accidental error
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 2)

H-INDEX

5
(FIVE YEARS 0)

2022 ◽  
Author(s):  
Saoirse Connor Desai ◽  
Stian Reimers

Misinformation often has a continuing influence on event-related reasoning even when it is clearly and credibly corrected; this is referred to as the continued influence effect. The present work investigated whether a correction’s effectiveness can be improved by explaining how the misinformation originated. Two experiments examined whether a correction that explained misinformation as originating from intentional deception, or an unintentional error were more effective than a correction that only identified the misinformation as false. Experiment 1 found that corrections which explained the misinformation as intentionally or unintentionally misleading were as effective as a correction that was not accompanied by an explanation for how the misinformation originated. We replicated this in Experiment 2 and found substantial attenuation of thecontinued influence effect in a novel scenario with the same underlying structure.Overall, the results suggest that informing people that the misinformation originated from a deliberate lie or accidental error may not be an effective correction strategy over and above stating that the misinformation is false.


2020 ◽  
Vol 3 (4) ◽  
pp. 193
Author(s):  
Ahmad Nasrullah ◽  
Bukhari Muslim ◽  
Christian Harta Wijaya ◽  
Deni Pirmantara ◽  
Aries Saifudin

The accuracy of the output of the employee selection application for promotion is very important, because if something goes wrong it can harm the company. Employees who are selected and misplaced can cause lower performance of the employee concerned or other employees. To ensure that the resulting promotion application has met the requirements and is free from defects / errors, testing is necessary. In this study, it is proposed to do black box testing using the Equivalence Partition technique. Black Box testing is carried out based on the resulting input and output values regardless of the process or algorithm in the application. Meanwhile, the Equvalence Partition technique is done by dividing the input value domains into valid and invalid groups, then selecting and using one of the values from each of these groups. Testing the promotion selection application is carried out on 4 forms, namely the Add Criteria form, Edit Criteria, Add Alternatives, and Edit Alternatives. In this test, 8 test cases were made. The results of this test ensure the quality of the Promotion Promotion application is free from errors by finding an accidental error in the Promotion Promotion Selection application at PT Maju Makmur.


First Monday ◽  
2015 ◽  
Author(s):  
Jenny Sundén

his paper develops an understanding of gender as something fundamentally technological, and as such broken. Drawing on the technological undercurrent in current posthumanist feminist theory, it puts into play a vocabulary of malfunctioning, broken, vulnerable technologies, and in particular uses the term ‘glitch’ to account for machinic failures in gender within the digital domain. As an intriguing example of the technologies of (trans)gender, the core example consists of the social media presence and public transition of Isabella Bunny Bennett — a musical performer and a member of the U.S.-based band Steam Powered Giraffe. Drawing on how glitch is understood as an accidental error and a critical potential in aesthetic practices, the article is a contribution to what recently has been coined ‘glitch feminism.’


2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
Dan Tang ◽  
Kai Chen ◽  
XiaoSu Chen ◽  
HuiYu Liu ◽  
Xinhua Li

The low-rate denial of service (LDoS) attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time the accuracy of the current detection methods for LDoS attacks is relatively low. As the fact that LDoS attacks led to abnormal distribution of the ACK traffic, LDoS attacks can be detected by analyzing the distribution characteristics of ACK traffic. Then traditional EWMA algorithm which can smooth the accidental error while being the same as the exceptional mutation may cause some misjudgment; therefore a new LDoS detection method based on adaptive EWMA (AEWMA) algorithm is proposed. The AEWMA algorithm which uses an adaptive weighting function instead of the constant weighting of EWMA algorithm can smooth the accidental error and retain the exceptional mutation. So AEWMA method is more beneficial than EWMA method for analyzing and measuring the abnormal distribution of ACK traffic. The NS2 simulations show that AEWMA method can detect LDoS attacks effectively and has a low false negative rate and a false positive rate. Based on DARPA99 datasets, experiment results show that AEWMA method is more efficient than EWMA method.


1967 ◽  
Vol 1 (1) ◽  
pp. 31-32
Author(s):  
P. C. Harris ◽  
M. I. Large

The usual method of calculating corrections for precession nutation and aberration involves the use of the precession constants M, N, m, n and the Day Numbers A, B, C, D, E, J, J’. For the computer analysis of radio source data obtained with the Molonglo Telescope it seemed desirable to compute the corrections directly from the basic formulae, thus avoiding the trouble and possibility of accidental error in copying out the Day Numbers for each day’s observation. In this paper we quote in full the equations that are used in the analysis of the Molonglo data. These equations are abstracted from The Explanatory Supplement to the Astronomical Ephemeris and Smart’s Spherical Astronomy, and expressed in a form which parallels the organization of the computer routine. In addition to the observed position, the only other data required to compute the precession nutation and aberration corrections is the Julian date (J.D.). This basic parameter in the equations is very simply calculated to the required accuracy of a few minutes from the time and date of the observation. The computer routine that computes the corrections occupies 1350 words of programme in the KDF9 computer and takes 200 msec to compute one position. If a large number of computations are being carried out on continuous data, then the average time per computation is only 5 msec as a full computation of the coefficients does not have to be made for each point separately.


1960 ◽  
Vol 2 ◽  
pp. 35-42 ◽  
Author(s):  
Benjamin Schwartz
Keyword(s):  

The following remarks (which I hope will be my last on Prof. Wittfogel's “The Legend of ‘Maoism’”) will hardly bear the appearance of a coherent essay. They are simply a collection of fragmentary replies to his own fragmentary points of attack. For some years now Prof. Wittfogel has been obsessed with the view that Fairbank, Schwartz and Brandt (an indivisible entity) have committed an “error” (not an accidental error!) which has led to incalculably evil results in our struggle with world Communism.


Sign in / Sign up

Export Citation Format

Share Document