Search results

1 – 10 of 59
Open Access
Article
Publication date: 13 March 2018

Ulla Gain

Cognitive computing is part of AI and cognitive applications consists of cognitive services, which are building blocks of the cognitive systems. These applications mimic the human…

1576

Abstract

Cognitive computing is part of AI and cognitive applications consists of cognitive services, which are building blocks of the cognitive systems. These applications mimic the human brain functions, for example, recognize the speaker, sense the tone of the text. On this paper, we present the similarities of these with human cognitive functions. We establish a framework which gathers cognitive functions into nine intentional processes from the substructures of the human brain. The framework, underpins human cognitive functions, and categorizes cognitive computing functions into the functional hierarchy, through which we present the functional similarities between cognitive service and human cognitive functions to illustrate what kind of functions are cognitive in the computing. The results from the comparison of the functional hierarchy of cognitive functions are consistent with cognitive computing literature. Thus, the functional hierarchy allows us to find the type of cognition and reach the comparability between the applications.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 1 May 2023

Ai Yibo, Zhang Yuanyuan, Cui Hao and Zhang Weidong

This study aims to ensure the operation safety of high speed trains, it is necessary to carry out nondestructive monitoring of the tensile damage of the gearbox housing material…

Abstract

Purpose

This study aims to ensure the operation safety of high speed trains, it is necessary to carry out nondestructive monitoring of the tensile damage of the gearbox housing material in rail time, yet the traditional tests of mechanical property can hardly meet this requirement.

Design/methodology/approach

In this study the acoustic emission (AE) technology is applied in the tensile tests of the gearbox housing material of an high-speed rail (HSR) train, during which the acoustic signatures are acquired for parameter analysis. Afterward, the support vector machine (SVM) classifier is introduced to identify and classify the characteristic parameters extracted, on which basis the SVM is improved and the weighted support vector machine (WSVM) method is applied to effectively reduce the misidentification of the SVM classifier. Through the study of the law of relations between the characteristic values and the tensile life, a degradation model of the gearbox housing material amid tensile is built.

Findings

The results show that the growth rate of the logarithmic hit count of AE signals and that of logarithmic amplitude can well characterize the stage of the material tensile process, and the WSVM method can improve the classification accuracy of the imbalanced data to above 94%. The degradation model built can identify the damage occurred to the HSR gearbox housing material amid the tensile process and predict the service life remains.

Originality/value

The results of this study provide new concepts for the life prediction of tensile samples, and more further tests should be conducted to verify the conclusion of this research.

Open Access
Book part
Publication date: 18 July 2022

Christian Versloot, Maria Iacob and Klaas Sikkel

Utility strikes have spawned companies specializing in providing a priori analyses of the underground. Geophysical techniques such as Ground Penetrating Radar (GPR) are harnessed…

Abstract

Utility strikes have spawned companies specializing in providing a priori analyses of the underground. Geophysical techniques such as Ground Penetrating Radar (GPR) are harnessed for this purpose. However, analyzing GPR data is labour-intensive and repetitive. It may therefore be worthwhile to amplify this process by means of Machine Learning (ML). In this work, harnessing the ADR design science methodology, an Intelligence Amplification (IA) system is designed that uses ML for decision-making with respect to utility material type. It is driven by three novel classes of Convolutional Neural Networks (CNNs) trained for this purpose, which yield accuracies of 81.5% with outliers of 86%. The tool is grounded in the available literature on IA, ML and GPR and is embedded into a generic analysis process. Early validation activities confirm its business value.

Open Access
Article
Publication date: 15 December 2020

Daniel Wee

This paper aims to analyze and evaluate the arguments provided in Gema Dari Menara that aim to justify Islamic prohibitions. The first part of this paper will attempt to indicate…

Abstract

This paper aims to analyze and evaluate the arguments provided in Gema Dari Menara that aim to justify Islamic prohibitions. The first part of this paper will attempt to indicate that the arguments concerning Islam’s prohibition of certain activities are surprisingly secular in their justification, in the sense that their reasoning rests on mundane empirical considerations rather than lofty theological exhortations. For instance, pre-marital sex must be prohibited because it would “ruin one’s personality and community”, Bruneians should not gamble because people who do so “forget their own responsibilities”, and alcohol should not be consumed because it can “ruin a sound mind and one’s personality”. These justifications do not appeal to the divine but instead refer to phenomena that can be observed, measured, and quantified. The second part of this paper will consider the implications of trying to justify absolute religious prohibitions through secular considerations. It will be argued that in doing so the film opens itself to empirical queries that must be addressed for the film to have its desired effect. This paper ultimately draws attention to some of the challenges facing religious apologetics as the social sciences gain prominence.

Details

Southeast Asia: A Multidisciplinary Journal, vol. 20 no. 2
Type: Research Article
ISSN: 1819-5091

Open Access
Article
Publication date: 10 May 2021

Olusola Joshua Olujobi

This study aims to investigate why anti-corruption statutes are not efficient in Nigeria’s upstream petroleum industry.

6082

Abstract

Purpose

This study aims to investigate why anti-corruption statutes are not efficient in Nigeria’s upstream petroleum industry.

Design/methodology/approach

This study is a doctrinal legal research that embraces a point-by-point comparative methodology with a library research technique.

Findings

This study reveals that corruption strives on feeble implementation of anti-corruption legal regime and the absence of political will in offering efficient regulatory intervention. Finally, this study finds that anti-corruption organisations in Nigeria are not efficient due to non-existence of the Federal Government’s political will to fight corruption, insufficient funds and absence of stringent implementation of the anti-corruption legal regime in the country.

