CINXE.COM
Search results for: attribution
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: attribution</title> <meta name="description" content="Search results for: attribution"> <meta name="keywords" content="attribution"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="attribution" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="attribution"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 73</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: attribution</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">73</span> The Initiator Matters in Service Co-Recovery: Investigation on Attribution and Satisfaction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Ching%20Tsai">Chia-Ching Tsai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the literature, the positive effect of service co-recovery has been evidenced, and which customers’ attribution is the key successful factor has also been indicated. There is also literature investigating on initiation of co-recovery for finding out the superior way to co-recovery, and indicating co-recovery initiated by employees causes better effect of co-recovery. This research postulates the consequences of co-recovery by different initiators affect customers’ attribution and the resultant results. Thus, this research uses a 3x2 factorial design to investigate the impact of initiator of co-recovery and consequence of co-recovery on customers’ attribution and post-recovery satisfaction. The results show initiation of co-recovery has a significant influence on internal attribution, and the employee initiator causes the highest internal attribution. The consequences of co-recovery interact with initiators of co-recovery on internal attribution significantly. Moreover, internal attribution significantly affects post-recovery satisfaction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=service%20co-recovery" title="service co-recovery">service co-recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=initiation%20of%20co-recovery" title=" initiation of co-recovery"> initiation of co-recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=attribution" title=" attribution"> attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=post-recovery%20satisfaction" title=" post-recovery satisfaction"> post-recovery satisfaction</a> </p> <a href="https://publications.waset.org/abstracts/78185/the-initiator-matters-in-service-co-recovery-investigation-on-attribution-and-satisfaction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78185.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">263</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">72</span> Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jian%20Xu">Jian Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaochun%20Yun"> Xiaochun Yun</a>, <a href="https://publications.waset.org/abstracts/search?q=Yongzheng%20Zhang"> Yongzheng Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yafei%20Sang"> Yafei Sang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhenyu%20Cheng"> Zhenyu Cheng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution%20trace" title="attribution trace">attribution trace</a>, <a href="https://publications.waset.org/abstracts/search?q=probabilistic%20relevance" title=" probabilistic relevance"> probabilistic relevance</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20attack" title=" network attack"> network attack</a>, <a href="https://publications.waset.org/abstracts/search?q=attacker%20identification" title=" attacker identification"> attacker identification</a> </p> <a href="https://publications.waset.org/abstracts/61350/trace-network-a-probabilistic-relevant-pattern-recognition-approach-to-attribution-trace-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">71</span> A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Qiang">Li Qiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Ze-Ming"> Yang Ze-Ming</a>, <a href="https://publications.waset.org/abstracts/search?q=Liu%20Bao-Xu"> Liu Bao-Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiang%20Zheng-Wei"> Jiang Zheng-Wei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reasoning" title="reasoning">reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20networks" title=" Bayesian networks"> Bayesian networks</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-attack%20attribution" title=" cyber-attack attribution"> cyber-attack attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=Kill%20Chain" title=" Kill Chain"> Kill Chain</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20intelligence" title=" threat intelligence"> threat intelligence</a> </p> <a href="https://publications.waset.org/abstracts/50175/a-reasoning-method-of-cyber-attack-attribution-based-on-threat-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">450</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">70</span> Overconfidence and Self-Attribution Bias: The Difference among Economic Students at Different Stage of the Study and Non-Economic Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vera%20Jancurova">Vera Jancurova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> People are, in general, exposed to behavioral biases, however, the degree and impact are affected by experience, knowledge, and other characteristics. The purpose of this article is to study two of defined behavioral biases, the overconfidence and self-attribution bias, and its impact on economic and non-economic students at different stage of the study. The research method used for the purpose of this study is a controlled field study that contains questions on perception of own confidence and self-attribution and estimation of limits to analyse actual abilities. The results of the research show that economic students seem to be more overconfident than their non–economic colleagues, which seems to be caused by the fact the questionnaire was asking for predicting economic indexes and own knowledge and abilities in financial environment. Surprisingly, the most overconfidence was detected by the students at the beginning of their study (1st-semester students). However, the estimations of real numbers do not point out, that economic students have better results by the prediction itself. The study confirmed the presence of self-attribution bias at all of the respondents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=behavioral%20finance" title="behavioral finance">behavioral finance</a>, <a href="https://publications.waset.org/abstracts/search?q=overconfidence" title=" overconfidence"> overconfidence</a>, <a href="https://publications.waset.org/abstracts/search?q=self-attribution" title=" self-attribution"> self-attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=heuristics%20and%20biases" title=" heuristics and biases"> heuristics and biases</a> </p> <a href="https://publications.waset.org/abstracts/50982/overconfidence-and-self-attribution-bias-the-difference-among-economic-students-at-different-stage-of-the-study-and-non-economic-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">257</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">69</span> Exploring Syntactic and Semantic Features for Text-Based Authorship Attribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haiyan%20Wu">Haiyan Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Liu"> Ying Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shaoyun%20Shi"> Shaoyun Shi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Authorship attribution is to extract features to identify authors of anonymous documents. Many previous works on authorship attribution focus on statistical style features (e.g., sentence/word length), content features (e.g., frequent words, n-grams). Modeling these features by regression or some transparent machine learning methods gives a portrait of the authors' writing style. But these methods do not capture the syntactic (e.g., dependency relationship) or semantic (e.g., topics) information. In recent years, some researchers model syntactic trees or latent semantic information by neural networks. However, few works take them together. Besides, predictions by neural networks are difficult to explain, which is vital in authorship attribution tasks. In this paper, we not only utilize the statistical style and content features but also take advantage of both syntactic and semantic features. Different from an end-to-end neural model, feature selection and prediction are two steps in our method. An attentive n-gram network is utilized to select useful features, and logistic regression is applied to give prediction and understandable representation of writing style. Experiments show that our extracted features can improve the state-of-the-art methods on three benchmark datasets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorship%20attribution" title="authorship attribution">authorship attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=attention%20mechanism" title=" attention mechanism"> attention mechanism</a>, <a href="https://publications.waset.org/abstracts/search?q=syntactic%20feature" title=" syntactic feature"> syntactic feature</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a> </p> <a href="https://publications.waset.org/abstracts/129270/exploring-syntactic-and-semantic-features-for-text-based-authorship-attribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129270.