Search results for: deceptive jamming
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 41

Search results for: deceptive jamming

11 A Supervised Approach for Detection of Singleton Spam Reviews

Authors: Atefeh Heydari, Mohammadali Tavakoli, Naomie Salim

Abstract:

In recent years, we have witnessed that online reviews are the most important source of customers’ opinion. They are progressively more used by individuals and organisations to make purchase and business decisions. Unfortunately, for the reason of profit or fame, frauds produce deceptive reviews to hoodwink potential customers. Their activities mislead not only potential customers to make appropriate purchasing decisions and organisations to reshape their business, but also opinion mining techniques by preventing them from reaching accurate results. Spam reviews could be divided into two main groups, i.e. multiple and singleton spam reviews. Detecting a singleton spam review that is the only review written by a user ID is extremely challenging due to lack of clue for detection purposes. Singleton spam reviews are very harmful and various features and proofs used in multiple spam reviews detection are not applicable in this case. Current research aims to propose a novel supervised technique to detect singleton spam reviews. To achieve this, various features are proposed in this study and are to be combined with the most appropriate features extracted from literature and employed in a classifier. In order to compare the performance of different classifiers, SVM and naive Bayes classification algorithms were used for model building. The results revealed that SVM was more accurate than naive Bayes and our proposed technique is capable to detect singleton spam reviews effectively.

Keywords: classification algorithms, Naïve Bayes, opinion review spam detection, singleton review spam detection, support vector machine

Procedia PDF Downloads 293
10 Accuracy of Autonomy Navigation of Unmanned Aircraft Systems through Imagery

Authors: Sidney A. Lima, Hermann J. H. Kux, Elcio H. Shiguemori

Abstract:

The Unmanned Aircraft Systems (UAS) usually navigate through the Global Navigation Satellite System (GNSS) associated with an Inertial Navigation System (INS). However, GNSS can have its accuracy degraded at any time or even turn off the signal of GNSS. In addition, there is the possibility of malicious interferences, known as jamming. Therefore, the image navigation system can solve the autonomy problem, because if the GNSS is disabled or degraded, the image navigation system would continue to provide coordinate information for the INS, allowing the autonomy of the system. This work aims to evaluate the accuracy of the positioning though photogrammetry concepts. The methodology uses orthophotos and Digital Surface Models (DSM) as a reference to represent the object space and photograph obtained during the flight to represent the image space. For the calculation of the coordinates of the perspective center and camera attitudes, it is necessary to know the coordinates of homologous points in the object space (orthophoto coordinates and DSM altitude) and image space (column and line of the photograph). So if it is possible to automatically identify in real time the homologous points the coordinates and attitudes can be calculated whit their respective accuracies. With the methodology applied in this work, it is possible to verify maximum errors in the order of 0.5 m in the positioning and 0.6º in the attitude of the camera, so the navigation through the image can reach values equal to or higher than the GNSS receivers without differential correction. Therefore, navigating through the image is a good alternative to enable autonomous navigation.

Keywords: autonomy, navigation, security, photogrammetry, remote sensing, spatial resection, UAS

Procedia PDF Downloads 173
9 Lying Decreases Relying: Deceiver's Distrust in Online Restaurant Reviews

Authors: Jenna Barriault, Reeshma Haji

Abstract:

