Results for 'Credit Card Fraud Detection System Machine Learning'

987 found
Order:
  1. How the machine ‘thinks’: Understanding opacity in machine learning algorithms.Jenna Burrell - 2016 - Big Data and Society 3 (1):205395171562251.
    This article considers the issue of opacity as a problem for socially consequential mechanisms of classification and ranking, such as spam filters, credit card fraud detection, search engines, news trends, market segmentation and advertising, insurance or loan qualification, and credit scoring. These mechanisms of classification all frequently rely on computational algorithms, and in many cases on machine learning algorithms to do this work. In this article, I draw a distinction between three forms of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   228 citations  
  2.  63
    Credit Card Fraud Detection through Parenclitic Network Analysis.Massimiliano Zanin, Miguel Romance, Santiago Moral & Regino Criado - 2018 - Complexity 2018:1-9.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  54
    Healthcare and anomaly detection: using machine learning to predict anomalies in heart rate data.Edin Šabić, David Keeley, Bailey Henderson & Sara Nannemann - 2021 - AI and Society 36 (1):149-158.
    The application of machine learning algorithms to healthcare data can enhance patient care while also reducing healthcare worker cognitive load. These algorithms can be used to detect anomalous physiological readings, potentially leading to expedited emergency response or new knowledge about the development of a health condition. However, while there has been much research conducted in assessing the performance of anomaly detection algorithms on well-known public datasets, there is less conceptual comparison across unsupervised and supervised performance on physiological (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  27
    A machine learning approach to detecting fraudulent job types.Marcel Naudé, Kolawole John Adebayo & Rohan Nanda - 2023 - AI and Society 38 (2):1013-1024.
    Job seekers find themselves increasingly duped and misled by fraudulent job advertisements, posing a threat to their privacy, security and well-being. There is a clear need for solutions that can protect innocent job seekers. Existing approaches to detecting fraudulent jobs do not scale well, function like a black-box, and lack interpretability, which is essential to guide applicants’ decision-making. Moreover, commonly used lexical features may be insufficient as the representation does not capture contextual semantics of the underlying document. Hence, this paper (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models.Basim Mahbooba, Radhya Sahal, Martin Serrano & Wael Alosaimi - 2021 - Complexity 2021:1-23.
    To design and develop AI-based cybersecurity systems ), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  59
    Machine learning in human creativity: status and perspectives.Mirko Farina, Andrea Lavazza, Giuseppe Sartori & Witold Pedrycz - 2024 - AI and Society 39 (6):3017-3029.
    As we write this research paper, we notice an explosion in popularity of machine learning in numerous fields (ranging from governance, education, and management to criminal justice, fraud detection, and internet of things). In this contribution, rather than focusing on any of those fields, which have been well-reviewed already, we decided to concentrate on a series of more recent applications of deep learning models and technologies that have only recently gained significant track in the relevant (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  81
    Automatic Detection of Focal Cortical Dysplasia Type II in MRI: Is the Application of Surface-Based Morphometry and Machine Learning Promising?Zohreh Ganji, Mohsen Aghaee Hakak, Seyed Amir Zamanpour & Hoda Zare - 2021 - Frontiers in Human Neuroscience 15.
    Background and ObjectivesFocal cortical dysplasia is a type of malformations of cortical development and one of the leading causes of drug-resistant epilepsy. Postoperative results improve the diagnosis of lesions on structural MRIs. Advances in quantitative algorithms have increased the identification of FCD lesions. However, due to significant differences in size, shape, and location of the lesion in different patients and a big deal of time for the objective diagnosis of lesion as well as the dependence of individual interpretation, sensitive approaches (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Detecting racial bias in algorithms and machine learning.Nicol Turner Lee - 2018 - Journal of Information, Communication and Ethics in Society 16 (3):252-260.
    Purpose The online economy has not resolved the issue of racial bias in its applications. While algorithms are procedures that facilitate automated decision-making, or a sequence of unambiguous instructions, bias is a byproduct of these computations, bringing harm to historically disadvantaged populations. This paper argues that algorithmic biases explicitly and implicitly harm racial groups and lead to forms of discrimination. Relying upon sociological and technical research, the paper offers commentary on the need for more workplace diversity within high-tech industries and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  9.  26
    Machine Learning-Based Multitarget Tracking of Motion in Sports Video.Xueliang Zhang & Fu-Qiang Yang - 2021 - Complexity 2021:1-10.
