Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

Search Results (149)

Search Parameters:
Keywords = ambiguity sharing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 2132 KiB  
Article
Sharing Information and Threshold Ambiguity in Public Bads Prevention
by Islam Md Tawhidul, Kenta Tanaka and Koji Kotani
World 2025, 6(1), 7; https://doi.org/10.3390/world6010007 - 1 Jan 2025
Viewed by 525
Abstract
Public bads prevention problems, such as climate change, require people to cooperate above a certain threshold, which is ambiguous and varies in many situations. In that case, people conjecture and share some information about the threshold. However, little is known about how sharing [...] Read more.
Public bads prevention problems, such as climate change, require people to cooperate above a certain threshold, which is ambiguous and varies in many situations. In that case, people conjecture and share some information about the threshold. However, little is known about how sharing such information affects people to cooperate. We experimentally examine how people’s cooperative choices are influenced by ambiguity and sharing information about the conjectures in public bads prevention, hypothesizing that sharing the information does not necessarily contribute to cooperation. We conduct the laboratory experiments with 400 subjects under five treatments, each of which differs in ambiguity as well as in presence or absence of sharing the information. We find that (i) the percentages of cooperative choices are nonmonotonic, decreasing and then increasing over ambiguity levels and (ii) sharing the information tends to uniformly discourage cooperation, and the negative impact becomes prominent as the ambiguity levels rise. The result demonstrates an adverse effect between sharing information and threshold ambiguity on cooperation, being in sharp contrast with the literature. Overall, this study suggests that how or what information is shared among people should be carefully reconsidered for resolving any public bads problem involving threshold ambiguity, as everybody is able to easily publicize their conjectures during an era of digital democracy. Additionally, providing unified public information or fostering agreement could help improve cooperation and enhance collective efforts in public bads prevention. Full article
Show Figures

Figure 1

Figure 1
<p>A flow chart of experimental procedures for a subject to participate in one session (for Base, Amb, and Amb_info treatments).</p>
Full article ">Figure 2
<p>Percentages of cooperative choices over 10 rounds across treatments in comparison to Base: (<b>a</b>) Ambiguity and sharing info; (<b>b</b>) Wide ambiguity and sharing info.</p>
Full article ">Figure 3
<p>Percentages of successful public bads prevention across treatments.</p>
Full article ">
20 pages, 1352 KiB  
Article
Microelement Integration Drives Smart Manufacturing: A Mixed Method Study
by Chenguang Li, Jingtong Gong, Tao Fu and Zhiguo Liang
Systems 2024, 12(12), 577; https://doi.org/10.3390/systems12120577 - 19 Dec 2024
Viewed by 542
Abstract
Smart manufacturing is an important initiative to promote the transformation and upgrading of industries and the high-quality development of the economy. However, the current situation of digitalized smart transformation in manufacturing enterprises is not optimistic, which is primarily attributed to the ambiguity surrounding [...] Read more.
Smart manufacturing is an important initiative to promote the transformation and upgrading of industries and the high-quality development of the economy. However, the current situation of digitalized smart transformation in manufacturing enterprises is not optimistic, which is primarily attributed to the ambiguity surrounding the pathways. This study is based on the technology-organization-environment-individual (TOE-I) analytical framework; it selects 20 case studies of advanced manufacturing enterprises; and employs case studies and necessary condition fuzzy set qualitative comparative research methods (NCA and fsQCA) to investigate the pathways through which technology, organization, the environment, and individual microelements synergistically drive smart manufacturing from a configurational perspective. The study reveals that digital technology breakthroughs, digital infrastructure, digital talent, digital sharing, organizational resilience, organizational culture, and the entrepreneurial spirit are the core influencing factors in advancing smart manufacturing for manufacturing enterprises, and four implementation paths driven by smart manufacturing are analyzed. Among them, digital technology breakthroughs and digital infrastructure have a potential substitutive relationship in the “technology + talent” empowerment organizational model. Organizational resilience, organizational culture, and the entrepreneurial spirit are important safeguards for successful advancements in smart manufacturing. In contrast, digital infrastructure plays a more indirect, supporting role. Accordingly, this paper provides theoretical reference and practical guidance. Full article
(This article belongs to the Special Issue Management and Simulation of Digitalized Smart Manufacturing Systems)
Show Figures