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">68</span> Estimating View-Through Ad Attribution from User Surveys Using Convex Optimization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuhan%20Lin">Yuhan Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Rohan%20Kekatpure"> Rohan Kekatpure</a>, <a href="https://publications.waset.org/abstracts/search?q=Cassidy%20Yeung"> Cassidy Yeung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Digital Marketing, robust quantification of View-through attribution (VTA) is necessary for evaluating channel effectiveness. VTA occurs when a product purchase is aided by an Ad but without an explicit click (e.g. a TV ad). A lack of a tracking mechanism makes VTA estimation challenging. Most prevalent VTA estimation techniques rely on post-purchase in-product user surveys. User surveys enable the calculation of channel multipliers, which are the ratio of the view-attributed to the click-attributed purchases of each marketing channel. Channel multipliers thus provide a way to estimate the unknown VTA for a channel from its known click attribution. In this work, we use Convex Optimization to compute channel multipliers in a way that enables a mathematical encoding of the expected channel behavior. Large fluctuations in channel attributions often result from overfitting the calculations to user surveys. Casting channel attribution as a Convex Optimization problem allows an introduction of constraints that limit such fluctuations. The result of our study is a distribution of channel multipliers across the entire marketing funnel, with important implications for marketing spend optimization. Our technique can be broadly applied to estimate Ad effectiveness in a privacy-centric world that increasingly limits user tracking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20marketing" title="digital marketing">digital marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=survey%20analysis" title=" survey analysis"> survey analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=operational%20research" title=" operational research"> operational research</a>, <a href="https://publications.waset.org/abstracts/search?q=convex%20optimization" title=" convex optimization"> convex optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=channel%20attribution" title=" channel attribution"> channel attribution</a> </p> <a href="https://publications.waset.org/abstracts/149140/estimating-view-through-ad-attribution-from-user-surveys-using-convex-optimization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149140.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">199</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">67</span> Authorship Attribution Using Sociolinguistic Profiling When Considering Civil and Criminal Cases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Diana%20A.%20Sokolova">Diana A. Sokolova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article is devoted to one of the possibilities for identifying the author of an oral or written text - sociolinguistic profiling. Sociolinguistic profiling is utilized as a forensic linguistics technique to identify individuals through language patterns, particularly in criminal cases. It examines how social factors influence language use. This study aims to showcase the significance of linguistic profiling for attributing authorship in texts and emphasizes the necessity for its continuous enhancement while considering its strengths and weaknesses. The study employs semantic-syntactic, lexical-semantic, linguopragmatic, logical, presupposition, authorization, and content analysis methods to investigate linguistic profiling. The research highlights the relevance of sociolinguistic profiling in authorship attribution and underscores the importance of ongoing refinement of the technique, considering its limitations. This study emphasizes the practical application of linguistic profiling in legal settings and underscores the impact of social factors on language use, contributing to the field of forensic linguistics. Data collection involves collecting oral and written texts from criminal and civil court cases to analyze language patterns for authorship attribution. The collected data is analyzed using various linguistic analysis methods to identify individual characteristics and patterns that can aid in authorship attribution. The study addresses the effectiveness of sociolinguistic profiling in identifying authors of texts and explores the impact of social factors on language use in legal contexts. In spite of advantages challenges in linguistics profiling have spurred debates and controversies in academic circles, legal environments, and the public sphere. So, this research highlights the significance of sociolinguistic profiling in authorship attribution and emphasizes the need for further development of this method, considering its strengths and weaknesses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorship%20attribution" title="authorship attribution">authorship attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=detection%20of%20identifying" title=" detection of identifying"> detection of identifying</a>, <a href="https://publications.waset.org/abstracts/search?q=dialect" title=" dialect"> dialect</a>, <a href="https://publications.waset.org/abstracts/search?q=features" title=" features"> features</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20linguistics" title=" forensic linguistics"> forensic linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20influence" title=" social influence"> social influence</a>, <a href="https://publications.waset.org/abstracts/search?q=sociolinguistics" title=" sociolinguistics"> sociolinguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=unique%20speech%20characteristics" title=" unique speech characteristics"> unique speech characteristics</a> </p> <a href="https://publications.waset.org/abstracts/188208/authorship-attribution-using-sociolinguistic-profiling-when-considering-civil-and-criminal-cases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">37</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">66</span> As Evolved Mechanisms and Cultural Modeling Affect Child Gender Attribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stefano%20Federici">Stefano Federici</a>, <a href="https://publications.waset.org/abstracts/search?q=Alessandro%20Lepri"> Alessandro Lepri</a>, <a href="https://publications.waset.org/abstracts/search?q=Antonella%20Carrera"> Antonella Carrera</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Kessler and McKenna in the seventies, and recently Federici and Lepri investigated how an individual attributes gender to a person. By administering nudes of human figures, the scholars have found that the penis more than the vagina and the male sexual characteristics more than the female ones are significantly more salient in the gender attribution process. Federici and Lepri suggested that the asymmetrical salience of sexual characteristics is attributable to evolved decision-making processes for the solution of gender attribution problems to avoid the greatest danger of an (angry) adult male. The present study has observed the behaviour of 60 children, aged between 3 and 6 years, and their parents verifying whether the child gender attribution mechanisms are permeable to cultural stereotypes. The participating children were asked to make a male or a female on a tablet by combining 12 human physical characteristics (long hair, short hair, wide hips, narrow hips, breasts, flat chest, body hair, hairless body, penis, vagina, male face, and female face) and four cloths (male t-shirt, female t-shirt, pants, and skirt) by superimposing one or more of them on a sexually neutral manikin. On the tablet was installed an App, created by authors, to replicate the Kessler and McKenna and Federici and Lepri previous studies. One of the parents of each of the participating children was asked to make a male or a female using the same apparatus used by children. In addition, the participating parents were asked to complete a test, as proposed by Federici and Lepri in their previous study, to compare adult and child processes of gender attribution. The results suggested that children are affected both by evolved mechanisms as adults were (e.g., taking less time to make a male than a female, using the penis more often than the vagina), and by cultural modeling of parental and environmental gender stereotypes (e.g., the genitals were often covered with pants in case the delivery was to make a male and a skirt in the case was to make a female). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biological%20sex" title="biological sex">biological sex</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20biases" title=" cognitive biases"> cognitive biases</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20modeling" title=" cultural modeling"> cultural modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20attribution" title=" gender attribution"> gender attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=evolved%20decision-making%20processes" title=" evolved decision-making processes"> evolved decision-making processes</a> </p> <a href="https://publications.waset.org/abstracts/129663/as-evolved-mechanisms-and-cultural-modeling-affect-child-gender-attribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">65</span> Pay Per Click Attribution: Effects on Direct Search Traffic and Purchases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Toni%20Raurich-Marcet">Toni Raurich-Marcet</a>, <a href="https://publications.waset.org/abstracts/search?q=Joan%20Llonch-Andreu"> Joan Llonch-Andreu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research is focused on the relationship between Search Engine Marketing (SEM) and traditional advertising. The dominant assumption is that SEM does not help brand awareness and only does it in session as if it were the cost of manufacturing the product being sold. The study is methodologically developed using an experiment where the effects were determined to analyze the billboard effect. The research allowed the cross-linking of theoretical and empirical knowledge on digital marketing. This paper has validated this marketing generates retention as traditional advertising would by measuring brand awareness and its improvements. This changes the way performance and brand campaigns are split within marketing departments, effectively rebalancing budgets moving forward. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution" title="attribution">attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20marketing" title=" performance marketing"> performance marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=SEM" title=" SEM"> SEM</a>, <a href="https://publications.waset.org/abstracts/search?q=marketplaces" title=" marketplaces"> marketplaces</a> </p> <a href="https://publications.waset.org/abstracts/147427/pay-per-click-attribution-effects-on-direct-search-traffic-and-purchases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147427.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">64</span> Attribution Theory and Perceived Reliability of Cellphones for Teaching and Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mayowa%20A.%20Sofowora">Mayowa A. Sofowora</a>, <a href="https://publications.waset.org/abstracts/search?q=Seraphin%20D.%20Eyono%20Obono"> Seraphin D. Eyono Obono</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of information and communication technologies such as computers, mobile phones and the internet is becoming prevalent in today’s world; and it is facilitating access to a vast amount of data, services, and applications for the improvement of people’s lives. However, this prevalence of ICTs is hampered by the problem of low income levels in developing countries to the point where people cannot timeously replace or repair their ICT devices when damaged or lost; and this problem serves as a motivation for this study whose aim is to examine the perceptions of teachers on the reliability of cellphones when used for teaching and learning purposes. The research objectives unfolding this aim are of two types: objectives on the selection and design of theories and models, and objectives on the empirical testing of these theories and models. The first type of objectives is achieved using content analysis in an extensive literature survey, and the second type of objectives is achieved through a survey of high school teachers from the ILembe and Umgungudlovu districts in the KwaZuluNatal province of South Africa. Data collected from this questionnaire based survey is analysed in SPSS using descriptive statistics and Pearson correlations after checking the reliability and validity of the questionnaire. The main hypothesis driving this study is that there is a relationship between the demographics and the attribution identity of teachers on one hand, and their perceptions on the reliability of cellphones on the other hand, as suggested by existing literature; except that attribution identities are considered in this study under three angles: intention, knowledge and ability, and action. The results of this study confirm that the perceptions of teachers on the reliability of cellphones for teaching and learning are affected by the school location of these teachers, and by their perceptions on learners’ cellphones usage intentions and actual use. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution" title="attribution">attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=cellphones" title=" cellphones"> cellphones</a>, <a href="https://publications.waset.org/abstracts/search?q=e-learning" title=" e-learning"> e-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability "> reliability </a> </p> <a href="https://publications.waset.org/abstracts/14971/attribution-theory-and-perceived-reliability-of-cellphones-for-teaching-and-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14971.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">63</span> Investigating the Dimensions of Perceived Attributions in Making Sense of Failure: An Exploratory Study of Lebanese Entrepreneurs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghiwa%20Dandach">Ghiwa Dandach</a> </p> <p class="card-text"><strong>Abstract:</strong></p> By challenging the anti-failure bias and contributing to the theoretical territory of the attribution theory, this thesis develops a comprehensive process for entrepreneurial learning from failure. The practical implication of the findings suggests assisting entrepreneurs (current, failing, and nascent) in effectively anticipating and reflecting upon failure. Additionally, the process is suggested to enhance the level of institutional and private (accelerators and financers) support provided to entrepreneurs, the implications of which may improve future opportunities for entrepreneurial success. Henceforth, exploring learning from failure is argued to impact the potential survival of future ventures, subsequently revitalizing the economic contribution of entrepreneurship. This learning process can be enhanced with the cognitive development of causal ascriptions for failure, which eventually impacts learning outcomes. However, the mechanism with which entrepreneurs make sense of failure, reflect on the journey, and transform experience into knowledge is still under-researched. More specifically, the cognitive process of failure attribution is under-explored, majorly in the context of developing economies, calling for a more insightful understanding on how entrepreneurs ascribe failure. Responding to the call for more thorough research in such cultural contexts, this study expands the understanding of the dimensions of failure attributions as perceived by entrepreneurs and the impact of these dimensions on learning outcomes in the Lebanese context. The research adopted the exploratory interpretivism paradigm and collected data from interviews with industry experts first, followed by narratives of entrepreneurs using the qualitative multimethod approach. The holistic and categorical content analysis of narratives, preceded by the thematic analysis of interviews, unveiled how entrepreneurs ascribe failure by developing minor and major dimensions of each failure attribution. The findings have also revealed how each dimension impacts the learning from failure when accompanied by emotional resilience. The thesis concludes that exploring in-depth the dimensions of failure attributions significantly determines the level of learning generated. They are moving beyond the simple categorisation of ascriptions as primary internal or external unveiled how learning may occur with each attribution at the individual, venture, and ecosystem levels. This has further accentuated that a major internal attribution of failure combined with a minor external attribution generated the highest levels of transformative and double-loop learning, emphasizing the role of personal blame and responsibility on enhancing learning outcomes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution" title="attribution">attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title=" entrepreneurship"> entrepreneurship</a>, <a href="https://publications.waset.org/abstracts/search?q=reflection" title=" reflection"> reflection</a>, <a href="https://publications.waset.org/abstracts/search?q=sense-making" title=" sense-making"> sense-making</a>, <a href="https://publications.waset.org/abstracts/search?q=emotions" title=" emotions"> emotions</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20outcomes" title=" learning outcomes"> learning outcomes</a>, <a href="https://publications.waset.org/abstracts/search?q=failure" title=" failure"> failure</a>, <a href="https://publications.waset.org/abstracts/search?q=exit" title=" exit"> exit</a> </p> <a href="https://publications.waset.org/abstracts/144087/investigating-the-dimensions-of-perceived-attributions-in-making-sense-of-failure-an-exploratory-study-of-lebanese-entrepreneurs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144087.