    In this paper, we track the motion of multiple targets in sports videos by a machine learning algorithm and study its tracking technique in depth. In terms of moving target detection, the traditional detection algorithms are analysed theoretically as well as implemented algorithmically, based on which a fusion algorithm of four interframe difference method and background averaging method is proposed for the shortcomings of interframe difference method and background difference method. The fusion algorithm uses the (...) rate to update the background in real time and combines morphological processing to correct the foreground, which can effectively cope with the slow change of the background. According to the requirements of real time, accuracy, and occupying less video memory space in intelligent video surveillance systems, this paper improves the streamlined version of the algorithm. The experimental results show that the improved multitarget tracking algorithm effectively improves the Kalman filter-based algorithm to meet the real-time and accuracy requirements in intelligent video surveillance scenarios. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  1
    Machine learning methods for isolating indigenous language catalog descriptions.Yi Liu, Carrie Heitman, Leen-Kiat Soh & Peter Whiteley - forthcoming - AI and Society:1-11.
    Museum collection databases contain echoes of encounter between colonial collectors (broadly defined) and Indigenous people from around the world. The moment of acquisition—when an item passed out of a community and into the hands of the collector—often included multilingual acts of translation. An artist may have shared the Indigenous name of the object, or the terms associated with its origin and use. Late nineteenth and twemtieth century museum registrars would in turn transcribe this information from field logs into museum catalogs. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  50
    Justificatory explanations in machine learning: for increased transparency through documenting how key concepts drive and underpin design and engineering decisions.David Casacuberta, Ariel Guersenzvaig & Cristian Moyano-Fernández - 2024 - AI and Society 39 (1):279-293.
    Given the pervasiveness of AI systems and their potential negative effects on people’s lives (especially among already marginalised groups), it becomes imperative to comprehend what goes on when an AI system generates a result, and based on what reasons, it is achieved. There are consistent technical efforts for making systems more “explainable” by reducing their opaqueness and increasing their interpretability and explainability. In this paper, we explore an alternative non-technical approach towards explainability that complement existing ones. Leaving aside technical, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  30
    Playing with machines: Using machine learning to understand automated copyright enforcement at scale.Nicolas P. Suzor & Joanne E. Gray - 2020 - Big Data and Society 7 (1).
    This article presents the results of methodological experimentation that utilises machine learning to investigate automated copyright enforcement on YouTube. Using a dataset of 76.7 million YouTube videos, we explore how digital and computational methods can be leveraged to better understand content moderation and copyright enforcement at a large scale.We used the BERT language model to train a machine learning classifier to identify videos in categories that reflect ongoing controversies in copyright takedowns. We use this to explore, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  13
    A hybrid machine learning system to impute and classify a component-based robot.Nuño Basurto, Ángel Arroyo, Carlos Cambra & Álvaro Herrero - 2023 - Logic Journal of the IGPL 31 (2):338-351.
    In the field of cybernetic systems and more specifically in robotics, one of the fundamental objectives is the detection of anomalies in order to minimize loss of time. Following this idea, this paper proposes the implementation of a Hybrid Intelligent System in four steps to impute the missing values, by combining clustering and regression techniques, followed by balancing and classification tasks. This system applies regression models to each one of the clusters built on the instances of data (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  25
    Towards a Framework for Acquisition and Analysis of Speeches to Identify Suspicious Contents through Machine Learning.Md Rashadur Rahman, Mohammad Shamsul Arefin, Md Billal Hossain, Mohammad Ashfak Habib & A. S. M. Kayes - 2020 - Complexity 2020:1-14.
    The most prominent form of human communication and interaction is speech. It plays an indispensable role for expressing emotions, motivating, guiding, and cheering. An ill-intentioned speech can mislead people, societies, and even a nation. A misguided speech can trigger social controversy and can result in violent activities. Every day, there are a lot of speeches being delivered around the world, which are quite impractical to inspect manually. In order to prevent any vicious action resulting from any misguided speech, the development (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. The emergence of “truth machines”?: Artificial intelligence approaches to lie detection.Jo Ann Oravec - 2022 - Ethics and Information Technology 24 (1):1-10.
