To see the other types of publications on this topic, follow the link: Optimal decided trust inference.

Journal articles on the topic 'Optimal decided trust inference'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 journal articles for your research on the topic 'Optimal decided trust inference.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mahendrakar Shaymrao, Swetha, Pushpa Sothenahalli Krishnaraju, Thungamani Mahalingappa, and Manjunath Thimmasandra Narayanappa. "Design and development of anonymous location based routing for mobile ad-hoc network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2743. http://dx.doi.org/10.11591/ijece.v12i3.pp2743-2755.

Full text
Abstract:
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
APA, Harvard, Vancouver, ISO, and other styles
2

Swetha, Mahendrakar Shaymrao, Sothenahalli Krishnaraju Pushpa, Mahalingappa Thungamani, and Thimmasandra Narayanappa Manjunath. "Design and development of anonymous location based routing for mobile ad-hoc network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2743–55. https://doi.org/10.11591/ijece.v12i3.pp2743-2755.

Full text
Abstract:
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
APA, Harvard, Vancouver, ISO, and other styles
3

Et.al, Mrs Swetha M. S. "Strong Secure Anonymous Location Based Routing (S2ALBR) method for MANET." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 4349–56. http://dx.doi.org/10.17762/turcomat.v12i3.1726.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) utilize confounding planning shows that spread community point characters similarly as courses from outside onlookers so as to give obscurity security. MANET contains different little gadgets conceding suddenly over the air. The topology of the system is changing an incredible piece of the time in light of the advantageous idea of its inside focuses. The security challenges ascend taking into account self-game-plan and self-reinforce limits. By the by, existing mysterious organizing shows depending upon either ricochet by-skip encryption or excess traffic either produce imperative expense or can't give full namelessness security to information sources, targets, and courses. The imperative expense raises the trademark asset limitation issue in MANETs particularly in natural media remote applications. To offer high absence of definition assurance expecting for all intents and purposes no effort, we strong secure anonymous location based routing (S2ALBR) protocol for MANET utilizing optimal partitioning and trust inference model. In S2ALBR appear, first segments a system into zones utilizing optimal tug of war partition (OTW) algorithm. By at that point, figure the trustiness of each reduced focus point utilizing the imprisonments got signal quality, versatility, way debacle and joint exertion rate. The arrangement of trust calculation is advanced by the optimal decided trust inference (ODTI) model, which gives the trustiness of each adaptable. By then picks the most basic trust ensured focus point in each zone as generally engaging trade habitats for information transmission, which structure a non-unquestionable bewildering course. The introduction of proposed S2ALBR show is examined by various testing conditions with Network Simulator (NS2) instrument.
APA, Harvard, Vancouver, ISO, and other styles
4

MA, Yao, Hongwei LU, and Zaobin GAN. "Discovery of the Optimal Trust Inference Path for Online Social Networks." IEICE Transactions on Information and Systems E97.D, no. 4 (2014): 673–84. http://dx.doi.org/10.1587/transinf.e97.d.673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Swetha M S. "Develop a Mathematical Model to Secure Anonymous Communication in Manet Through Cluster Framework." Communications on Applied Nonlinear Analysis 31, no. 8s (2024): 505–13. http://dx.doi.org/10.52783/cana.v31.1544.

Full text
Abstract:
Introduction: MANETs employ intricate routing protocols that obscure node identities and routes from external observers, thereby ensuring anonymity and security. However, existing anonymous networking protocols relying on either hop-by-hop encryption or excessive traffic generation incur significant costs and often fail to provide complete anonymity protection for data sources, destinations, and routes due to emerging self-organization and self-reinforcement constraints. Objectives: To provide robust anonymity assurance at minimal cost, the research work proposes Secure Clustered Location-Based Routing Protocol (SCLBRP), The research work is evaluated for the network model is considered with performance parameter Energy and Network life time. Methods: To provide robust anonymity assurance at minimal cost, the research work proposes Secure Clustered Location-Based Routing Protocol (SCLBRP), in MANET utilizing optimal partitioning and cluster model. In SCLBRP First divides the network into zones using the Optimal Zone Partitioning (OZP) algorithm and cluster trust calculation Optimal Trust Inference Algorithm (OTIA). Results: The evaluation of the network model is considered with performance parameter Energy and Network life time. The proposed work is compared with the AASR and ALERT protocol with the help of Mathematical equation of energy and network live time. The work is proved that proposed work is giving better performance Conclusions: The research work focused in proposing a Secure Clustered Location-Based Routing Protocol (SCLBRP) for MANET. The highest trust degree is act as CH in the cluster among multiple mobile nodes. Optimal Trust Inference Algorithm (OTIA) is used to compute the optimal path among multiple paths. Finally, the proposed SCLBRP protocol is proved with better performance with existing protocol terms of energy and network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
6

Hasan, Abdulkadir Abdulahi, Xianwen Fang, Sohaib Latif, and Adeel Iqbal. "Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems." Sensors 25, no. 12 (2025): 3672. https://doi.org/10.3390/s25123672.

Full text
Abstract:
The Social Opportunistic Internet of Things (SO-IoT) is a rapidly emerging paradigm that enables mobile, ad-hoc device communication based on both physical and social interactions. In such networks, routing decisions heavily depend on the selection of intermediate nodes to ensure secure and efficient data dissemination. Traditional approaches relying solely on reliability or social interest fail to capture the multifaceted trustworthiness of nodes in dynamic SO-IoT environments. This paper proposes a trust-based route optimization framework that integrates social interest and behavioral reliability using Bayesian inference and Jeffrey’s conditioning. A composite trust level is computed for each intermediate node to determine its suitability for data forwarding. To validate the framework, we conduct a two-phase simulation-based analysis: a scenario-driven evaluation that demonstrates the model’s behavior in controlled settings, and a large-scale NS-3-based simulation comparing our method with benchmark routing schemes, including random, greedy, and AI-based protocols. Results confirm that our proposed model achieves up to an 88.9% delivery ratio with minimal energy consumption and the highest trust accuracy (86.5%), demonstrating its robustness and scalability in real-world-inspired IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
7

Basha, Adam Raja, and Calpakkam Yaashuwanth. "Double Secure Optimal Partial Aggregation Using Trust Inference and Hybrid Syncryption Algorithm for Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 15, no. 2 (2018): 423–36. http://dx.doi.org/10.1166/jctn.2018.7106.

Full text
Abstract:
A reliable security mechanism for data aggregation is most wanted due to the rapid growth in wireless sensor network (WSN) applications. Many research works have been focus to obtain confidentiality and integrity. Data aggregation is a challenging process, for one of the reason security issues can arrived at aggregated node. In this paper, we propose a double secure optimal partial aggregation (DS-OPA), which provides secure data aggregation without compromise network performance. The proposed DS-OPA technique consists of two phase. In first phase, we propose multi-objective differential evolution based inference (MDEI) model to compute the trusted aggregated node among multiple nodes in neighbor. The time varying constraints gather from aggregated nodes are optimize by proposed Jaya optimization algorithm. The selected aggregation node successfully received multiple input and produce single output without loss. In second phase, we use hybrid syncryption public key algorithm used to protect data privacy, which avoid data modification in aggregated node. To demonstrate their performance, we implemented our proposed DS-OPA system in network simulator tool with large network size. The simulation results prove that our proposed DS-OPA system are perfectly suited than existing systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Isabel, R. A., and E. Baburaj. "An Optimal Trust Aware Cluster Based Routing Protocol Using Fuzzy Based Trust Inference Model and Improved Evolutionary Particle Swarm Optimization in WBANs." Wireless Personal Communications 101, no. 1 (2018): 201–22. http://dx.doi.org/10.1007/s11277-018-5683-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohammed, Geleta T., Jane A. Aduda, and Ananda O. Kube. "Improving Forecasts of the EGARCH Model Using Artificial Neural Network and Fuzzy Inference System." Journal of Mathematics 2020 (June 24, 2020): 1–14. http://dx.doi.org/10.1155/2020/6871396.

Full text
Abstract:
This paper proposes an innovative semiparametric nonlinear fuzzy-EGARCH-ANN model to solve the problem of accurate modeling for forecasting stock market volatility. This model has been developed by a combination of the FIS, ANN, and EGARCH models. Because the proposed model is highly nonlinear and gradient-based parameter estimation methods might not give global optimal parameters for highly nonlinear models, the study has decided to use evolutionary algorithms instead. In particular, a differential evolution (DE) algorithm is suggested to solve the parameter estimation problem of the proposed model. After this, the semiparametric nonlinear fuzzy-EGARCH-ANN model has been developed mathematically from the three models mentioned before, and the study has simulated data by it. After the simulation, parameter estimation of the proposed model using a differential evolution algorithm on the simulated data is done. Finally, it is seen that the proposed model is good in capturing the volatility clustering and leverage effects of highly nonlinear and complicated financial time series data that were overlooked by the EGARCH model.
APA, Harvard, Vancouver, ISO, and other styles
10

Tsoumas, Ilias, Georgios Giannarakis, Vasileios Sitokonstantinou, et al. "Evaluating Digital Agriculture Recommendations with Causal Inference." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 12 (2023): 14514–22. http://dx.doi.org/10.1609/aaai.v37i12.26697.