Figure 1

Figure 1
<p>The analysis process underlying the research approach.</p>
Full article ">Figure 2
<p>Number of topics and coherence scores.</p>
Full article ">Figure 3
<p>Configuration model.</p>
Full article ">
27 pages, 4376 KiB  
Article
A Unified Mission Ontology Based on Systematic Integration of Interdisciplinary Concepts
by Zelalem Mihret Belay and Jakob Axelsson
Systems 2024, 12(12), 567; https://doi.org/10.3390/systems12120567 - 16 Dec 2024
Viewed by 484
Abstract
The concept of a mission is important to system design and development, especially in system of systems (SoS) engineering. However, the diverse usage of the term ’mission’ across disciplines often results in ambiguity regarding its role in practical applications in mission-centric engineering tasks. [...] Read more.
The concept of a mission is important to system design and development, especially in system of systems (SoS) engineering. However, the diverse usage of the term ’mission’ across disciplines often results in ambiguity regarding its role in practical applications in mission-centric engineering tasks. Clearly defined and precisely represented missions improve communication among stakeholders and help bridge interdisciplinary gaps. This study aims to investigate and analyze the state of the art for mission conceptualizations and representations and proposes a unified mission ontology (UMO) that improves semantic interoperability across various domains. To achieve this goal, we conducted a systematic literature review (SLR) to examine how missions are conceptualized and represented, analyzed the findings to obtain insight about cross-domain concepts related to missions, and developed a UMO that can be adapted to domain specific applications. The UMO facilitates semantic interoperability across domains through a high-level abstraction of shared concepts. To validate the comprehensiveness and adaptability of the UMO, we conducted coverage analysis using semantic similarity estimates to assess the equivalence of ontological concepts. This evaluation quantified the extent to which concepts from various domain-specific ontologies, including the mission engineering guideline, align with those in the UMO. Full article
(This article belongs to the Special Issue System of Systems Engineering)
Show Figures

Figure 1

Figure 1
<p>Overall research approach.</p>
Full article ">Figure 2
<p>Primary study selection process.</p>
Full article ">Figure 3
<p>Concept co-occurrence with mission.</p>
Full article ">Figure 4
<p>High co-occurrence concepts with mission from primary references R1 [<a href="#B14-systems-12-00567" class="html-bibr">14</a>], R2 [<a href="#B18-systems-12-00567" class="html-bibr">18</a>,<a href="#B19-systems-12-00567" class="html-bibr">19</a>], R3 [<a href="#B17-systems-12-00567" class="html-bibr">17</a>], R4 [<a href="#B22-systems-12-00567" class="html-bibr">22</a>], R5 [<a href="#B20-systems-12-00567" class="html-bibr">20</a>], R6 [<a href="#B23-systems-12-00567" class="html-bibr">23</a>], R7 [<a href="#B21-systems-12-00567" class="html-bibr">21</a>], R8 [<a href="#B16-systems-12-00567" class="html-bibr">16</a>], R9 [<a href="#B31-systems-12-00567" class="html-bibr">31</a>], R10 [<a href="#B30-systems-12-00567" class="html-bibr">30</a>] and R11 [<a href="#B15-systems-12-00567" class="html-bibr">15</a>].</p>
Full article ">Figure 5
<p>Verification and validation techniques used by primary studies.</p>
Full article ">Figure 6
<p>A mission representation based on the major mission-related concepts and their relationships taken from the DoD frameworks and glossary.</p>
Full article ">Figure 7
<p>Revised mission representation based on [<a href="#B17-systems-12-00567" class="html-bibr">17</a>,<a href="#B22-systems-12-00567" class="html-bibr">22</a>] conceptualization (a UML class diagram).</p>
Full article ">Figure 8
<p>Revised mission representation based on [<a href="#B18-systems-12-00567" class="html-bibr">18</a>,<a href="#B19-systems-12-00567" class="html-bibr">19</a>,<a href="#B20-systems-12-00567" class="html-bibr">20</a>] conceptualization.</p>
Full article ">Figure 9
<p>Revised mission representation based on [<a href="#B15-systems-12-00567" class="html-bibr">15</a>,<a href="#B24-systems-12-00567" class="html-bibr">24</a>] conceptualization—a unified mission ontology (UMO).</p>
Full article ">Figure 10
<p>Mission engineering guide conceptual model based on mission conduction processes elements.</p>
Full article ">Figure 11
<p>Mission model diagram.</p>
Full article ">Figure 12
<p>Mission ontology based on MEG mission conceptualization.</p>
Full article ">
32 pages, 3135 KiB  
Review
Non-IID Medical Imaging Data on COVID-19 in the Federated Learning Framework: Impact and Directions
by Fatimah Saeed Alhafiz and Abdullah Ahmad Basuhail
COVID 2024, 4(12), 1985-2016; https://doi.org/10.3390/covid4120140 - 16 Dec 2024
Viewed by 552
Abstract
After first appearing in December 2019, coronavirus disease 2019 (COVID-19) spread rapidly, leading to global effects and significant risks to health systems. The virus’s high replication competence in the human lung accelerated the severity of lung pneumonia cases, resulting in a catastrophic death [...] Read more.
After first appearing in December 2019, coronavirus disease 2019 (COVID-19) spread rapidly, leading to global effects and significant risks to health systems. The virus’s high replication competence in the human lung accelerated the severity of lung pneumonia cases, resulting in a catastrophic death rate. Variable observations in the clinical testing of virus-related and patient-related cases across different populations led to ambiguous results. Medical and epidemiological studies on the virus effectively use imaging and scanning devices to help explain the virus’s behavior and its impact on the lungs. Varying equipment resources and a lack of uniformity in medical imaging acquisition led to disorganized and widely dispersed data collection worldwide, while high heterogeneity in datasets caused a poor understanding of the virus and related strains, consequently leading to unstable results that could not be generalized. Hospitals and medical institutions, therefore, urgently need to collaborate to share and extract useful knowledge from these COVID-19 datasets while preserving the privacy of medical records. Researchers are turning to an emerging technology that enhances the reliability and accessibility of information without sharing actual patient data. Federated learning (FL) is a technique that learns distributed data locally, sharing only the weights of each local model to compute a global model, and has the potential to improve the generalization of diagnosis and treatment decisions. This study investigates the applicability of FL for COVID-19 under the impact of data heterogeneity, defining the lung imaging characteristics and identifying the practical constraints of FL in medical fields. It describes the challenges of implementation from a technical perspective, with reference to valuable research directions, and highlights the research challenges that present opportunities for further efforts to overcome the pitfalls of distributed learning performance. The primary objective of this literature review is to provide valuable insights that will aid in the formulation of effective technical strategies to mitigate the impact of data heterogeneity on the generalization of FL results, particularly in light of the ongoing and evolving COVID-19 pandemic. Full article
Show Figures

