956 resultados para False confession
Resumo:
In this paper, we describe a method to represent and discover adversarial group behavior in a continuous domain. In comparison to other types of behavior, adversarial behavior is heavily structured as the location of a player (or agent) is dependent both on their teammates and adversaries, in addition to the tactics or strategies of the team. We present a method which can exploit this relationship through the use of a spatiotemporal basis model. As players constantly change roles during a match, we show that employing a "role-based" representation instead of one based on player "identity" can best exploit the playing structure. As vision-based systems currently do not provide perfect detection/tracking (e.g. missed or false detections), we show that our compact representation can effectively "denoise" erroneous detections as well as enabe temporal analysis, which was previously prohibitive due to the dimensionality of the signal. To evaluate our approach, we used a fully instrumented field-hockey pitch with 8 fixed high-definition (HD) cameras and evaluated our approach on approximately 200,000 frames of data from a state-of-the-art real-time player detector and compare it to manually labelled data.
Resumo:
Reliability of the performance of biometric identity verification systems remains a significant challenge. Individual biometric samples of the same person (identity class) are not identical at each presentation and performance degradation arises from intra-class variability and inter-class similarity. These limitations lead to false accepts and false rejects that are dependent. It is therefore difficult to reduce the rate of one type of error without increasing the other. The focus of this dissertation is to investigate a method based on classifier fusion techniques to better control the trade-off between the verification errors using text-dependent speaker verification as the test platform. A sequential classifier fusion architecture that integrates multi-instance and multisample fusion schemes is proposed. This fusion method enables a controlled trade-off between false alarms and false rejects. For statistically independent classifier decisions, analytical expressions for each type of verification error are derived using base classifier performances. As this assumption may not be always valid, these expressions are modified to incorporate the correlation between statistically dependent decisions from clients and impostors. The architecture is empirically evaluated by applying the proposed architecture for text dependent speaker verification using the Hidden Markov Model based digit dependent speaker models in each stage with multiple attempts for each digit utterance. The trade-off between the verification errors is controlled using the parameters, number of decision stages (instances) and the number of attempts at each decision stage (samples), fine-tuned on evaluation/tune set. The statistical validation of the derived expressions for error estimates is evaluated on test data. The performance of the sequential method is further demonstrated to depend on the order of the combination of digits (instances) and the nature of repetitive attempts (samples). The false rejection and false acceptance rates for proposed fusion are estimated using the base classifier performances, the variance in correlation between classifier decisions and the sequence of classifiers with favourable dependence selected using the 'Sequential Error Ratio' criteria. The error rates are better estimated by incorporating user-dependent (such as speaker-dependent thresholds and speaker-specific digit combinations) and class-dependent (such as clientimpostor dependent favourable combinations and class-error based threshold estimation) information. The proposed architecture is desirable in most of the speaker verification applications such as remote authentication, telephone and internet shopping applications. The tuning of parameters - the number of instances and samples - serve both the security and user convenience requirements of speaker-specific verification. The architecture investigated here is applicable to verification using other biometric modalities such as handwriting, fingerprints and key strokes.
Resumo:
Taking an empirical, critical approach to the problem of drugs, this thesis explores the interaction of drug policies and young people's drug use in Brisbane. The research argues that criminalising drug users does not usually prevent harmful drug use, but it can exacerbate harm and change how young people use drugs. Contemporary understandings of drug use as either recreational or addictive can create a false binary, and influence how illicit drugs are used. These understandings interact with policy responses to the drug problem, with some very real implications for the lived experiences of drug users. This research opens up possibilities for new directions in drug research and allows for a redefinition of drug related harm.