Full text
Abstract:
In contrast to the rapid digitalization of several industries, agriculture suffers from low adoption of smart farming tools. Even though recent advancements in AI-driven digital agriculture can offer high-performing predictive functionalities, they lack tangible quantitative evidence on their benefits to the farmers. Field experiments can derive such evidence, but are often costly, time consuming and hence limited in scope and scale of application. To this end, we propose an observational causal inference framework for the empirical evaluation of the impact of digital tools on target farm performance indicators (e.g., yield in this case). This way, we can increase farmers' trust via enhancing the transparency of the digital agriculture market, and in turn accelerate the adoption of technologies that aim to secure farmer income resilience and global agricultural sustainability against a changing climate. As a case study, we designed and implemented a recommendation system for the optimal sowing time of cotton based on numerical weather predictions, which was used by a farmers' cooperative during the growing season of 2021. We then leverage agricultural knowledge, collected yield data, and environmental information to develop a causal graph of the farm system. Using the back-door criterion, we identify the impact of sowing recommendations on the yield and subsequently estimate it using linear regression, matching, inverse propensity score weighting and meta-learners. The results revealed that a field sown according to our recommendations exhibited a statistically significant yield increase that ranged from 12% to 17%, depending on the method. The effect estimates were robust, as indicated by the agreement among the estimation methods and four successful refutation tests. We argue that this approach can be implemented for decision support systems of other fields, extending their evaluation beyond a performance assessment of internal functionalities.
APA, Harvard, Vancouver, ISO, and other styles
11

Rajaraman, Sivaramakrishnan, Ghada Zamzmi, Feng Yang, Zhiyun Xue, Stefan Jaeger, and Sameer K. Antani. "Uncertainty Quantification in Segmenting Tuberculosis-Consistent Findings in Frontal Chest X-rays." Biomedicines 10, no. 6 (2022): 1323. http://dx.doi.org/10.3390/biomedicines10061323.

Full text
Abstract:
Deep learning (DL) methods have demonstrated superior performance in medical image segmentation tasks. However, selecting a loss function that conforms to the data characteristics is critical for optimal performance. Further, the direct use of traditional DL models does not provide a measure of uncertainty in predictions. Even high-quality automated predictions for medical diagnostic applications demand uncertainty quantification to gain user trust. In this study, we aim to investigate the benefits of (i) selecting an appropriate loss function and (ii) quantifying uncertainty in predictions using a VGG16-based-U-Net model with the Monto–Carlo (MCD) Dropout method for segmenting Tuberculosis (TB)-consistent findings in frontal chest X-rays (CXRs). We determine an optimal uncertainty threshold based on several uncertainty-related metrics. This threshold is used to select and refer highly uncertain cases to an expert. Experimental results demonstrate that (i) the model trained with a modified Focal Tversky loss function delivered superior segmentation performance (mean average precision (mAP): 0.5710, 95% confidence interval (CI): (0.4021,0.7399)), (ii) the model with 30 MC forward passes during inference further improved and stabilized performance (mAP: 0.5721, 95% CI: (0.4032,0.7410), and (iii) an uncertainty threshold of 0.7 is observed to be optimal to refer highly uncertain cases.
APA, Harvard, Vancouver, ISO, and other styles
12

Pooja, Chaturvedi, and K. Daniel A. "Energy Efficient Communication Framework for Target Coverage using Trust Concepts." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 247–57. https://doi.org/10.35940/ijeat.A9858.029320.

Full text
Abstract:
Target coverage is a challenging task in the field of wireless sensor networks aiming to observe a set of critical targets while considering the limited resources and the network lifetime is improved. The paper proposes an approach to : i) determine the strategy according to which the critical targets can be monitored while satisfying a certain confidence level. ii) determine the maximum and minimum number of nodes which can guarantee the coverage, iii) determine the optimal number of active nodes for various deployment strategies, iv) to determine a routing mechanism using either single hop/multi hop communication based on the reachability of the node to the base station and iv) to develop an aggregation protocol which can reduce the redundancy and number of packet transmissions. The proposed protocol is based on the two level aggregation at the set cover level and at the cluster level using the concept of Locality Sensitive Hashing (LSH) and Jaccard Similarity measure. The efficiency of the proposed aggregation mechanism is determined for various data sets of multiple dimensions. The results obtained through the simulations show the improvement in the network performance with respect to the network longevity, coverage, reliability and of the data transmission as compared to the Boolean coverage model
APA, Harvard, Vancouver, ISO, and other styles
13

N, Mr Aravindhan. "Securing AI-as-a-Service Models against Inference Leakage Attacks with Applied Cryptography." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 990–93. https://doi.org/10.22214/ijraset.2025.72175.

Full text
Abstract:
AI-as-a-Service (AIaaS) is an innovative cloud-based paradigm that empowers service providers to deliver advanced artificial intelligence capabilities—such as facial recognition, financial prediction, and epidemic modeling—through accessible online platforms. Despite its benefits, this model presents serious data privacy challenges, as users must transmit sensitive personal or corporate information to external servers. Among these threats, inference leakage attacks are particularly concerning, as they can compromise both user data and the integrity of the AI models.Traditional methods often struggle to strike an optimal balance between efficiency and data confidentiality, leading to security gaps and increased exposure to unauthorized access or leaks. To mitigate these issues, this project introduces a privacy-preserving solution based on Fully Homomorphic Encryption (FHE), which allows computations to be performed directly on encrypted data.With FHE, user inputs remain encrypted throughout the AI processing workflow. When a user submits encrypted data, the cloud server processes it using the AI model without ever seeing the original content. The resulting output is also encrypted and can only be decrypted by the user holding the appropriate private key. This ensures that the service provider cannot access either the input or the output in plain form.By employing FHE, this framework secures the inference process, blocks leakage of sensitive information, and preserves the proprietary nature of AI models. The method is especially suitable for applications requiring rapid decisionmaking, such as live facial recognition, while also reinforcing trust and privacy in AI cloud services.
APA, Harvard, Vancouver, ISO, and other styles
14

Sandanasamy, A., and P. Joseph Charles. "Hybrid Proximal Policy Optimization based Adaptive Link Load Balancing with INT in Secure SDN-IoT Networks." Indian Journal Of Science And Technology 18, no. 24 (2025): 1915–30. https://doi.org/10.17485/ijst/v18i24.1007.

Full text
Abstract:
Background/Objectives: The Internet of things with software defined networking has evolved and is facing vigorous traffic patterns and security threats in the realm of data communication. Balancing the load becomes a challenge with IoT devices. The objective is to develop Hybrid Proximal Policy Optimization based adaptive link load balancing method to address the issues of dynamic traffic patterns and security threats in SDN-IoT, thereby enhancing network performance. Method: The research follows a two level architecture which includes a centralized SDN controller which is responsible for training policy with global telemetry and switches that perform real time inference using local state observation. The system constructs the state representations using live INT metrics. Link utilization, queue length, delay, packet-loss and trust score help to find the robust path cost estimation. The PPO selects the optimal forwarding paths aided by a dynamic reward function. The policy is synchronized with edge switches for low-latency, decentralized decision-making. Findings: The effectiveness of the proposed algorithm is validated under normal and adversarial conditions. While comparing ECMP, DQN, A3C and Trust AODV, the proposed method demonstrates superior scalability with 37% reduction in 99th percentile latency. Efficient load balancing is achieved with 60-62% stable link utilization and 75 ms threat response latency at 90% attack intensity. The F1 score of 95% for DDoS, 92% for INT spoofing indicates its higher detection accuracy. These results show that the significant improvements are achieved in load distribution, reduced latency, and in security resiliency. Novelty: This research article uniquely integrates real time telemetry, trust based security model and deep reinforcement learning model to achieve load balancing in SDN IoT network. The real time INT data and trust metrics enables decentralized and lowlatency path selection. The balance between QoS and security is achieved by the dynamic reward function providing a robust and scalable solution. Keywords: Load balancing; SDN-IoT; Link load balancing; INT; Trust aware routing; QoS
APA, Harvard, Vancouver, ISO, and other styles
15

Hasibuan, Abdurrozzaq, Luthfi Parinduri, Oris Krianto Sulaiman, et al. "Application of Taguchi and Analysis Hierarcy Process Methods for Furan Design on Metal Casting Industry." International Journal of Engineering & Technology 7, no. 2.13 (2018): 366. http://dx.doi.org/10.14419/ijet.v7i2.13.16922.