    This article analyzes emerging artificial intelligence (AI)-enhanced lie detection systems from ethical and human resource (HR) management perspectives. I show how these AI enhancements transform lie detection, followed with analyses as to how the changes can lead to moral problems. Specifically, I examine how these applications of AI introduce human rights issues of fairness, mental privacy, and bias and outline the implications of these changes for HR management. The changes that AI is making to lie detection are (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Neutrosophic speech recognition Algorithm for speech under stress by Machine learning.Florentin Smarandache, D. Nagarajan & Said Broumi - 2023 - Neutrosophic Sets and Systems 53.
    It is well known that the unpredictable speech production brought on by stress from the task at hand has a significant negative impact on the performance of speech processing algorithms. Speech therapy benefits from being able to detect stress in speech. Speech processing performance suffers noticeably when perceptually produced stress causes variations in speech production. Using the acoustic speech signal to objectively characterize speaker stress is one method for assessing production variances brought on by stress. Real-world complexity and ambiguity make (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  19
    Modeling and PID control of quadrotor UAV based on machine learning.Pradeep Kumar Singh, Anton Pljonkin & Lirong Zhou - 2022 - Journal of Intelligent Systems 31 (1):1112-1122.
    The aim of this article was to discuss the modeling and control method of quadrotor unmanned aerial vehicle. In the process of modeling, mechanism modeling and experimental testing are combined, especially the motor and propeller are modeled in detail. Through the understanding of the body structure and flight principle of the quadrotor UAV, the Newton–Euler method is used to analyze the dynamics of the quadrotor UAV, and the mathematical model of the UAV is established under the small angle rotation. Process (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  37
    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model.Basim Mahbooba, Mohan Timilsina, Radhya Sahal & Martin Serrano - 2021 - Complexity 2021:1-11.
    Despite the growing popularity of machine learning models in the cyber-security applications ), most of these models are perceived as a black-box. The eXplainable Artificial Intelligence has become increasingly important to interpret the machine learning models to enhance trust management by allowing human experts to understand the underlying data evidence and causal reasoning. According to IDS, the critical role of trust management is to understand the impact of the malicious data to detect any intrusion in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  22
    A Prediction Method of Electromagnetic Environment Effects for UAV LiDAR Detection System.Min Huang, Dandan Liu, Liyun Ma, Jingyang Wang, Yuming Wang & Yazhou Chen - 2021 - Complexity 2021:1-14.
    With the rapid development of science and technology, UAVs have become a new type of weapon in the informatization battlefield by their advantages of low loss and zero casualty rate. In recent years, UAV navigation electromagnetic decoy and electromagnetic interference crashes have activated widespread international attention. The UAV LiDAR detection system is susceptible to electromagnetic interference in a complex electromagnetic environment, which results in inaccurate detection and causes the mission to fail. Therefore, it is very necessary to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  39
    Deep learning approach to text analysis for human emotion detection from big data.Jia Guo - 2022 - Journal of Intelligent Systems 31 (1):113-126.
    Emotional recognition has arisen as an essential field of study that can expose a variety of valuable inputs. Emotion can be articulated in several means that can be seen, like speech and facial expressions, written text, and gestures. Emotion recognition in a text document is fundamentally a content-based classification issue, including notions from natural language processing (NLP) and deep learning fields. Hence, in this study, deep learning assisted semantic text analysis (DLSTA) has been proposed for human emotion (...) using big data. Emotion detection from textual sources can be done utilizing notions of Natural Language Processing. Word embeddings are extensively utilized for several NLP tasks, like machine translation, sentiment analysis, and question answering. NLP techniques improve the performance of learning-based methods by incorporating the semantic and syntactic features of the text. The numerical outcomes demonstrate that the suggested method achieves an expressively superior quality of human emotion detection rate of 97.22% and the classification accuracy rate of 98.02% with different state-of-the-art methods and can be enhanced by other emotional word embeddings. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  16
    Intensive Cold-Air Invasion Detection and Classification with Deep Learning in Complicated Meteorological Systems.Ming Yang, Hao Ma, Bomin Chen & Guangtao Dong - 2022 - Complexity 2022:1-13.