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">227</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">62</span> Real-Time Multi-Vehicle Tracking Application at Intersections Based on Feature Selection in Combination with Color Attribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Qiang%20Zhang">Qiang Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaojian%20Hu"> Xiaojian Hu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In multi-vehicle tracking, based on feature selection, the tracking system efficiently tracks vehicles in a video with minimal error in combination with color attribution, which focuses on presenting a simple and fast, yet accurate and robust solution to the problem such as inaccurately and untimely responses of statistics-based adaptive traffic control system in the intersection scenario. In this study, a real-time tracking system is proposed for multi-vehicle tracking in the intersection scene. Considering the complexity and application feasibility of the algorithm, in the object detection step, the detection result provided by virtual loops were post-processed and then used as the input for the tracker. For the tracker, lightweight methods were designed to extract and select features and incorporate them into the adaptive color tracking (ACT) framework. And the approbatory online feature selection algorithms are integrated on the mature ACT system with good compatibility. The proposed feature selection methods and multi-vehicle tracking method are evaluated on KITTI datasets and show efficient vehicle tracking performance when compared to the other state-of-the-art approaches in the same category. And the system performs excellently on the video sequences recorded at the intersection. Furthermore, the presented vehicle tracking system is suitable for surveillance applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=real-time" title="real-time">real-time</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-vehicle%20tracking" title=" multi-vehicle tracking"> multi-vehicle tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20selection" title=" feature selection"> feature selection</a>, <a href="https://publications.waset.org/abstracts/search?q=color%20attribution" title=" color attribution"> color attribution</a> </p> <a href="https://publications.waset.org/abstracts/136438/real-time-multi-vehicle-tracking-application-at-intersections-based-on-feature-selection-in-combination-with-color-attribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136438.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">163</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">61</span> The Role of Situational Attribution Training in Reducing Automatic In-Group Stereotyping in Females</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olga%20Mironiuk">Olga Mironiuk</a>, <a href="https://publications.waset.org/abstracts/search?q=Ma%C5%82gorzata%20Kossowska"> Małgorzata Kossowska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the present study was to investigate the influence of Situational Attribution Training on reducing automatic in-group stereotyping in females. The experiment was conducted with the control of age and level of prejudice. 90 female participants were randomly assigned to two conditions: experimental and control group (each group was also divided into younger- and older-aged condition). Participants from the experimental condition were subjected to more extensive training. In the first part of the experiment, the experimental group took part in the first session of Situational Attribution Training while the control group participated in the Grammatical Training Control. In the second part of the research both groups took part in the Situational Attribution Training (which was considered as the second training session for the experimental group and the first one for the control condition). The training procedure was based on the descriptions of ambiguous situations which could be explained using situational or dispositional attributions. The participant’s task was to choose the situational explanation from two alternatives, out of which the second one presented the explanation based on neutral or stereotypically associated with women traits. Moreover, the experimental group took part in the third training session after two- day time delay, in order to check the persistence of the training effect. The main hypothesis stated that among participants taking part in the more extensive training, the automatic in-group stereotyping would be less frequent after having finished training sessions. The effectiveness of the training was tested by measuring the response time and the correctness of answers: the longer response time for the examples where one of two possible answers was based on the stereotype trait and higher correctness of answers was considered to be a proof of the training effectiveness. As the participants’ level of prejudice was controlled (using the Ambivalent Sexism Inventory), it was also assumed that the training effect would be weaker for participants revealing a higher level of prejudice. The obtained results did not confirm the hypothesis based on the response time: participants from the experimental group responded faster in case of situations where one of the possible explanations was based on stereotype trait. However, an interesting observation was made during the analysis of the answers’ correctness: regardless the condition and age group affiliation, participants made more mistakes while choosing the situational explanations when the alternative was based on stereotypical trait associated with the dimension of warmth. What is more, the correctness of answers was higher in the third training session for the experimental group in case when the alternative of situational explanation was based on the stereotype trait associated with the dimension of competence. The obtained results partially confirm the effectiveness of the training. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=female" title="female">female</a>, <a href="https://publications.waset.org/abstracts/search?q=in-group%20stereotyping" title=" in-group stereotyping"> in-group stereotyping</a>, <a href="https://publications.waset.org/abstracts/search?q=prejudice" title=" prejudice"> prejudice</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training" title=" situational attribution training"> situational attribution training</a> </p> <a href="https://publications.waset.org/abstracts/72813/the-role-of-situational-attribution-training-in-reducing-automatic-in-group-stereotyping-in-females" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72813.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">60</span> Stigma and Discrimination toward Mental Illness: Translation and Validation of the Attribution Questionnaire-27 (AQ-27)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gokcen%20Akyurek">Gokcen Akyurek</a>, <a href="https://publications.waset.org/abstracts/search?q=Hulya%20Kayihan"> Hulya Kayihan</a>, <a href="https://publications.waset.org/abstracts/search?q=Deniz%20Yuce"> Deniz Yuce</a>, <a href="https://publications.waset.org/abstracts/search?q=Selen%20Yilmaz"> Selen Yilmaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The stigma towards mental illness is still very rooted in our society, despite the number of studies, campaigns, and anti-stigma programs developed in recent years. Stigma represents a serious obstacle to recovery and social integration for people who experience a mental illness, affecting directly their well-being and quality of life. It implies that these persons have to deal with many other barriers apart from the disease symptoms (1-5). Convergent, recent literature suggests that less positive attitudes by mental health professionals interfere with the self-determination and recovery process (4-10).The aim of this study was to translate the Attribution Questionnaire-27 (AQ-27) to the Turkish language (AQ-27-T), and to examine the reliability and validity of this new Turkish version. Cultural adaptation was implemented according to the internationally suggested method. To determine the understandability and appropriateness of this measure for the Turkish culture, a pretest was administered and the final form was generated. Then, 424 randomly chosen people took part in the study. Participant’s mean age was 36.9±12.7 years and %52 of them female. Cronbach's alpha and intra-class coefficients were used to estimate instrument reliability. The AQ-27-T was assessed again 14 days later for test retest reliability. The AQ-27-T demonstrated acceptable internal consistency, with a Cronbach's alpha of 0.88 for the total scale and ranging between 0.86 and 0.89 for the items. The test-retest reliability was good, with Pearson correlation coefficients of 0.79 for the total scale and ranging between 0.35 and 0.77 for the items (p<0.05). Correlation between subscales was moderate-good, with Pearson correlation coefficients of 0.18-0.88 (p<0.05). Fit indices of the model supported the factor structure and paths. The AQ-27-T is a reliable measure to assess stigmatizing attitudes in Turkish. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution%20questionnaire" title="attribution questionnaire">attribution questionnaire</a>, <a href="https://publications.waset.org/abstracts/search?q=validity" title=" validity"> validity</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=stigma" title=" stigma"> stigma</a> </p> <a href="https://publications.waset.org/abstracts/40371/stigma-and-discrimination-toward-mental-illness-translation-and-validation-of-the-attribution-questionnaire-27-aq-27" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40371.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">442</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">59</span> Effects of an Educative Model in Socially Responsible Behavior and Other Psychological Variables</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gracia%20V.%20Navarro">Gracia V. Navarro</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20V.%20Gonzalez"> Maria V. Gonzalez</a>, <a href="https://publications.waset.org/abstracts/search?q=Carlos%20G.