Full text
Abstract:
In the preparation of furan the raw material used are, Silica Sand, Resin, and Catalyst. Some problem that occurs are high level of water, high level of sour, high level of clay, unsuitable distribution, and low permeability. All those problems above make the power of furan not suitable with the target that has been stated, so that furan can easily be broken, cracked, and do not stand with high temperature and its power becomes weak. The result of this research is that the optimal combination based on the highest TOPSIS score is A1 B2 C3 with the composition of Resin 1.3%, Catalyst 22.5% and new sand 15% + reclaim sand 85%. The coefficient of loss function compression strength is 4.611,11 and 10.375 for the shear strength. The raising quality based on the confirmation experiment is 0.1018 for the compression strength and 0.2339 for the shear strength. The value of S/N in the confirmation experiment for the compression strength is 20.5817 and 23.0480, in which both numbers are in the trust interval limitation that has been decided. It shows that TOPSIS procedure is able to increase furan quality for both responses, that is compression strength response, and shear strength response all at once in one parameter setting.
APA, Harvard, Vancouver, ISO, and other styles
16

Hounsome, Luke, Julia Verne, Raj Persad, et al. "An audit of urological MDT decision making in the South West of England." Journal of Clinical Urology 11, no. 4 (2018): 254–57. http://dx.doi.org/10.1177/2051415818755626.

Full text
Abstract:
Objective: The formation of multidisciplinary teams (MDTs) was formalised for urological cancer services by the National Institute for Health and Care Excellence (NICE) in the 2002 Improving Outcomes in Urological Cancer guidance. This project aimed to assess the variability of MDT recommendations when presented with the same patient. It covered the type and grade of tumour, recorded stage, treatment recommendations and whether clinical trials were considered. Materials and methods: Anonymised details of 10 patients were sent to South West Trust MDTs in two tranches. Details included age, clinical history, haematology and biochemistry results, digital radiology, and pathology text. A panel of representative urologists and urological oncologists from the region decided on optimal treatment and key points of management decisions. Results: The MDTs were not consistent in decision making. This agrees with a previous survey of urologists which also showed inconsistent decision making, and under-use of clinical cues. Some decisions contradicted NICE guidelines in force at the time. Conclusions: MDTs are now an instrumental, integrated part of cancer management. It is vital for assurance of best patient care and best outcomes that the MDT considering and planning treatment is fully functional and well informed on the evidence base, with effective communications. This audit suggests that this is not the case. The Oxford Centre for Evidence-based Medicine – Levels of Evidence is not applicable to this study.
APA, Harvard, Vancouver, ISO, and other styles
17

Imran, Muhammad, Muhammad Salman Habib, Amjad Hussain, Naveed Ahmed, and Abdulrahman M. Al-Ahmari. "Inventory Routing Problem in Supply Chain of Perishable Products under Cost Uncertainty." Mathematics 8, no. 3 (2020): 382. http://dx.doi.org/10.3390/math8030382.

Full text
Abstract:
This paper presents a multi-objective, multi-period inventory routing problem in the supply chain of perishable products under uncertain costs. In addition to traditional objectives of cost and greenhouse gas (GHG) emission minimization, a novel objective of priority index maximization has been introduced in the model. The priority index quantifies the qualitative social aspects, such as coordination, trust, behavior, and long-term relationships among the stakeholders. In a multi-echelon supply chain, the performance of distributor/retailer is affected by the performance of supplier/distributor. The priority index measures the relative performance index of each player within the supply chain. The maximization of priority index ensures the achievement of social sustainability in the supply chain. Moreover, to model cost uncertainty, a time series integrated regression fuzzy method is developed. This research comprises of three phases. In the first phase, a mixed-integer multi-objective mathematical model while considering the cost uncertainty has been formulated. In order to determine the parameters for priority index objective function, a two-phase fuzzy inference process is used and the rest of the objectives (cost and GHG) have been modeled mathematically. The second phase involves the development of solution methodology. In this phase, to solve the mathematical model, a modified interactive multi-objective fuzzy programming has been employed that incorporates experts’ preferences for objective satisfaction based on their experiences. Finally, in the third phase, a case study of the supply chain of surgical instruments is presented as an example. The results of the case provide optimal flow of products from suppliers to hospitals and the optimal sequence of the visits of different vehicle types that minimize total cost, GHG emissions, and maximizes the priority index.
APA, Harvard, Vancouver, ISO, and other styles
18

Xie, Yibing, Nichakorn Pongsakornsathien, Alessandro Gardi, and Roberto Sabatini. "Explanation of Machine-Learning Solutions in Air-Traffic Management." Aerospace 8, no. 8 (2021): 224. http://dx.doi.org/10.3390/aerospace8080224.

Full text
Abstract:
Advances in the trusted autonomy of air-traffic management (ATM) systems are currently being pursued to cope with the predicted growth in air-traffic densities in all classes of airspace. Highly automated ATM systems relying on artificial intelligence (AI) algorithms for anomaly detection, pattern identification, accurate inference, and optimal conflict resolution are technically feasible and demonstrably able to take on a wide variety of tasks currently accomplished by humans. However, the opaqueness and inexplicability of most intelligent algorithms restrict the usability of such technology. Consequently, AI-based ATM decision-support systems (DSS) are foreseen to integrate eXplainable AI (XAI) in order to increase interpretability and transparency of the system reasoning and, consequently, build the human operators’ trust in these systems. This research presents a viable solution to implement XAI in ATM DSS, providing explanations that can be appraised and analysed by the human air-traffic control operator (ATCO). The maturity of XAI approaches and their application in ATM operational risk prediction is investigated in this paper, which can support both existing ATM advisory services in uncontrolled airspace (Classes E and F) and also drive the inflation of avoidance volumes in emerging performance-driven autonomy concepts. In particular, aviation occurrences and meteorological databases are exploited to train a machine learning (ML)-based risk-prediction tool capable of real-time situation analysis and operational risk monitoring. The proposed approach is based on the XGBoost library, which is a gradient-boost decision tree algorithm for which post-hoc explanations are produced by SHapley Additive exPlanations (SHAP) and Local Interpretable Model-Agnostic Explanations (LIME). Results are presented and discussed, and considerations are made on the most promising strategies for evolving the human–machine interactions (HMI) to strengthen the mutual trust between ATCO and systems. The presented approach is not limited only to conventional applications but also suitable for UAS-traffic management (UTM) and other emerging applications.
APA, Harvard, Vancouver, ISO, and other styles
19

Rosen, David M., Luca Carlone, Afonso S. Bandeira, and John J. Leonard. "SE-Sync: A certifiably correct algorithm for synchronization over the special Euclidean group." International Journal of Robotics Research 38, no. 2-3 (2018): 95–125. http://dx.doi.org/10.1177/0278364918784361.

Full text
Abstract:
Many important geometric estimation problems naturally take the form of synchronization over the special Euclidean group: estimate the values of a set of unknown group elements [Formula: see text] given noisy measurements of a subset of their pairwise relative transforms [Formula: see text]. Examples of this class include the foundational problems of pose-graph simultaneous localization and mapping (SLAM) (in robotics), camera motion estimation (in computer vision), and sensor network localization (in distributed sensing), among others. This inference problem is typically formulated as a non-convex maximum-likelihood estimation that is computationally hard to solve in general. Nevertheless, in this paper we present an algorithm that is able to efficiently recover certifiably globally optimal solutions of the special Euclidean synchronization problem in a non-adversarial noise regime. The crux of our approach is the development of a semidefinite relaxation of the maximum-likelihood estimation (MLE) whose minimizer provides an exact maximum-likelihood estimate so long as the magnitude of the noise corrupting the available measurements falls below a certain critical threshold; furthermore, whenever exactness obtains, it is possible to verify this fact a posteriori, thereby certifying the optimality of the recovered estimate. We develop a specialized optimization scheme for solving large-scale instances of this semidefinite relaxation by exploiting its low-rank, geometric, and graph-theoretic structure to reduce it to an equivalent optimization problem defined on a low-dimensional Riemannian manifold, and then design a Riemannian truncated-Newton trust-region method to solve this reduction efficiently. Finally, we combine this fast optimization approach with a simple rounding procedure to produce our algorithm, SE-Sync. Experimental evaluation on a variety of simulated and real-world pose-graph SLAM datasets shows that SE-Sync is capable of recovering certifiably globally optimal solutions when the available measurements are corrupted by noise up to an order of magnitude greater than that typically encountered in robotics and computer vision applications, and does so significantly faster than the Gauss–Newton-based approach that forms the basis of current state-of-the-art techniques.
APA, Harvard, Vancouver, ISO, and other styles
20

Fedoruk, Benjamin, Harrison Nelson, Russell Frost, and Kai Fucile Ladouceur. "The Plebeian Algorithm: A Democratic Approach to Censorship and Moderation." JMIR Formative Research 5, no. 12 (2021): e32427. http://dx.doi.org/10.2196/32427.