    Faster R-CNN architecture is used to solve the problems of moving path uncertainty, changeable coverage, and high complexity in cold-air induced large-scale intensive temperature-reduction detection and classification, since those problems usually lead to path identification biases as well as low accuracy and generalization ability of recognition algorithm. In this paper, an improved recognition method of national ITR path in China based on faster R-CNN in complicated meteorological systems is proposed. Firstly, quality control of the original dataset of strong cooling (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  16
    A support system for the detection of abusive clauses in B2C contracts.Sławomir Dadas, Marek Kozłowski, Rafał Poświata, Michał Perełkiewicz, Marcin Białas & Małgorzata Grębowiec - forthcoming - Artificial Intelligence and Law:1-39.
    Many countries employ systemic methods of protecting consumers from unfair business practices. One such practice is the use of abusive clauses in business-to-consumer (B2C) contracts, which unfairly impose additional obligations on the consumer or deprive them of their due rights. This article presents an information system that utilizes artificial intelligence methods to automate contract analysis and to detect abusive clauses. The goal of the system is to support the entire administrative process, from contract acquisition, through text extraction and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  32
    Human Detection Using Partial Least Squares Analysis.W. R. Schwartz, Aniruddha Kembhavi, David Harwood & L. S. Davis - 2009 - Analysis.
    Significant research has been devoted to detecting people in images and videos. In this paper we describe a human de- tection method that augments widely used edge-based fea- tures with texture and color information, providing us with a much richer descriptor set. This augmentation results in an extremely high-dimensional feature space (more than 170,000 dimensions). In such high-dimensional spaces, classical machine learning algorithms such as SVMs are nearly intractable with respect to training. Furthermore, the number of training samples (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  13
    Identification of Accounting Fraud Based on Support Vector Machine and Logistic Regression Model.Rongyuan Qin - 2021 - Complexity 2021:1-11.
    The authenticity of the company’s accounting information is an important guarantee for the effective operation of the capital market. Accounting fraud is the tampering and distortion of the company’s public disclosure information. The continuous outbreak of fraud cases has dealt a heavy blow to the confidence of investors, shaken the credit foundation of the capital market, and hindered the healthy and stable development of the capital market. Therefore, it is of great theoretical and practical significance to carry (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  37
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol.Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García & Carmen Benavides - 2019 - Complexity 2019:1-11.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  17
    The fabrics of machine moderation: Studying the technical, normative, and organizational structure of Perspective API.Yarden Skop & Bernhard Rieder - 2021 - Big Data and Society 8 (2).
    Over recent years, the stakes and complexity of online content moderation have been steadily raised, swelling from concerns about personal conflict in smaller communities to worries about effects on public life and democracy. Because of the massive growth in online expressions, automated tools based on machine learning are increasingly used to moderate speech. While ‘design-based governance’ through complex algorithmic techniques has come under intense scrutiny, critical research covering algorithmic content moderation is still rare. To add to our understanding (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  15
    Unfair clause detection in terms of service across multiple languages.Andrea Galassi, Francesca Lagioia, Agnieszka Jabłonowska & Marco Lippi - forthcoming - Artificial Intelligence and Law.
    Most of the existing natural language processing systems for legal texts are developed for the English language. Nevertheless, there are several application domains where multiple versions of the same documents are provided in different languages, especially inside the European Union. One notable example is given by Terms of Service (ToS). In this paper, we compare different approaches to the task of detecting potential unfair clauses in ToS across multiple languages. In particular, after developing an annotated corpus and a machine (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  55
    Using Machine Learning to Predict Corporate Fraud: Evidence Based on the GONE Framework.Xin Xu, Feng Xiong & Zhe An - 2022 - Journal of Business Ethics 186 (1):137-158.
