CINXE.COM
Search results for: false positive
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: false positive</title> <meta name="description" content="Search results for: false positive"> <meta name="keywords" content="false positive"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="false positive" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="false positive"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 7083</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: false positive</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7083</span> Angiographic Evaluation of ETT (Treadmill) Positive Patients in a Tertiary Care Hospital of Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Syed%20Dawood%20Md.%20Taimur">Syed Dawood Md. Taimur</a>, <a href="https://publications.waset.org/abstracts/search?q=Saidur%20Rahman%20Khan"> Saidur Rahman Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Farzana%20Islam"> Farzana Islam </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Objective: To evaluate the factors which predetermine the coronary artery disease in patients having positive Exercise Tolerance Test (ETT) that is treadmill results and coronary artery findings. Methods: This descriptive study was conducted at Department of Cardiology, Ibrahim Cardiac Hospital & Research Institute,Dhaka,Bangladesh from 1st January, 2014 to 31st August, 2014. All patients who had done ETT (treadmill) for chest pain diagnosis were studied. One hundred and four patients underwent coronary angiogram after positive treadmill result. Patients were divided into two groups depending upon the angiographic findings, i.e. true positive and false positive. Positive treadmill test patients who have coronary artery involvement these are called true positive and who have no involvement they are called false positive group. Both groups were compared with each other. Results: Out of 104 patients, 81 (77.9%) patients had true positive ETT and 23 (22.1%) patients had false positive ETT. The mean age of patients in positive ETT was 53.46± 8.06 years and male mean age was 53.63±8.36 years and female was 52.87 ± 7.0 years. Sixty nine (85.19%) male patients and twelve (14.81%) female patients had true positive ETT, whereas 15 (65.21%) males and 8 (34.79%) females had false positive ETT, this was statistically significant (p<0.032)difference in the two groups(sex) in comparison of true and false positive ETT. The risk factors of these patients like diabetes mellitus, hypertension, dyslipidemia, family history and smoking were seen among these patients. Hypertensive patients having true positive which were statically significant (p<0.004) and diabetic, dyslipidaemic patients having true positive which were statically significant (p < 0.032 & 0.030).True positive patients had family history were 68 (83.95%) and smoking were 52 (64.20%), where family history patients had statistically significant(p<0.017) between two groups of patients and smokers were significant (p<0.012). 46 true positive patients achieved THR which was not statistically significant (P<0.138)and 79 true patients had abnormal resting ECG whether it was significant (p<0.036). Amongst the vessels involvement the most common was LAD 55 (67.90%), followed by LCX 42 (51.85%), RCA 36 (44.44%) and the LMCA was 9 (11.11%), .40 patients (49.38%) had SVD, 26 (30.10%) had DVD, 15(18.52%) had TVD and 23 had normal coronary arteries. Conclusion: It can be concluded that among the female patients who have positive ETT with normal resting ECG, who had achieved target heart rate are likely to have a false positive test result. Conversely male patients,resting abnormal ECG who had not achieved THR, symptom limited ETT, have a hypertension, diabetis, dyslipidaemic, family history and smoking are likely to have a true positive treadmill test result. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exercise%20tolerance%20test" title="exercise tolerance test">exercise tolerance test</a>, <a href="https://publications.waset.org/abstracts/search?q=coronary%20artery%20disease" title=" coronary artery disease"> coronary artery disease</a>, <a href="https://publications.waset.org/abstracts/search?q=coronary%20angiography" title=" coronary angiography"> coronary angiography</a>, <a href="https://publications.waset.org/abstracts/search?q=true%20positive" title=" true positive"> true positive</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positive" title=" false positive"> false positive</a> </p> <a href="https://publications.waset.org/abstracts/17646/angiographic-evaluation-of-ett-treadmill-positive-patients-in-a-tertiary-care-hospital-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17646.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7082</span> Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nadjah%20Chergui">Nadjah Chergui</a>, <a href="https://publications.waset.org/abstracts/search?q=Narhimene%20Boustia"> Narhimene Boustia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context" title="context">context</a>, <a href="https://publications.waset.org/abstracts/search?q=default" title=" default"> default</a>, <a href="https://publications.waset.org/abstracts/search?q=exception" title=" exception"> exception</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/46511/using-vulnerability-to-reduce-false-positive-rate-in-intrusion-detection-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46511.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7081</span> Reduction of False Positives in Head-Shoulder Detection Based on Multi-Part Color Segmentation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lae-Jeong%20Park">Lae-Jeong Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper presents a method that utilizes figure-ground color segmentation to extract effective global feature in terms of false positive reduction in the head-shoulder detection. Conventional detectors that rely on local features such as HOG due to real-time operation suffer from false positives. Color cue in an input image provides salient information on a global characteristic which is necessary to alleviate the false positives of the local feature based detectors. An effective approach that uses figure-ground color segmentation has been presented in an effort to reduce the false positives in object detection. In this paper, an extended version of the approach is presented that adopts separate multipart foregrounds instead of a single prior foreground and performs the figure-ground color segmentation with each of the foregrounds. The multipart foregrounds include the parts of the head-shoulder shape and additional auxiliary foregrounds being optimized by a search algorithm. A classifier is constructed with the feature that consists of a set of the multiple resulting segmentations. Experimental results show that the presented method can discriminate more false positive than the single prior shape-based classifier as well as detectors with the local features. The improvement is possible because the presented approach can reduce the false positives that have the same colors in the head and shoulder foregrounds. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pedestrian%20detection" title="pedestrian detection">pedestrian detection</a>, <a href="https://publications.waset.org/abstracts/search?q=color%20segmentation" title=" color segmentation"> color segmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positive" title=" false positive"> false positive</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a> </p> <a href="https://publications.waset.org/abstracts/61932/reduction-of-false-positives-in-head-shoulder-detection-based-on-multi-part-color-segmentation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61932.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">281</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7080</span> Attack Redirection and Detection using Honeypots</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chowduru%20Ramachandra%20Sharma">Chowduru Ramachandra Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Shatunjay%20Rawat"> Shatunjay Rawat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=honeypot" title="honeypot">honeypot</a>, <a href="https://publications.waset.org/abstracts/search?q=TPOT" title=" TPOT"> TPOT</a>, <a href="https://publications.waset.org/abstracts/search?q=snort" title=" snort"> snort</a>, <a href="https://publications.waset.org/abstracts/search?q=NIDS" title=" NIDS"> NIDS</a>, <a href="https://publications.waset.org/abstracts/search?q=honeybird" title=" honeybird"> honeybird</a>, <a href="https://publications.waset.org/abstracts/search?q=iptables" title=" iptables"> iptables</a>, <a href="https://publications.waset.org/abstracts/search?q=netfilter" title=" netfilter"> netfilter</a>, <a href="https://publications.waset.org/abstracts/search?q=redirection" title=" redirection"> redirection</a>, <a href="https://publications.waset.org/abstracts/search?q=attack%20detection" title=" attack detection"> attack detection</a>, <a href="https://publications.waset.org/abstracts/search?q=docker" title=" docker"> docker</a>, <a href="https://publications.waset.org/abstracts/search?q=snare" title=" snare"> snare</a>, <a href="https://publications.waset.org/abstracts/search?q=tanner" title=" tanner"> tanner</a> </p> <a href="https://publications.waset.org/abstracts/143612/attack-redirection-and-detection-using-honeypots" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143612.