Filters








21,386 Hits in 1.4 sec

A News Verification Browser for the Detection of Clickbait, Satire, and Falsified News

Victoria Rubin, Chris Brogly, Nadia Conroy, Yimin Chen, Sarah Cornwell, Toluwase Asubiaro
2019 Journal of Open Source Software  
Detection of falsified news articles Rubin & Conroy, 2012) . Each is implemented as a separate overlay option through three tabs at the bottom right of the browser.  ...  The News Verification Browser is a research tool -not a replacement for a day-to-day web browser. It should not be used where security is critical.  ... 
doi:10.21105/joss.01208 fatcat:odrgzpwajnek7cwnigvazwvliu

Falsificationism and Software Engineering

Yasuyuki KAGEYAMA
1999 Annals of the Japan Association for Philosophy of Science  
In any ways, Popper admits that falsifiability is not a sharp logical criterion. Cf., LSD, p.  ...  Pressman, Software Engineering, New York: McGraw-Hill, 3rd ed., 1992, p. 597.) , there is an asymmetry of verification and falsification in software, which is adduced by Popper as an argument for falsifiability  ... 
doi:10.4288/jafpos1956.9.165 fatcat:k52v6zvdqbf2dmoz5y6iop55eq

Empirical analyses of the factors affecting confirmation bias and the effects of confirmation bias on software developer/tester performance

Gul Calikli, Ayse Bener
2010 Proceedings of the 6th International Conference on Predictive Models in Software Engineering - PROMISE '10  
Moreover, the results of the analysis to investigate the relationship between code defect density and confirmation bias levels of software developers and testers showed that there is a direct correlation  ...  These tests were conducted on the 36 employees of a large scale telecommunication company in Europe as well as 28 graduate computer engineering students of Bogazici University, resulting in a total of  ...  P and Q) as a choice of a verifier, whereas the subject is defined to be a falsifier if he/she selects the cards D and 7 (i.e. P and not-Q).  ... 
doi:10.1145/1868328.1868344 dblp:conf/promise/CalikliB10 fatcat:ycjgwlhom5dl5lwgsmvytqjhe4

Use of computer software for technical training at rail car repair shops

Artem Popkov, Sergei Bekher, A.D. Abramov, A.L. Manakov, A.A. Klimov, V.I. Khabarov, V.I. Medvedev
2018 MATEC Web of Conferences  
Therefore, there is a need for software and hardware that will provide updated information to specialists of car repair shops in a timely manner.  ...  As a result of the research, the authors have developed a system that can verify training results with a probability of more than 95%.  ...  A specialpurpose network software product was designed to conduct technical on-the-job training [5] .  ... 
doi:10.1051/matecconf/201821604001 fatcat:tvz6wjp37nffrici23vrwbuuem

Strengthening Inferred Specifications using Search Based Testing

Kamran Ghani, John A. Clark
2008 2008 IEEE International Conference on Software Testing Verification and Validation Workshop  
This leads to a much tighter (accurate) inferred specifications.  ...  Software specification is an important element of the software development process. However, in most cases the specifications are out-of-date or even missing.  ...  Our work shows that extant search based software test data generation approaches can be used to stress each inferred invariant with a view to falsifying it.  ... 
doi:10.1109/icstw.2008.39 dblp:conf/icst/GhaniC08 fatcat:tuquzkervjeelg4wj44jrpwyo4

The Most Important Ethical Concerns in Science

Kuochen Chou
2020 Natural Science  
The most unethical behaviors in science are of falsifying data and stealing ideas from previous investigators.  ...  But for publishing papers with high similarity and editing papers with coercion, it is necessary to carry out a concrete analysis case by case.  ...  "Falsifying data" is a typical cheating, and so is "Stealing ideas from previous investigators".  ... 
doi:10.4236/ns.2020.122005 fatcat:eh7evay2efh4pn6crfthtrlmem

Uncertainty, risk, and information value in software requirements and architecture

Emmanuel Letier, David Stefan, Earl T. Barr
2014 Proceedings of the 36th International Conference on Software Engineering - ICSE 2014  
• Models given by design team: Utility score defined as weighted sum of objectives satisfaction (unfortunately not falsifiable) 21 • Method output: A shortlist of 10 architectures with highest  ...  design decisions is hard -High standard: models must be falsifiable -Weak foundations: e.g. what is an architectural decision?  ... 
doi:10.1145/2568225.2568239 dblp:conf/icse/LetierSB14 fatcat:zb7k22xfrjhrtguj37gaim3owq

Myths and Over-Simplifications in Software Engineering

Magne Jørgensen
2013 Lecture Notes on Software Engineering  
Some of them may be harmless, but others may hamper evidence-based practices and contribute to a fashion-and myth-based software engineering discipline.  ...  We report from a study examining this tendency.  ...  With increased vagueness a myth or over-simplification may turn into a non-falsifiable claim.  ... 
doi:10.7763/lnse.2013.v1.2 fatcat:5h2peruwtnbyloyunjbjt5yovi

Usefulness of combined screening methods for rapid detection of falsified and/or substandard medicines in the absence of a confirmatory method