Resumo:
Numbers, rates and proportions of those remanded in custody have increased significantly in recent decades across a range of jurisdictions. In Australia they have doubled since the early 1980s, such that close to one in four prisoners is currently unconvicted. Taking NSW as a case study and drawing on the recent New South Wales Law Reform Commission Report on Bail (2012), this article will identify the key drivers of this increase in NSW, predominantly a form of legislative hyperactivity involving constant changes to the Bail Act 1978 (NSW), changes which remove or restrict the presumption in favour of bail for a wide range of offences. The article will then examine some of the conceptual, cultural and practice shifts underlying the increase. These include: a shift away from a conception of bail as a procedural issue predominantly concerned with securing the attendance of the accused at trial and the integrity of the trial, to the use of bail for crime prevention purposes; the diminishing force of the presumption of innocence; the framing of a false opposition between an individual interest in liberty and a public interest in safety; a shift from determination of the individual case by reference to its own particular circumstances to determination by its classification within pre‐set legislative categories of offence types and previous convictions; a double jeopardy effect arising in relation to people with previous convictions for which they have already been punished; and an unacknowledged preventive detention effect arising from the increased emphasis on risk. Many of these conceptual shifts are apparent in the explosion in bail conditions and the KPI‐driven policing of bail conditions and consequent rise in revocations, especially in relation to juveniles. The paper will conclude with a note on the NSW Government’s response to the NSW LRC Report in the form of a Bail Bill (2013) and brief speculation as to its likely effects.
Resumo:
Genetic variability in the strength and precision of fear memory is hypothesised to contribute to the etiology of anxiety disorders, including post-traumatic stress disorder. We generated fear-susceptible (F-S) or fear-resistant (F-R) phenotypes from an F8 advanced intercross line (AIL) of C57BL/6J and DBA/2J inbred mice by selective breeding. We identified specific traits underlying individual variability in Pavlovian conditioned fear learning and memory. Offspring of selected lines differed in the acquisition of conditioned fear. Furthermore, F-S mice showed greater cued fear memory and generalised fear in response to a novel context than F-R mice. F-S mice showed greater basal corticosterone levels and hypothalamic corticotrophin-releasing hormone (CRH) mRNA levels than F-R mice, consistent with higher hypothalamic-pituitary-adrenal (HPA) axis drive. Hypothalamic mineralocorticoid receptor and CRH receptor 1 mRNA levels were decreased in F-S mice as compared with F-R mice. Manganese-enhanced magnetic resonance imaging (MEMRI) was used to investigate basal levels of brain activity. MEMRI identified a pattern of increased brain activity in F-S mice that was driven primarily by the hippocampus and amygdala, indicating excessive limbic circuit activity in F-S mice as compared with F-R mice. Thus, selection pressure applied to the AIL population leads to the accumulation of heritable trait-relevant characteristics within each line, whereas non-behaviorally relevant traits remain distributed. Selected lines therefore minimise false-positive associations between behavioral phenotypes and physiology. We demonstrate that intrinsic differences in HPA axis function and limbic excitability contribute to phenotypic differences in the acquisition and consolidation of associative fear memory. Identification of system-wide traits predisposing to variability in fear memory may help in the direction of more targeted and efficacious treatments for fear-related pathology. Through short-term selection in a B6D2 advanced intercross line we created mouse populations divergent for the retention of Pavlovian fear memory. Trait distinctions in HPA-axis drive and fear network circuitry could be made between naïve animals in the two lines. These data demonstrate underlying physiological and neurological differences between Fear-Susceptible and Fear-Resistant animals in a natural population. F-S and F-R mice may therefore be relevant to a spectrum of disorders including depression, anxiety disorders and PTSD for which altered fear processing occurs.