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7079</span> Balanced Ischemia Misleading to a False Negative Myocardial Perfusion Imaging (Stress) Test</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Devam%20Sheth">Devam Sheth </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nuclear imaging with stress myocardial perfusion (stress test) is the preferred first line investigation for noninvasive evaluation of ischaemic heart condition. The sensitivity of this test is close to 90 % making it a very reliable test. However, rarely it gives a false negative result which can be explained by the phenomenon termed as “balanced ischaemia”. We present the case of a 78 year Caucasian female without any significant past cardiac history, who presents with chest pain and shortness of breath since one day. The initial ECG and cardiac enzymes were non-impressive. Few hours later, she had some substernal chest pain along with some ST segment depression in the lateral leads. Stress test comes back negative for any significant perfusion defects. However, given her typical symptoms, she underwent a cardiac catheterization which revealed significant triple vessel disease mandating her to get a bypass surgery. This unusual phenomenon of false nuclear stress test in the setting of positive ECG changes can be explained only by balanced ischemia wherein due to global myocardial ischemia, the stress test fails to reveal relative perfusion defects in the affected segments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=balanced" title="balanced">balanced</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positive" title=" false positive"> false positive</a>, <a href="https://publications.waset.org/abstracts/search?q=ischemia" title=" ischemia"> ischemia</a>, <a href="https://publications.waset.org/abstracts/search?q=myocardial%20perfusion%20imaging" title=" myocardial perfusion imaging"> myocardial perfusion imaging</a> </p> <a href="https://publications.waset.org/abstracts/49756/balanced-ischemia-misleading-to-a-false-negative-myocardial-perfusion-imaging-stress-test" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49756.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7078</span> A Comparative Study of Malware Detection Techniques Using Machine Learning Methods</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cristina%20Vatamanu">Cristina Vatamanu</a>, <a href="https://publications.waset.org/abstracts/search?q=Doina%20Cosovan"> Doina Cosovan</a>, <a href="https://publications.waset.org/abstracts/search?q=Dragos%20Gavrilut"> Dragos Gavrilut</a>, <a href="https://publications.waset.org/abstracts/search?q=Henri%20Luchian"> Henri Luchian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the past few years, the amount of malicious software increased exponentially and, therefore, machine learning algorithms became instrumental in identifying clean and malware files through semi-automated classification. When working with very large datasets, the major challenge is to reach both a very high malware detection rate and a very low false positive rate. Another challenge is to minimize the time needed for the machine learning algorithm to do so. This paper presents a comparative study between different machine learning techniques such as linear classifiers, ensembles, decision trees or various hybrids thereof. The training dataset consists of approximately 2 million clean files and 200.000 infected files, which is a realistic quantitative mixture. The paper investigates the above mentioned methods with respect to both their performance (detection rate and false positive rate) and their practicability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ensembles" title="ensembles">ensembles</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positives" title=" false positives"> false positives</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20selection" title=" feature selection"> feature selection</a>, <a href="https://publications.waset.org/abstracts/search?q=one%20side%20class%20algorithm" title=" one side class algorithm"> one side class algorithm</a> </p> <a href="https://publications.waset.org/abstracts/30093/a-comparative-study-of-malware-detection-techniques-using-machine-learning-methods" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30093.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7077</span> ANA Negative but FANA Positive Patients with Clinical Symptoms of Rheumatic Disease: The Suggestion for Clinicians</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdolreza%20Esmaeilzadeh">Abdolreza Esmaeilzadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehri%20Mirzaei"> Mehri Mirzaei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Objective: Rheumatic disease is a chronic disease that causes pain, stiffness, swelling and limited motion and function of many joints. RA is the most common form of autoimmune arthritis, affecting more than 1.3 million Americans. Of these, about 75% are women. Materials and Methods: This study was formed due to the misconception about ANA test, which is frequently performed with methods based upon solid phase as ELISA. This experiment was conducted on 430 patients, with clinical symptoms that are likely affected with rheumatic diseases, simultaneously by means of ANA and FANA. Results: 36 cases (8.37%) of patients, despite positive ANA, have demonstrated negative results via Indirect Immunofluorescence Assay (IIFA), (false positive). 116 cases (27%) have demonstrated negative ANA results, by means of the ELISA technique, although they had positive IIFA results. Conclusion: Other advantages of IIFA are antibody titration and specific pattern detection that have the capability of distinguishing positive dsDNA results. According to the restrictions and false negative cases, in patients, IIFA test is highly recommended for these disease's diagnosis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=autoimmune%20disease" title="autoimmune disease">autoimmune disease</a>, <a href="https://publications.waset.org/abstracts/search?q=IIFA" title=" IIFA"> IIFA</a>, <a href="https://publications.waset.org/abstracts/search?q=EIA" title=" EIA"> EIA</a>, <a href="https://publications.waset.org/abstracts/search?q=rheumatic%20disease" title=" rheumatic disease"> rheumatic disease</a> </p> <a href="https://publications.waset.org/abstracts/23763/ana-negative-but-fana-positive-patients-with-clinical-symptoms-of-rheumatic-disease-the-suggestion-for-clinicians" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23763.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">499</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7076</span> A Method for False Alarm Recognition Based on Multi-Classification Support Vector Machine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Weiwei%20Cui">Weiwei Cui</a>, <a href="https://publications.waset.org/abstracts/search?q=Dejian%20Lin"> Dejian Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Leigang%20Zhang"> Leigang Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yao%20Wang"> Yao Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zheng%20Sun"> Zheng Sun</a>, <a href="https://publications.waset.org/abstracts/search?q=Lianfeng%20Li"> Lianfeng Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Built-in test (BIT) is an important technology in testability field, and it is widely used in state monitoring and fault diagnosis. With the improvement of modern equipment performance and complexity, the scope of BIT becomes larger, and it leads to the emergence of false alarm problem. The false alarm makes the health assessment unstable, and it reduces the effectiveness of BIT. The conventional false alarm suppression methods such as repeated test and majority voting cannot meet the requirement for a complicated system, and the intelligence algorithms such as artificial neural networks (ANN) are widely studied and used. However, false alarm has a very low frequency and small sample, yet a method based on ANN requires a large size of training sample. To recognize the false alarm, we propose a method based on multi-classification support vector machine (SVM) in this paper. Firstly, we divide the state of a system into three states: healthy, false-alarm, and faulty. Then we use multi-classification with '1 vs 1' policy to train and recognize the state of a system. Finally, an example of fault injection system is taken to verify the effectiveness of the proposed method by comparing ANN. The result shows that the method is reasonable and effective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=false%20alarm" title="false alarm">false alarm</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20diagnosis" title=" fault diagnosis"> fault diagnosis</a>, <a href="https://publications.waset.org/abstracts/search?q=SVM" title=" SVM"> SVM</a>, <a href="https://publications.waset.org/abstracts/search?q=k-means" title=" k-means"> k-means</a>, <a href="https://publications.waset.org/abstracts/search?q=BIT" title=" BIT"> BIT</a> </p> <a href="https://publications.waset.org/abstracts/87531/a-method-for-false-alarm-recognition-based-on-multi-classification-support-vector-machine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87531.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7075</span> Improvements in OpenCV's Viola Jones Algorithm in Face Detection–Skin Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jyoti%20Bharti">Jyoti Bharti</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20K.