Figure 1

Figure 1
<p>Training techniques for distributed data: (<b>a</b>) individual training technique, (<b>b</b>) centralizing technique, and (<b>c</b>) federated learning technique.</p>
Full article ">Figure 2
<p>The algorithm of central FL architecture.</p>
Full article ">Figure 3
<p>The algorithm of peer-to-peer architecture.</p>
Full article ">Figure 4
<p>Skewness type examples including (<b>a</b>) quantity skew example, (<b>b</b>) label distribution skew example, (<b>c</b>) extreme label skew example, (<b>d</b>) acquisition protocol skew example, (<b>e</b>) modality skew, and (<b>f</b>) feature skew example.</p>
Full article ">Figure 5
<p>The number of investigations of skewness types and the impact of each on the FL performance (collected from considered papers, as referred to in each skewness-type section).</p>
Full article ">Figure 6
<p>Type of lung imaging dataset modalities used in FL framework for COVID-19.</p>
Full article ">Figure 7
<p>The average accuracy of the models that correspond to the skewness type.</p>
Full article ">
19 pages, 298 KiB  
Article
Low Transitive Constructions as Typical Clauses in English: A Case Study of the Functions of Clauses with the Nonverbal Predicate be in Stance Displays
by Patricia Mayes
Languages 2024, 9(12), 372; https://doi.org/10.3390/languages9120372 - 6 Dec 2024
Viewed by 552
Abstract
Low transitive constructions are ubiquitous in English conversation and as such can be considered “typical” clauses. This article furthers this claim by showing that these constructions are also most frequent in a different genre: arguments between participants at organized protests. It has been [...] Read more.
Low transitive constructions are ubiquitous in English conversation and as such can be considered “typical” clauses. This article furthers this claim by showing that these constructions are also most frequent in a different genre: arguments between participants at organized protests. It has been argued that one reason these constructions are so frequent is that they function to display participants’ stances. Arguments are a type of interaction where stance displays abound. In fact, they are defined as sequences of utterances that display opposing stances. Thus, the study goes on to examine how the most frequent of the low transitive constructions in the data—clauses with the nonverbal predicate be—function to display opposition across utterances. Du Bois has analyzed stance as resonance across utterances, created from structural parallelism, and he argues that slight changes between linguistic forms can create differing focal points that index contrasts. This framework is used to analyze how participants use the multiple semantic functions of be clauses across interactional sequences to display and modify their stances in response to their opponent. It is suggested that the versatility and ambiguity of be clauses are especially useful in arguments where participants do not share a set of common beliefs. Full article
(This article belongs to the Special Issue (A)typical Clauses across Languages)
22 pages, 1124 KiB  
Article
Improved Banzhaf Value Based on Participant’s Triangular Fuzzy Number-Weighted Excess Contributions and Its Application in Manufacturing Supply Chain Coalitions
by Jiacai Liu, Shiying Liu, Rongji Lai and Qingfan Lin
Symmetry 2024, 16(12), 1593; https://doi.org/10.3390/sym16121593 - 29 Nov 2024
Viewed by 533
Abstract
Intense market competition has driven small- and medium-sized enterprises (SMEs) in the manufacturing sector to collaborate and form supply chain coalitions, which can improve the information flow and resource sharing and significantly enhance supply chain management efficiency. However, the distribution of cooperative benefits [...] Read more.
Intense market competition has driven small- and medium-sized enterprises (SMEs) in the manufacturing sector to collaborate and form supply chain coalitions, which can improve the information flow and resource sharing and significantly enhance supply chain management efficiency. However, the distribution of cooperative benefits poses a core challenge for the long-term stability of coalitions. This paper addresses the impact of dynamic changes in complex business environments by utilizing triangular fuzzy numbers to represent the value of coalition, effectively depicting the uncertainty and ambiguity in the cooperation process. Compared to traditional models (which do not use triangular fuzzy numbers), this model is better suited to dynamic changes, offering flexible response mechanisms that ensure adaptability and fairness in the decision-making process. In addition, considering the influence of each member’s weight in the coalition, the fuzzy comprehensive evaluation method is used to determine the weights. With the goal of minimizing the dissatisfaction of enterprises in benefit distribution, a least square contribution with triangular fuzzy numbers is constructed to replace the marginal contribution of the classical Banzhaf value, and an improved Banzhaf value based on the player’s triangular fuzzy number-weighted excess contribution is proposed to arrive at a fair and reasonable benefit allocation strategy in order to enhance the long-term stability and cooperative benefits of coalition. By analyzing an example of the supply chain coalition, the effectiveness of the proposed improved Banzhaf value is verified, which satisfies the uniqueness, the individual rationality, and the group rationality. It not only promotes the level of risk management and decision making under the uncertainty conditions of complex business, but also deepens the theoretical foundation of cooperative game theory and expands its possibilities in practical applications and future development. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