Online consumer behaviourand reliance on online reviews may be more pervasive than ever, andthis necessitates a better scientific understanding of the widespread phenomenon of online deception. The present research focuses on the understudied topic of deceiver’s distrust, where those who engage in deception later have less trust in others in the context of online restaurant reviews. The purpose was to examine deception and valence in online restaurant reviews and the effects they had on deceiver’s distrust. Undergraduate university students (N = 76) completed an online study where valence was uniquely manipulated by telling participants that either positive (or negative reviews) were influential and asking them to write a correspondingly valenced review. Deception was manipulated in the same task. Participants in the deception condition were asked to write an online restaurant review that was counter to their actual experience of the restaurant (negative review of a restaurant they liked, positive review of the restaurant they did not like). In the no deception condition, participants were asked to write a review that they actually liked or didn’t like (based on the valence condition to which they were randomly assigned). Participants’ trust was then assessed through various measures, includingfuture reliance on online reviews. There was a main effect of deception on reliance on online reviews. Consistent with deceiver’s distrust, those who deceived reported that they would rely less on online reviews. This study demonstrates that even when participants are induced to write a deceptive review, it can result in deceiver’s distrust, thereby lowering their trust in online reviews. If trust or reliance can be altered through deception in online reviews, people may start questioning the objectivity or true representation of a company based on such reviews. A primary implication is that people may reduce theirreliance upon online reviews if they know they are easily subject to manipulation. The findings of this study also contribute to the limited research regarding deceiver’s distrust in an online context, and further research is clarifying the specific conditions in which it is most likely to occur.

Keywords: deceiver’s distrust, deception, online reviews, trust, valence

Procedia PDF Downloads 109
8 Human Rights and Fundamental Freedoms in Crisis as Viewed during Bangladesh Parliamentary Election-2018 and Afterwards: A Contestant's Perspective on Social Measures

Authors: Mohammad S. Islam

Abstract:

Elections in Bangladesh are always controversial, and sometimes it becomes a violent affair when state power is combined with politics. Despite the commitment of the ruling party- the polling government to ensure free, fair, and credible elections, the participants of opposition parties and the general voters became very disappointed, terribly frustrated, and severely shocked. It happened when numerous claims of serious irregularities of vote rigging and violence came out in broad daylight during the election. This paper addresses the issues of how the ruling party created frightening and a horror situation to make people silent over electoral fraud and violent incidents, including gang rape. It also seeks to demonstrate that election-2018 was simply the deceptive action of the ruling party to legitimate their power, but not to provide a minimum opportunity for voters to exercise their fundamental right to vote. The fundamental freedom and the rule of law seemed to be ignored completely in this election process and afterwards. With the help of state machinery, the government of the ruling party violated human rights, restricted fundamental freedoms, and humiliated social protection & dignity. The contestant’s views as witnessed and relevant literatures are cited first for conceptual understanding. Then, the paper will examine how a new dimension of circumstantial social measures related to sustained protection can reduce all kinds of violence against humanity towards establishing a peaceful democratic society. Finally, this paper interprets the key findings and considers wider implications.

Keywords: electoral fraud, human rights, sustained protection, social measures, vote rigging

Procedia PDF Downloads 180
7 Flipped Classroom in Bioethics Education: A Blended and Interactive Online Learning Courseware That Enhances Active Learning and Student Engagement

Authors: Molly Pui Man Wong

Abstract:

In this study, a blended and interactive e-learning Courseware that our team developed will be introduced, and our team’s experiences on how the e-learning Courseware and the flipped classroom benefit student learning in bioethics in the medical program will be shared. This study is a continuation of the previously established study, which provides a summary of the well-developed e-learning Courseware in a blended learning approach and an update on its efficiency and efficacy. First, a collection of animated videos capturing selected topics of bioethics and related ethical issues and dilemma will be introduced. Next, a selection of problem-based learning videos (“simulated doctor-patient role play”) with pop-up questions and discussions will be further discussed. Our recent findings demonstrated that these activities launched by the Courseware strongly engaged students in bioethics education and enhanced students’ critical thinking and creativity, which were consistent with the previous data in the preliminary studies. Moreover, the educational benefits of the online art exhibition, art jamming, and competition will be discussed, through which students could express bioethics through arts and enrich their learning in medical research in an interactive, fun, and entertaining way, strengthening their interests in bioethics. Furthermore, online survey questionnaires and focus group interviews were conducted. Consistent with the preliminary studies, our results indicated that implementing the e-learning Courseware with a flipped classroom in bioethics education enhanced both active learning and student engagement. In conclusion, our Courseware not only reinforces education in art, bioethics, and medicine but also benefits students in understanding and critical thinking in socio-ethical issues and serves as a valuable learning tool in bioethics teaching and learning.