Full text
Abstract:
Background The infodemic created by the COVID-19 pandemic has created several societal issues, including a rise in distrust between the public and health experts, and even a refusal of some to accept vaccination; some sources suggest that 1 in 4 Americans will refuse the vaccine. This social concern can be traced to the level of digitization today, particularly in the form of social media. Objective The goal of the research is to determine an optimal social media algorithm, one which is able to reduce the number of cases of misinformation and which also ensures that certain individual freedoms (eg, the freedom of expression) are maintained. After performing the analysis described herein, an algorithm was abstracted. The discovery of a set of abstract aspects of an optimal social media algorithm was the purpose of the study. Methods As social media was the most significant contributing factor to the spread of misinformation, the team decided to examine infodemiology across various text-based platforms (Twitter, 4chan, Reddit, Parler, Facebook, and YouTube). This was done by using sentiment analysis to compare general posts with key terms flagged as misinformation (all of which concern COVID-19) to determine their verity. In gathering the data sets, both application programming interfaces (installed using Python’s pip) and pre-existing data compiled by standard scientific third parties were used. Results The sentiment can be described using bimodal distributions for each platform, with a positive and negative peak, as well as a skewness. It was found that in some cases, misinforming posts can have up to 92.5% more negative sentiment skew compared to accurate posts. Conclusions From this, the novel Plebeian Algorithm is proposed, which uses sentiment analysis and post popularity as metrics to flag a post as misinformation. This algorithm diverges from that of the status quo, as the Plebeian Algorithm uses a democratic process to detect and remove misinformation. A method was constructed in which content deemed as misinformation to be removed from the platform is determined by a randomly selected jury of anonymous users. This not only prevents these types of infodemics but also guarantees a more democratic way of using social media that is beneficial for repairing social trust and encouraging the public’s evidence-informed decision-making.
APA, Harvard, Vancouver, ISO, and other styles
21

Vadday, Komal. "P02 Use of intrathecal fluorescein to identify cerebrospinal fluid (CSF) rhinorrhea in paediatrics: a case report and literature review." Archives of Disease in Childhood 107, no. 5 (2022): e25.3-e25. http://dx.doi.org/10.1136/archdischild-2022-nppg.11.

Full text
Abstract:
Early identification of CSF rhinorrhoea can reduce the risk of meningitis and potentially decrease the length of hospital stay. To determine the exact site of leak, intrathecal fluorescein (IF) is frequently used as a diagnostic tool adjunct to repair surgery in rhinorrhea. Although this is generally considered safe, there is a slight risk of seizures, radicular symptoms such as numbness and transient paraparesis.1Miss. AB, a 20 month old child weighing 11.6kg with history of traumatic subdural collections was admitted with episodes of absence seizures, ataxia and unresponsiveness. Initial investigations involved an electroencephalogram which reported a normal background rhythm. A follow up MRI scan reported no definite site of abnormal CSF leak to confirm the working diagnosis. Hence, IF was proposed as a diagnostic tool to identify the location of a possible leak. The pharmacist conducted a therapeutic review with the aim of appraising existing evidence for the use of IF in paediatrics.A total of 12 articles were identified using Medline and Embase. 5 case series and 1 case report were selected for further review to determine the safety profile, optimal dose and appropriate formulation for the diagnostic procedure. Studies showed at lower concentrations, with doses ranging from 25-100mg the rate of minor complications such as nausea/vomiting, headache and dizziness was negligible.1 2 No complications were accounted in using the lowest dose (<25mg).2 Another study specifically mentioned no adverse reactions observed in children when 0.1ml/kg of 5% fluorescein was administered.3 The case report presented a paediatric patient (16 months) with CSF leak who was administered 0.125ml (6.25mg) of 5% IT to identify the leak.4 The potential dosage for Miss. AB was decided as between 10mg to 25mg balancing the increasing risk of adverse reactions with higher doses and possibility of false-negative result with lower doses.The neurosurgical team used this evidence to present the patient’s case to the chairman’s board for an off-label use approval at the trust. Upon enquiring various manufactures, the 5% unlicensed injection was unavailable to purchase and the 10% injection is unsuitable for intrathecal use. Therefore, the 20% fluorescence sodium injection which is an unlicensed ‘specials’ product usually used in adults was recommended by pharmacy. The smallest measurable dose of 0.1ml (20mg) of 20% fluorescein sodium, diluted in 10ml CSF with 5ml infused via a 0.2micron filter was recommended. The batch number and pyrogen free certificate was obtained from pharmacy procurement and application was submitted.Upon receiving the panel approval, IF was used and a CSF leak was identified. This has aided the surgeons to confirm diagnosis and repair the rhinorrhea. With this successful intervention, the use of IF can be an established option to diagnose CSF rhinorrhea prior to surgery in the trust. These findings will be used in submitting a formulary application and drafting trust guidance for extending the use of IF to paediatrics as a diagnostic tool in neurosurgery.ReferencesJavadi S, Samimi H, Naderi F, et al. The use of low- dose intrathecal fluorescein in endoscopic repair of cerebrospinal fluid rhinorrhea. Archives of Iranian Medicine 2013;16:264-266.Rainer K, Wienke A, Wolfgang D, et al. Use of sodium fluorescein solution for detection of cerebrospinal fluid fistulas: an analysis of 420 administrations and reported complications in Europe and the United States. Laryngoscope 2004;114:266-272.Crosara P, Becker C, Stamm A, et al. Chemical and cytological analysis of cerebral spinal fluid after intrathecal injection of hypodense fluorescein. Brazilian Journal of Otorhinolaryngology 2015;81:549-553Lue A, Manolidis S. Intrathecal fluorescein to localize cerebrospinal fluid leakage in Bilateral Mondini Dysplasia. Otology & Neurotology 2004;25:50-52.
APA, Harvard, Vancouver, ISO, and other styles
22

Polenkova, M. V. "Features of the Sale of Export Products of Agricultural Enterprises in the Conditions of Risks." Business Inform 12, no. 515 (2020): 285–92. http://dx.doi.org/10.32983/2222-4459-2020-12-285-292.

Full text
Abstract:
The article is aimed at modeling the sale of exported crop production and animal husbandry of agricultural enterprises in the conditions of risks. It is identified that agricultural activities are accompanied by a number of threats of socio-economic, financial, market, infrastructure, systemic, environmental and institutional nature; some risks have been exacerbated in recent years due to climate change and food price instability. It is proved that small agrarian enterprises are especially vulnerable to the problems of ensuring their means of livelihood, may experience difficulties in assessing and managing risks, and do not receive an appropriate effect from investment opportunities that can improve business and strengthen their sustainability. Several risks that accompany the agricultural sector of Ukraine and often become real threats to its socio-economic development are allocated as such that are the least taken into account by agricultural enterprises of various organizational forms and sizes. They are gathered to six groups (market; reduction in labor potential; systemic; loss of trust; political; legal). The method of fuzzy sets (fuzzy logic) is applied, based on the Matlab package and the Fuzzy Logic Toolbox module, within which a fuzzy logical classification and inference system is created. The fuzzy format of the calculation results is ensured by the two-step sequence of the formation of sets (phazification and dephazification). According to the results of modeling the optimal export volumes under the influence of external and internal risks, it is proved that ensuring large volumes of plant exports is accompanied by medium and high levels of market risks, medium and high risks of reducing labor potential and medium and high levels of market risks; ensuring large volumes of exports of animal products is accompanied by low and medium levels of market risks, medium and high levels of risk of reducing labor potential, high levels of market risks and high levels of legal risks. The proposed model is favorable for agricultural enterprises in the process of their economic activity in order to identify the strength of either positive or negative impact of risks and other hidden connections to predict and optimize their activities, which will allow to more clearly establish the strategic priorities of their activities and use resources more rationally.
APA, Harvard, Vancouver, ISO, and other styles
23

Pietruszka-Ortyl, Anna. "THE IMPACT OF ORGANIZATIONAL CULTURE FOR COMPANY'S INNOVATION STRATEGY." Marketing and Management of Innovations, no. 3 (2019): 178–92. http://dx.doi.org/10.21272/mmi.2019.3-14.