Figure 1
<p>Coalition of suppliers, manufacturers, and 3PL companies.</p>
Full article ">Figure 2
<p>Three-parameter comparison of benefit distribution results (in millions of dollars, USD).</p>
Full article ">Figure 3
<p>Analogous results of benefit distribution (in millions of dollars, USD).</p>
Full article ">
11 pages, 661 KiB  
Article
Religious Education (RE) as a Context: The Subcultures That Shape Teacher’s Work When Teaching This Subject in Australian Catholic Secondary Schools
by Brendan Hyde and Anthony Sylvester Anning
Religions 2024, 15(12), 1442; https://doi.org/10.3390/rel15121442 - 27 Nov 2024
Viewed by 588
Abstract
Religious Education (RE) can be conceived of as a specific context within which secondary RE teachers from diverse backgrounds teach. This context gives rise to distinctive subject subcultures, characterised by a unique set of beliefs, norms, and practices that are shared by teachers [...] Read more.
Religious Education (RE) can be conceived of as a specific context within which secondary RE teachers from diverse backgrounds teach. This context gives rise to distinctive subject subcultures, characterised by a unique set of beliefs, norms, and practices that are shared by teachers who teach RE. Using micronarratives as a way to initiate further discussion and to distil some key points which can be elaborated upon, we illustrate some salient aspects of RE’s subcultures. These include a subculture of ambiguity, boundary crossings and objects, and a confusion of purpose and terms. Knowledge of these may better assist schools—and Catholic Schools’ Departments—to orient and support these teachers in their classroom practice. Full article
Show Figures

Figure 1

Figure 1
<p>Requirements for gaining and maintaining accreditation in Victoria.</p>
Full article ">
20 pages, 7765 KiB  
Article
Rapid High-Precision Ranging Technique for Multi-Frequency BDS Signals
by Jie Sun, Jiaolong Wei, Zuping Tang and Yuze Duan
Remote Sens. 2024, 16(23), 4352; https://doi.org/10.3390/rs16234352 - 21 Nov 2024
Viewed by 461
Abstract
The rapid expansion of BeiDou satellite navigation applications has led to a growing demand for real-time high-precision positioning services. Currently, high-precision positioning services face challenges such as a long initialization time and heavy reliance on reference station networks, thereby failing to fulfill the [...] Read more.
The rapid expansion of BeiDou satellite navigation applications has led to a growing demand for real-time high-precision positioning services. Currently, high-precision positioning services face challenges such as a long initialization time and heavy reliance on reference station networks, thereby failing to fulfill the requirements for real-time, wide-area, and centimeter-level positioning. In this study, we consider the multi-frequency signals that are broadcast by a satellite to share a common reference clock and possess identical RF channels and propagation paths with strict temporal, spectral, and spatial coupling between signal components, resulting in strongly coherent propagation delays. Firstly, we accurately establish a multi-frequency signal model that fully exploits those coherent characteristics among the multi-frequency BDS signals. Subsequently, we propose a rapid high-precision ranging technique using the code and carrier phases of multi-frequency signals. The proposed method unitizes multi-frequency signals via a coherent joint processing unit consisting of a joint tracking state estimator and a coherent signal generator. The joint tracking state estimator simultaneously estimates the biased pseudorange and its change rate, ionospheric delay and its change rate, and ambiguities. The coherent signal generator updates the numerically controlled oscillator (NCO) to adjust the local reference signal’s code and carrier replicas of different frequencies, changing them according to the state estimated by the joint tracking state estimator. Finally, the simulation results indicate that the proposed method efficiently diminishes the estimated biased pseudorange and ionospheric delay errors to below 0.1 m. Furthermore, this method reduces the carrier phase errors by more than 60% compared with conventional single-frequency-independent tracking methods. Consequently, the proposed method can achieve rapid centimeter-level results ranging for up to 1 min without using precise atmosphere corrections and provide enhanced tracking sensitivity and robustness. Full article
Show Figures