%20Reed"> Carlos G. Reed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The eudaimonic perspective in philosophy and psychology suggests that a good life is closely related to developing oneself in order to contribute to the well-being and happiness of other people and of the world as a whole. Educational psychology can help to achieve this through the design and validation of educative models. Since 2004, the University of Concepcion and other Chilean universities apply an educative model to train socially responsible professionals, people that in the exercise of their profession contribute to generate equity for the development and assess the impacts of their decisions, opting for those that serve the common good. The main aim is to identify if a relationship exists between achieved learning, attitudes toward social responsibility, self-attribution of socially responsible behavior, value type, professional behavior observed and, participation in a specific model to train socially responsible (SR) professionals. The Achieved Learning and Attitudes Toward Social Responsibility Questionnaire, interview with employers and Values Questionnaire and Self-attribution of SR Behavior Questionnaire is applied to 394 students and graduates, divided into experimental and control groups (trained and not trained under the educative model), in order to identify the professional behavior of the graduates. The results show that students and graduates perceive cognitive, affective and behavioral learning, with significant differences in attitudes toward social responsibility and self-attribution of SR behavior, between experimental and control. There are also differences in employers' perceptions about the professional practice of those who were trained under the model and those who were not. It is concluded that the educative model has an impact on the learning of social responsibility and educates for a full life. It is also concluded that it is necessary to identify mediating variables of the model effect. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=educative%20model" title="educative model">educative model</a>, <a href="https://publications.waset.org/abstracts/search?q=good%20life" title=" good life"> good life</a>, <a href="https://publications.waset.org/abstracts/search?q=professional%20social%20responsibility" title=" professional social responsibility"> professional social responsibility</a>, <a href="https://publications.waset.org/abstracts/search?q=values" title=" values"> values</a> </p> <a href="https://publications.waset.org/abstracts/56996/effects-of-an-educative-model-in-socially-responsible-behavior-and-other-psychological-variables" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56996.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">264</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">58</span> Dual-Channel Reliable Breast Ultrasound Image Classification Based on Explainable Attribution and Uncertainty Quantification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haonan%20Hu">Haonan Hu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shuge%20Lei"> Shuge Lei</a>, <a href="https://publications.waset.org/abstracts/search?q=Dasheng%20Sun"> Dasheng Sun</a>, <a href="https://publications.waset.org/abstracts/search?q=Huabin%20Zhang"> Huabin Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Kehong%20Yuan"> Kehong Yuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Jian%20Dai"> Jian Dai</a>, <a href="https://publications.waset.org/abstracts/search?q=Jijun%20Tang"> Jijun Tang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on the classification task of breast ultrasound images and conducts research on the reliability measurement of classification results. A dual-channel evaluation framework was developed based on the proposed inference reliability and predictive reliability scores. For the inference reliability evaluation, human-aligned and doctor-agreed inference rationals based on the improved feature attribution algorithm SP-RISA are gracefully applied. Uncertainty quantification is used to evaluate the predictive reliability via the test time enhancement. The effectiveness of this reliability evaluation framework has been verified on the breast ultrasound clinical dataset YBUS, and its robustness is verified on the public dataset BUSI. The expected calibration errors on both datasets are significantly lower than traditional evaluation methods, which proves the effectiveness of the proposed reliability measurement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=medical%20imaging" title="medical imaging">medical imaging</a>, <a href="https://publications.waset.org/abstracts/search?q=ultrasound%20imaging" title=" ultrasound imaging"> ultrasound imaging</a>, <a href="https://publications.waset.org/abstracts/search?q=XAI" title=" XAI"> XAI</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainty%20measurement" title=" uncertainty measurement"> uncertainty measurement</a>, <a href="https://publications.waset.org/abstracts/search?q=trustworthy%20AI" title=" trustworthy AI"> trustworthy AI</a> </p> <a href="https://publications.waset.org/abstracts/176771/dual-channel-reliable-breast-ultrasound-image-classification-based-on-explainable-attribution-and-uncertainty-quantification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">57</span> The Grammar of the Content Plane as a Style Marker in Forensic Authorship Attribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dayane%20de%20Almeida">Dayane de Almeida</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work aims at presenting a study that demonstrates the usability of categories of analysis from Discourse Semiotics – also known as Greimassian Semiotics in authorship cases in forensic contexts. It is necessary to know if the categories examined in semiotic analysis (the ‘grammar’ of the content plane) can distinguish authors. Thus, a study with 4 sets of texts from a corpus of ‘not on demand’ written samples (those texts differ in formality degree, purpose, addressees, themes, etc.) was performed. Each author contributed with 20 texts, separated into 2 groups of 10 (Author1A, Author1B, and so on). The hypothesis was that texts from a single author were semiotically more similar to each other than texts from different authors. The assumptions and issues that led to this idea are as follows: -The features analyzed in authorship studies mostly relate to the expression plane: they are manifested on the ‘surface’ of texts. If language is both expression and content, content would also have to be considered for more accurate results. Style is present in both planes. -Semiotics postulates the content plane is structured in a ‘grammar’ that underlies expression, and that presents different levels of abstraction. This ‘grammar’ would be a style marker. -Sociolinguistics demonstrates intra-speaker variation: an individual employs different linguistic uses in different situations. Then, how to determine if someone is the author of several texts, distinct in nature (as it is the case in most forensic sets), when it is known intra-speaker variation is dependent on so many factors?-The idea is that the more abstract the level in the content plane, the lower the intra-speaker variation, because there will be a greater chance for the author to choose the same thing. If two authors recurrently chose the same options, differently from one another, it means each one’s option has discriminatory power. -Size is another issue for various attribution methods. Since most texts in real forensic settings are short, methods relying only on the expression plane tend to fail. The analysis of the content plane as proposed by greimassian semiotics would be less size-dependable. -The semiotic analysis was performed using the software Corpus Tool, generating tags to allow the counting of data. Then, similarities and differences were quantitatively measured, through the application of the Jaccard coefficient (a statistical measure that compares the similarities and differences between samples). The results showed the hypothesis was confirmed and, hence, the grammatical categories of the content plane may successfully be used in questioned authorship scenarios. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorship%20attribution" title="authorship attribution">authorship attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=content%20plane" title=" content plane"> content plane</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20linguistics" title=" forensic linguistics"> forensic linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=greimassian%20semiotics" title=" greimassian semiotics"> greimassian semiotics</a>, <a href="https://publications.waset.org/abstracts/search?q=intraspeaker%20variation" title=" intraspeaker variation"> intraspeaker variation</a>, <a href="https://publications.waset.org/abstracts/search?q=style" title=" style"> style</a> </p> <a href="https://publications.waset.org/abstracts/56959/the-grammar-of-the-content-plane-as-a-style-marker-in-forensic-authorship-attribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56959.