-
161
Moving up North
Published 2022-07-01“…The article is aimed at demonstrating that 20th and 21st century histories of resilience and recovery from trauma, challenge the overrepresentation of stories of deceptions or victimhood. Using archival material from the Refugee Council in London, the article analyses how bureaucracy, policies and politics, amplified by public opinion and media interventions, have in fact derailed the stated aim of integration of these populations. …”
Get full text
Article -
162
Vers le nord
Published 2022-07-01“…The article is aimed at demonstrating that 20th and 21st century histories of resilience and recovery from trauma, challenge the overrepresentation of stories of deceptions or victimhood. Using archival material from the Refugee Council in London, the article analyses how bureaucracy, policies and politics, amplified by public opinion and media interventions, have in fact derailed the stated aim of integration of these populations into the British society. …”
Get full text
Article -
163
Intelligent reflecting surface-enabled electromagnetic stealth for 6G: recent advances and future prospects
Published 2024-07-01“…This technology utilized IRS to suppress or redirect reflected signals, thus achieving adaptive transparent or deceptive electromagnetic stealth. To fully explore the great potential of IRS in the field of electromagnetic stealth, the basic principles, system models, design challenges, and open issues of IRS-enabled electromagnetic stealth were discussed, aiming to provide directional guidance for the future development of electromagnetic stealth technology.…”
Get full text
Article -
164
Cognitive FDA-MIMO Radar Network’s Transmit Element Selection Algorithm for Target Tracking in a Complex Interference Scenario
Published 2024-12-01“…The traditional frequency diversity array multiple-input multiple-output (FDA-MIMO) radar is rendered ineffective due to occurrences of frequency spectrum interference and main-lobe deceptive interference with arbitrary time delays. …”
Get full text
Article -
165
Challenges in sharing information effectively: examples from command and control
Published 2006-01-01“…Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were collaborating successfully, i.e., a deceptively false shared understanding had emerged. …”
Get full text
Article -
166
Distributed trust management scheme based on blockchain in Internet of vehicles
Published 2023-05-01“…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
Get full text
Article -
167
Manipulation Game Considering No-Regret Strategies
Published 2025-01-01“…Manipulators intersperse unethical behavior within their typical conduct, deploying deceptive tactics before resuming a baseline demeanor. …”
Get full text
Article -
168
Plasmacytoid Urothelial Carcinoma of the Urinary Bladder Metastatic to the Duodenum: A Case Report—Diagnostic Relevance of GATA3 Immunohistochemistry
Published 2017-01-01“…Plasmacytoid urothelial carcinoma (PUC) of the urinary bladder is a rare and aggressive subtype of urothelial carcinoma. Its deceptive morphology is characterized by a discohesive growth of cells with plasmacytoid morphology. …”
Get full text
Article -
169
An interpersonal pragmatic perspective on seductive discourse
Published 2017-12-01“…This is one reason why, although SD is often necessarily covert, it is not thereby inherently deceptive. The other reason is that we simply do not have the time to present ourselves fully and explicitly. …”
Get full text
Article -
170
Slowness and Renewed Perception: Revisiting Douglas Gordon’s 24 Hour Psycho (1993) with Don DeLillo’s Point Omega (2010)
Published 2020-12-01“…After presenting these various works and the intersemiotic reflexion they activate in DeLillo’s novel, the essay examines the deceptive simplicity of this brief text, in terms of syntax and diegetic structure (including the film-related framing device). …”
Get full text
Article -
171
Corps sensible, environnement urbain moderniste
Published 2019-07-01“…In it, he confronts his character Hulot with a transitionless shift from the familiar conventions of a historic capital (Paris), which make it possible to stroll peacefully, to the exhausting and deceptive signage and plastic and formal components of a big city that makes for a world in itself, with no space or time outside the frame: a city that asserts the international, modernist version of a city rather than its modern version, being ubiquitous and timeless, devoted to accelerated communication, circulation and consumption.Lost in a disappointing “quest” with multiplying loops and dead-ends, Hulot often appears to be dissolving—shadowless body—at the whim of avatars, doubles and reflections, despite the virtues of transparency and communication, considered to be linked with the “new” architectural and urban environment. …”
Get full text
Article -
172
Evaluating the role of generative AI and color patterns in the dissemination of war imagery and disinformation on social media
Published 2025-01-01“…This study explores the evolving role of social media in the spread of misinformation during the Ukraine-Russia conflict, with a focus on how artificial intelligence (AI) contributes to the creation of deceptive war imagery. Specifically, the research examines the relationship between color patterns (LUTs) in war-related visuals and their perceived authenticity, highlighting the economic, political, and social ramifications of such manipulative practices. …”
Get full text
Article -
173
G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud
Published 2025-01-01“…We use the autoencoder to generate a sufficiently deceptive mask that covers the original input, adjusting the critical subset through a geometry-aware trick to distort the point cloud gradient. …”
Get full text
Article -
174
Enlightenment and Totalitarianism A Book Review of Critique and Crisis, Enlightenment and the Pathogenesis of Modern Society
Published 2021-02-01“…The Enlightenment succumbed to a Utopian image which, while deceptively propelling it, helped to produce contradictions that could not be resolved in practice and prepared the way for the Terror and for dictatorship. …”
Get full text
Article -
175
Does Reproductive Success in Orchids Affect the Evolution of Their Number of Flowers?