%20Gupta"> M. K. Gupta</a>, <a href="https://publications.waset.org/abstracts/search?q=Astha%20Jain"> Astha Jain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes a new improved approach for false positives filtering of detected face images on OpenCV’s Viola Jones Algorithm In this approach, for Filtering of False Positives, Skin Detection in two colour spaces i.e. HSV (Hue, Saturation and Value) and YCrCb (Y is luma component and Cr- red difference, Cb- Blue difference) is used. As a result, it is found that false detection has been reduced. Our proposed method reaches the accuracy of about 98.7%. Thus, a better recognition rate is achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=face%20detection" title="face detection">face detection</a>, <a href="https://publications.waset.org/abstracts/search?q=Viola%20Jones" title=" Viola Jones"> Viola Jones</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positives" title=" false positives"> false positives</a>, <a href="https://publications.waset.org/abstracts/search?q=OpenCV" title=" OpenCV"> OpenCV</a> </p> <a href="https://publications.waset.org/abstracts/48849/improvements-in-opencvs-viola-jones-algorithm-in-face-detection-skin-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7074</span> Filtering Intrusion Detection Alarms Using Ant Clustering Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghodhbani%20Salah">Ghodhbani Salah</a>, <a href="https://publications.waset.org/abstracts/search?q=Jemili%20Farah"> Jemili Farah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20system" title="intrusion detection system">intrusion detection system</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm%20filtering" title=" alarm filtering"> alarm filtering</a>, <a href="https://publications.waset.org/abstracts/search?q=ANT%20class" title=" ANT class"> ANT class</a>, <a href="https://publications.waset.org/abstracts/search?q=ant%20clustering" title=" ant clustering"> ant clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=intruders%E2%80%99%20behaviors" title=" intruders’ behaviors"> intruders’ behaviors</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20alarms" title=" false alarms"> false alarms</a> </p> <a href="https://publications.waset.org/abstracts/23716/filtering-intrusion-detection-alarms-using-ant-clustering-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23716.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7073</span> A Study on the False Alarm Rates of MEWMA and MCUSUM Control Charts When the Parameters Are Estimated</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umar%20Farouk%20Abbas">Umar Farouk Abbas</a>, <a href="https://publications.waset.org/abstracts/search?q=Danjuma%20Mustapha"> Danjuma Mustapha</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamisu%20Idi"> Hamisu Idi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is now a known fact that quality is an important issue in manufacturing industries. A control chart is an integrated and powerful tool in statistical process control (SPC). The mean µ and standard deviation σ parameters are estimated. In general, the multivariate exponentially weighted moving average (MEWMA) and multivariate cumulative sum (MCUSUM) are used in the detection of small shifts in joint monitoring of several correlated variables; the charts used information from past data which makes them sensitive to small shifts. The aim of the paper is to compare the performance of Shewhart xbar, MEWMA, and MCUSUM control charts in terms of their false rates when parameters are estimated with autocorrelation. A simulation was conducted in R software to generate the average run length (ARL) values of each of the charts. After the analysis, the results show that a comparison of the false alarm rates of the charts shows that MEWMA chart has lower false alarm rates than the MCUSUM chart at various levels of parameter estimated to the number of ARL0 (in control) values. Also noticed was that the sample size has an advert effect on the false alarm of the control charts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=average%20run%20length" title="average run length">average run length</a>, <a href="https://publications.waset.org/abstracts/search?q=MCUSUM%20chart" title=" MCUSUM chart"> MCUSUM chart</a>, <a href="https://publications.waset.org/abstracts/search?q=MEWMA%20chart" title=" MEWMA chart"> MEWMA chart</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20alarm%20rate" title=" false alarm rate"> false alarm rate</a>, <a href="https://publications.waset.org/abstracts/search?q=parameter%20estimation" title=" parameter estimation"> parameter estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a> </p> <a href="https://publications.waset.org/abstracts/106504/a-study-on-the-false-alarm-rates-of-mewma-and-mcusum-control-charts-when-the-parameters-are-estimated" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106504.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7072</span> A 3-Year Evaluation Study on Fine Needle Aspiration Cytology and Corresponding Histology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20Al%20Shammari">Amjad Al Shammari</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashraf%20Ibrahim"> Ashraf Ibrahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Laila%20Seada"> Laila Seada</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background and Objectives: Incidence of thyroid carcinoma has been increasing world-wide. In the present study, we evaluated diagnostic accuracy of Fine needle aspiration (FNA) and its efficiency in early detecting neoplastic lesions of thyroid gland over a 3-year period. Methods: Data have been retrieved from pathology files in King Khalid Hospital. For each patient, age, gender, FNA, site & size of nodule and final histopathologic diagnosis were recorded. Results: Study included 490 cases where 419 of them were female and 71 male. Male to female ratio was 1:6. Mean age was 43 years for males and 38 for females. Cases with confirmed histopathology were 131. In 101/131 (77.1%), concordance was found between FNA and histology. In 30/131 (22.9%), there was discrepancy in diagnosis. Total malignant cases were 43, out of which 14 (32.5%) were true positive and 29 (67.44%) were false negative. No false positive cases could be found in our series. Conclusion: FNA could diagnose benign nodules in all cases, however, in malignant cases, ultrasound findings have to be taken into consideration to avoid missing of a microcarcinoma in the contralateral lobe. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=FNA" title="FNA">FNA</a>, <a href="https://publications.waset.org/abstracts/search?q=hail" title=" hail"> hail</a>, <a href="https://publications.waset.org/abstracts/search?q=histopathology" title=" histopathology"> histopathology</a>, <a href="https://publications.waset.org/abstracts/search?q=thyroid" title=" thyroid"> thyroid</a> </p> <a href="https://publications.waset.org/abstracts/72692/a-3-year-evaluation-study-on-fine-needle-aspiration-cytology-and-corresponding-histology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72692.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7071</span> A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoqing%20Wang">Xiaoqing Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Junfeng%20Wang"> Junfeng Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaolan%20Zhu"> Xiaolan Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=API%20Calls" title=" API Calls"> API Calls</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=permissions%20combination" title=" permissions combination"> permissions combination</a> </p> <a href="https://publications.waset.org/abstracts/51217/a-static-android-malware-detection-based-on-actual-used-permissions-combination-and-api-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51217.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">329</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7070</span> Fast Accurate Detection of Frequency Jumps Using Kalman Filter with Non Linear Improvements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20E.%20Mohamed">Mahmoud E. Mohamed</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20F.%20Shalash"> Ahmed F. Shalash</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20A.%20Kamal"> Hanan A. Kamal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In communication systems, frequency jump is a serious problem caused by the oscillators used. Kalman filters are used to detect that jump, Despite the tradeoff between the noise level and the speed of the detection. In this paper, An improvement is introduced in the Kalman filter, Through a nonlinear change in the bandwidth of the filter. Simulation results show a considerable improvement in the filter speed with a very low noise level. Additionally, The effect on the response to false alarms is also presented and false alarm rate show improvement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kalman%20filter" title="Kalman filter">Kalman filter</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20detection" title=" false detection"> false detection</a>, <a href="https://publications.waset.org/abstracts/search?q=improvement" title=" improvement "> improvement </a> </p> <a href="https://publications.waset.org/abstracts/7978/fast-accurate-detection-of-frequency-jumps-using-kalman-filter-with-non-linear-improvements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7978.