Full text
Abstract:
The resource-based view recognizes present organizational culture as a key component to its success or failure. It has a direct impact on the innovation strategy of organizations and therefore should be treated as a determinant of the organisation's future. Presently companies should naturally strive to make efforts aiming at the creation of such organizational cultures which would affirm knowledge – cultures characteristic for organisations based on knowledge, that foster engagement of employees, building trust and sharing knowledge. They are most often convergent and mutually complementary and described as: lean culture, learning organization culture, information culture, group-development culture. One type of the organizational cultures indicated as optimal for operating in knowledge-based economy is the quality culture. Concentration on quality is currently a sine qua non-condition for the survival and development of modern organization and at the same time, one of the main tasks of managers. Because of the fact that that instruments are in place but still there is a lack of quality culture in the practical aspects and also common point of view that there is a gap to be filled in the development of appropriate culture for quality, the study provides an initial comparative verification of which stage of evolution towards quality culture is represented by companies from different sectors in Poland. The paper has theoretical-empirical ladder. Its aims are to review existing literature dedicated to organisational quality culture essence, elements, determinants and dimensions. Investigation of the topic in the paper is carried out in the following logical sequence: TQM implementation → Organizational culture → Quality culture → Organizational Quality Culture. The purpose of this paper is to describe components of organisational quality cultures in polish enterprises from different sectors. The methodological tool of the research methods was survey questionnaire, included 20 closed-ended questions – most of them multiple choice. It was decided to research, in the context of quality culture, all enterprises: those operating in production, in services and also mixed enterprises. Based on exploration of empirical data, the condition of quality culture in companies operating in Poland is diagnosed. Paper proves that verified organisations are on their way in the direction to the phase of permanent organisational quality culture creation. The results of the research can be useful for developing the complex model of organizational quality culture constitution. They can also provide managers with valuable suggestions on building stable organizational quality culture.
APA, Harvard, Vancouver, ISO, and other styles
24

Abdelhedi, Fatma, and Nabil Derbel. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (2016): 513–19. http://dx.doi.org/10.25046/aj020366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Biran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (2017): 553–61. http://dx.doi.org/10.25046/aj020371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

De Magalhães, Leandro, Dominik Hangartner, Salomo Hirvonen, Jaakko Meriläinen, Nelson A. Ruiz, and Janne Tukiainen. "When Can We Trust Regression Discontinuity Design Estimates from Close Elections? Evidence from Experimental Benchmarks." Political Analysis, January 20, 2025, 1–8. https://doi.org/10.1017/pan.2024.28.

Full text
Abstract:
Abstract Regression discontinuity designs (RDD) are widely used in the social sciences to estimate causal effects from observational data. Following recent methodological advances, scholars can choose from various RDD estimators for point estimation and inference. This decision is mainly guided by theoretical results on optimality and Monte Carlo simulations because of a paucity of research on the performance of the different estimators in recovering real-world experimental benchmarks. Leveraging exact ties in personal votes in local elections in Colombia and Finland, which are resolved by a random lottery, we assess the performance of various estimators featuring different polynomial degrees, bias-correction methods, optimal bandwidths, and approaches to statistical inference. Using re-running and re-election as outcomes, we document only minor differences in the performance of the various implementation approaches when the conditional expectation function (CEF) of the outcomes in the vicinity of the discontinuity is close to linear. When approximating the curvature of the CEF is more challenging, bias-corrected and robust inference with coverage-error-rate-optimal bandwidths comes closer to the experimental benchmark than more widely used alternative implementations.
APA, Harvard, Vancouver, ISO, and other styles
27

Sujatha, M., K. Geetha, and P. Balakrishnan. "User-centric framework to facilitate trust worthy cloud service provider selection based on fuzzy inference system." Journal of Intelligent & Fuzzy Systems, April 9, 2021, 1–9. http://dx.doi.org/10.3233/jifs-189883.

Full text
Abstract:
The widespread adoption of cloud computing by several companies across diverse verticals of different sizes has led to an exponential growth of Cloud Service Providers (CSP). Multiple CSPs offer homogeneous services with a vast array of options and different pricing policies, making the suitable service selection process complex. Our proposed model simplifies the IaaS selection process that can be used by all users including clients from the non-IT background. In the first phase, requirements are gathered using a simple questionnaire and are mapped with the compute services among different alternatives.In the second phase, we have implemented the Sugeno Fuzzy inference system to rank the service providers based on the QoS attributes to ascertain the appropriate selection. In the third phase, we have applied the cost model to identify the optimal CSP. This framework is validated by applying it for a gaming application use case and it has outperformed the online tools thus making it an exemplary model.
APA, Harvard, Vancouver, ISO, and other styles
28

White, Ben, and Mark Miller. "Ambient smart environments: affordances, allostasis, and wellbeing." Synthese 204, no. 2 (2024). http://dx.doi.org/10.1007/s11229-024-04679-9.

Full text
Abstract:
AbstractIn this paper we assess the functionality and therapeutic potential of ambient smart environments. We argue that the language of affordances alone fails to do justice to the peculiar functionality of this ambient technology, and draw from theoretical approaches based on the free energy principle and active inference. We argue that ambient smart environments should be understood as playing an'upstream' role, shaping an agent's field of affordances in real time, in an adaptive way that supports an optimal grip on a field of affordances. We characterise this optimal grip using precision weighting, and in terms of allostatic control, drawing an analogy with the role of precision weighting in metacognitive processes. One key insight we present is that ambient smart environments may support allostatic control not only by simplifying an agent's problem space, but by increasing uncertainty, in order to destabilise calcified, sub-optimal, psychological and behavioural patterns. In short, we lay an empirically-grounded theoretical foundation for understanding ambient smart environments, and for answering related philosophical questions around agency, trust, and subjective wellbeing.
APA, Harvard, Vancouver, ISO, and other styles
29

Dantzer, Travis, and Branko Kerkez. "Tunable linear feedback control of urban drainage systems using models defined purely from data." Water Science & Technology, June 4, 2024. http://dx.doi.org/10.2166/wst.2024.195.

Full text
Abstract:
ABSTRACT Real-time and model-predictive control promises to make urban drainage systems (UDS) adaptive, coordinated, and dynamically optimal. Though early implementations are promising, existing control algorithms have drawbacks in computational expense, trust, system-level coordination, and labor cost. Linear feedback control has distinct advantages in computational expense, interpretation, and coordination. However, current methods for building linear feedback controllers require calibrated software models. Here we present an automated method for generating tunable linear feedback controllers that require only system response data. The controller design consists of three main steps: (1) estimating the network connectivity using tools for causal inference, (2) identifying a linear, time-invariant (LTI) dynamical system which approximates the network, and (3) designing and tuning a feedback controller based on the LTI urban drainage system approximation. The flooding safety, erosion prevention, and water treatment performance of the method are evaluated across 190 design storms on a separated sewer model. Strong results suggest that the system knowledge required for generating effective, safe, and tunable controllers for UDS is surprisingly basic. This method allows near-turnkey synthesis of controllers solely from sensor data or reduction of process-based models.
APA, Harvard, Vancouver, ISO, and other styles
30

Sohmer, O. R., R. C. Bauman, and J. N. Ferrer. "An embodied spiritual inquiry into the nature of human boundaries: Outcomes of a participatory approach to transpersonal education and research." International Journal of Transpersonal Studies 38, no. 2 (2022). http://dx.doi.org/10.24972/ijts.2019.38.2.117.

Full text
Abstract:
Embodied spiritual inquiry (ESI) is a radical approach to integral and transpersonal education and research offered as a graduate course at the California Institute of Integral Studies (CIIS). Inspired by elements of participatory research and cooperative inquiry, ESI applies interactive embodied meditations to access multiple ways of knowing (e.g., somatic, vital, emotional, mental, contemplative) and mindfully inquire into collaboratively decided questions. This article presents the learning outcomes of an inquiry into the nature of human boundaries within and between co-inquirers, providing an example of how ESI is implemented in the classroom and can be used to study transpersonal subject matter. In particular, the study found that boundaries were experienced in terms of their dynamic effects rather than as static qualities, with a relationship between dissociation and overly firm boundaries, as well as a relationship between integration/merging and more varied combinations of firm and permeable boundaries. Other notable inquiry outcomes include the identification of (a) experiential qualities of the states of dissociation, merging, and integration; (b) a recursive relationship between fear and trust in the modulation of optimal interpersonal boundaries; and (c) the phenomenon of shared emergent experience between practitioners, which suggests the existence of an intersubjective transpersonal field.
APA, Harvard, Vancouver, ISO, and other styles
31

Toriyama, Masahiro, Mohanbir Sawhney, and Katharine Kruse. "Sony Computer Science Laboratories: Sustaining a Culture and Organization for Fundamental Research." Kellogg School of Management Cases, June 5, 2020, 1–32. http://dx.doi.org/10.1108/case.kellogg.2021.000021.

Full text
Abstract:
In late 2019, Dr. Hiroaki Kitano, the president and director of research at Sony Computer Science Laboratories (Sony CSL), had decided he would be stepping down from his position soon. Sony CSL, a small blue-sky fundamental research facility funded by Sony, had always operated on the strength of the trust between Sony's CEO and the lab's director. Sony had been hands-off in its management, leaving Kitano to hire, fire, fund, and evaluate the lab's researchers and project portfolio at his own discretion. Now that he was stepping down, however, he worried that Sony CSL could not withstand his departure. Kitano wanted to make a transparent plan for the organization's future before he handed off Sony CSL to his successor. That plan involved three key decisions. First, what should be the optimal structure and governance of Sony CSL? Should it maintain its independence and autonomy, or should it align more closely with Sony's business priorities? Second, how could Sony CSL scale its impact on Sony and society at large, given its small size? Finally, should Sony CSL establish some standard methods of measuring project success and strength of the portfolio? In making these decisions, Kitano wanted to ensure that he preserved the unique culture that had allowed Sony CSL to pursue path-breaking research and innovation.
APA, Harvard, Vancouver, ISO, and other styles
32

Iqbal, Talha, Aaleen Khalid, and Ihsan Ullah. "Explaining decisions of a light-weight deep neural network for real-time coronary artery disease classification in magnetic resonance imaging." Journal of Real-Time Image Processing 21, no. 2 (2024). http://dx.doi.org/10.1007/s11554-023-01411-7.