    This study focuses on a traditional business ethics question and aims to use advanced techniques to improve the performance of corporate fraud prediction. Based on the GONE framework, we adopt the machine learning model to predict the occurrence of corporate fraud in China. We first identify a comprehensive set of fraud-related variables and organize them into each category (i.e., Greed, Opportunity, Need, and Exposure) of the GONE framework. Among the six machine learning models (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  30
    Bangla hate speech detection on social media using attention-based recurrent neural network.Md Nur Hossain, Anik Paul, Abdullah Al Asif & Amit Kumar Das - 2021 - Journal of Intelligent Systems 30 (1):578-591.
    Hate speech has spread more rapidly through the daily use of technology and, most notably, by sharing your opinions or feelings on social media in a negative aspect. Although numerous works have been carried out in detecting hate speeches in English, German, and other languages, very few works have been carried out in the context of the Bengali language. In contrast, millions of people communicate on social media in Bengali. The few existing works that have been carried out need improvements (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  26
    Machine learning techniques applied to detect cyber attacks on web applications.M. Chora & R. Kozik - 2015 - Logic Journal of the IGPL 23 (1):45-56.
  31.  44
    Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying.Patxi Galán-GarcÍa, José Gaviria De La Puerta, Carlos Laorden Gómez, Igor Santos & Pablo García Bringas - 2016 - Logic Journal of the IGPL 24 (1).
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  24
    Machine Learning Approaches for MDD Detection and Emotion Decoding Using EEG Signals.Lijuan Duan, Huifeng Duan, Yuanhua Qiao, Sha Sha, Shunai Qi, Xiaolong Zhang, Juan Huang, Xiaohan Huang & Changming Wang - 2020 - Frontiers in Human Neuroscience 14.
  33.  39
    Automatic Analysis of EEGs Using Big Data and Hybrid Deep Learning Architectures.Meysam Golmohammadi, Amir Hossein Harati Nejad Torbati, Silvia Lopez de Diego, Iyad Obeid & Joseph Picone - 2019 - Frontiers in Human Neuroscience 13:390744.
    Brain monitoring combined with automatic analysis of EEGs provides a clinical decision support tool that can reduce time to diagnosis and assist clinicians in real-time monitoring applications (e.g., neurological intensive care units). Clinicians have indicated that a sensitivity of 95% with specificity below 5% was the minimum requirement for clinical acceptance. In this study, a high-performance automated EEG analysis system based on principles of machine learning and big data is proposed. This hybrid architecture integrates hidden Markov models (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  46
    The Contemplative Classroom, or Learning by Heart in the Age of Google.Barbara Newman - 2013 - Buddhist-Christian Studies 33:3-11.
    In lieu of an abstract, here is a brief excerpt of the content:The Contemplative Classroom, or Learning by Heart in the Age of GoogleBarbara NewmanIn his provocative essay “Slow Knowledge,” David Orr outlines the countervailing assumptions of what he calls “the culture of fast knowledge.” Among these are the widely shared, though rarely examined, beliefs that “only that which can be measured is true knowledge; the more knowledge we have, the better; there are no significant distinctions between information and (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35.  14
    Estimating Systemic Cognitive States from a Mixture of Physiological and Brain Signals.Matthias Scheutz, Shuchin Aeron, Ayca Aygun, J. P. de Ruiter, Sergio Fantini, Cristianne Fernandez, Zachary Haga, Thuan Nguyen & Boyang Lyu - 2024 - Topics in Cognitive Science 16 (3):485-526.
    As human–machine teams are being considered for a variety of mixed-initiative tasks, detecting and being responsive to human cognitive states, in particular systematic cognitive states, is among the most critical capabilities for artificial systems to ensure smooth interactions with humans and high overall team performance. Various human physiological parameters, such as heart rate, respiration rate, blood pressure, and skin conductance, as well as brain activity inferred from functional near-infrared spectroscopy or electroencephalogram, have been linked to different systemic cognitive states, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  99
    Machine Learning, Functions and Goals.Patrick Butlin - 2022 - Croatian Journal of Philosophy 22 (66):351-370.
    Machine learning researchers distinguish between reinforcement learning and supervised learning and refer to reinforcement learning systems as “agents”. This paper vindicates the claim that systems trained by reinforcement learning are agents while those trained by supervised learning are not. Systems of both kinds satisfy Dretske’s criteria for agency, because they both learn to produce outputs selectively in response to inputs. However, reinforcement learning is sensitive to the instrumental value of outputs, giving rise (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  37. (1 other version)Machine Learning and Irresponsible Inference: Morally Assessing the Training Data for Image Recognition Systems.Owen C. King - 2019 - In Matteo Vincenzo D'Alfonso & Don Berkich, On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer Verlag. pp. 265-282.
