Showing 161 - 180 results of 190 for search '"deception"', query time: 0.04s Refine Results
  1. 161

    Moving up North by Olivette Otele

    Published 2022-07-01
    “…The article is aimed at demonstrating that 20th and 21st century histories of resilience and recovery from trauma, challenge the overrepresentation of stories of deceptions or victimhood. Using archival material from the Refugee Council in London, the article analyses how bureaucracy, policies and politics, amplified by public opinion and media interventions, have in fact derailed the stated aim of integration of these populations. …”
    Get full text
    Article
  2. 162

    Vers le nord by Olivette Otele

    Published 2022-07-01
    “…The article is aimed at demonstrating that 20th and 21st century histories of resilience and recovery from trauma, challenge the overrepresentation of stories of deceptions or victimhood. Using archival material from the Refugee Council in London, the article analyses how bureaucracy, policies and politics, amplified by public opinion and media interventions, have in fact derailed the stated aim of integration of these populations into the British society. …”
    Get full text
    Article
  3. 163

    Intelligent reflecting surface-enabled electromagnetic stealth for 6G: recent advances and future prospects by MA Tiantian, ZHENG Beixiong, XIONG Xue, ZHANG Rui

    Published 2024-07-01
    “…This technology utilized IRS to suppress or redirect reflected signals, thus achieving adaptive transparent or deceptive electromagnetic stealth. To fully explore the great potential of IRS in the field of electromagnetic stealth, the basic principles, system models, design challenges, and open issues of IRS-enabled electromagnetic stealth were discussed, aiming to provide directional guidance for the future development of electromagnetic stealth technology.…”
    Get full text
    Article
  4. 164

    Cognitive FDA-MIMO Radar Network’s Transmit Element Selection Algorithm for Target Tracking in a Complex Interference Scenario by Yingfei Yan, Haihong Tao, Jingjing Guo, Biao Yang

    Published 2024-12-01
    “…The traditional frequency diversity array multiple-input multiple-output (FDA-MIMO) radar is rendered ineffective due to occurrences of frequency spectrum interference and main-lobe deceptive interference with arbitrary time delays. …”
    Get full text
    Article
  5. 165

    Challenges in sharing information effectively: examples from command and control by Diane H. Sonnenwald

    Published 2006-01-01
    “…Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were collaborating successfully, i.e., a deceptively false shared understanding had emerged. …”
    Get full text
    Article
  6. 166

    Distributed trust management scheme based on blockchain in Internet of vehicles by Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG

    Published 2023-05-01
    “…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
    Get full text
    Article
  7. 167

    Manipulation Game Considering No-Regret Strategies by Julio B. Clempner

    Published 2025-01-01
    “…Manipulators intersperse unethical behavior within their typical conduct, deploying deceptive tactics before resuming a baseline demeanor. …”
    Get full text
    Article
  8. 168

    Plasmacytoid Urothelial Carcinoma of the Urinary Bladder Metastatic to the Duodenum: A Case Report—Diagnostic Relevance of GATA3 Immunohistochemistry by Hermann Brustmann

    Published 2017-01-01
    “…Plasmacytoid urothelial carcinoma (PUC) of the urinary bladder is a rare and aggressive subtype of urothelial carcinoma. Its deceptive morphology is characterized by a discohesive growth of cells with plasmacytoid morphology. …”
    Get full text
    Article
  9. 169

    An interpersonal pragmatic perspective on seductive discourse by Jim O’DRISCOLL

    Published 2017-12-01
    “…This is one reason why, although SD is often necessarily covert, it is not thereby inherently deceptive. The other reason is that we simply do not have the time to present ourselves fully and explicitly. …”
    Get full text
    Article
  10. 170

    Slowness and Renewed Perception: Revisiting Douglas Gordon’s 24 Hour Psycho (1993) with Don DeLillo’s Point Omega (2010) by Françoise Sammarcelli

    Published 2020-12-01
    “…After presenting these various works and the intersemiotic reflexion they activate in DeLillo’s novel, the essay examines the deceptive simplicity of this brief text, in terms of syntax and diegetic structure (including the film-related framing device). …”
    Get full text
    Article
  11. 171

    Corps sensible, environnement urbain moderniste by Françoise Michel-Jones

    Published 2019-07-01
    “…In it, he confronts his character Hulot with a transitionless shift from the familiar conventions of a historic capital (Paris), which make it possible to stroll peacefully, to the exhausting and deceptive signage and plastic and formal components of a big city that makes for a world in itself, with no space or time outside the frame: a city that asserts the international, modernist version of a city rather than its modern version, being ubiquitous and timeless, devoted to accelerated communication, circulation and consumption.Lost in a disappointing “quest” with multiplying loops and dead-ends, Hulot often appears to be dissolving—shadowless body—at the whim of avatars, doubles and reflections, despite the virtues of transparency and communication, considered to be linked with the “new” architectural and urban environment. …”
    Get full text
    Article
  12. 172

    Evaluating the role of generative AI and color patterns in the dissemination of war imagery and disinformation on social media by Estibaliz García-Huete, Sara Ignacio-Cerrato, David Pacios, José Luis Vázquez-Poletti, María José Pérez-Serrano, Andrea Donofrio, Clemente Cesarano, Nikolaos Schetakis, Nikolaos Schetakis, Alessio Di Iorio

