2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Zhiqiang Liu ◽  
Hongzhou Zhang ◽  
Shengjin Wang ◽  
Weijun Hong ◽  
Jianhui Ma ◽  
...  

For the sake of measuring the reliability of actual face recognition system with continuous variables, after analyzing system structure, common failures, influencing factors of reliability, and maintenance data of a public security face recognition system in use, we propose a reliability evaluation model based on Continuous Bayesian Network. We design a Clique Tree Propagation algorithm to reason and solve the model, which is realized by R programs, and as a result, the reliability coefficient of the actual system is obtained. Subsequently, we verify the Continuous Bayesian Network by comparing its evaluation results with those of traditional Bayesian Network and Ground Truth. According to these evaluation results, we find out some weaknesses of the system and propose some optimization strategies by the way of finding the right remedies and filling in blanks. In this paper, we synthetically apply a variety of methods, such as qualitative analysis, quantitative analysis, theoretical analysis, and empirical analysis, to solve the unascertained causal reasoning problem. The evaluation method is reasonable and valid, the results are consistent with realities and objective, and the proposed strategies are very operable and targeted. This work is of theoretical significance to research on reliability theory. It is also of practical significance to the improvement of the system’s reliability and the ability of public order maintenance.


Author(s):  
Jonathon Keats

The Chinese government declared 1996 the Year of the Internet. There wasn’t much to it: only one person in ten thousand was connected—at a modem speed of 14.4 kilobits per second—and 86 percent of the population had never encountered a computer. Even in universities email was still a novelty, haltingly introduced in 1994. Yet in one respect China was the most advanced nation on the planet. Using equipment supplied by Sun Microsystems and Cisco, the Chinese Public Security Bureau had corralled the entire country, all 3,705,000 square miles, within a fanghuo qiang, or firewall. The firewall promised to make the internet safe for autocracy. All online communication could be monitored, at least in principle, and access to any website could be denied. On February 1, 1996, Premier Li Peng signed State Council Order 195, officially placing the government “in charge of overall planning, national standardization, graded control, and the development of all areas related to the internet,” and expressly forbidding users “to endanger national security or betray state secrets.” Enforcement was arbitrary. Discipline was imposed by the dread of uncertainty. This was an inevitability, since the Public Security Bureau couldn’t possibly watch all online activity within China, let alone block every objectionable web page worldwide. Interviewed by Wired magazine, the computer engineer overseeing the fanghuo qiang bluntly explained his working policy: “You make a problem for us, and we’ll make a law for you.” In many countries such a firewall might have stifled development, but most Chinese weren’t interested in making problems. They were attracted to the internet’s dazzling potential, as advertised on billboards that encouraged them to “join the internet club, meet today’s successful people, experience the spirit of the age, drink deep of the cup of leisure.” Those who could afford a connection, which cost approximately half the monthly salary of a recent college graduate, casually referred to the fanghuo qiang as the wangguan , calmly evoking the many guan (passes) of the Great Wall as natural features of China’s wan wei wang (ten-thousand-dimensional web).


2010 ◽  
Vol 69 (3) ◽  
pp. 161-167 ◽  
Author(s):  
Jisien Yang ◽  
Adrian Schwaninger

Configural processing has been considered the major contributor to the face inversion effect (FIE) in face recognition. However, most researchers have only obtained the FIE with one specific ratio of configural alteration. It remains unclear whether the ratio of configural alteration itself can mediate the occurrence of the FIE. We aimed to clarify this issue by manipulating the configural information parametrically using six different ratios, ranging from 4% to 24%. Participants were asked to judge whether a pair of faces were entirely identical or different. The paired faces that were to be compared were presented either simultaneously (Experiment 1) or sequentially (Experiment 2). Both experiments revealed that the FIE was observed only when the ratio of configural alteration was in the intermediate range. These results indicate that even though the FIE has been frequently adopted as an index to examine the underlying mechanism of face processing, the emergence of the FIE is not robust with any configural alteration but dependent on the ratio of configural alteration.


Author(s):  
Chrisanthi Nega

Abstract. Four experiments were conducted investigating the effect of size congruency on facial recognition memory, measured by remember, know and guess responses. Different study times were employed, that is extremely short (300 and 700 ms), short (1,000 ms), and long times (5,000 ms). With the short study time (1,000 ms) size congruency occurred in knowing. With the long study time the effect of size congruency occurred in remembering. These results support the distinctiveness/fluency account of remembering and knowing as well as the memory systems account, since the size congruency effect that occurred in knowing under conditions that facilitated perceptual fluency also occurred independently in remembering under conditions that facilitated elaborative encoding. They do not support the idea that remember and know responses reflect differences in trace strength.


Sign in / Sign up

Export Citation Format

Share Document