    Just as humans can draw conclusions responsibly or irresponsibly, so too can computers. Machine learning systems that have been trained on data sets that include irresponsible judgments are likely to yield irresponsible predictions as outputs. In this paper I focus on a particular kind of inference a computer system might make: identification of the intentions with which a person acted on the basis of photographic evidence. Such inferences are liable to be morally objectionable, because of a way (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Egalitarian Machine Learning.Clinton Castro, David O’Brien & Ben Schwan - 2023 - Res Publica 29 (2):237–264.
    Prediction-based decisions, which are often made by utilizing the tools of machine learning, influence nearly all facets of modern life. Ethical concerns about this widespread practice have given rise to the field of fair machine learning and a number of fairness measures, mathematically precise definitions of fairness that purport to determine whether a given prediction-based decision system is fair. Following Reuben Binns (2017), we take ‘fairness’ in this context to be a placeholder for a variety (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  39.  7
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter describes (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  15
    Design and Evaluation of Outlier Detection Based on Semantic Condensed Nearest Neighbor.Nagaraju Devarakonda & M. Rao Batchanaboyina - 2019 - Journal of Intelligent Systems 29 (1):1416-1424.
    Social media contain abundant information about the events or news occurring all over the world. Social media growth has a greater impact on various domains like marketing, e-commerce, health care, e-governance, and politics, etc. Currently, Twitter was developed as one of the social media platforms, and now, it is one of the most popular social media platforms. There are 1 billion user’s profiles and millions of active users, who post tweets daily. In this research, buzz detection in social media (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  15
    Feasibility of a Machine Learning-Based Smartphone Application in Detecting Depression and Anxiety in a Generally Senior Population.David Lin, Tahmida Nazreen, Tomasz Rutowski, Yang Lu, Amir Harati, Elizabeth Shriberg, Piotr Chlebek & Michael Aratow - 2022 - Frontiers in Psychology 13.
    BackgroundDepression and anxiety create a large health burden and increase the risk of premature mortality. Mental health screening is vital, but more sophisticated screening and monitoring methods are needed. The Ellipsis Health App addresses this need by using semantic information from recorded speech to screen for depression and anxiety.ObjectivesThe primary aim of this study is to determine the feasibility of collecting weekly voice samples for mental health screening. Additionally, we aim to demonstrate portability and improved performance of Ellipsis’ machine (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. Machine learning in scientific grant review: algorithmically predicting project efficiency in high energy physics.Vlasta Sikimić & Sandro Radovanović - 2022 - European Journal for Philosophy of Science 12 (3):1-21.
    As more objections have been raised against grant peer-review for being costly and time-consuming, the legitimate question arises whether machine learning algorithms could help assess the epistemic efficiency of the proposed projects. As a case study, we investigated whether project efficiency in high energy physics can be algorithmically predicted based on the data from the proposal. To analyze the potential of algorithmic prediction in HEP, we conducted a study on data about the structure and outcomes of HEP experiments (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  61
    Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data.Reuben Binns & Michael Veale - 2017 - Big Data and Society 4 (2):205395171774353.
    Decisions based on algorithmic, machine learning models can be unfair, reproducing biases in historical data used to train them. While computational techniques are emerging to address aspects of these concerns through communities such as discrimination-aware data mining and fairness, accountability and transparency machine learning, their practical implementation faces real-world challenges. For legal, institutional or commercial reasons, organisations might not hold the data on sensitive attributes such as gender, ethnicity, sexuality or disability needed to diagnose and mitigate (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  44.  42
    A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions. [REVIEW]Mazin Abed Mohammed, Belal Al-Khateeb & Nuha Qais Abdulmajeed - 2022 - Journal of Intelligent Systems 31 (1):855-875.