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">602</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7069</span> The Effect of Employees' Positive Attitude and Smile and Its Impact on the Quality of Service in the Hospitality Service </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mariam%20Kutateladze">Mariam Kutateladze </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the twenty-first century, in the customer service settings for hospitality institution’s employee management and their well-being have become a core issue since it is linked to the customers' increased demand for high-quality service. Employees' positive attitude to customers plays an essential role in the serving process; for this reason, in the hospitality institutions service with a smile is a job requirement. This research is devoted to the issues of employee management systems improvement and its effect of the genuine smile as a positive attitude expressed by the employees to the customer. Different researchers work about the effect of the genuine smile, which is analyzed in the present paper. Based on it, the link between satisfied employees from service climate and their genuine smile is determined. An investigation in local resort hotels which are located in the regions of Georgia is conducted. In the methodology of the paper, we have used linkage research, which stated that employee satisfaction in a working place depends on the existing service climate in an organization. We have prepared questioners according to eight dimensions of good service climate by linkage research, and extra questions about the effect of the smile on customers were added. Questionnaires were distributed among employees, and the results have shown that dissatisfaction from organizations’ service climate led to employees' false smile toward customers. Demanding positive emotions from frustrated employees was the mistake of the hotel management. The false smile was easily recognized by the customers, and the frustrated employee with a false smile could not provide high-quality service. The findings of the paper will help managers to realize the importance of forming the positive service climate within the institutions since it is linked to employees' well-being who are the creators of high-quality service. The conclusion drawn from this study indicates there are core issues those managers need to take into account when planning their organizations’ profit. Managers should know their employees very well, their feelings and attitudes toward work before asking them expressing a smile since forced smile does not have a good result and quite often has bad outcomes; therefore, first of all, managers should investigate service climate in the organization. Managers should take into consideration employees’ opinions about the service climate in the organization, motivate their employees, and respect their ideas. Also, they should satisfy employees' basic needs and stress more value on extrinsic goals such as competence, relatedness, and autonomy. Managers should create a positive working environment, positive service climate, which will lead to employee satisfaction and genuine feelings, as well as improve the working environment since negative working climate will cause customers disappointment because of low-quality service provided by the unsatisfied employees. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=employee%20management" title="employee management">employee management</a>, <a href="https://publications.waset.org/abstracts/search?q=hotel" title=" hotel"> hotel</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20service" title=" quality of service"> quality of service</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20climate" title=" service climate "> service climate </a> </p> <a href="https://publications.waset.org/abstracts/113698/the-effect-of-employees-positive-attitude-and-smile-and-its-impact-on-the-quality-of-service-in-the-hospitality-service" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/113698.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">112</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7068</span> Modeling False Statements in Texts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francielle%20A.%20Vargas">Francielle A. Vargas</a>, <a href="https://publications.waset.org/abstracts/search?q=Thiago%20A.%20S.%20Pardo"> Thiago A. S. Pardo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to the standard philosophical definition, lying is saying something that you believe to be false with the intent to deceive. For deception detection, the FBI trains its agents in a technique named statement analysis, which attempts to detect deception based on parts of speech (i.e., linguistics style). This method is employed in interrogations, where the suspects are first asked to make a written statement. In this poster, we model false statements using linguistics style. In order to achieve this, we methodically analyze linguistic features in a corpus of fake news in the Portuguese language. The results show that they present substantial lexical, syntactic and semantic variations, as well as punctuation and emotion distinctions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deception%20detection" title="deception detection">deception detection</a>, <a href="https://publications.waset.org/abstracts/search?q=linguistics%20style" title=" linguistics style"> linguistics style</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20linguistics" title=" computational linguistics"> computational linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20processing" title=" natural language processing"> natural language processing</a> </p> <a href="https://publications.waset.org/abstracts/129388/modeling-false-statements-in-texts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129388.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7067</span> Enhancing a Recidivism Prediction Tool with Machine Learning: Effectiveness and Algorithmic Fairness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marzieh%20Karimihaghighi">Marzieh Karimihaghighi</a>, <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Castillo"> Carlos Castillo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work studies how Machine Learning (ML) may be used to increase the effectiveness of a criminal recidivism risk assessment tool, RisCanvi. The two key dimensions of this analysis are predictive accuracy and algorithmic fairness. ML-based prediction models obtained in this study are more accurate at predicting criminal recidivism than the manually-created formula used in RisCanvi, achieving an AUC of 0.76 and 0.73 in predicting violent and general recidivism respectively. However, the improvements are small, and it is noticed that algorithmic discrimination can easily be introduced between groups such as national vs foreigner, or young vs old. It is described how effectiveness and algorithmic fairness objectives can be balanced, applying a method in which a single error disparity in terms of generalized false positive rate is minimized, while calibration is maintained across groups. Obtained results show that this bias mitigation procedure can substantially reduce generalized false positive rate disparities across multiple groups. Based on these results, it is proposed that ML-based criminal recidivism risk prediction should not be introduced without applying algorithmic bias mitigation procedures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithmic%20fairness" title="algorithmic fairness">algorithmic fairness</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20risk%20assessment" title=" criminal risk assessment"> criminal risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=equalized%20odds" title=" equalized odds"> equalized odds</a>, <a href="https://publications.waset.org/abstracts/search?q=recidivism" title=" recidivism"> recidivism</a> </p> <a href="https://publications.waset.org/abstracts/130161/enhancing-a-recidivism-prediction-tool-with-machine-learning-effectiveness-and-algorithmic-fairness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7066</span> Mosaic Augmentation: Insights and Limitations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olivia%20A.%20Kjorlien">Olivia A. Kjorlien</a>, <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Asghari"> Maryam Asghari</a>, <a href="https://publications.waset.org/abstracts/search?q=Farshid%20Alizadeh-Shabdiz"> Farshid Alizadeh-Shabdiz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The goal of this paper is to investigate the impact of mosaic augmentation on the performance of object detection solutions. To carry out the study, YOLOv4 and YOLOv4-Tiny models have been selected, which are popular, advanced object detection models. These models are also representatives of two classes of complex and simple models. The study also has been carried out on two categories of objects, simple and complex. For this study, YOLOv4 and YOLOv4 Tiny are trained with and without mosaic augmentation for two sets of objects. While mosaic augmentation improves the performance of simple object detection, it deteriorates the performance of complex object detection, specifically having the largest negative impact on the false positive rate in a complex object detection case. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accuracy" title="accuracy">accuracy</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20positives" title=" false positives"> false positives</a>, <a href="https://publications.waset.org/abstracts/search?q=mosaic%20augmentation" title=" mosaic augmentation"> mosaic augmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20detection" title=" object detection"> object detection</a>, <a href="https://publications.waset.org/abstracts/search?q=YOLOV4" title=" YOLOV4"> YOLOV4</a>, <a href="https://publications.waset.org/abstracts/search?q=YOLOV4-Tiny" title=" YOLOV4-Tiny"> YOLOV4-Tiny</a> </p> <a href="https://publications.waset.org/abstracts/162634/mosaic-augmentation-insights-and-limitations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162634.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7065</span> An Improved Two-dimensional Ordered Statistical Constant False Alarm Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Weihao%20Wang">Weihao Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhulin%20Zong"> Zhulin Zong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Two-dimensional ordered statistical constant false alarm detection is a widely used method for detecting weak target signals in radar signal processing applications. The method is based on analyzing the statistical characteristics of the noise and clutter present in the radar signal and then using this information to set an appropriate detection threshold. In this approach, the reference cell of the unit to be detected is divided into several reference subunits. These subunits are used to estimate the noise level and adjust the detection threshold, with the aim of minimizing the false alarm rate. By using an ordered statistical approach, the method is able to effectively suppress the influence of clutter and noise, resulting in a low false alarm rate. The detection process involves a number of steps, including filtering the input radar signal to remove any noise or clutter, estimating the noise level based on the statistical characteristics of the reference subunits, and finally, setting the detection threshold based on the estimated noise level. One of the main advantages of two-dimensional ordered statistical constant false alarm detection is its ability to detect weak target signals in the presence of strong clutter and noise. This is achieved by carefully analyzing the statistical properties of the signal and using an ordered statistical approach to estimate the noise level and adjust the detection threshold. In conclusion, two-dimensional ordered statistical constant false alarm detection is a powerful technique for detecting weak target signals in radar signal processing applications. By dividing the reference cell into several subunits and using an ordered statistical approach to estimate the noise level and adjust the detection threshold, this method is able to effectively suppress the influence of clutter and noise and maintain a low false alarm rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=two-dimensional" title="two-dimensional">two-dimensional</a>, <a href="https://publications.waset.org/abstracts/search?q=ordered%20statistical" title=" ordered statistical"> ordered statistical</a>, <a href="https://publications.waset.org/abstracts/search?q=constant%20false%20alarm" title=" constant false alarm"> constant false alarm</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a>, <a href="https://publications.waset.org/abstracts/search?q=weak%20target%20signals" title=" weak target signals"> weak target signals</a> </p> <a href="https://publications.waset.org/abstracts/163351/an-improved-two-dimensional-ordered-statistical-constant-false-alarm-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163351.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7064</span> The Perils of Flagging Pirates: How Gender, False Consensus and Normative Messages Influence Digital Piracy Intentions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kate%20Whitman">Kate Whitman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Murad"> Zahra Murad</a>, <a href="https://publications.waset.org/abstracts/search?q=Joe%20Cox"> Joe Cox</a>, <a href="https://publications.waset.org/abstracts/search?q=Adam%20Cox"> Adam Cox</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the influence of normative communications on digital piracy intentions. Although descriptive norms are thought to influence behavior, the study examines the potential bias in one's own behavior, leading to false consensus—a phenomenon perpetuating undesirable activities. The research tests the presence of false consensus and the effect of correcting normative predictions on changes in piracy intentions, examining gender differences. Results from a controlled experiment (N = 684) indicate that normative communications, reflecting the "real" norm based on government data (N=5000), increase (decrease) piracy intentions among men (women) underestimating their peers' behavior. Conversely, neither men nor women overestimating their peers' piracy show any notable change in intentions. Considering men consume more illegal content than women, suggesting they pose a higher risk, the study highlights the need for cautious use of normative communications. Therefore, policymakers should minimize the visibility of piracy behavior for effective digital piracy management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20piracy" title="digital piracy">digital piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20consensus" title=" false consensus"> false consensus</a>, <a href="https://publications.waset.org/abstracts/search?q=normative%20interventions" title=" normative interventions"> normative interventions</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasive%20messages" title=" persuasive messages"> persuasive messages</a> </p> <a href="https://publications.waset.org/abstracts/182037/the-perils-of-flagging-pirates-how-gender-false-consensus-and-normative-messages-influence-digital-piracy-intentions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182037.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7063</span> Machine Learning Techniques in Bank Credit Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fernanda%20M.%20Assef">Fernanda M. Assef</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Teresinha%20A.%20Steiner"> Maria Teresinha A. Steiner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this paper is to compare and discuss better classifier algorithm options for credit risk assessment by applying different Machine Learning techniques. Using records from a Brazilian financial institution, this study uses a database of 5,432 companies that are clients of the bank, where 2,600 clients are classified as non-defaulters, 1,551 are classified as defaulters and 1,281 are temporarily defaulters, meaning that the clients are overdue on their payments for up 180 days. For each case, a total of 15 attributes was considered for a one-against-all assessment using four different techniques: Artificial Neural Networks Multilayer Perceptron (ANN-MLP), Artificial Neural Networks Radial Basis Functions (ANN-RBF), Logistic Regression (LR) and finally Support Vector Machines (SVM). For each method, different parameters were analyzed in order to obtain different results when the best of each technique was compared. Initially the data were coded in thermometer code (numerical attributes) or dummy coding (for nominal attributes). The methods were then evaluated for each parameter and the best result of each technique was compared in terms of accuracy, false positives, false negatives, true positives and true negatives. This comparison showed that the best method, in terms of accuracy, was ANN-RBF (79.20% for non-defaulter classification, 97.74% for defaulters and 75.37% for the temporarily defaulter classification). However, the best accuracy does not always represent the best technique. For instance, on the classification of temporarily defaulters, this technique, in terms of false positives, was surpassed by SVM, which had the lowest rate (0.07%) of false positive classifications. All these intrinsic details are discussed considering the results found, and an overview of what was presented is shown in the conclusion of this study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20networks%20%28ANNs%29" title="artificial neural networks (ANNs)">artificial neural networks (ANNs)</a>, <a href="https://publications.waset.org/abstracts/search?q=classifier%20algorithms" title=" classifier algorithms"> classifier algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=credit%20risk%20assessment" title=" credit risk assessment"> credit risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20regression" title=" logistic regression"> logistic regression</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20Learning" title=" machine Learning"> machine Learning</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20vector%20machines" title=" support vector machines"> support vector machines</a> </p> <a href="https://publications.waset.org/abstracts/125977/machine-learning-techniques-in-bank-credit-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7062</span> Intelligent Prediction of Breast Cancer Severity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wahab%20Ali">Wahab Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Oyebade%20K.