Research limitations/implications

Investigations reveal during this study that Nigerian National Petroleum Corporation (NNPC) operations are characterised with poor record-keeping, lack of accountability as well as secrecy in the award of oil contracts, oil licence, leases and other financial transactions due to non-disclosure or confidentiality clauses contained in most of these contracts. Also, an arbitration proceeding limit access to their records and some of these agreements under contentions. This has also limited the success of this research work and generalising its findings.

Practical implications

This study recommends, among other reforms, soft law technique and stringent execution of anti-corruption statutes. This study also recommends increment in financial appropriation to Nigeria’s anti-corruption institutions, taking into consideration the finding that a meagre budget is a drawback.

Social implications

This study reveals that corruption strives on feeble implementation of anti-corruption legal regime and the absence of political will in offering efficient regulatory intervention. Corruption flourishes due to poor enforcement of anti-corruption laws and the absence of political will in offering efficient regulatory intervention by the government.

Originality/value

The study advocates the need for enhancement of anti-corruption agencies' budgets taking into consideration the finding that meagres budgets are challenge of the agencies.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 19 May 2021

Saadan A. Edson and Adam M. Akyoo

An increasing demand of agricultural intensification and value addition necessitates the use of improved inputs such as improved seed. Smallholder farmers contribute about 70% of…

Abstract

An increasing demand of agricultural intensification and value addition necessitates the use of improved inputs such as improved seed. Smallholder farmers contribute about 70% of agricultural production in Tanzania. Agriculture sector in Tanzania contributes about 24.1% of the GDP, 30% of exports and 65% of industrial raw materials. Thus, agriculture development, economic growth and industrialization are inseparable. Due to the nature of the product, smallholder farmers cannot judge the overall excellence of seed at the time of buying. This paper assessed quality uncertainty in maize and vegetable seed and its implication for market exchange between farmers and seed sellers in Kilolo district, Iringa Tanzania. The study used a random sample of 130 smallholder farmers and representatives from ten seed companies. Asymmetric information prevails between the two trading sides, i.e. sellers and buyers, leading into quality uncertainty. Moreover, product augmentation is profoundly overlooked whereby most of seed companies have not augmented their products. Because an improved seed is a quintessential example of an experience good, quality uncertainty of some crop varieties under field conditions favored some seed brands to be used more by farmers compared to others. This paper offers a thorough deduction on quality uncertainty under farmers' field condition and its implication on market exchange. It adds information in the body of knowledge on how an improved seed can contribute to sustainable production of food and industrial raw materials, which is a step towards desired industrialization agenda in Tanzania.

Details

Emerald Open Research, vol. 1 no. 6
Type: Research Article
ISSN: 2631-3952

Keywords

Open Access
Article
Publication date: 23 July 2020

Rami Mustafa A. Mohammad

Spam emails classification using data mining and machine learning approaches has enticed the researchers' attention duo to its obvious positive impact in protecting internet…

1962

Abstract

Spam emails classification using data mining and machine learning approaches has enticed the researchers' attention duo to its obvious positive impact in protecting internet users. Several features can be used for creating data mining and machine learning based spam classification models. Yet, spammers know that the longer they will use the same set of features for tricking email users the more probably the anti-spam parties might develop tools for combating this kind of annoying email messages. Spammers, so, adapt by continuously reforming the group of features utilized for composing spam emails. For that reason, even though traditional classification methods possess sound classification results, they were ineffective for lifelong classification of spam emails duo to the fact that they might be prone to the so-called “Concept Drift”. In the current study, an enhanced model is proposed for ensuring lifelong spam classification model. For the evaluation purposes, the overall performance of the suggested model is contrasted against various other stream mining classification techniques. The results proved the success of the suggested model as a lifelong spam emails classification method.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Book part
Publication date: 4 June 2021

Sukaina Al-Nasrawi

Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's…

Abstract

Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's 2030 Agenda for Sustainable Development considers technology as a means to combat violence against women and girls, and there is ample evidence on the positive impact of technology in combating violence. At the same time, however, technology can promote and perpetrate new forms of violence. Research shows that more than 70% of women and girls online are exposed to forms of cyber violence. Most of these cases remain unreported.

This chapter argues that technology contributes to increasing cyber violence against women and girls which in turn leads to severe social and economic implications affecting them. It also argues that legislative and policy reforms can limit this type of violence while enabling women and girls to leverage technology for empowerment. It highlights cases of cyber violence in the Arab region and provides an overview of applicable legislative frameworks. The chapter concludes with recommended policy reforms and measures to strengthen and harmonize efforts to combat cyber violence against women and girls in the Arab region.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 14 July 2021

Molly Cooper, Yair Levy, Ling Wang and Laurie Dringus

This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.

1545

Abstract

Purpose

This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.

Design/methodology/approach

This study has three phases. The first phase included 32 subject matter experts that provided feedback toward a phishing alert and warning system. The second phase included development and a pilot study to validate a phishing alert and warning system prototype. The third phase included delivery of the Phishing Alert and Warning System (PAWSTM mobile app) to 205 participants. This study designed, developed, as well as empirically tested the PAWSTM mobile app that alerted and warned participants to the signs of phishing in emails on mobile devices.

Findings

The results of this study indicated audio alerts and visual warnings potentially lower phishing susceptibility in emails. Audiovisual warnings appeared to assist study participants in noticing phishing emails more easily and in less time than without audiovisual warnings.

Practical implications

This study's implications to mitigation of phishing emails are key, as it appears that alerts and warnings added to email applications may play a significant role in the reduction of phishing susceptibility.

Originality/value

This study extends the existing information security body of knowledge on phishing prevention and awareness by using audiovisual alerts and warnings to email recipients tested in real-life applications.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Abstract

Details

Sameness and Repetition in Contemporary Media Culture
Type: Book
ISBN: 978-1-80455-955-0

1 – 10 of 59