Figure 1

Figure 1
<p>Block diagram of the rapid high-precision ranging technique.</p>
Full article ">Figure 2
<p>The workflow of the rapid high-precision ranging technique.</p>
Full article ">Figure 3
<p>Auto-correlation functions of the BPSK(2), BPSK(10), and QMBOC(6,1,4/33) signals.</p>
Full article ">Figure 4
<p>Sky map of the visible BDS satellites at 16:51 on 30 July 2024.</p>
Full article ">Figure 5
<p>Estimation errors of the biased pseudorange and ionospheric delay on multi-frequency integrated signals: (<b>a</b>) six-frequency integrated; (<b>b</b>) five-frequency integrated; (<b>c</b>) quad-frequency integrated; (<b>d</b>) triple-frequency integrated.</p>
Full article ">Figure 6
<p>Code and carrier phase errors on multi-frequency integrated signals. (<b>a</b>) Code phase error using integrated six-frequency signals; (<b>b</b>) carrier phase error using integrated six-frequency signals; (<b>c</b>) code phase error using integrated five-frequency signals; (<b>d</b>) carrier phase error using integrated five-frequency signals; (<b>e</b>) code phase error using integrated quad-frequency signals; (<b>f</b>) carrier phase error using integrated quad-frequency signals; (<b>g</b>) code phase error using integrated triple-frequency signals; (<b>h</b>) carrier phase error using integrated triple-frequency signals.</p>
Full article ">Figure 6 Cont.
<p>Code and carrier phase errors on multi-frequency integrated signals. (<b>a</b>) Code phase error using integrated six-frequency signals; (<b>b</b>) carrier phase error using integrated six-frequency signals; (<b>c</b>) code phase error using integrated five-frequency signals; (<b>d</b>) carrier phase error using integrated five-frequency signals; (<b>e</b>) code phase error using integrated quad-frequency signals; (<b>f</b>) carrier phase error using integrated quad-frequency signals; (<b>g</b>) code phase error using integrated triple-frequency signals; (<b>h</b>) carrier phase error using integrated triple-frequency signals.</p>
Full article ">Figure 7
<p>Estimation errors of the biased pseudorange and ionospheric delay on five-frequency integrated signals in a weak signal environment.</p>
Full article ">Figure 8
<p>Code and carrier phases error of the five-frequency integrated signals in a weak signal environment. (<b>a</b>) Code phase errors of B1I, B3I, B1C, B2a, and B2b; (<b>b</b>) carrier phase errors of B1I, B3I, B1C, B2a, and B2b.</p>
Full article ">Figure 9
<p>Estimation errors of the biased pseudorange and ionospheric delay on five-frequency integrated signals with selective frequency signal attenuation.</p>
Full article ">Figure 10
<p>Code and carrier phase errors on five-frequency signals with selective frequency signal attenuation. (<b>a</b>) Code phase error of B1I, B3I, B1C, B2a, and B2b; (<b>b</b>) carrier phase error of B1I, B3I, B1C, B2a, and B2b.</p>
Full article ">
17 pages, 8145 KiB  
Article
Integrated Anti-Aliasing and Fully Shared Convolution for Small-Ship Detection in Synthetic Aperture Radar (SAR) Images
by Manman He, Junya Liu, Zhen Yang and Zhijian Yin
Electronics 2024, 13(22), 4540; https://doi.org/10.3390/electronics13224540 - 19 Nov 2024
Viewed by 560
Abstract
Synthetic Aperture Radar (SAR) imaging plays a vital role in maritime surveillance, yet the detection of small vessels poses a significant challenge when employing conventional Constant False Alarm Rate (CFAR) techniques, primarily due to the limitations in resolution and the presence of clutter. [...] Read more.
Synthetic Aperture Radar (SAR) imaging plays a vital role in maritime surveillance, yet the detection of small vessels poses a significant challenge when employing conventional Constant False Alarm Rate (CFAR) techniques, primarily due to the limitations in resolution and the presence of clutter. Deep learning (DL) offers a promising alternative, yet it still struggles with identifying small targets in complex SAR backgrounds because of feature ambiguity and noise. To address these challenges, our team has developed the AFSC network, which combines anti-aliasing techniques with fully shared convolutional layers to improve the detection of small targets in SAR imagery. The network is composed of three key components: the Backbone Feature Extraction Module (BFEM) for initial feature extraction, the Neck Feature Fusion Module (NFFM) for consolidating features, and the Head Detection Module (HDM) for final object detection. The BFEM serves as the principal feature extraction technique, with a primary emphasis on extracting features of small targets, The NFFM integrates an anti-aliasing element and is designed to accentuate the feature details of diminutive objects throughout the fusion procedure, HDM is the detection head module and adopts a new fully shared convolution strategy to make the model more lightweight. Our approach has shown better performance in terms of speed and accuracy for detecting small targets in SAR imagery, surpassing other leading methods on the SSDD dataset. It attained a mean Average Precision (AP) of 69.3% and a specific AP for small targets (APS) of 66.5%. Furthermore, the network’s robustness was confirmed using the HRSID dataset. Full article
(This article belongs to the Special Issue Advances in AI Technology for Remote Sensing Image Processing)
Show Figures