%20Oyedotun"> Oyebade K. Oyedotun</a>, <a href="https://publications.waset.org/abstracts/search?q=Adnan%20Khashman"> Adnan Khashman </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Breast cancer remains a threat to the woman’s world in view of survival rates, it early diagnosis and mortality statistics. So far, research has shown that many survivors of breast cancer cases are in the ones with early diagnosis. Breast cancer is usually categorized into stages which indicates its severity and corresponding survival rates for patients. Investigations show that the farther into the stages before diagnosis the lesser the chance of survival; hence the early diagnosis of breast cancer becomes imperative, and consequently the application of novel technologies to achieving this. Over the year, mammograms have used in the diagnosis of breast cancer, but the inconclusive deductions made from such scans lead to either false negative cases where cancer patients may be left untreated or false positive where unnecessary biopsies are carried out. This paper presents the application of artificial neural networks in the prediction of severity of breast tumour (whether benign or malignant) using mammography reports and other factors that are related to breast cancer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=breast%20cancer" title="breast cancer">breast cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligent%20classification" title=" intelligent classification"> intelligent classification</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title=" neural networks"> neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=mammography" title=" mammography"> mammography</a> </p> <a href="https://publications.waset.org/abstracts/25662/intelligent-prediction-of-breast-cancer-severity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">487</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7061</span> The Phenomena of False Cognates and Deceptive Cognates: Issues to Foreign Language Learning and Teaching Methodology Based on Set Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marilei%20Amadeu%20Sabino">Marilei Amadeu Sabino</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study is to establish differences between the terms ‘false cognates’, ‘false friends’ and ‘deceptive cognates’, usually considered to be synonyms. It will be shown they are not synonyms, since they do not designate the same linguistic process or phenomenon. Despite their differences in meaning, many pairs of formally similar words in two (or more) different languages are true cognates, although they are usually known as ‘false’ cognates – such as, for instance, the English and Italian lexical items ‘assist x assistere’; ‘attend x attendere’; ‘argument x argomento’; ‘apology x apologia’; ‘camera x camera’; ‘cucumber x cocomero’; ‘fabric x fabbrica’; ‘factory x fattoria’; ‘firm x firma’; ‘journal x giornale’; ‘library x libreria’; ‘magazine x magazzino’; ‘parent x parente’; ‘preservative x preservativo’; ‘pretend x pretendere’; ‘vacancy x vacanza’, to name but a few examples. Thus, one of the theoretical objectives of this paper is firstly to elaborate definitions establishing a distinction between the words that are definitely ‘false cognates’ (derived from different etyma) and those that are just ‘deceptive cognates’ (derived from the same etymon). Secondly, based on Set Theory and on the concepts of equal sets, subsets, intersection of sets and disjoint sets, this study is intended to elaborate some theoretical and practical questions that will be useful in identifying more precisely similarities and differences between cognate words of different languages, and according to graphic interpretation of sets it will be possible to classify them and provide discernment about the processes of semantic changes. Therefore, these issues might be helpful not only to the Learning of Second and Foreign Languages, but they could also give insights into Foreign and Second Language Teaching Methodology. Acknowledgements: FAPESP – São Paulo State Research Support Foundation – the financial support offered (proc. n° 2017/02064-7). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deceptive%20cognates" title="deceptive cognates">deceptive cognates</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20cognates" title=" false cognates"> false cognates</a>, <a href="https://publications.waset.org/abstracts/search?q=foreign%20language%20learning" title=" foreign language learning"> foreign language learning</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching%20methodology" title=" teaching methodology"> teaching methodology</a> </p> <a href="https://publications.waset.org/abstracts/65740/the-phenomena-of-false-cognates-and-deceptive-cognates-issues-to-foreign-language-learning-and-teaching-methodology-based-on-set-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65740.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">337</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7060</span> Challenge of the Credibility of Witnesses in the International Criminal Court and the Precondition to Establish the Truth</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Romina%20Beqiri">Romina Beqiri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the context of the prosecution of those responsible for the commission of the most hideous crimes and the fight against impunity, a fundamental role is played by witnesses of the crimes who contribute to ascertaining the ‘procedural truth’. This article examines recent decisions and legislation of the Hague-based International Criminal Court in terms of the endangerment of the integrity of the criminal proceedings in consequence of witness tampering. The analysis focuses on the new developments in the courtroom and the academia, in particular, on the first-ever sentence confirming the charges of corruptly influencing witnesses, interpretation of presenting false evidence and giving false testimony when under an obligation to tell the truth. Confronted with recent tampering with witnesses and their credibility at stake in the ongoing cases, the research explores different Court’s decisions and scholars’ legal disputes concerning the deterrence approach to punish the authors of offences against the administration of justice when committed intentionally. Therefore, the analysis concludes that the Court cannot tolerate any witness false testimony and should enhance consistency and severity of sanctions for the sake of fair trial and end impunity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=International%20Criminal%20Court" title="International Criminal Court">International Criminal Court</a>, <a href="https://publications.waset.org/abstracts/search?q=administration%20of%20justice" title=" administration of justice"> administration of justice</a>, <a href="https://publications.waset.org/abstracts/search?q=credibility%20of%20witness" title=" credibility of witness"> credibility of witness</a>, <a href="https://publications.waset.org/abstracts/search?q=fair%20trial" title=" fair trial"> fair trial</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20testimony" title=" false testimony"> false testimony</a>, <a href="https://publications.waset.org/abstracts/search?q=witness%20tampering" title=" witness tampering"> witness tampering</a> </p> <a href="https://publications.waset.org/abstracts/95054/challenge-of-the-credibility-of-witnesses-in-the-international-criminal-court-and-the-precondition-to-establish-the-truth" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7059</span> Real, Ideal, or False Self- Presentation among Young Adult and Middle Adult Facebook Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maria%20Joan%20Grafil">Maria Joan Grafil</a>, <a href="https://publications.waset.org/abstracts/search?q=Hannah%20Wendam"> Hannah Wendam</a>, <a href="https://publications.waset.org/abstracts/search?q=Christine%20Joyce%20%20Yu"> Christine Joyce Yu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of social networking sites had been a big part of life of most people. One of the most popular among these is Facebook. Users range from young adults to late adults. While it is more popular among emerging and young adults, this social networking site gives people opportunities to express the self. Via Facebook, people have the opportunity to think about what they prefer to show others. This study identified which among the multiple facets of the self (real self, false self or ideal self) is dominantly presented by young adults and middle adults in using the social networking site Facebook. South Metro Manila was the locale of this study where 100 young adult participants (aged 18-25) were students from nearby universities and the 100 middle adult participants (aged 35-45) were working residents within the area. Participants were comprised of 53% females and 47% males. The data was gathered using a self-report questionnaire to determine which online self-presentation (real self-presentation, false self-presentation, or ideal self-presentation) of the participants has greater extent when engaging in the social networking site Facebook. Using means comparison, results showed that both young adults and middle adults engaged primarily in real self-presentation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=false%20self" title="false self">false self</a>, <a href="https://publications.waset.org/abstracts/search?q=ideal%20self" title=" ideal self"> ideal self</a>, <a href="https://publications.waset.org/abstracts/search?q=middle%20adult" title=" middle adult"> middle adult</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20self" title=" real self"> real self</a>, <a href="https://publications.waset.org/abstracts/search?q=self%20presentation" title=" self presentation"> self presentation</a>, <a href="https://publications.waset.org/abstracts/search?q=young%20adult" title=" young adult"> young adult</a> </p> <a href="https://publications.waset.org/abstracts/54665/real-ideal-or-false-self-presentation-among-young-adult-and-middle-adult-facebook-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54665.