Full text
Abstract:
AbstractIn certain healthcare settings, such as emergency or critical care units, where quick and accurate real-time analysis and decision-making are required, the healthcare system can leverage the power of artificial intelligence (AI) models to support decision-making and prevent complications. This paper investigates the optimization of healthcare AI models based on time complexity, hyper-parameter tuning, and XAI for a classification task. The paper highlights the significance of a lightweight convolutional neural network (CNN) for analysing and classifying Magnetic Resonance Imaging (MRI) in real-time and is compared with CNN-RandomForest (CNN-RF). The role of hyper-parameter is also examined in finding optimal configurations that enhance the model’s performance while efficiently utilizing the limited computational resources. Finally, the benefits of incorporating the XAI technique (e.g. GradCAM and Layer-wise Relevance Propagation) in providing transparency and interpretable explanations of AI model predictions, fostering trust, and error/bias detection are explored. Our inference time on a MacBook laptop for 323 test images of size 100x100 is only 2.6 sec, which is merely 8 milliseconds per image while providing comparable classification accuracy with the ensemble model of CNN-RF classifiers. Using the proposed model, clinicians/cardiologists can achieve accurate and reliable results while ensuring patients’ safety and answering questions imposed by the General Data Protection Regulation (GDPR). The proposed investigative study will advance the understanding and acceptance of AI systems in connected healthcare settings.
APA, Harvard, Vancouver, ISO, and other styles
33

Bhargav Sunkara, Vivek Lakshman. "Explainable AI (XAI) for Product Managers: Bridging the Gap between AI Models and Business Needs." International Journal of Scientific Research and Modern Technology, May 29, 2023, 1–6. https://doi.org/10.38124/ijsrmt.v2i5.571.

Full text
Abstract:
Product managers often grapple with integrating opaque AI systems into decision making all the while ensuring transparency, trust, and alignment with business goals. Explainable AI (XAI) is an emerging field targeting the transparency and interpretability aspects of AI. While considerable progress has been made in AI technology in the last few years, for the average non-technical user, the inner workings of AI are like a black box, still a mystery in the results and a potential misuse of the data by the AI systems. This paper proposes a robust framework –the XAI-Bridge Framework leveraging Explainable AI (XAI) to address these challenges. One of the significant principles of Explainable AI (XAI) is incorporating cutting-edge techniques such as model-agnostic tools like LIME [1], SHAP [2] to enable the users gain an understanding of the high-level behaviour of the model without needing access to its inner structure. These tools help the users with intuitive explanations and causal inference for deeper insights. Through real-world case studies spanning e-commerce personalization, retail demand forecasting, loan approval systems, and cancer diagnostics, this paper illustrates XAI’s capabilities to enhance model interpretability, reduce biases, and build stakeholder confidence. The results of this work include a practical, end-to-end methodology for setting explainability objectives, selecting optimal XAI tools, and assessing their impact on business metrics and compliance. Also, this work equips product managers with actionable strategies to seamlessly connect AI capabilities to organizational success.
APA, Harvard, Vancouver, ISO, and other styles
34

Garety, Philippa, Clementine J. Edwards, Thomas Ward, et al. "Optimising AVATAR therapy for people who hear distressing voices: study protocol for the AVATAR2 multi-centre randomised controlled trial." Trials 22, no. 1 (2021). http://dx.doi.org/10.1186/s13063-021-05301-w.

Full text
Abstract:
Abstract Background AVATAR therapy is a novel intervention targeting distressing auditory verbal hallucinations (henceforth ‘voices’). A digital simulation (avatar) of the voice is created and used in a three-way dialogue between participant, avatar and therapist. To date, therapy has been delivered over 6 sessions, comprising an initial phase, focusing on standing up to a hostile avatar, and a second phase in which the avatar concedes and focus shifts to individualised treatment targets, including beliefs about voices. The first fully powered randomised trial found AVATAR therapy resulted in a rapid and substantial fall in voice frequency and associated distress that was superior to supportive counselling at 12 weeks. The main objective of this AVATAR2 trial is to test the efficacy of two forms of AVATAR therapy in reducing voice-related distress: AVATAR-brief (standardised focus on exposure, assertiveness and self-esteem) and AVATAR-extended (phase 1 mirroring AVATAR-brief augmented by a formulation-driven phase 2). Secondary objectives include the examination of additional voice, wellbeing and mood outcomes, the exploration of mediators and moderators of therapy response, and examining cost-effectiveness of both forms of therapy compared with usual treatment (TAU). Methods This multi-site parallel group randomised controlled trial will independently randomise 345 individuals to receive AVATAR-brief (6 sessions) plus TAU or AVATAR-extended (12 sessions) plus TAU or TAU alone (1:1:1 allocation). Participants will be people with a diagnosis of schizophrenia spectrum and other psychotic disorders who have heard distressing voices for more than 6 months. The primary outcome is the PSYRATS Auditory Hallucinations Distress dimension score at 16 and 28 weeks, conducted by blinded assessors. Statistical analysis will follow the intention-to-treat principle and data will be analysed using linear mixed models. Mediation and moderation analyses using contemporary causal inference methods will be conducted as secondary analyses. Service costs will be calculated, and cost-effectiveness assessed in terms of quality-adjusted life years accrued. Discussion This study will clarify optimal therapy delivery, test efficacy in a multi-site study and enable the testing of the AVATAR software platform, therapy training and provision in NHS settings. Trial registration ISRCTN registry ISRCTN55682735. Registered on 22 January 2020. The trial is funded by the Wellcome Trust (WT).
APA, Harvard, Vancouver, ISO, and other styles
35

Hartley, John. "Lament for a Lost Running Order? Obsolescence and Academic Journals." M/C Journal 12, no. 3 (2009). http://dx.doi.org/10.5204/mcj.162.