Figure 1

Figure 1
<p>Architecture of the proposed network AFSC, including BFEM, NFFM, and HDM.</p>
Full article ">Figure 2
<p>Architecture of the proposed sub-module PC.</p>
Full article ">Figure 3
<p>Architecture of the proposed module HDM.</p>
Full article ">Figure 4
<p>Details regarding the dimensions of the bounding boxes within both datasets. The <b>top-left</b> graph of each dataset is the number of data in the training set and how many there are in each category; the <b>top right</b> figure is the size and number of boxes; the <b>lower-left</b> figure depicts the location of the object’s center relative to the entire image; and the <b>lower-right</b> figure shows the object’s height-to-width ratio in comparison to the entire image.</p>
Full article ">Figure 5
<p>The visual results on the SSDD dataset are displayed. Red bounding boxes indicate the actual positions, while blue bounding boxes denote the predicted locations, and yellow bounding boxes indicate the missed detections and the orange box indicates false detection. From the first line to line 9 are Ground Truth, Faster R-CNN, MobileNet, SSD, RetinaNet, YOLOv7, YOLOv8, YOLOv10 and AFSC.</p>
Full article ">Figure 6
<p>The curves of the experimental results, with the x-axis indicating the number of epochs and the y-axis representing the corresponding quantitative results.</p>
Full article ">Figure 7
<p>Based on the actual and predicted categories from the classification model, the confusion matrix organizes the dataset’s records into a matrix format. In this matrix, the rows correspond to the true categories, and the columns correspond to the model’s predicted categories. The above are the confusion matrices for the base model and the AFSC model, respectively.</p>
Full article ">
13 pages, 8080 KiB  
Article
Linguistic Secret Sharing via Ambiguous Token Selection for IoT Security
by Kai Gao, Ji-Hwei Horng, Ching-Chun Chang and Chin-Chen Chang
Electronics 2024, 13(21), 4216; https://doi.org/10.3390/electronics13214216 - 27 Oct 2024
Cited by 1 | Viewed by 685
Abstract
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This scheme leverages neural networks to [...] Read more.
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This scheme leverages neural networks to embed private data within texts transmitted by IoT devices, using an ambiguous token selection algorithm that maintains the textual integrity of the cover messages. Our approach eliminates the need to share additional information for accurate data extraction while also enhancing security through a secret sharing mechanism. Experimental results demonstrate that the proposed scheme achieves approximately 50% accuracy in detecting steganographic text across two steganalysis networks. Additionally, the generated steganographic text preserves the semantic information of the cover text, evidenced by a BERT score of 0.948. This indicates that the proposed scheme performs well in terms of security. Full article
(This article belongs to the Special Issue IoT Security in the Age of AI: Innovative Approaches and Technologies)
Show Figures