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">288</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7058</span> Parameter Estimation of False Dynamic EIV Model with Additive Uncertainty</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dalvinder%20Kaur%20Mangal">Dalvinder Kaur Mangal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For the past decade, noise corrupted output measurements have been a fundamental research problem to be investigated. On the other hand, the estimation of the parameters for linear dynamic systems when also the input is affected by noise is recognized as more difficult problem which only recently has received increasing attention. Representations where errors or measurement noises/disturbances are present on both the inputs and outputs are usually called errors-in-variables (EIV) models. These disturbances may also have additive effects which are also considered in this paper. Parameter estimation of false EIV problem using equation error, output error and iterative prefiltering identification schemes with and without additive uncertainty, when only the output observation is corrupted by noise has been dealt in this paper. The comparative study of these three schemes has also been carried out. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=errors-in-variable%20%28EIV%29" title="errors-in-variable (EIV)">errors-in-variable (EIV)</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20EIV" title=" false EIV"> false EIV</a>, <a href="https://publications.waset.org/abstracts/search?q=equation%20error" title=" equation error"> equation error</a>, <a href="https://publications.waset.org/abstracts/search?q=output%20error" title=" output error"> output error</a>, <a href="https://publications.waset.org/abstracts/search?q=iterative%20prefiltering" title=" iterative prefiltering"> iterative prefiltering</a>, <a href="https://publications.waset.org/abstracts/search?q=Gaussian%20noise" title=" Gaussian noise"> Gaussian noise</a> </p> <a href="https://publications.waset.org/abstracts/9427/parameter-estimation-of-false-dynamic-eiv-model-with-additive-uncertainty" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9427.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">491</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7057</span> True and False Cognates of Japanese, Chinese and Philippine Languages: A Contrastive Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jose%20Marie%20E.%20Ocdenaria">Jose Marie E. Ocdenaria</a>, <a href="https://publications.waset.org/abstracts/search?q=Riceli%20C.%20Mendoza"> Riceli C. Mendoza</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Culturally, languages meet, merge, share, exchange, appropriate, donate, and divide in and to and from each other. Further, this type of recurrence manifests in East Asian cultures, where language influence diffuses across geographical proximities. Historically, China has notable impacts on Japan’s culture. For instance, Japanese borrowed words from China and their way of reading and writing. This qualitative and descriptive employing contrastive analysis study addressed the true and false cognates of Japanese-Philippine languages and Chinese-Philippine languages. It involved a rich collection of data from various sources like textual pieces of evidence or corpora to gain a deeper understanding of true and false cognates between L1 and L2. Cognates of Japanese-Philippine languages and Chinese-Philippine languages were analyzed contrastively according to orthography, phonology, and semantics. The words presented were the roots; however, derivatives, reduplications, and variants of stress were included when they shed emphases on the comparison. The basis of grouping the cognates was its phonetic-semantic resemblance. Based on the analysis, it revealed that there are words which may have several types of lexical relationship. Further, the study revealed that the Japanese language has more false cognates in the Philippine languages, particularly in Tagalog and Cebuano. On the other hand, there are more true cognates of Chinese in Tagalog. It is the hope of this study to provide a significant contribution to a diverse audience. These include the teachers and learners of foreign languages such as Japanese and Chinese, future researchers and investigators, applied linguists, curricular theorists, community, and publishers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Contrastive%20Analysis" title="Contrastive Analysis">Contrastive Analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=Japanese" title=" Japanese"> Japanese</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinese%20and%20Philippine%20languages" title=" Chinese and Philippine languages"> Chinese and Philippine languages</a>, <a href="https://publications.waset.org/abstracts/search?q=Qualitative%20and%20descriptive%20study" title=" Qualitative and descriptive study"> Qualitative and descriptive study</a>, <a href="https://publications.waset.org/abstracts/search?q=True%20and%20False%20Cognates" title=" True and False Cognates"> True and False Cognates</a> </p> <a href="https://publications.waset.org/abstracts/121040/true-and-false-cognates-of-japanese-chinese-and-philippine-languages-a-contrastive-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/121040.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7056</span> The Role of Mobile Applications on Consumerism Case Study: Snappfood Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vajihe%20Fasihi">Vajihe Fasihi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the advancement of technology and the expansion of the Internet, a significant change in lifestyle and consumption can be seen in societies. The increasing number of mobile applications (such as SnappFood) has expanded the scope of using apps for wider access to services to citizens and meets the needs of a large number of citizens in the shortest time and with reasonable quality. First, this article seeks to understand the concept and function of the Internet distribution network on the Iranian society, which was investigated in a smaller sample (students of the Faculty of Social Sciences of the Tehran university ) and uses the semi-structured interview method, and then explores the concept of consumerism. The main issue of this research is the effect of mobile apps, especially SnappFood, on increasing consumption and the difference between real needs and false needs among consumers. The findings of this research show that the use of the mentioned program has been effective in increasing the false needs of the sample community and has led to the phenomenon of consumerism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=consumerism%20economics" title="consumerism economics">consumerism economics</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20needs" title=" false needs"> false needs</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=reel%20needs" title=" reel needs"> reel needs</a> </p> <a href="https://publications.waset.org/abstracts/178833/the-role-of-mobile-applications-on-consumerism-case-study-snappfood-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/178833.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">57</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7055</span> Multicenter Evaluation of the ACCESS Anti-HCV Assay on the DxI 9000 ACCESS Immunoassay Analyzer, for the Detection of Hepatitis C Virus Antibody</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dan%20W.%20Rhodes">Dan W. Rhodes</a>, <a href="https://publications.waset.org/abstracts/search?q=Juliane%20Hey"> Juliane Hey</a>, <a href="https://publications.waset.org/abstracts/search?q=Magali%20Karagueuzian"> Magali Karagueuzian</a>, <a href="https://publications.waset.org/abstracts/search?q=Florianne%20Martinez"> Florianne Martinez</a>, <a href="https://publications.waset.org/abstracts/search?q=Yael%20Sandowski"> Yael Sandowski</a>, <a href="https://publications.waset.org/abstracts/search?q=Vanessa%20Roulet"> Vanessa Roulet</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20Badawi"> Mahmoud Badawi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed-Amine%20Chakir"> Mohammed-Amine Chakir</a>, <a href="https://publications.waset.org/abstracts/search?q=Val%C3%A9rie%20Simon"> Valérie Simon</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%A9r%C3%A9mie%20Gautier"> Jérémie Gautier</a>, <a href="https://publications.waset.org/abstracts/search?q=Fran%C3%A7oise%20Le%20Boulaire"> Françoise Le Boulaire</a>, <a href="https://publications.waset.org/abstracts/search?q=Catherine%20Coignard"> Catherine Coignard</a>, <a href="https://publications.waset.org/abstracts/search?q=Claire%20Vincent"> Claire Vincent</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandrine%20Greaume"> Sandrine Greaume</a>, <a href="https://publications.waset.org/abstracts/search?q=Isabelle%20Voisin"> Isabelle Voisin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Beckman Coulter, Inc. (BEC) has recently developed a fully automated second-generation