Published 2025-01-01“…Therefore, here, only a special case of this question is studied in deceptive species of orchids: reproductive success (RS, ratio of the number of fruits to the number of flowers produced by a plant during the whole season), a commonly used measure of fitness is used to develop a model describing how RS affects the number of flowers, n, of a plant. …”
Get full text
Article -
176
Out-of-context misinformation detection method based on stance analysis
Published 2024-04-01“…Among its forms, out-of-context misinformation stands out as particularly deceptive and readily executable. This type of misinformation involves malicious actors enhancing the credibility of false narratives by misrepresenting contextual details such as individuals, events, and locations within real images. …”
Get full text
Article -
177
Mockery as a special type of laugher in the prose of Leonid Andreev
Published 2024-12-01“…The idea of variability, the deceptiveness of the world is reflected in the depiction of necrospace in the story Peace . …”
Get full text
Article -
178
A multigrained preference analysis method for product iterative design incorporating AI-generated review detection
Published 2025-01-01“…With the surge of generative artificial intelligence (AI) technologies such as ChatGPT, some merchants might exploit them to fabricate deceptive positive reviews, and competitors may also fabricate negative reviews to influence the opinions of consumers and designers. …”
Get full text
Article -
179
The Linguistic Landscape of Ulaanbaatar: what Signs and People tell about
Published 2024-12-01“…The linguistic landscape in Ulaanbaatar creates a deceptive impression of a large presence of the Russian language, which is created due to the Cyrillic alphabet as a graphic system of the modern Mongolian language and a large number of Russian borrowings. …”
Get full text
Article -
180
Physical-social attributes integrated Sybil detection for Tor bridge distribution
Published 2023-02-01“…As one of the most widely utilized censorship circumvention systems, Tor faces serious Sybil attacks in bridge distribution.Censors with rich network and human resources usually deploy a large number of Sybils, which disguise themselves as normal nodes to obtain bridges information and block them.In the process, due to the different identities, purposes and intentions of Sybils and normal nodes, individual or group behavior differences occur in network activities, called as node behavior characteristics.To handle the Sybil attacks threat, a Sybil detection mechanism integrating physical-social attributes was proposed based on the analysis of node behavior characteristics.The physical-social attributes evaluation methods were designed.The credit value of nodes objectively reflecting the operation status of bridges on the nodes and the suspicion index of nodes reflecting the blocking status of bridges, were utilized to evaluate the physical attributes of nodes.The social attributes of nodes were evaluated by the social similarity, which described the static attribute labels of nodes and their social trust characterizing the dynamic interaction behaviors of nodes.Furthermore, integrating the physical-social attributes, the credibility of nodes were defined as the possibility of the current node being a Sybil, which was exploited as a guidance on inferring the true identifies of nodes, so as to achieve accurate detection on Sybils.The detection performance of the proposed mechanism based on the constructed Tor network operation status simulator and the Microblog PCU dataset were simulated.The results show that the proposed mechanism can effectively improve the true positive rate on Sybils, and decrease the false positive rate.It also has stronger resistance on the deceptive behavior of censors, and still performs well in the absence of node social attributes.…”
Get full text
Article