Figure 1

Figure 1
<p>Architecture of RoBERTa.</p>
Full article ">Figure 2
<p>Flowchart of proposed scheme.</p>
Full article ">Figure 3
<p>An example of token selection and data embedding.</p>
Full article ">Figure 4
<p>Embedding rule.</p>
Full article ">Figure 5
<p>An example of (2, 3)-linguistic secret sharing.</p>
Full article ">Figure 5 Cont.
<p>An example of (2, 3)-linguistic secret sharing.</p>
Full article ">
16 pages, 338 KiB  
Article
A French Jesuit in China: The Case of André Yverneau 1948–1951
by Timothy Pickard Baycroft
Religions 2024, 15(10), 1239; https://doi.org/10.3390/rel15101239 - 12 Oct 2024
Viewed by 804
Abstract
During the many centuries of interaction and exchange between China and Europe, one of the most complex and ambiguous relationships was that of the Catholic Church and its missionaries in China. On one hand, they contributed to and can be seen as a [...] Read more.
During the many centuries of interaction and exchange between China and Europe, one of the most complex and ambiguous relationships was that of the Catholic Church and its missionaries in China. On one hand, they contributed to and can be seen as a part of the European imperial project of world colonisation, but on the other hand, they were instrumental in sharing and exchanging knowledge, as well as creating schools and other institutions in the places they created missions. At the same time, attempts were being made within the Catholic Church to promote the development of a Chinese clergy, although this issue remained divisive. This article examines these complex relationships through the eyes of a French Jesuit, André Yverneau, who was in China between 1948 and 1951 and who left a collection of letters back to his family describing these years. His experiences, observations, reactions and attitudes towards China and the mission are presented and analysed in order to re-evaluate some of the main debates surrounding the mission in China in the mid-twentieth century: education, language, indigenisation, and politics, both internal to the Catholic Church and with its relations in China. Full article
(This article belongs to the Special Issue Chinese Christianity: From Society to Culture)
12 pages, 241 KiB  
Article
Unjust: Publishing Black and African American Children’s Books and School Availability
by Karen Bowlding and Kathy Anderson
Humanities 2024, 13(5), 120; https://doi.org/10.3390/h13050120 - 18 Sep 2024
Viewed by 922
Abstract
Traditional book publishing has a pronounced and unjust deficiency of Black and African American voices. White culture, thoughts, and rules are the standard in traditional publishing. Black and African American authors are not typically picked up by white-dominated publishing companies. In traditional publishing, [...] Read more.
Traditional book publishing has a pronounced and unjust deficiency of Black and African American voices. White culture, thoughts, and rules are the standard in traditional publishing. Black and African American authors are not typically picked up by white-dominated publishing companies. In traditional publishing, mostly white literary agents are gatekeepers and acquisition editors shut the doors too frequently to non-white authors. Aspiring Black authors then resort to hybrid or vanity press companies that often use unscrupulous practices, charge exorbitant fees, accomplish little or low-quality work, and deny authors’ agency and full rights in the final disposition of a book. Because a majority of traditionally published children’s books featuring Black or African American stories or characters are written by or illustrated by non-Black people, the wide possibilities of adventure, celebrations, discovery, and friendship stories are not published for Black children. Instead, publishers favor stories about slavery, the civil rights movement, famous Black people, and hair tales as well as racially ambiguous characters. Regrettably, Black and African American culturally relevant stories written and illustrated by Black or African Americans are not readily available to children in school and library settings consistent with schools’ community or student demographics. This article shares research findings and viewpoints of Kathy Anderson and Karen Bowlding, two Black children’s book writers and publishing consultants who are also parents. Black and African American students encounter education and cultural injustice because of the practices of traditional publishing companies, educators, and librarians. Parents and guardians can ameliorate these issues with discernment and action. Foremost, publishing company decision-makers must acknowledge their own racial biases that deny representation and authenticity to all children in our US classrooms. Full article
(This article belongs to the Special Issue African American Children's Literature)
18 pages, 1516 KiB  
Article
The Impact of Paradoxical Leadership on Employee Knowledge-Sharing Behavior: The Role of Trust in the Leader and Employee Promotive Voice Behavior
by Vítor Hugo Silva, Ana Patrícia Duarte and Luís Miguel Simões
Adm. Sci. 2024, 14(9), 221; https://doi.org/10.3390/admsci14090221 - 13 Sep 2024
Viewed by 1612
Abstract
As the organizational environment becomes more volatile, uncertain, complex, and ambiguous, and the economy becomes increasingly knowledge-based, organizational knowledge management is key for companies’ success. This is especially important as organizational ties are weaker and job-hopping becomes a more prevalent phenomenon. As human [...] Read more.
As the organizational environment becomes more volatile, uncertain, complex, and ambiguous, and the economy becomes increasingly knowledge-based, organizational knowledge management is key for companies’ success. This is especially important as organizational ties are weaker and job-hopping becomes a more prevalent phenomenon. As human resource mobility increases, companies must ensure that knowledge remains within the company despite employee exit. In this context, the current study sought to understand how leaders’ actions can facilitate employee knowledge sharing, focusing on paradoxical leadership. Besides examining the impact of paradoxical leadership on employees’ propensity to adopt knowledge-sharing behaviors, this study also explored the effects of one potential intervening variable (i.e., promotive voice behavior) and one potential boundary condition (i.e., trust in the leader) on this relationship. A two-wave time-lagged correlational study was conducted with a sample of 154 workers from various sectors. The results of moderated mediation analysis suggest that paradoxical leaders indirectly promote greater knowledge-sharing among subordinates by fostering their promotive-voice behaviors, but only for those with high levels of trust in the leader. The implications of these findings for current organizational challenges regarding knowledge management are discussed. Full article
(This article belongs to the Special Issue Leadership and Sustainability: Building a Better Future)
Show Figures

Figure 1

Figure 1
<p>Conceptual model.</p>
Full article ">Figure 2
<p>Conditional effect of paradoxical leadership on employee promotive-voice behavior across different values of trust in the leader.</p>
Full article ">Figure 3
<p>The visual presentation of the linear function relating trust in the leader to the indirect effect of paradoxical leadership on knowledge sharing through employee promotive-voice behavior.</p>
Full article ">Figure 4
<p>Moderated mediation model. Note: non-significant (n.s.); unstandardized values; * <span class="html-italic">p</span> &lt; 0.05, ** <span class="html-italic">p</span> &lt; 0.01, *** <span class="html-italic">p</span> &lt; 0.001.</p>
Full article ">
14 pages, 605 KiB  
Article
A Hierarchical Multi-Task Learning Framework for Semantic Annotation in Tabular Data
by Jie Wu and Mengshu Hou
Entropy 2024, 26(8), 664; https://doi.org/10.3390/e26080664 - 4 Aug 2024
Viewed by 1305
Abstract
To optimize the utilization and analysis of tables, it is essential to recognize and understand their semantics comprehensively. This requirement is especially critical given that many tables lack explicit annotations, necessitating the identification of column types and inter-column relationships. Such identification can significantly [...] Read more.
To optimize the utilization and analysis of tables, it is essential to recognize and understand their semantics comprehensively. This requirement is especially critical given that many tables lack explicit annotations, necessitating the identification of column types and inter-column relationships. Such identification can significantly augment data quality, streamline data integration, and support data analysis and mining. Current table annotation models often address each subtask independently, which may result in the neglect of constraints and contextual information, causing relational ambiguities and inference errors. To address this issue, we propose a unified multi-task learning framework capable of concurrently handling multiple tasks within a single model, including column named entity recognition, column type identification, and inter-column relationship detection. By integrating these tasks, the framework exploits their interrelations, facilitating the exchange of shallow features and the sharing of representations. Their cooperation enables each task to leverage insights from the others, thereby improving the performance of individual subtasks and enhancing the model’s overall generalization capabilities. Notably, our model is designed to employ only the internal information of tabular data, avoiding reliance on external context or knowledge graphs. This design ensures robust performance even with limited input information. Extensive experiments demonstrate the superior performance of our model across various tasks, validating the effectiveness of unified multi-task learning framework in the recognition and comprehension of table semantics. Full article
(This article belongs to the Special Issue Natural Language Processing and Data Mining)
Show Figures