Full text
Abstract:
The academic journal is obsolete. In a world where there are more titles than ever, this is a comment on their form – especially the print journal – rather than their quantity. Now that you can get everything online, it doesn’t really matter what journal a paper appears in; certainly it doesn’t matter what’s in the same issue. The experience of a journal is rapidly obsolescing, for both editors and readers. I’m obviously not the first person to notice this (see, for instance, "Scholarly Communication"; "Transforming Scholarly Communication"; Houghton; Policy Perspectives; Teute), but I do have a personal stake in the process. For if the journal is obsolete then it follows that the editor is obsolete, and I am the editor of the International Journal of Cultural Studies. I founded the IJCS and have been sole editor ever since. Next year will see the fiftieth issue. So far, I have been responsible for over 280 published articles – over 2.25 million words of other people’s scholarship … and counting. We won’t say anything about the words that did not get published, except that the IJCS rejection rate is currently 87 per cent. Perhaps the first point that needs to be made, then, is that obsolescence does not imply lack of success. By any standard the IJCS is a successful journal, and getting more so. It has recently been assessed as a top-rating A* journal in the Australian Research Council’s journal rankings for ERA (Excellence in Research for Australia), the newly activated research assessment exercise. (In case you’re wondering, M/C Journal is rated B.) The ARC says of the ranking exercise: ‘The lists are a result of consultations with the sector and rigorous review by leading researchers and the ARC.’ The ARC definition of an A* journal is given as: Typically an A* journal would be one of the best in its field or subfield in which to publish and would typically cover the entire field/ subfield. Virtually all papers they publish will be of very high quality. These are journals where most of the work is important (it will really shape the field) and where researchers boast about getting accepted.Acceptance rates would typically be low and the editorial board would be dominated by field leaders, including many from top institutions. (Appendix I, p. 21; and see p. 4.)Talking of boasting, I love to prate about the excellent people we’ve published in the IJCS. We have introduced new talent to the field, and we have published new work by some of its pioneers – including Richard Hoggart and Stuart Hall. We’ve also published – among many others – Sara Ahmed, Mohammad Amouzadeh, Tony Bennett, Goran Bolin, Charlotte Brunsdon, William Boddy, Nico Carpentier, Stephen Coleman, Nick Couldry, Sean Cubitt, Michael Curtin, Daniel Dayan, Ben Dibley, Stephanie Hemelryk Donald, John Frow, Elfriede Fursich, Christine Geraghty, Mark Gibson, Paul Gilroy, Faye Ginsberg, Jonathan Gray, Lawrence Grossberg, Judith Halberstam, Hanno Hardt, Gay Hawkins, Joke Hermes, Su Holmes, Desmond Hui, Fred Inglis, Henry Jenkins, Deborah Jermyn, Ariel Heryanto, Elihu Katz, Senator Rod Kemp (Australian government minister), Youna Kim, Agnes Ku, Richard E. Lee, Jeff Lewis, David Lodge (the novelist), Knut Lundby, Eric Ma, Anna McCarthy, Divya McMillin, Antonio Menendez-Alarcon, Toby Miller, Joe Moran, Chris Norris, John Quiggin, Chris Rojek, Jane Roscoe, Jeffrey Sconce, Lynn Spigel, John Storey, Su Tong, the late Sako Takeshi, Sue Turnbull, Graeme Turner, William Uricchio, José van Dijck, Georgette Wang, Jing Wang, Elizabeth Wilson, Janice Winship, Handel Wright, Wu Jing, Wu Qidi (Chinese Vice-Minister of Education), Emilie Yueh-Yu Yeh, Robert Young and Zhao Bin. As this partial list makes clear, as well as publishing the top ‘hegemons’ we also publish work pointing in new directions, including papers from neighbouring disciplines such as anthropology, area studies, economics, education, feminism, history, literary studies, philosophy, political science, and sociology. We have sought to represent neglected regions, especially Chinese cultural studies, which has grown strongly during the past decade. And for quite a few up-and-coming scholars we’ve been the proud host of their first international publication. The IJCS was first published in 1998, already well into the internet era, but it was print-only at that time. Since then, all content, from volume 1:1 onwards, has been digitised and is available online (although vol 1:2 is unaccountably missing). The publishers, Sage Publications Ltd, London, have steadily added online functionality, so that now libraries can get the journal in various packages, including offering this title among many others in online-only bundles, and individuals can purchase single articles online. Thus, in addition to institutional and individual subscriptions, which remain the core business of the journal, income is derived by the publisher from multi-site licensing, incremental consortial sales income, single- and back-issue sales (print), pay-per-view, and deep back file sales (electronic). So what’s obsolete about it? In that boasting paragraph of mine (above), about what wonderful authors we’ve published, lies one of the seeds of obsolescence. For now that it is available online, ‘users’ (no longer ‘readers’!) can search for what they want and ignore the journal as such altogether. This is presumably how most active researchers experience any journal – they are looking for articles (or less: quotations; data; references) relevant to a given topic, literature review, thesis etc. They encounter a journal online through its ‘content’ rather than its ‘form.’ The latter is irrelevant to them, and may as well not exist. The Cover Some losses are associated with this change. First is the loss of the front cover. Now you, dear reader, scrolling through this article online, might well complain, why all the fuss about covers? Internet-generation journals don’t have covers, so all of the work that goes into them to establish the brand, the identity and even the ‘affect’ of a journal is now, well, obsolete. So let me just remind you of what’s at stake. Editors, designers and publishers all take a good deal of trouble over covers, since they are the point of intersection of editorial, design and marketing priorities. Thus, the IJCS cover contains the only ‘content’ of the journal for which we pay a fee to designers and photographers (usually the publisher pays, but in one case I did). Like any other cover, ours has three main elements: title, colour and image. Thought goes into every detail. Title I won’t say anything about the journal’s title as such, except that it was the result of protracted discussions (I suggested Terra Nullius at one point, but Sage weren’t having any of that). The present concern is with how a title looks on a cover. Our title-typeface is Frutiger. Originally designed by Adrian Frutiger for Charles de Gaulle Airport in Paris, it is suitably international, being used for the corporate identity of the UK National Health Service, Telefónica O2, the Royal Navy, the London School of Economics , the Canadian Broadcasting Corporation, the Conservative Party of Canada, Banco Bradesco of Brazil, the Finnish Defence Forces and on road signs in Switzerland (Wikipedia, "Frutiger"). Frutiger is legible, informal, and reads well in small copy. Sage’s designer and I corresponded on which of the words in our cumbersome name were most important, agreeing that ‘international’ combined with ‘cultural’ is the USP (Unique Selling Point) of the journal, so they should be picked out (in bold small-caps) from the rest of the title, which the designer presented in a variety of Frutiger fonts (regular, italic, and reversed – white on black), presumably to signify the dynamism and diversity of our content. The word ‘studies’ appears on a lozenge-shaped cartouche that is also used as a design element throughout the journal, for bullet points, titles and keywords. Colour We used to change this every two years, but since volume 7 it has stabilised with the distinctive Pantone 247, ‘new fuchsia.’ This colour arose from my own environment at QUT, where it was chosen (by me) for the new Creative Industries Faculty’s academic gowns and hoods, and thence as a detailing colour for the otherwise monochrome Creative Industries Precinct buildings. There’s a lot of it around my office, including on the wall and the furniture. New Fuchsia is – we are frequently told – a somewhat ‘girly’ colour, especially when contrasted with the Business Faculty’s blue or Law’s silver; its similarity to the Girlfriend/Dolly palette does introduce a mild ‘politics of prestige’ element, since it is determinedly pop culture, feminised, and non-canonical. Image Right at the start, the IJCS set out to signal its difference from other journals. At that time, all Sage journals had calligraphic colours – but I was insistent that we needed a photograph (I have ‘form’ in this respect: in 1985 I changed the cover of the Australian Journal of Cultural Studies from a line drawing (albeit by Sydney Nolan) to a photograph; and I co-designed the photo-cover of Cultural Studies in 1987). For IJCS I knew which photo I wanted, and Sage went along with the choice. I explained it in the launch issue’s editorial (Hartley, "Editorial"). That original picture, a goanna on a cattle grid in the outback, by Australian photographer Grant Hobson, lasted ten years. Since volume 11 – in time for our second decade – the goanna has been replaced with a picture by Italian-based photographer Patrick Nicholas, called ‘Reality’ (Hartley, "Cover Narrative"). We have also used two other photos as cover images, once each. They are: Daniel Meadows’s 1974 ‘Karen & Barbara’ (Hartley, "Who"); and a 1962 portrait of Richard Hoggart from the National Portrait Gallery in London (Owen & Hartley 2007). The choice of picture has involved intense – sometimes very tense – negotiations with Sage. Most recently, they were adamant the Daniel Meadows picture, which I wanted to use as the long-term replacement of the goanna, was too ‘English’ and they would not accept it. We exchanged rather sharp words before compromising. There’s no need to rehearse the dispute here; the point is that both sides, publisher and editor, felt that vital interests were at stake in the choice of a cover-image. Was it too obscure; too Australian; too English; too provocative (the current cover features, albeit in the deep background, a TV screen-shot of a topless Italian game-show contestant)? Running Order Beyond the cover, the next obsolete feature of a journal is the running order of articles. Obviously what goes in the journal is contingent upon what has been submitted and what is ready at a given time, so this is a creative role within a very limited context, which is what makes it pleasurable. Out of a limited number of available papers, a choice must be made about which one goes first, what order the other papers should follow, and which ones must be held over to the next issue. The first priority is to choose the lead article: like the ‘first face’ in a fashion show (if you don’t know what I mean by that, see FTV.com. It sets the look, the tone, and the standard for the issue. I always choose articles I like for this slot. It sends a message to the field – look at this! Next comes the running order. We have about six articles per issue. It is important to maintain the IJCS’s international mix, so I check for the country of origin, or failing that (since so many articles come from Anglosphere countries like the USA, UK and Australia), the location of the analysis. Attention also has to be paid to the gender balance among authors, and to the mix of senior and emergent scholars. Sometimes a weak article needs to be ‘hammocked’ between two good ones (these are relative terms – everything published in the IJCS is of a high scholarly standard). And we need to think about disciplinary mix, so as not to let the journal stray too far towards one particular methodological domain. Running order is thus a statement about the field – the disciplinary domain – rather than about an individual paper. It is a proposition about how different voices connect together in some sort of disciplinary syntax. One might even claim that the combination of cover and running order is a last vestige of collegiate collectivism in an era of competitive academic individualism. Now all that matters is the individual paper and author; the ‘currency’ is tenure, promotion and research metrics, not relations among peers. The running order is obsolete. Special Issues An extreme version of running order is the special issue. The IJCS has regularly published these; they are devoted to field-shaping initiatives, as follows: Title Editor(s) Issue Date Radiocracy: Radio, Development and Democracy Amanda Hopkinson, Jo Tacchi 3.2 2000 Television and Cultural Studies Graeme Turner 4.4 2001 Cultural Studies and Education Karl Maton, Handel Wright 5.4 2002 Re-Imagining Communities Sara Ahmed, Anne-Marie Fortier 6.3 2003 The New Economy, Creativity and Consumption John Hartley 7.1 2004 Creative Industries and Innovation in China Michael Keane, John Hartley 9.3 2006 The Uses of Richard Hoggart Sue Owen, John Hartley 10.1 2007 A Cultural History of Celebrity Liz Barry 11.3 2008 Caribbean Media Worlds Anna Pertierra, Heather Horst 12.2 2009 Co-Creative Labour Mark Deuze, John Banks 12.5 2009 It’s obvious that special issues have a place in disciplinary innovation – they can draw attention in a timely manner to new problems, neglected regions, or innovative approaches, and thus they advance the field. They are indispensible. But because of online publication, readers are not held to the ‘project’ of a special issue and can pick and choose whatever they want. And because of the peculiarities of research assessment exercises, editing special issues doesn’t count as research output. The incentive to do them is to that extent reduced, and some universities are quite heavy-handed about letting academics ‘waste’ time on activities that don’t produce ‘metrics.’ The special issue is therefore threatened with obsolescence too. Refereeing In many top-rating journals, the human side of refereeing is becoming obsolete. Increasingly this labour-intensive chore is automated and the labour is technologically outsourced from editors and publishers to authors and referees. You have to log on to some website and follow prompts in order to contribute both papers and the assessment of papers; interactions with editors are minimal. At the IJCS the process is still handled by humans – namely, journal administrator Tina Horton and me. We spend a lot of time checking how papers are faring, from trying to find the right referees through to getting the comments and then the author’s revisions completed in time for a paper to be scheduled into an issue. The volume of email correspondence is considerable. We get to know authors and referees. So we maintain a sense of an interactive and conversational community, albeit by correspondence rather than face to face. Doubtless, sooner or later, there will be a depersonalised Text Management System. But in the meantime we cling to the romantic notion that we are involved in refereeing for the sake of the field, for raising the standard of scholarship, for building a globally dispersed virtual college of cultural studies, and for giving everyone – from unfavoured countries and neglected regions to famous professors in old-money universities – the same chance to get their research published. In fact, these are largely delusional ideals, for as everyone knows, refereeing is part of the political economy of publicly-funded research. It’s about academic credentials, tenure and promotion for the individual, and about measurable research metrics for the academic organisation or funding agency (Hartley, "Death"). The IJCS has no choice but to participate: we do what is required to qualify as a ‘double-blind refereed journal’ because that is the only way to maintain repute, and thence the flow of submissions, not to mention subscriptions, without which there would be no journal. As with journals themselves, which proliferate even as the print form becomes obsolete, so refereeing is burgeoning as a practice. It’s almost an industry, even though the currency is not money but time: part gift-economy; part attention-economy; partly the payment of dues to the suzerain funding agencies. But refereeing is becoming obsolete in the sense of gathering an ‘imagined community’ of people one might expect to know personally around a particular enterprise. The process of dispersal and anonymisation of the field is exacerbated by blind refereeing, which we do because we must. This is suited to a scientific domain of objective knowledge, but everyone knows it’s not quite like that in the ‘new humanities’. The agency and identity of the researcher is often a salient fact in the research. The embedded positionality of the author, their reflexiveness about their own context and room-for-manoeuvre, and the radical contextuality of knowledge itself – these are all more or less axiomatic in cultural studies, but they’re not easily served by ‘double-blind’ refereeing. When refereeing is depersonalised to the extent that is now rife (especially in journals owned by international commercial publishers), it is hard to maintain a sense of contextualised productivity in the knowledge domain, much less a ‘common cause’ to which both author and referee wish to contribute. Even though refereeing can still be seen as altruistic, it is in the service of something much more general (‘scholarship’) and much more particular (‘my career’) than the kind of reviewing that wants to share and improve a particular intellectual enterprise. It is this mid-range altruism – something that might once have been identified as a politics of knowledge – that’s becoming obsolete, along with the printed journals that were the banner and rallying point for the cause. If I were to start a new journal (such as cultural-science.org), I would prefer ‘open refereeing’: uploading papers on an open site, subjecting them to peer-review and criticism, and archiving revised versions once they have received enough votes and comments. In other words I’d like to see refereeing shifted from the ‘supply’ or production side of a journal to the ‘demand’ or readership side. But of course, ‘demand’ for ‘blind’ refereeing doesn’t come from readers; it comes from the funding agencies. The Reading Experience Finally, the experience of reading a journal is obsolete. Two aspects of this seem worthy of note. First, reading is ‘out of time’ – it no longer needs to conform to the rhythms of scholarly publication, which are in any case speeding up. Scholarship is no longer seasonal, as it has been since the Middle Ages (with university terms organised around agricultural and ecclesiastical rhythms). Once you have a paper’s DOI number, you can read it any time, 24/7. It is no longer necessary even to wait for publication. With some journals in our field (e.g. Journalism Studies), assuming your Library subscribes, you can access papers as soon as they’re uploaded on the journal’s website, before the published edition is printed. Soon this will be the norm, just as it is for the top science journals, where timely publication, and thereby the ability to claim first discovery, is the basis of intellectual property rights. The IJCS doesn’t (yet) offer this service, but its frequency is speeding up. It was launched in 1998 with three issues a year. It went quarterly in 2001 and remained a quarterly for eight years. It has recently increased to six issues a year. That too causes changes in the reading experience. The excited ripping open of the package is less of a thrill the more often it arrives. Indeed, how many subscribers will admit that sometimes they don’t even open the envelope? Second, reading is ‘out of place’ – you never have to see the journal in which a paper appears, so you can avoid contact with anything that you haven’t already decided to read. This is more significant than might first appear, because it is affecting journalism in general, not just academic journals. As we move from the broadcast to the broadband era, communicative usage is shifting too, from ‘mass’ communication to customisation. This is a mixed blessing. One of the pleasures of old-style newspapers and the TV news was that you’d come across stories you did not expect to find. Indeed, an important attribute of the industrial form of journalism is its success in getting whole populations to read or watch stories about things they aren’t interested in, or things like wars and crises that they’d rather not know about at all. That historic textual achievement is in jeopardy in the broadband era, because ‘the public’ no longer needs to gather around any particular masthead or bulletin to get their news. With Web 2.0 affordances, you can exercise much more choice over what you attend to. This is great from the point of view of maximising individual choice, but sub-optimal in relation to what I’ve called ‘population-gathering’, especially the gathering of communities of interest around ‘tales of the unexpected’ – novelty or anomalies. Obsolete: Collegiality, Trust and Innovation? The individuation of reading choices may stimulate prejudice, because prejudice (literally, ‘pre-judging’) is built in when you decide only to access news feeds about familiar topics, stories or people in which you’re already interested. That sort of thing may encourage narrow-mindedness. It is certainly an impediment to chance discovery, unplanned juxtaposition, unstructured curiosity and thence, perhaps, to innovation itself. This is a worry for citizenship in general, but it is also an issue for academic ‘knowledge professionals,’ in our ever-narrower disciplinary silos. An in-close specialist focus on one’s own area of expertise need no longer be troubled by the concerns of the person in the next office, never mind the next department. Now, we don’t even have to meet on the page. One of the advantages of whole journals, then, is that each issue encourages ‘macro’ as well as ‘micro’ perspectives, and opens reading up to surprises. This willingness to ‘take things on trust’ describes a ‘we’ community – a community of trust. Trust too is obsolete in these days of performance evaluation. We’re assessed by an anonymous system that’s managed by people we’ll never meet. If the ‘population-gathering’ aspects of print journals are indeed obsolete, this may reduce collegiate trust and fellow-feeling, increase individualist competitiveness, and inhibit innovation. In the face of that prospect, I’m going to keep on thinking about covers, running orders, referees and reading until the role of editor is obsolete too. ReferencesHartley, John. "'Cover Narrative': From Nightmare to Reality." International Journal of Cultural Studies 11.2 (2005): 131-137. ———. "Death of the Book?" Symposium of the National Scholarly Communication Forum & Australian Academy of the Humanities, Sydney Maritime Museum, 2005. 26 Apr. 2009 ‹http://www.humanities.org.au/Resources/Downloads/NSCF/RoundTables1-17/PDF/Hartley.pdf›. ———. "Editorial: With Goanna." International Journal of Cultural Studies 1.1 (1998): 5-10. ———. "'Who Are You Going to Believe – Me or Your Own Eyes?' New Decade; New Directions." International Journal of Cultural Studies 11.1 (2008): 5-14. Houghton, John. "Economics of Scholarly Communication: A Discussion Paper." Center for Strategic Economic Studies, Victoria University, 2000. 26 Apr. 2009 ‹http://www.caul.edu.au/cisc/EconomicsScholarlyCommunication.pdf›. Owen, Sue, and John Hartley, eds. The Uses of Richard Hoggart. International Journal of Cultural Studies (special issue), 10.1 (2007). Policy Perspectives: To Publish and Perish. (Special issue cosponsored by the Association of Research Libraries, Association of American Universities and the Pew Higher Education Roundtable) 7.4 (1998). 26 Apr. 2009 ‹http://www.arl.org/scomm/pew/pewrept.html›. "Scholarly Communication: Crisis and Revolution." University of California Berkeley Library. N.d. 26 Apr. 2009 ‹http://www.lib.berkeley.edu/Collections/crisis.html›. Teute, F. J. "To Publish or Perish: Who Are the Dinosaurs in Scholarly Publishing?" Journal of Scholarly Publishing 32.2 (2001). 26 Apr. 2009 ‹http://www.utpjournals.com/product/jsp/322/perish5.html›."Transforming Scholarly Communication." University of Houston Library. 2005. 26 Apr. 2009 ‹http://info.lib.uh.edu/scomm/transforming.htm›.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!