Keywords: bioethics, courseware, e-learning, flipped classroom

Procedia PDF Downloads 114
6 Spatial Analytics of Ramayan to Geolocate Lanka

Authors: Raj Mukta Sundaram

Abstract:

The location of Ayodhya is distinctly described along river Sarayu in the epic Ramayan. On the contrary, even elaborate descriptions of Lanka and its environs are still proving elusive to human ingenuity to find a direct correlation on the ground. His-torically, there were hardly any attempts to locate Lanka, but some speculations have been made very recently, of which Sri Lanka has gained widespread public ac-ceptance for obvious reasons, such as Sri and Lanka. This belief is almost secured by the impression of Ram Setu on the satellite images, which has led the government to initiate a scientific mission to determine its age. In fact, other viewpoints believe Lanka to be somewhere far-flung along the equator, and another has long proclaimed it to be in central regions of India, but both are diminished by contemporary belief. This study emanates from the fact that Sri Lanka has no correlation to epic, and more importantly, satellite images are deceptive. So the objectives are twofold - firstly, to interpret the text from a holistic approach by analyzing the ecosystem, settlements, geological as-pects, and most importantly, the timeline of key events. Secondly, it explains the pit-falls in the rationale behind contemporary belief. At the outset, it categorically rejects the notion of Ram Setu, which, in geological terms, is merely a part of the continental shelf developed millions of years ago. It also refutes the misconception created by the word “Sri,” which is, in fact, an official name adopted by the country in the seventies with no correlation whatsoever with the events of Ramayana. Likewise, the study ar-gues for the establishment of a prosperous kingdom on a remote island with adverse climatic conditions for any civilization at that time. Eventually, the study demonstrates that travel time for the distances covered by Lord Rama does not corroborate with the description in the epic. It all leads to one conclusion that Lanka cannot be in Sri Lanka. Rather, it needs to be somewhere in the central-eastern parts of India. That region jus-tifies the environs and timelines for the journeys undertaken by Lord Rama, besides the fact that the tribes of the region show strong allegiance to Ravana. The study strongly recommends looking into the central-east region of India for the golden abode of a demon king and rejuvenating tourism of a scenic and culturally rich region hitherto marred by disturbances.

Keywords: spatial analysis, Ramayan, heritage, tourism

Procedia PDF Downloads 46
5 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 456
4 Population Centralization in Urban Area and Metropolitans in Developing Countries: A Case Study of Urban Centralization in Iran

Authors: Safar Ghaedrahmati, Leila Soltani

Abstract:

Population centralization in urban area and metropolitans, especially in developing countries such as Iran increase metropolitan's problems. For few decades, the population of cities in developing countries, including Iran had a higher growth rate than the total growth rate of countries’ population. While in developed countries, the development of the big cities began decades ago and generally allowed for controlled and planned urban expansion, the opposite is the case in developing countries, where rapid urbanization process is characterized by an unplanned existing urban expansion. The developing metropolitan cities have enormous difficulties in coping both with the natural population growth and the urban physical expansion. Iranian cities are usually the heart of economic and cultural changes that have occurred after the Islamic revolution in 1979. These cities are increasingly having impacts via political–economical arrangement and chiefly by urban management structures. Structural features have led to the population growth of cities and urbanization (in number, population and physical frame) and the main problems in them. On the other hand, the lack of birth control policies and the deceptive attractions of cities, particularly big cities, and the birth rate has shot up, something which has occurred mainly in rural regions and small cities. The population of Iran has increased rapidly since 1956. The 1956 and 1966 decennial censuses counted the population of Iran at 18.9 million and 25.7 million, respectively, with a 3.1% annual growth rate during the 1956–1966 period. The 1976 and 1986 decennial censuses counted Iran’s population at 33.7 and 49.4 million, respectively, a 2.7% and 3.9% annual growth rate during the 1966–1976 and 1976–1986 periods. The 1996 count put Iran’s population at 60 million, a 1.96% annual growth rate from 1986–1996 and the 2006 count put Iran population at 72 million. A recent major policy of urban economic and industrial decentralization is a persistent program of the government. The policy has been identified as a result of the massive growth of Tehran in the recent years, up to 9 million by 2010. Part of the growth of the capitally resulted from the lack of economic opportunities elsewhere and in order to redress the developing primacy of Tehran and the domestic pressures which it is undergoing, the policy of decentralization is to be implemented as quickly as possible. Type of research is applied and method of data collection is documentary and methods of analysis are; population analysis with urban system analysis and urban distribution system