anti-HCV test on a new immunoassay platform. The objective of this multicenter study conducted in Europe was to evaluate the performance of the ACCESS anti-HCV assay on the recently CE-marked DxI 9000 ACCESS Immunoassay Analyzer as an aid in the diagnosis of HCV (Hepatitis C Virus) infection and as a screening test for blood and plasma donors. Methods: The clinical specificity of the ACCESS anti-HCV assay was determined using HCV antibody-negative samples from blood donors and hospitalized patients. Sample antibody status was determined by a CE-marked anti-HCV assay (Abbott ARCHITECTTM anti-HCV assay or Abbott PRISM HCV assay) with an additional confirmation method (Immunoblot testing with INNO-LIATM HCV Score - Fujirebio), if necessary, according to pre-determined testing algorithms. The clinical sensitivity was determined using known HCV antibody-positive samples, identified positive by Immunoblot testing with INNO-LIATM HCV Score - Fujirebio. HCV RNA PCR or genotyping was available on all Immunoblot positive samples for further characterization. The false initial reactive rate was determined on fresh samples from blood donors and hospitalized patients. Thirty (30) commercially available seroconversion panels were tested to assess the sensitivity for early detection of HCV infection. The study was conducted from November 2019 to March 2022. Three (3) external sites and one (1) internal site participated. Results: Clinical specificity (95% CI) was 99.7% (99.6 – 99.8%) on 5852 blood donors and 99.0% (98.4 – 99.4%) on 1527 hospitalized patient samples. There were 15 discrepant samples (positive on ACCESS anti-HCV assay and negative on both ARCHITECT and Immunoblot) observed with hospitalized patient samples, and of note, additional HCV RNA PCR results showed five (5) samples had positive HCV RNA PCR results despite the absence of HCV antibody detection by ARCHITECT and Immunoblot, suggesting a better sensitivity of the ACCESS anti-HCV assay with these five samples compared to the ARCHITECT and Immunoblot anti-HCV assays. Clinical sensitivity (95% CI) on 510 well-characterized, known HCV antibody-positive samples was 100.0% (99.3 – 100.0%), including 353 samples with known HCV genotypes (1 to 6). The overall false initial reactive rate (95% CI) on 6630 patient samples was 0.02% (0.00 – 0.09%). Results obtained on 30 seroconversion panels demonstrated that the ACCESS anti-HCV assay had equivalent sensitivity performances, with an average bleed difference since the first reactive bleed below one (1), compared to the ARCHITECTTM anti-HCV assay. Conclusion: The newly developed ACCESS anti-HCV assay from BEC for use on the DxI 9000 ACCESS Immunoassay Analyzer demonstrated high clinical sensitivity and specificity, equivalent to currently marketed anti-HCV assays, as well as a low false initial reactive rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DxI%209000%20ACCESS%20Immunoassay%20Analyzer" title="DxI 9000 ACCESS Immunoassay Analyzer">DxI 9000 ACCESS Immunoassay Analyzer</a>, <a href="https://publications.waset.org/abstracts/search?q=HCV" title=" HCV"> HCV</a>, <a href="https://publications.waset.org/abstracts/search?q=HCV%20antibody" title=" HCV antibody"> HCV antibody</a>, <a href="https://publications.waset.org/abstracts/search?q=Hepatitis%20C%20virus" title=" Hepatitis C virus"> Hepatitis C virus</a>, <a href="https://publications.waset.org/abstracts/search?q=immunoassay" title=" immunoassay"> immunoassay</a> </p> <a href="https://publications.waset.org/abstracts/152600/multicenter-evaluation-of-the-access-anti-hcv-assay-on-the-dxi-9000-access-immunoassay-analyzer-for-the-detection-of-hepatitis-c-virus-antibody" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152600.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7054</span> Multicenter Evaluation of the ACCESS HBsAg and ACCESS HBsAg Confirmatory Assays on the DxI 9000 ACCESS Immunoassay Analyzer, for the Detection of Hepatitis B Surface Antigen</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vanessa%20Roulet">Vanessa Roulet</a>, <a href="https://publications.waset.org/abstracts/search?q=Marc%20Turini"> Marc Turini</a>, <a href="https://publications.waset.org/abstracts/search?q=Juliane%20Hey"> Juliane Hey</a>, <a href="https://publications.waset.org/abstracts/search?q=St%C3%A9phanie%20Bord-Romeu"> Stéphanie Bord-Romeu</a>, <a href="https://publications.waset.org/abstracts/search?q=Emilie%20Bonzom"> Emilie Bonzom</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20Badawi"> Mahmoud Badawi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed-Amine%20Chakir"> Mohammed-Amine Chakir</a>, <a href="https://publications.waset.org/abstracts/search?q=Val%C3%A9rie%20Simon"> Valérie Simon</a>, <a href="https://publications.waset.org/abstracts/search?q=Vanessa%20Viotti"> Vanessa Viotti</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%A9r%C3%A9mie%20Gautier"> Jérémie Gautier</a>, <a href="https://publications.waset.org/abstracts/search?q=Fran%C3%A7oise%20Le%20Boulaire"> Françoise Le Boulaire</a>, <a href="https://publications.waset.org/abstracts/search?q=Catherine%20Coignard"> Catherine Coignard</a>, <a href="https://publications.waset.org/abstracts/search?q=Claire%20Vincent"> Claire Vincent</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandrine%20Greaume"> Sandrine Greaume</a>, <a href="https://publications.waset.org/abstracts/search?q=Isabelle%20Voisin"> Isabelle Voisin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Beckman Coulter, Inc. has recently developed fully automated assays for the detection of HBsAg on a new immunoassay platform. The objective of this European multicenter study was to evaluate the performance of the ACCESS HBsAg and ACCESS HBsAg Confirmatory assays† on the recently CE-marked DxI 9000 ACCESS Immunoassay Analyzer. Methods: The clinical specificity of the ACCESS HBsAg and HBsAg Confirmatory assays was determined using HBsAg-negative samples from blood donors and hospitalized patients. The clinical sensitivity was determined using presumed HBsAg-positive samples. Sample HBsAg status was determined using a CE-marked HBsAg assay (Abbott ARCHITECT HBsAg Qualitative II, Roche Elecsys HBsAg II, or Abbott PRISM HBsAg assay) and a CE-marked HBsAg confirmatory assay (Abbott ARCHITECT HBsAg Qualitative II Confirmatory or Abbott PRISM HBsAg Confirmatory assay) according to manufacturer package inserts and pre-determined testing algorithms. False initial reactive rate was determined on fresh hospitalized patient samples. The sensitivity for the early detection of HBV infection was assessed internally on thirty (30) seroconversion panels. Results: Clinical specificity was 99.95% (95% CI, 99.86 – 99.99%) on 6047 blood donors and 99.71% (95%CI, 99.15 – 99.94%) on 1023 hospitalized patient samples. A total of six (6) samples were found false positive with the ACCESS HBsAg assay. None were confirmed for the presence of HBsAg with the ACCESS HBsAg Confirmatory assay. Clinical sensitivity on 455 HBsAg-positive samples was 100.00% (95% CI, 99.19 – 100.00%) for the ACCESS HBsAg assay alone and for the ACCESS HBsAg Confirmatory assay. The false initial reactive rate on 821 fresh hospitalized patient samples was 0.24% (95% CI, 0.03 – 0.87%). Results obtained on 30 seroconversion panels demonstrated that the ACCESS HBsAg assay had equivalent sensitivity performances compared to the Abbott ARCHITECT HBsAg Qualitative II assay with an average bleed difference since first reactive bleed of 0.13. All bleeds found reactive in ACCESS HBsAg assay were confirmed in ACCESS HBsAg Confirmatory assay. Conclusion: The newly developed ACCESS HBsAg and ACCESS HBsAg Confirmatory assays from Beckman Coulter have demonstrated high clinical sensitivity and specificity, equivalent to currently marketed HBsAg assays, as well as a low false initial reactive rate. †Pending achievement of CE compliance; not yet available for in vitro diagnostic use. 2023-11317 Beckman Coulter and the Beckman Coulter product and service marks mentioned herein are trademarks or registered trademarks of Beckman Coulter, Inc. in the United States and other countries. All other trademarks are the property of their respective owners. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dxi%209000%20access%20immunoassay%20analyzer" title="dxi 9000 access immunoassay analyzer">dxi 9000 access immunoassay analyzer</a>, <a href="https://publications.waset.org/abstracts/search?q=hbsag" title=" hbsag"> hbsag</a>, <a href="https://publications.waset.org/abstracts/search?q=hbv" title=" hbv"> hbv</a>, <a href="https://publications.waset.org/abstracts/search?q=hepatitis%20b%20surface%20antigen" title=" hepatitis b surface antigen"> hepatitis b surface antigen</a>, <a href="https://publications.waset.org/abstracts/search?q=hepatitis%20b%20virus" title=" hepatitis b virus"> hepatitis b virus</a>, <a href="https://publications.waset.org/abstracts/search?q=immunoassay" title=" immunoassay"> immunoassay</a> </p> <a href="https://publications.waset.org/abstracts/164572/multicenter-evaluation-of-the-access-hbsag-and-access-hbsag-confirmatory-assays-on-the-dxi-9000-access-immunoassay-analyzer-for-the-detection-of-hepatitis-b-surface-antigen" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164572.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=236">236</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=237">237</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=false%20positive&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>