Resumo:
Suicide is a serious public health issue that results from an interaction between multiple risk factors including individual vulnerabilities to complex feelings of hopelessness, fear, and stress. Although kinase genes have been implicated in fear and stress, including the consolidation and extinction of fearful memories, expression profiles of those genes in the brain of suicide victims are less clear. Using gene expression microarray data from the Online Stanley Genomics Database 1 and a quantitative PCR, we investigated the expression profiles of multiple kinase genes including the calcium calmodulin-dependent kinase (CAMK), the cyclin-dependent kinase, the mitogen-activated protein kinase (MAPK), and the protein kinase C (PKC) in the prefrontal cortex (PFC) of mood disorder patients died with suicide (N = 45) and without suicide (N = 38). We also investigated the expression pattern of the same genes in the PFC of developing humans ranging in age from birth to 49 year (N = 46). The expression levels of CAMK2B, CDK5, MAPK9, and PRKCI were increased in the PFC of suicide victims as compared to non-suicide controls (false discovery rate, FDR-adjusted p < 0.05, fold change >1.1). Those genes also showed changes in expression pattern during the postnatal development (FDR-adjusted p < 0.05). These results suggest that multiple kinase genes undergo age-dependent changes in normal brains as well as pathological changes in suicide brains. These findings may provide an important link to protein kinases known to be important for the development of fear memory, stress associated neural plasticity, and up-regulation in the PFC of suicide victims. More research is needed to better understand the functional role of these kinase genes that may be associated with the pathophysiology of suicide
Resumo:
Crashes that occur on motorways contribute to a significant proportion (40-50%) of non-recurrent motorway congestion. Hence, reducing the frequency of crashes assist in addressing congestion issues (Meyer, 2008). Analysing traffic conditions and discovering risky traffic trends and patterns are essential basics in crash likelihood estimations studies and still require more attention and investigation. In this paper we will show, through data mining techniques, that there is a relationship between pre-crash traffic flow patterns and crash occurrence on motorways, compare them with normal traffic trends, and that this knowledge has the potentiality to improve the accuracy of existing crash likelihood estimation models, and opens the path for new development approaches. The data for the analysis was extracted from records collected between 2007 and 2009 on the Shibuya and Shinjuku lines of the Tokyo Metropolitan Expressway in Japan. The dataset includes a total of 824 rear-end and sideswipe crashes that have been matched with crashes corresponding traffic flow data using an incident detection algorithm. Traffic trends (traffic speed time series) revealed that crashes can be clustered with regards to the dominant traffic patterns prior to the crash occurrence. K-Means clustering algorithm applied to determine dominant pre-crash traffic patterns. In the first phase of this research, traffic regimes identified by analysing crashes and normal traffic situations using half an hour speed in upstream locations of crashes. Then, the second phase investigated the different combination of speed risk indicators to distinguish crashes from normal traffic situations more precisely. Five major trends have been found in the first phase of this paper for both high risk and normal conditions. The study discovered traffic regimes had differences in the speed trends. Moreover, the second phase explains that spatiotemporal difference of speed is a better risk indicator among different combinations of speed related risk indicators. Based on these findings, crash likelihood estimation models can be fine-tuned to increase accuracy of estimations and minimize false alarms.
Resumo:
During the last three decades, restorative justice has emerged in numerous localities around the world as an accepted approach to responding to crime. This article, which stems from a doctoral study on the history of restorative justice, provides a critical analysis of accepted histories of restorative practices. It revisits the celebrated historical texts of the restorative justice movement, and re-evaluates their contribution to the emergence of restorative justice measures. It traces the emergence of the term 'restorative justice', and reveals that it emerged in much earlier writings than is commonly thought to be the case by scholars in the restorative justice field. It also briefly considers some 'power struggles' in relation to producing an accepted version of the history of restorative justice, and scholars' attempts to 'rewrite history' to align with current views on restorative justice. Finally, this article argues that some histories of restorative justice selectively and inaccurately portray key figures from the history of criminology as restorative justice supporters. This, it is argued, gives restorative justice a false lineage and operates to legitimise the widespread adoption of restorative justice around the globe.
Resumo:
Research on theory of mind began in the context of determining whether chimpanzees are aware that individuals experience cognitive and emotional states. More recently, this research has involved various groups of children and various tasks, including the false belief task. Based almost exclusively on that paradigm, investigators have concluded that although ``normal'' hearing children develop theory of mind by age 5, children who are autistic or deaf do not do so until much later, perhaps not until their teenage years. The present study explored theory of mind by examining stories told by children who are deaf and hearing (age 9±15 years) for statements ascribing behaviour-relevant states of mind to themselves and others. Both groups produced such attributions, although there were reliable differences between them. Results are discussed in terms of the cognitive abilities assumed to underlie false belief and narrative paradigms and the implications of attributing theory of mind solely on the basis of performance on the false belief task.