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">56</span> Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mastoor%20Qubra">Mastoor Qubra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution" title="attribution">attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20terrorism" title=" cyber terrorism"> cyber terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20cooperation" title=" global cooperation"> global cooperation</a> </p> <a href="https://publications.waset.org/abstracts/79819/cyber-warfare-and-cyber-terrorism-an-analysis-of-global-cooperation-and-cyber-security-counter-measures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">55</span> Recent Policy Changes in Israeli Early Childhood Frameworks: Hope for the Future</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yaara%20Shilo">Yaara Shilo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Early childhood education and care (ECEC)in Israel has undergone extensive reform and now requires daycare centers to meet internationally recognized professional standards. Since 1948, one of the aims of childcare facilities was to enable women’s participation in the workforce.A 1965 law grouped daycare centers for young children with facilities for the elderly and for disabled persons under the same authority. In the 1970’s, ECEC leaders sought to change childcare from proprietary to educational facilities. From 1976 deliberations in the Knesset regarding appropriate attribution of ECEC frameworks resulted in their being moved to various authorities that supported women’s employment: Ministries of Finance, Industry, and Commerce, as well as the Welfare Department. Prior to 2018, 75% of infants and toddlers in institutional care were in unlicensed and unsupervised settings. Legislative processes accompanied the conceptual change to an eventual appropriate attribution of ECEC frameworks. Position papers over the past two decades resulted in recommendations for standards conforming to OECD regulations. Simultaneous incidents of child abuse, some resulting in death, riveted public attention to the need for adequate government supervision, accelerating the legislative process. Appropriate care for very young children must center on quality interactions with caregivers, thus requiring adequate staff training. Finally, in 2018 a law was passed stipulating standards for staff training, proper facilities, child-adult ratios, and safety measures. The Ariav commission expanded training to caregivers for ages 0-3. Transfer of the ECEC to the Ministry of Education ensured establishment of basic training. Groundwork created by new legislation initiated professional development of EC educators for ages 0-3. This process should raise salaries and bolster the system’s ability to attract quality employees. In 2022 responsibility for ECEC ages 0-3 was transferred from the Ministry of Finance to the Ministry of Education, shifting emphasis from proprietary care to professional considerations focusing on wellbeing and early childhood education. The recent revolutionary changes in ECEC point to a new age in the care and education of Israel’s youngest citizens. Implementation of international standards, adequate training, and professionalization of the workforce focus on the child’s needs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=policy" title="policy">policy</a>, <a href="https://publications.waset.org/abstracts/search?q=early%20childhood" title=" early childhood"> early childhood</a>, <a href="https://publications.waset.org/abstracts/search?q=care%20and%20education" title=" care and education"> care and education</a>, <a href="https://publications.waset.org/abstracts/search?q=daycare" title=" daycare"> daycare</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/157655/recent-policy-changes-in-israeli-early-childhood-frameworks-hope-for-the-future" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">54</span> Author’s Moral Rights in the Copyright Laws of the Baltic States: Comparative Legal Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sintija%20Zalane">Sintija Zalane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the protection and implementation of authors' moral rights in the copyright laws of Latvia, Lithuania, and Estonia, focusing on their legal frameworks in light of the Berne Convention. The analysis highlights how moral rights, such as authorship attribution, integrity of the work, and opposition to derogatory treatment, are upheld in these jurisdictions. The study compares national approaches to posthumous protection of moral rights and their interplay with economic rights. Drawing on legal texts and court decisions, the paper identifies challenges in enforcement and suggests harmonization opportunities to strengthen the moral rights framework across the Baltic region. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authors%E2%80%99%20moral%20rights" title="authors’ moral rights">authors’ moral rights</a>, <a href="https://publications.waset.org/abstracts/search?q=copyright%20laws" title=" copyright laws"> copyright laws</a>, <a href="https://publications.waset.org/abstracts/search?q=Baltic%20states" title=" Baltic states"> Baltic states</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20frameworks" title=" legal frameworks"> legal frameworks</a>, <a href="https://publications.waset.org/abstracts/search?q=berne%20convention" title=" berne convention"> berne convention</a>, <a href="https://publications.waset.org/abstracts/search?q=posthumous%20protection" title=" posthumous protection"> posthumous protection</a> </p> <a href="https://publications.waset.org/abstracts/194777/authors-moral-rights-in-the-copyright-laws-of-the-baltic-states-comparative-legal-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194777.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">11</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">53</span> Analysis of the Significance of Multimedia Channels Using Sparse PCA and Regularized SVD</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kourosh%20Modarresi">Kourosh Modarresi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The abundance of media channels and devices has given users a variety of options to extract, discover, and explore information in the digital world. Since, often, there is a long and complicated path that a typical user may venture before taking any (significant) action (such as purchasing goods and services), it is critical to know how each node (media channel) in the path of user has contributed to the final action. In this work, the significance of each media channel is computed using statistical analysis and machine learning techniques. More specifically, “Regularized Singular Value Decomposition”, and “Sparse Principal Component” has been used to compute the significance of each channel toward the final action. The results of this work are a considerable improvement compared to the present approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multimedia%20attribution" title="multimedia attribution">multimedia attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=sparse%20principal%20component" title=" sparse principal component"> sparse principal component</a>, <a href="https://publications.waset.org/abstracts/search?q=regularization" title=" regularization"> regularization</a>, <a href="https://publications.waset.org/abstracts/search?q=singular%20value%20decomposition" title=" singular value decomposition"> singular value decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20significance" title=" feature significance"> feature significance</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20systems" title=" linear systems"> linear systems</a>, <a href="https://publications.waset.org/abstracts/search?q=variable%20shrinkage" title=" variable shrinkage"> variable shrinkage</a> </p> <a href="https://publications.waset.org/abstracts/19533/analysis-of-the-significance-of-multimedia-channels-using-sparse-pca-and-regularized-svd" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19533.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">309</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> Exploration of Competitive Athletes’ Superstition in Taiwan: “Miracle” and “Coincidence”</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shieh%20Shiow-Fang">Shieh Shiow-Fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Superstitious thoughts or actions often occur during athletic competitions. Often "superstitious rituals" have a positive impact on the performance of competitive athletes. Athletes affirm the many psychological benefits of religious beliefs mostly in a positive way. Method: By snowball sampling, we recruited 10 experienced competitive athletes as participants. We used in-person and online one-to-one in-depth interviews to collect their experiences about sports superstition. The total interview time was 795 minutes. We analyzed the raw data with the grounded theory processes suggested by Strauss and Corbin (1990). Results: The factors affecting athlete performance are ritual beliefs, taboo awareness, learning norms, and spontaneous attribution behaviors. Conclusion: We concluded that sports superstition reflects several psychological implications. The analysis results of this paper can provide another research perspective for the future study of sports superstition behavior. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=superstition" title="superstition">superstition</a>, <a href="https://publications.waset.org/abstracts/search?q=taboo%20awarences" title=" taboo awarences"> taboo awarences</a>, <a href="https://publications.waset.org/abstracts/search?q=competitive%20athlete" title=" competitive athlete"> competitive athlete</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20norms" title=" learning norms"> learning norms</a> </p> <a href="https://publications.waset.org/abstracts/164550/exploration-of-competitive-athletes-superstition-in-taiwan-miracle-and-coincidence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164550.