Figure 1

Figure 1
<p>An example of table semantic annotation. The goal is to assign semantic tags to columns and column pairs within the table.</p>
Full article ">Figure 2
<p>The architecture of our multi-task learning framework. Our model features a shared bottom encoder coupled with multiple associated classifiers. Once the table, serialized into text, is encoded, the representations of all columns are forwarded to the upper classifiers. Information is then processed sequentially according to the task hierarchy of column named entity recognition (NER), column type annotation (CTA), and inter-column relationship annotation (CRA).</p>
Full article ">Figure 3
<p>The training losses of three subtasks.</p>
Full article ">Figure 4
<p>Performance of training under different proportions of dataset.</p>
Full article ">Figure 5
<p>The case study on HardTables2022 dataset. It includes the prediction results of different models for column types and inter-column relationships.</p>
Full article ">
16 pages, 3650 KiB  
Perspective
A Cognitive Load Theory (CLT) Analysis of Machine Learning Explainability, Transparency, Interpretability, and Shared Interpretability
by Stephen Fox and Vitor Fortes Rey
Mach. Learn. Knowl. Extr. 2024, 6(3), 1494-1509; https://doi.org/10.3390/make6030071 - 2 Jul 2024
Cited by 3 | Viewed by 1793
Abstract
Information that is complicated and ambiguous entails high cognitive load. Trying to understand such information can involve a lot of cognitive effort. An alternative to expending a lot of cognitive effort is to engage in motivated cognition, which can involve selective attention to [...] Read more.
Information that is complicated and ambiguous entails high cognitive load. Trying to understand such information can involve a lot of cognitive effort. An alternative to expending a lot of cognitive effort is to engage in motivated cognition, which can involve selective attention to new information that matches existing beliefs. In accordance with principles of least action related to management of cognitive effort, another alternative is to give up trying to understand new information with high cognitive load. In either case, high cognitive load can limit potential for understanding of new information and learning from new information. Cognitive Load Theory (CLT) provides a framework for relating the characteristics of information to human cognitive load. Although CLT has been developed through more than three decades of scientific research, it has not been applied comprehensively to improve the explainability, transparency, interpretability, and shared interpretability (ETISI) of machine learning models and their outputs. Here, in order to illustrate the broad relevance of CLT to ETISI, it is applied to analyze a type of hybrid machine learning called Algebraic Machine Learning (AML). This is the example because AML has characteristics that offer high potential for ETISI. However, application of CLT reveals potential for high cognitive load that can limit ETISI even when AML is used in conjunction with decision trees. Following the AML example, the general relevance of CLT to machine learning ETISI is discussed with the examples of SHapley Additive exPlanations (SHAP), Local Interpretable Model-Agnostic Explanations (LIME), and the Contextual Importance and Utility (CIU) method. Overall, it is argued in this Perspective paper that CLT can provide science-based design principles that can contribute to improving the ETISI of all types of machine learning. Full article
(This article belongs to the Section Learning)
Show Figures

Figure 1

Figure 1
<p>High cognitive load from ML can increase potential cognitive effort.</p>
Full article ">Figure 2
<p>Example of one atom connected to constants: full view.</p>
Full article ">Figure 3
<p>Example of one atom connected to constants: enlarged partial view.</p>
Full article ">Figure 4
<p>Example of AML Description Language for gait analysis.</p>
Full article ">Figure 5
<p>Several AML chains of inputs–atoms–outputs: full view.</p>
Full article ">Figure 6
<p>Several AML chains of inputs–atoms–outputs: enlarged partial view.</p>
Full article ">Figure 7
<p>Tree diagram representation of results of AML-enabled gait analysis.</p>
Full article ">Figure 8
<p>Illustrative visual comparation of three explanation methods, (<b>a</b>) SHAP, (<b>b</b>) LIME, (<b>c</b>) CIU, which shows that CIU entails less split-attention effect and redundancy effect than SHAP and LIME.</p>
Full article ">Figure 9
<p>Importance of applying CLT.</p>
Full article ">
Back to TopTop