    Speech is a primary means of human communication and one of the most basic features of human conduct. Voice is an important part of its subsystems. A speech disorder is a condition that affects the ability of a person to speak normally, which occasionally results in voice impairment with psychological and emotional consequences. Early detection of voice problems is a crucial factor. Computer-based procedures are less costly and easier to administer for such purposes than traditional methods. This study highlights (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  18
    Arabic sentiment analysis about online learning to mitigate covid-19.Manal Mostafa Ali - 2021 - Journal of Intelligent Systems 30 (1):524-540.
    The Covid-19 pandemic is forcing organizations to innovate and change their strategies for a new reality. This study collects online learning related tweets in Arabic language to perform a comprehensive emotion mining and sentiment analysis (SA) during the pandemic. The present study exploits Natural Language Processing (NLP) and Machine Learning (ML) algorithms to extract subjective information, determine polarity and detect the feeling. We begin with pulling out the tweets using Twitter APIs and then preparing for intensive preprocessing. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  33
    Machine learning for electric energy consumption forecasting: Application to the Paraguayan system.Félix Morales-Mareco, Miguel García-Torres, Federico Divina, Diego H. Stalder & Carlos Sauer - 2024 - Logic Journal of the IGPL 32 (6):1048-1072.
    In this paper we address the problem of short-term electric energy prediction using a time series forecasting approach applied to data generated by a Paraguayan electricity distribution provider. The dataset used in this work contains data collected over a three-year period. This is the first time that these data have been used; therefore, a preprocessing phase of the data was also performed. In particular, we propose a comparative study of various machine learning and statistical strategies with the objective (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  45
    Machine learning techniques for computer-based decision systems in the operating theatre: application to analgesia delivery.Jose M. Gonzalez-Cava, Rafael Arnay, Juan Albino Mendez-Perez, Ana León, María Martín, Jose A. Reboso, Esteban Jove-Perez & Jose Luis Calvo-Rolle - 2021 - Logic Journal of the IGPL 29 (2):236-250.
    This work focuses on the application of machine learning techniques to assist the clinicians in the administration of analgesic drug during general anaesthesia. Specifically, the main objective is to propose the basis of an intelligent system capable of making decisions to guide the opioid dose changes based on a new nociception monitor, the analgesia nociception index. Clinical data were obtained from 15 patients undergoing cholecystectomy surgery. By means of an off-line study, machine learning techniques were (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  25
    Bias, machine learning, and conceptual engineering.Rachel Etta Rudolph, Elay Shech & Michael Tamir - forthcoming - Philosophical Studies:1-29.
    Large language models (LLMs) such as OpenAI’s ChatGPT reflect, and can potentially perpetuate, social biases in language use. Conceptual engineering aims to revise our concepts to eliminate such bias. We show how machine learning and conceptual engineering can be fruitfully brought together to offer new insights to both conceptual engineers and LLM designers. Specifically, we suggest that LLMs can be used to detect and expose bias in the prototypes associated with concepts, and that LLM de-biasing can serve conceptual (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  49.  15
    Machine overstrain prediction for early detection and effective maintenance: A machine learning algorithm comparison.Bruno Mota, Pedro Faria & Carlos Ramos - forthcoming - Logic Journal of the IGPL.
    Machine stability and energy efficiency have become major issues in the manufacturing industry, primarily during the COVID-19 pandemic where fluctuations in supply and demand were common. As a result, Predictive Maintenance (PdM) has become more desirable, since predicting failures ahead of time allows to avoid downtime and improves stability and energy efficiency in machines. One type of machine failure stands out due to its impact, machine overstrain, which can occur when machines are used beyond their tolerable limit. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  48
    “There must be Someone’s Name Under Every Bit of Text, Even if it is Unimportant or Incorrect”: Plagiarism as a Learning Strategy.Beata Bielska & Mateusz Rutkowski - 2022 - Journal of Academic Ethics 20 (4):479-498.
    The article offers analyses of the phenomenon of copying (plagiarism) in higher education. The analyses were based on a quantitative survey using questionnaires, conducted in 2019 at one of the Polish universities. Plagiarism is discussed here both as an element of the learning process and a subject of public practices. The article presents students’ definitions of plagiarism, their strategies for unclear or difficult situations, their experiences with plagiarism and their opinions on how serious and widespread this phenomenon is. Focusing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 987