which members, previously known to each other from another list, were anonymous and their gender not specified, was short lived. It did not become a site of play with, or 'beyond', gender. As well, people seem only disturbed when males are thought to be impersonating females - which indicates a degree of gender specificity itself. I have never seen a list of ways to detect whether a male avatar was female, while the opposite is common. This is not just anxiety from heterosexual males seeking sex partners but, in a famous case, occurred when women found that a supposedly female confidant was male (Van Gelder 1996, Stone 1995: 69-81). So why does this happen? Answers to such questions must be provisional, but it is probably connected with the role of women, in offline life, in maintaining and marking intimacy and support. We might over-quickly say that, offline (outside of male homosexual groups in which gender may function differently), an intimate relationship usually includes one woman. Emotional or support bonding is female. Male bonding has become almost suspect, particularly if it involves intimacy. We also live in a society with a common discourse about the decline of support through kinship, a rise in single person households, increased insecurity in work, and decline in state support for people in times of stress, at the very time that kinship no longer is able to give support (Castells 1997: 97). The Western generative atom of kinship, intimacy and support, approaches being the heterosexual pair bond. Wuthnow claimed in 1994 that, faced with these kinds of insecurities, 40% of American adults became members of small groups meeting regularly to provide support for members (1994: 45-50). There is no reason to assume the percentage has declined. Internet groups can be seen to function similarly; they are means by which people make contacts, provide help, discuss problems or interests, and sometimes get work - fibreculture being a case in point. There is often, in such groups, a fairly active 'off-group' life of correspondence and contact between particular members. Structurally, life which is off a mailing list, or in a private MOO room, approaches the structure of the dyadic, private and intimate pair bond, which should contain at least one woman. Finding out that a person you have been intimate with was not female, almost automatically changes the relationship from the realm of intimate and private into a public betrayal. Our private role and its vulnerabilities has broken into the public male domain and symbolically been exposed rather than shared. Gender functions as a way in which people interpret the actions of others. As Ten Have argues (2000), categorisation is one of the ways in which people decide what kinds of messages others are emitting, whether they have much in common and whether they can be trusted. The importance of particular categories can frequently be ascertained by how often they are requested - and gender is one of the most requested when unknown and when people are seeking support or intimacy. Because authenticity, or trying to find the truth of others, is important in Western thought about relationships, this truth becomes anchored in the 'real' body and the customs surrounding it. 'Truth' is confirmed the more private the information, and the more it is received offline. As a result, and because of models of intimacy, 'real gender' then becomes important and is central to current online life. It may also point to other ways in which the tension between the online and offline manifest, or in which an apparently abstract flow meets resistance. Works Cited Baym, Nancy (1995) "The Emergence of Community in Computer-Mediated Communication", in Steven G. Jones ed. Cybersociety: Computer-Mediated Communication and Community, Sage, Thousand Oaks. Castells, Manual (1997) The Information Age: Economy, Society and Culture Volume 2: the Power of Identity, Blackwell, 1997. Cherny, Lynn &amp; Weise, Elizabeth R. ed. (1996) Wired Women: Gender and New Realities in Cyberspace, Seal Press, Seattle. Herring, Susan (1994) "Gender Differences in Computer-Mediated Communication: Bringing Familiar Baggage to the New Frontier", Keynote talk at panel entitled Making the Net*Work*: Is there a Z39.50 in gender communication?, American Library Association annual convention, Miami, June 27, 1994. &lt;http://cpsr.org/cpsr/gender/herring.txt&gt; Kendall, Lori (1996) "MUDder? I Hardly Know 'Er! Adventures of a feminist MUDder" in Cherny &amp; Weise, 1996. Kolko, Beth (1997) "Discursive Citizenship: The Body Politic in Cyberspace", paper presented at the Creative Collaboration in Virtual Communities Conference, Sydney, Australia, February 1997. &lt;http://www.arch.su.edu.au/kcdc/conferences/VC97/papers/kolko.php&gt; McRae, Shannon (1996) "Coming Apart at the Seams: Sex, Text and the Virtual Body" in Cherny &amp; Weise. O'Brien, Jodi (1999) "Gender (Re)production in Online Interaction", in M.A. Smith, &amp; P. Kollock, eds. Communities in Cyberspace, Routledge, London. Poster, Mark (1997) "Cyberdemocracy", in David Holmes ed. Virtual Politics: Identity &amp; Community in Cyberspace, Sage Publications, London. Stone, A. R. (1995) The War of Desire and Technology at the Close of the Mechanical Age, MIT Press. Suler, John (1996) "Do Boys Just Wanna Have Fun? Male Gender-Switching in Cyberspace (and how to detect it)". &lt;http://www.rider.edu/users/suler/psycyber/genderswap.php&gt; ten Have, Paul (2000) " 'hi, a/s/l please?': identification/categorisation in computer mediated communication" A paper/mosaic presented at the 'Sociaal-Wetenschappelijke Studiedagen 2000', Session ICT &amp; Huiselijk Leven. Van Gelder, Lindsay (1996) "The Strange Case of the Electronic Lover", in Rob Kling ed Computerization and Controversy: Value Conflicts and Social Choices, 2nd Edition, Academic Press, San Diego. Witmar, D.F. &amp; Katzman, S.L. “Smile When You Say That: Graphic Accents as Gender Markers” in Fay Sudweeks et al eds. Network &amp; Netplay: Virtual Groups on the Internet, AAAI Press, MenloPark. Wright, Kathryn (2000) "Gender Bending in Games" &lt;http://www.womengamers.com/articles/gender.php&gt; Wuthnow, Robert (1994) Sharing the Journey: Support Groups and America's New Quest for Community, Free Press, NY. Links http://cpsr.org/cpsr/gender/herring.txt http://www.arch.su.edu.au/kcdc/conferences/VC97/papers/kolko.html http://www.rider.edu/users/suler/psycyber/genderswap.html http://www.womengamers.com/articles/gender.html%3e Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Marshall, Jonathan. "Resistances of Gender" M/C: A Journal of Media and Culture&lt; http://www.media-culture.org.au/0308/06-resistances.php&gt;. APA Style Marshall, J. (2003, Aug 26). Resistances of Gender. M/C: A Journal of Media and Culture, 6,&lt; http://www.media-culture.org.au/0308/06-resistances.php&gt;
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cross-language re-use detection"

1

Barrón, Cedeño Luis Alberto. "On the Mono- and Cross-Language Detection of Text Re-Use and Plagiarism." Doctoral thesis, Universitat Politècnica de València, 2012. http://hdl.handle.net/10251/16012.

Full text
Abstract:
Barrón Cedeño, LA. (2012). On the Mono- and Cross-Language Detection of Text Re-Use and Plagiarism [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/16012<br>Palancia
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cross-language re-use detection"

1

Barròn-Cedeño, Alberto, Paolo Rosso, Sobha Lalitha Devi, Paul Clough, and Mark Stevenson. "PAN@FIRE: Overview of the Cross-Language !ndian Text Re-Use Detection Competition." In Multilingual Information Access in South Asian Languages. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40087-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!