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> Modelling of Multi-Agent Systems for the Scheduling of Multi-EV Charging from Power Limited Sources</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manan%E2%80%99Iarivo%20Rasolonjanahary">Manan’Iarivo Rasolonjanahary</a>, <a href="https://publications.waset.org/abstracts/search?q=Chris%20Bingham"> Chris Bingham</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigel%20Schofield"> Nigel Schofield</a>, <a href="https://publications.waset.org/abstracts/search?q=Masoud%20Bazargan"> Masoud Bazargan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the research and application of model predictive scheduled charging of electric vehicles (EV) subject to limited available power resource. To focus on algorithm and operational characteristics, the EV interface to the source is modelled as a battery state equation during the charging operation. The researched methods allow for the priority scheduling of EV charging in a multi-vehicle regime and when subject to limited source power availability. Priority attribution for each connected EV is described. The validity of the developed methodology is shown through the simulation of different scenarios of charging operation of multiple connected EVs including non-scheduled and scheduled operation with various numbers of vehicles. Performance of the developed algorithms is also reported with the recommendation of the choice of suitable parameters. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=model%20predictive%20control" title="model predictive control">model predictive control</a>, <a href="https://publications.waset.org/abstracts/search?q=non-scheduled" title=" non-scheduled"> non-scheduled</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20limited%20sources" title=" power limited sources"> power limited sources</a>, <a href="https://publications.waset.org/abstracts/search?q=scheduled%20and%20stop-start%20battery%20charging" title=" scheduled and stop-start battery charging"> scheduled and stop-start battery charging</a> </p> <a href="https://publications.waset.org/abstracts/134020/modelling-of-multi-agent-systems-for-the-scheduling-of-multi-ev-charging-from-power-limited-sources" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134020.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">157</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">50</span> Exploration of Competitive Athletes’ Superstition in Taiwan: "Miracle" and "Coincidence"</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shieh%20Shiow-fang">Shieh Shiow-fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Superstitious thoughts or actions often occur during athletic competitions. Often "superstitious rituals" have a positive impact on the performance of competitive athletes. Athletes affirm the many psychological benefits of religious beliefs mostly in a positive way. Method: By snowball sampling, we recruited 10 experienced competitive athletes as participants. We used in-person and online one-to-one in-depth interview to collect their experiences about sport superstition. The total interview time was 795 minutes. We analyzed the raw data with the grounded theory processes suggested by Strauss and Corbin (1990). Results: The factors affecting athlete performance are ritual beliefs, taboo awareness, learning norms, and spontaneous attribution behaviors. Conclusion: We concluded that sports superstition reflects several psychological implications. The analysis results of this paper can provide another research perspective for the future study of sports superstition behavior. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=superstition" title="superstition">superstition</a>, <a href="https://publications.waset.org/abstracts/search?q=taboo%20awareness" title=" taboo awareness"> taboo awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20norms" title=" learning norms"> learning norms</a>, <a href="https://publications.waset.org/abstracts/search?q=competitive%20athlete" title=" competitive athlete"> competitive athlete</a> </p> <a href="https://publications.waset.org/abstracts/164811/exploration-of-competitive-athletes-superstition-in-taiwan-miracle-and-coincidence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> Reliable Soup: Reliable-Driven Model Weight Fusion on Ultrasound Imaging Classification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shuge%20Lei">Shuge Lei</a>, <a href="https://publications.waset.org/abstracts/search?q=Haonan%20Hu"> Haonan Hu</a>, <a href="https://publications.waset.org/abstracts/search?q=Dasheng%20Sun"> Dasheng Sun</a>, <a href="https://publications.waset.org/abstracts/search?q=Huabin%20Zhang"> Huabin Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Kehong%20Yuan"> Kehong Yuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Jian%20Dai"> Jian Dai</a>, <a href="https://publications.waset.org/abstracts/search?q=Yan%20Tong"> Yan Tong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It remains challenging to measure reliability from classification results from different machine learning models. This paper proposes a reliable soup optimization algorithm based on the model weight fusion algorithm Model Soup, aiming to improve reliability by using dual-channel reliability as the objective function to fuse a series of weights in the breast ultrasound classification models. Experimental results on breast ultrasound clinical datasets demonstrate that reliable soup significantly enhances the reliability of breast ultrasound image classification tasks. The effectiveness of the proposed approach was verified via multicenter trials. The results from five centers indicate that the reliability optimization algorithm can enhance the reliability of the breast ultrasound image classification model and exhibit low multicenter correlation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=breast%20ultrasound%20image%20classification" title="breast ultrasound image classification">breast ultrasound image classification</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20attribution" title=" feature attribution"> feature attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability%20assessment" title=" reliability assessment"> reliability assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability%20optimization" title=" reliability optimization"> reliability optimization</a> </p> <a href="https://publications.waset.org/abstracts/176773/reliable-soup-reliable-driven-model-weight-fusion-on-ultrasound-imaging-classification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176773.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> Experiences and Perceptions of Parents Raising Children with Autism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tamene%20Keneni">Tamene Keneni</a>, <a href="https://publications.waset.org/abstracts/search?q=Tibebu%20Yohannes"> Tibebu Yohannes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The prevalence of autism spectrum disorder (ASD) in general and autism in particular is on the rise globally, and the need for evidence-based intervention and care for children with autism has grown, too. However, evidence on autism is scanty in developing countries, including Ethiopia. With the aim to help fill the gap and paucity in research into the issue, the main purpose of this study is to explore, better understand, and document the experiences and perceptions of parents of children with autism. To this end, we used a qualitative survey to collect data from a convenient sample of parents raising a child with autism. The data collected were subjected to qualitative analysis that yielded several themes and subthemes, including late diagnosis, parents’ reactions to diagnosis, sources of information during and after diagnosis, differing reactions to having a child with autism from siblings, extended family members, and the larger community, attribution of autism to several causes by the community, lack of recognition and open discussion of autism and lack of appropriated public educational and health care services for children with autism and their parents. The themes and subthemes identified were discussed in light of existing literature, and implications for practice were drawn. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ASD" title="ASD">ASD</a>, <a href="https://publications.waset.org/abstracts/search?q=autism" title=" autism"> autism</a>, <a href="https://publications.waset.org/abstracts/search?q=children%20with%20autism" title=" children with autism"> children with autism</a>, <a href="https://publications.waset.org/abstracts/search?q=raising%20children%20with%20autism" title=" raising children with autism"> raising children with autism</a> </p> <a href="https://publications.waset.org/abstracts/145626/experiences-and-perceptions-of-parents-raising-children-with-autism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145626.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> Holomorphic Prioritization of Sets within Decagram of Strategic Decision Making of POSM Using Operational Research (OR): Analytic Hierarchy Process (AHP) Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elias%20Ogutu%20Azariah%20Tembe">Elias Ogutu Azariah Tembe</a>, <a href="https://publications.waset.org/abstracts/search?q=Hussain%20Abdullah%20Habib%20Al-Salamin"> Hussain Abdullah Habib Al-Salamin </a> </p> <p class="card-text"><strong>Abstract:</strong></p> There is decagram of strategic decisions of operations and production/service management (POSM) within operational research (OR) which must collate, namely: design, inventory, quality, location, process and capacity, layout, scheduling, maintain ace, and supply chain. This paper presents an architectural configuration conceptual framework of a decagram of sets decisions in a form of mathematical complete graph and abelian graph. Mathematically, a complete graph is undirected (UDG), and directed (DG) a relationship where every pair of vertices are connected, collated, confluent, and holomorphic. There has not been any study conducted which, however, prioritizes the holomorphic sets which of POMS within OR field of study. The study utilizes OR structured technique known as The Analytic Hierarchy Process (AHP) analysis for organizing, sorting and prioritizing (ranking) the sets within the decagram of POMS according to their attribution (propensity), and provides an analysis how the prioritization has real-world application within the 21st century. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=holomorphic" title="holomorphic">holomorphic</a>, <a href="https://publications.waset.org/abstracts/search?q=decagram" title=" decagram"> decagram</a>, <a href="https://publications.waset.org/abstracts/search?q=decagon" title=" decagon"> decagon</a>, <a href="https://publications.waset.org/abstracts/search?q=confluent" title=" confluent"> confluent</a>, <a href="https://publications.waset.org/abstracts/search?q=complete%20graph" title=" complete graph"> complete graph</a>, <a href="https://publications.waset.org/abstracts/search?q=AHP%20analysis" title=" AHP analysis"> AHP analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=SCM" title=" SCM"> SCM</a>, <a href="https://publications.waset.org/abstracts/search?q=HRM" title=" HRM"> HRM</a>, <a href="https://publications.waset.org/abstracts/search?q=OR" title=" OR"> OR</a>, <a href="https://publications.waset.org/abstracts/search?q=OM" title=" OM"> OM</a>, <a href="https://publications.waset.org/abstracts/search?q=abelian%20graph" title=" abelian graph"> abelian graph</a> </p> <a href="https://publications.waset.org/abstracts/15177/holomorphic-prioritization-of-sets-within-decagram-of-strategic-decision-making-of-posm-using-operational-research-or-analytic-hierarchy-process-ahp-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15177.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> The Role of Social Isolation and Its Relevance Towards the Intersex Condition for Policy Management of Inclusive Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hamza%20Iftikhar">Hamza Iftikhar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The intersex person’s social isolation condition is the leading concern in inclusive educational practices. It provides for the relevance of intersex communities with the influence of social isolation on their education and well-being. Given the underlying concern, this paper stresses the isolation-free condition of the intersex community by facilitating inclusive education. The Atkinson and Shiffrin Model and Behaviorism-Based Intersex Theory supports inclusive education by extending the desire for the significant management of stereotypes, quality teaching, parental beliefs, expressions, physique, and intersex attribution. The reducing role of social isolation for inclusive education is analyzed using the qualitative research method. The semi-structured interview research instrument is used for the data collection from the Ministry of Human Rights, Educational Institutions, and inter-sex Representatives. The results show that managing directors and heads of educational institutions frame policy management for the free social isolation of intersex persons, which is relevant through inclusive education. The implication of this paper is to provide a better social condition for intersex persons towards inclusive education through effective policy management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20isolation" title="social isolation">social isolation</a>, <a href="https://publications.waset.org/abstracts/search?q=inter-sex" title=" inter-sex"> inter-sex</a>, <a href="https://publications.waset.org/abstracts/search?q=relevance" title=" relevance"> relevance</a>, <a href="https://publications.waset.org/abstracts/search?q=inclusive%20education" title=" inclusive education"> inclusive education</a>, <a href="https://publications.waset.org/abstracts/search?q=policy%20management" title=" policy management"> policy management</a> </p> <a href="https://publications.waset.org/abstracts/174390/the-role-of-social-isolation-and-its-relevance-towards-the-intersex-condition-for-policy-management-of-inclusive-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174390.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> Review on Moral Disengagement in Sports</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Min%20Pan">Min Pan</a>, <a href="https://publications.waset.org/abstracts/search?q=Che-Yi%20Yang"> Che-Yi Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Behaviors in sports have been one of the research focuses for long. The possible causes of these deviant behaviors should be deterred to diminish such behaviors. The studies on moral disengagement in sports gained great attention internationally since then however studies regarding such issue are rather scarce in Taiwan. Hence, the study adopted literature review approach to retrospect researches on moral disengagement in sport so forth, introduced current instruments available – moral disengagement in sports (six factors, 32 items), moral disengagement in sports –short (1 factor, 8 items), and two Chinese version scales. It has been proved that moral disengagement in sport would render antisocial behaviors in sport context. It is also found players in team contact sports (e.g. basketball, football, and hockey) have higher moral disengagement at play. Male athletes tend to have higher moral disengagement than their female counterparts. Athletes competing in higher level also show higher moral disengagement. The study also summarized that factors such as coaching styles, emotion, self-orientation, motivation, and personality traits may deter the severity of moral disengagement of athletes hence further spur the antisocial behaviors in sports. It is suggested that a measurement of moral disengagement adequate for Taiwanese athletes and effective strategies for improving the antisocial behaviors should be developed based on the knowledge of moral disengagement in sports. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=antisocial%20behavior" title="antisocial behavior">antisocial behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=attribution%20of%20blame" title=" attribution of blame"> attribution of blame</a>, <a href="https://publications.waset.org/abstracts/search?q=moral%20disengagement%20in%20sports%20measurement" title=" moral disengagement in sports measurement"> moral disengagement in sports measurement</a>, <a href="https://publications.waset.org/abstracts/search?q=nonresponsibility" title=" nonresponsibility"> nonresponsibility</a> </p> <a href="https://publications.waset.org/abstracts/50972/review-on-moral-disengagement-in-sports" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50972.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">412</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> Building Safety Through Real-time Design Fire Protection Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohsin%20Ali%20Shaikh">Mohsin Ali Shaikh</a>, <a href="https://publications.waset.org/abstracts/search?q=Song%20Weiguo"> Song Weiguo</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Kashan%20Surahio"> Muhammad Kashan Surahio</a>, <a href="https://publications.waset.org/abstracts/search?q=Usman%20Shahid"> Usman Shahid</a>, <a href="https://publications.waset.org/abstracts/search?q=Rehmat%20Karim"> Rehmat Karim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When the area of a structure that is threatened by a disaster affects personal safety, the effectiveness of disaster prevention, evacuation, and rescue operations can be summarized by three assessment indicators: personal safety, property preservation, and attribution of responsibility. These indicators are applicable regardless of the disaster that affects the building. People need to get out of the hazardous area and to a safe place as soon as possible because there's no other way to respond. The results of the tragedy are thus closely related to how quickly people are advised to evacuate and how quickly they are rescued. This study considers present fire prevention systems to address catastrophes and improve building safety. It proposes the methods of Prevention Level for Deployment in Advance and Spatial Transformation by Human-Machine Collaboration. We present and prototype a real-time fire protection system architecture for building disaster prevention, evacuation, and rescue operations. The design encourages the use of simulations to check the efficacy of evacuation, rescue, and disaster prevention procedures throughout the planning and design phase of the structure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=prevention%20level" title="prevention level">prevention level</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20information%20modeling" title=" building information modeling"> building information modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20management%20system" title=" quality management system"> quality management system</a>, <a href="https://publications.waset.org/abstracts/search?q=simulated%20reality" title=" simulated reality"> simulated reality</a> </p> <a href="https://publications.waset.org/abstracts/183522/building-safety-through-real-time-design-fire-protection-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183522.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribution&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribution&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribution&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>