Kwabena Frimpong-Manso Opuni, Henry Nettey, Marvin Adjei Larbi, Salome Naa Amerley Amartey, Gifty Nti, Abraham Dzidonu, Patrick Owusu-Danso, Nicholas Amoah Owusu, Alexander Kwadwo Nyarko
2019 Malaria Journal  
The influx of substandard and falsified medicines is a global public health challenge and its rapid detection is a key solution to the menace.  ...  The combined screening methods may be used for rapid detection of falsified and/or substandard medicines without using a confirmatory method.  ...  Sensitivity is defined as the proportion of medicines that are determined as falsified/substandard by a screening device out of all the medicines detected as falsified/substandard by a reference method  ... 
doi:10.1186/s12936-019-3045-y pmid:31805937 pmcid:PMC6896689 fatcat:64hrfofcojac7dhgyszl43cp4m

Findings of Scientific Misconduct

2001 Federal register  
He further falsified the image using computer software to intensify a band he claimed was a sitespecific integration and to remove identifiable background spots present in the original image.  ...  Specifically, he used computer software to scan Figure 3A in Balagué et al. and then alter the locations of three major bands in an effort to conceal the origin of the falsified image (i.e., Figure  ...  Type of Request: Reinstatement of a previously approved collection for which approval has expired.  ... 
pmid:27737097 pmcid:PMC5019711 fatcat:afgj7u4hyvegdk4su2lnh3yvrm

Future Information Technology Tools for Fighting Substandard and Falsified Medicines in Low- and Middle-Income Countries

Huma Rasheed, Ludwig Höllein, Ulrike Holzgrabe
2018 Frontiers in Pharmacology  
Substandard and falsified (SF) medicines have emerged as a global public health issue within the last two decades especially in low-and middle-income countries (LMICs).  ...  The principles discussed herein are making profound impact in the fight against substandard and falsified medicines, offering cheap and accessible solutions.  ...  of falsified medicines.  ... 
doi:10.3389/fphar.2018.00995 pmid:30233373 pmcid:PMC6127459 fatcat:bkjc4yfnpzfk7ea3ca5hsreohu

Monotone digital signatures: an application in software copy protection

Edlira Martiri, Artur Baxhaku
2012 Procedia Technology - Elsevier  
According to this idea we have built an ID generation scheme which can be used in many situations where is needed such a level of security. We will apply this technique in software copy protection.  ...  One of the ways to fight duplication, software piracy and not only, is the usage of digital signatures.  ...  With all these a falsifier would build "real" signatures which would not be perceived as such at level j of control.  ... 
doi:10.1016/j.protcy.2012.02.058 fatcat:apkini5gsnaorp65cqvyr45qyq

Quantitative screening of the pharmaceutical ingredient for the rapid identification of substandard and falsified medicines using reflectance infrared spectroscopy

Graham Lawson, John Ogwu, Sangeeta Tanna, Mohammad Shahid
2018 PLoS ONE  
The World Health Organization suggests that approximately 10% of medicines worldwide are either falsified or substandard with higher figures in low and middle income countries.  ...  Such poor quality medicines can seriously harm patients and pose a threat to the economy worldwide.  ...  However, constituents of a mixture below 10% w/w could not be identified using this software.  ... 
doi:10.1371/journal.pone.0202059 pmid:30096202 pmcid:PMC6086453 fatcat:rsp42cophbbcpb3l2higiejkmu

Integration of Novel Low-Cost Colorimetric, Laser Photometric, and Visual Fluorescent Techniques for Rapid Identification of Falsified Medicines in Resource-Poor Areas: Application to Artemether–Lumefantrine

Michael D. Green, Dana M. Hostetler, Henry Nettey, Nicola Ranieri, Paul N. Newton, Isabel Swamidoss
2015 American Journal of Tropical Medicine and Hygiene  
Therefore, we suggest a three-tiered drug evaluation strategy for identifying a falsified drug in resource-poor areas.  ...  Image analysis software is used for the assessments. Although artemether-lumefantrine is used as an example, the strategy may be adapted to other medicines.  ...  As a result, specialized software may be required to interpret or detect subtle spectral differences.  ... 
doi:10.4269/ajtmh.14-0832 pmid:25897066 pmcid:PMC4455085 fatcat:3mbje6ilfjffnoxzhxktira5dq

Utilization of Blockchain Technology for Management E-Certificate Open Journal System

Farida Agustin, Qurotul Aini, Alfiah Khoirunisa, Efa Ayu Nabila
2020 Aptisi Transactions on Management (ATM)  
By using blockchain technology, the data collected will be well managed and not easily falsified.  ...  Observation on the open journal system and applied blockchain tools in the form of blockcerts as a place to issue e-certificates with guaranteed security so that e-certificates are verified as well as  ...  Also with a different transcript each block, it will not be possible for server users to duplicate and falsify data.  ... 
doi:10.33050/atm.v4i2.1293 fatcat:ekukkzq4bbe2zmtpfodrrt2kli
« Previous Showing results 1 — 15 out of 21,386 results