    Published 2025-01-01
    “…This study explores the evolving role of social media in the spread of misinformation during the Ukraine-Russia conflict, with a focus on how artificial intelligence (AI) contributes to the creation of deceptive war imagery. Specifically, the research examines the relationship between color patterns (LUTs) in war-related visuals and their perceived authenticity, highlighting the economic, political, and social ramifications of such manipulative practices. …”
    Get full text
    Article
  13. 173

    G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud by Geng Chen, Zhiwen Zhang, Yuanxi Peng, Chunchao Li, Teng Li

    Published 2025-01-01
    “…We use the autoencoder to generate a sufficiently deceptive mask that covers the original input, adjusting the critical subset through a geometry-aware trick to distort the point cloud gradient. …”
    Get full text
    Article
  14. 174

    Enlightenment and Totalitarianism A Book Review of Critique and Crisis, Enlightenment and the Pathogenesis of Modern Society by Behnam Joodi, Majid Tavassoli Roknabadi

    Published 2021-02-01
    “…The Enlightenment succumbed to a Utopian image which, while deceptively propelling it, helped to produce contradictions that could not be resolved in practice and prepared the way for the Terror and for dictatorship. …”
    Get full text
    Article
  15. 175

    Does Reproductive Success in Orchids Affect the Evolution of Their Number of Flowers? by Iva Traxmandlová, Michaela Steffelová, Pavel Kindlmann

    Published 2025-01-01
    “…Therefore, here, only a special case of this question is studied in deceptive species of orchids: reproductive success (RS, ratio of the number of fruits to the number of flowers produced by a plant during the whole season), a commonly used measure of fitness is used to develop a model describing how RS affects the number of flowers, n, of a plant. …”
    Get full text
    Article
  16. 176

    Out-of-context misinformation detection method based on stance analysis by YUAN Xin, GUO Jie, QIU Weidong, HUANG Zheng

    Published 2024-04-01
    “…Among its forms, out-of-context misinformation stands out as particularly deceptive and readily executable. This type of misinformation involves malicious actors enhancing the credibility of false narratives by misrepresenting contextual details such as individuals, events, and locations within real images. …”
    Get full text
    Article
  17. 177

    Mockery as a special type of laugher in the prose of Leonid Andreev by Alisa V. Mytareva

    Published 2024-12-01
    “…The idea of variability, the deceptiveness of the world is reflected in the depiction of necrospace in the story Peace . …”
    Get full text
    Article
  18. 178

    A multigrained preference analysis method for product iterative design incorporating AI-generated review detection by Zhaojing Su, Mei Yang, Qingbo Zhai, Kaiyuan Guo, Yuexin Huang, Yangfan Cong

    Published 2025-01-01
    “…With the surge of generative artificial intelligence (AI) technologies such as ChatGPT, some merchants might exploit them to fabricate deceptive positive reviews, and competitors may also fabricate negative reviews to influence the opinions of consumers and designers. …”
    Get full text
    Article
  19. 179

    The Linguistic Landscape of Ulaanbaatar: what Signs and People tell about by Erzhen V. Khilkhanova

    Published 2024-12-01
    “…The linguistic landscape in Ulaanbaatar creates a deceptive impression of a large presence of the Russian language, which is created due to the Cyrillic alphabet as a graphic system of the modern Mongolian language and a large number of Russian borrowings. …”
    Get full text
    Article
  20. 180

    Physical-social attributes integrated Sybil detection for Tor bridge distribution by Xin SHI, Yunfei GUO, Yawen WANG, Xiaoli SUN, Hao LIANG

    Published 2023-02-01
    “…As one of the most widely utilized censorship circumvention systems, Tor faces serious Sybil attacks in bridge distribution.Censors with rich network and human resources usually deploy a large number of Sybils, which disguise themselves as normal nodes to obtain bridges information and block them.In the process, due to the different identities, purposes and intentions of Sybils and normal nodes, individual or group behavior differences occur in network activities, called as node behavior characteristics.To handle the Sybil attacks threat, a Sybil detection mechanism integrating physical-social attributes was proposed based on the analysis of node behavior characteristics.The physical-social attributes evaluation methods were designed.The credit value of nodes objectively reflecting the operation status of bridges on the nodes and the suspicion index of nodes reflecting the blocking status of bridges, were utilized to evaluate the physical attributes of nodes.The social attributes of nodes were evaluated by the social similarity, which described the static attribute labels of nodes and their social trust characterizing the dynamic interaction behaviors of nodes.Furthermore, integrating the physical-social attributes, the credibility of nodes were defined as the possibility of the current node being a Sybil, which was exploited as a guidance on inferring the true identifies of nodes, so as to achieve accurate detection on Sybils.The detection performance of the proposed mechanism based on the constructed Tor network operation status simulator and the Microblog PCU dataset were simulated.The results show that the proposed mechanism can effectively improve the true positive rate on Sybils, and decrease the false positive rate.It also has stronger resistance on the deceptive behavior of censors, and still performs well in the absence of node social attributes.…”
    Get full text
    Article