Resumo:
Hot spot identification (HSID) aims to identify potential sites—roadway segments, intersections, crosswalks, interchanges, ramps, etc.—with disproportionately high crash risk relative to similar sites. An inefficient HSID methodology might result in either identifying a safe site as high risk (false positive) or a high risk site as safe (false negative), and consequently lead to the misuse the available public funds, to poor investment decisions, and to inefficient risk management practice. Current HSID methods suffer from issues like underreporting of minor injury and property damage only (PDO) crashes, challenges of accounting for crash severity into the methodology, and selection of a proper safety performance function to model crash data that is often heavily skewed by a preponderance of zeros. Addressing these challenges, this paper proposes a combination of a PDO equivalency calculation and quantile regression technique to identify hot spots in a transportation network. In particular, issues related to underreporting and crash severity are tackled by incorporating equivalent PDO crashes, whilst the concerns related to the non-count nature of equivalent PDO crashes and the skewness of crash data are addressed by the non-parametric quantile regression technique. The proposed method identifies covariate effects on various quantiles of a population, rather than the population mean like most methods in practice, which more closely corresponds with how black spots are identified in practice. The proposed methodology is illustrated using rural road segment data from Korea and compared against the traditional EB method with negative binomial regression. Application of a quantile regression model on equivalent PDO crashes enables identification of a set of high-risk sites that reflect the true safety costs to the society, simultaneously reduces the influence of under-reported PDO and minor injury crashes, and overcomes the limitation of traditional NB model in dealing with preponderance of zeros problem or right skewed dataset.
Resumo:
This chapter is concerned with innovation that involves creative cultural occupations, but not within the creative industries. Rather, we examine the operation of cultural creative occupations that exist outside the creative industries - so-called 'embedded creatives' who work across all industry sectors (Cunningham and Higgs 2009). In doing so, we concur with Bilton (2007) that the separation of creative industries from other industries is a 'false step'. All industries must be innovative; however, they also must be able to combine both scientific and artistic creativity, and that creativity comes from the intersection of different thinking styles (Kurtzberg 2005). Moreover, we suggest that there are now detailed empirical studies, as well as a nascent theoretical base, to suggest that the transdisciplinarity which results from embedded cultural creativity is an engine of growth in the broader economy. Thus, it is relevant to both policymakers and managers. This chapter addresses the following questions: What is the role and significance of the embedded creative? Given a paucity of detailed empirical work in the area to date, what can be deduced from what extant literature there is about the nature of employment and management of these workers? And what are the practical implications of these consideration?
Resumo:
For clinical use, in electrocardiogram (ECG) signal analysis it is important to detect not only the centre of the P wave, the QRS complex and the T wave, but also the time intervals, such as the ST segment. Much research focused entirely on qrs complex detection, via methods such as wavelet transforms, spline fitting and neural networks. However, drawbacks include the false classification of a severe noise spike as a QRS complex, possibly requiring manual editing, or the omission of information contained in other regions of the ECG signal. While some attempts were made to develop algorithms to detect additional signal characteristics, such as P and T waves, the reported success rates are subject to change from person-to-person and beat-to-beat. To address this variability we propose the use of Markov-chain Monte Carlo statistical modelling to extract the key features of an ECG signal and we report on a feasibility study to investigate the utility of the approach. The modelling approach is examined with reference to a realistic computer generated ECG signal, where details such as wave morphology and noise levels are variable.
Resumo:
This paper presents a method for the continuous segmentation of dynamic objects using only a vehicle mounted monocular camera without any prior knowledge of the object’s appearance. Prior work in online static/dynamic segmentation is extended to identify multiple instances of dynamic objects by introducing an unsupervised motion clustering step. These clusters are then used to update a multi-class classifier within a self-supervised framework. In contrast to many tracking-by-detection based methods, our system is able to detect dynamic objects without any prior knowledge of their visual appearance shape or location. Furthermore, the classifier is used to propagate labels of the same object in previous frames, which facilitates the continuous tracking of individual objects based on motion. The proposed system is evaluated using recall and false alarm metrics in addition to a new multi-instance labelled dataset to evaluate the performance of segmenting multiple instances of objects.
Resumo:
E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.
Resumo:
This paper explores the slippery nature of illness and diagnosis in Lauren Slater’s memoir, Lying: a Metaphorical Memoir (2000). Speaking from the shadowy intersection of childhood and adolescence, Slater’s narrator, Lauren, uses the metaphor of epilepsy to describe her own predilection for exaggeration. In exploiting the fallibility of the first-person narrator, Slater insists on the legitimacy of metaphor in accounts of childhood illness that are more concerned with narrative truth than historical accuracy. The result of this playfulness and general misrule is that Slater writes herself into a double bind: on one side, she is the child narrator who inadvertently misrepresents events and misdirects readers, and on the other side, she is the untrustworthy author who employs metaphor as a licence to lie.