Keywords: population centralization, cities of Iran, urban centralization, urban system

Procedia PDF Downloads 287
3 Reading as Moral Afternoon Tea: An Empirical Study on the Compensation Effect between Literary Novel Reading and Readers’ Moral Motivation

Authors: Chong Jiang, Liang Zhao, Hua Jian, Xiaoguang Wang

Abstract:

The belief that there is a strong relationship between reading narrative and morality has generally become the basic assumption of scholars, philosophers, critics, and cultural critics. The virtuality constructed by literary novels inspires readers to regard the narrative as a thinking experiment, creating the distance between readers and events so that they can freely and morally experience the positions of different roles. Therefore, the virtual narrative combined with literary characteristics is always considered as a "moral laboratory." Well-established findings revealed that people show less lying and deceptive behaviors in the morning than in the afternoon, called the morning morality effect. As a limited self-regulation resource, morality will be constantly depleted with the change of time rhythm under the influence of the morning morality effect. It can also be compensated and restored in various ways, such as eating, sleeping, etc. As a common form of entertainment in modern society, literary novel reading gives people more virtual experience and emotional catharsis, just as a relaxing afternoon tea that helps people break away from fast-paced work, restore physical strength, and relieve stress in a short period of leisure. In this paper, inspired by the compensation control theory, we wonder whether reading literary novels in the digital environment could replenish a kind of spiritual energy for self-regulation to compensate for people's moral loss in the afternoon. Based on this assumption, we leverage the social annotation text content generated by readers in digital reading to represent the readers' reading attention. We then recognized the semantics and calculated the readers' moral motivation expressed in the annotations and investigated the fine-grained dynamics of the moral motivation changing in each time slot within 24 hours of a day. Comprehensively comparing the division of different time intervals, sufficient experiments showed that the moral motivation reflected in the annotations in the afternoon is significantly higher than that in the morning. The results robustly verified the hypothesis that reading compensates for moral motivation, which we called the moral afternoon tea effect. Moreover, we quantitatively identified that such moral compensation can last until 14:00 in the afternoon and 21:00 in the evening. In addition, it is interesting to find that the division of time intervals of different units impacts the identification of moral rhythms. Dividing the time intervals by four-hour time slot brings more insights of moral rhythms compared with that of three-hour and six-hour time slot.

Keywords: digital reading, social annotation, moral motivation, morning morality effect, control compensation

Procedia PDF Downloads 137
2 TRAC: A Software Based New Track Circuit for Traffic Regulation

Authors: Jérôme de Reffye, Marc Antoni

Abstract:

Following the development of the ERTMS system, we think it is interesting to develop another software-based track circuit system which would fit secondary railway lines with an easy-to-work implementation and a low sensitivity to rail-wheel impedance variations. We called this track circuit 'Track Railway by Automatic Circuits.' To be internationally implemented, this system must not have any mechanical component and must be compatible with existing track circuit systems. For example, the system is independent from the French 'Joints Isolants Collés' that isolate track sections from one another, and it is equally independent from component used in Germany called 'Counting Axles,' in French 'compteur d’essieux.' This track circuit is fully interoperable. Such universality is obtained by replacing the train detection mechanical system with a space-time filtering of train position. The various track sections are defined by the frequency of a continuous signal. The set of frequencies related to the track sections is a set of orthogonal functions in a Hilbert Space. Thus the failure probability of track sections separation is precisely calculated on the basis of signal-to-noise ratio. SNR is a function of the level of traction current conducted by rails. This is the reason why we developed a very powerful algorithm to reject noise and jamming to obtain an SNR compatible with the precision required for the track circuit and SIL 4 level. The SIL 4 level is thus reachable by an adjustment of the set of orthogonal functions. Our major contributions to railway engineering signalling science are i) Train space localization is precisely defined by a calibration system. The operation bypasses the GSM-R radio system of the ERTMS system. Moreover, the track circuit is naturally protected against radio-type jammers. After the calibration operation, the track circuit is autonomous. ii) A mathematical topology adapted to train space localization by following the train through a linear time filtering of the received signal. Track sections are numerically defined and can be modified with a software update. The system was numerically simulated, and results were beyond our expectations. We achieved a precision of one meter. Rail-ground and rail-wheel impedance sensitivity analysis gave excellent results. Results are now complete and ready to be published. This work was initialised as a research project of the French Railways developed by the Pi-Ramses Company under SNCF contract and required five years to obtain the results. This track circuit is already at Level 3 of the ERTMS system, and it will be much cheaper to implement and to work. The traffic regulation is based on variable length track sections. As the traffic growths, the maximum speed is reduced, and the track section lengths are decreasing. It is possible if the elementary track section is correctly defined for the minimum speed and if every track section is able to emit with variable frequencies.

Keywords: track section, track circuits, space-time crossing, adaptive track section, automatic railway signalling

Procedia PDF Downloads 318
1 The Dependence of Carbonate Pore Geometry on Fossils: Examples from Zechstein, Poland

Authors: Adam Fheed

Abstract:

Carbonate porosity can be deceptive in the aspect of hydrocarbon exploration due to pore geometry variations, which are to some extent controlled by fossils. Therefore, the main aim of this paper was to assess the dependence of pore geometry and reservoir quality on fossils. The Permian Zechstein Limestone (Ca1) carbonates from the Brońsko Reef, located on the Wolsztyn Ridge in West Poland, were examined. Seventy meters of drill cores were described along with well log examination and transmitted-light microscope research. The archival porosity-permeability data was utilized to calibrate the well logs and look for the potential petrophysical trends. Several organism assemblages were recognized in the reef. Its bottom was colonized by the branched bryozoans which were fragmented and dissolved leaving poorly connected molds. Subsequently, numerous bivalves and gastropods appeared and their shells were heavily dissolved to form huge, albeit poorly communicated caverns. Such pores were also typical for local brachiopod occurrences. Although the caverns were widespread, and probably linked to the meteoric dissolution or freshwater flushing, severe anhydrite cementation has destroyed the majority of pores. Close to the top of Ca1, near the center of the reef, the fossil-rich zone comprising fenestrate bryozoans, extremely abundant encrusting foraminifers, bivalves, brachiopods, gastropods and ostracods, was identified. The zone contained extremely frequent dissolution channels formed within former shells of foraminifers, which had previously encrusted the bryozoans. The deposition of Ca1 strata has ultimately terminated with a poorly porous and generally impermeable stromatolitic layer containing scarce fossils. In general, the permeability of the reef rocks studied turned out to be the highest under the presence of foraminifer-related channels. In such cases, it frequently approached 100 mD. The presence of channels and other pores gave the average effective porosity derived from shallow resistivity and helium porosimetry of around 16 and 18 %, respectively. The highest porosity (over 18 %), often co-occurring with relatively low permeability (chiefly below 20 mD) was noted for the bottommost zone of the reef, represented by branched bryozoans. This is probably owing to a large amount of unconnected bryozoan-related molds. It was concluded that fossils played a major role in porosity formation and controlled the pore geometry significantly. While the dissolution of bivalves and brachiopods resulted in cavernous porosity formation, numerous molds were typically related with the alteration of branched bryozoans, gastropods and ostracods. Importantly, the bendy dissolution channels after the encrusting foraminifers appeared to be decisive in improving reservoir quality – specifically when permeability is considered. Acknowledgment: The research was financed by the Polish National Science Centre’s project No. UMO-2016/23/N/ST10/00350.

Keywords: dissolution channels, fossils, Permian, porosity

Procedia PDF Downloads 81