Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Brothers - In - Arms: Visual Commonalities Between The Us And Is Recruitment Strategies, Maha Ghalwash, Lawrie Phillips Dec 2021

Brothers - In - Arms: Visual Commonalities Between The Us And Is Recruitment Strategies, Maha Ghalwash, Lawrie Phillips

Political Science

This article claims that the visual image contributes to, reflects and supports the dominant discourse of two powerful armed groups that have operated in Iraq and Syria: the US military and the Islamic State (IS). This research uses multimodal discourse analysis to explore two crucial insights into the ideological power of the visual image: the power of the image as spectatorship or spectacle and the sublime or transcendental nature of the visual image. The authors conclude that US and IS recruitment and propaganda videos share these two crucial ideological elements: pride in the spectacle of their military power, discipline and …


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Utilizing Qr Codes To Verify The Visual Fidelity Of Image Datasets For Machine Learning, Yang-Wai Chow, Willy Susilo, Jianfang Wang, Richard Buckland, Joon Sang Baek, Jongkil Kim, Nan Li Jan 2021

Utilizing Qr Codes To Verify The Visual Fidelity Of Image Datasets For Machine Learning, Yang-Wai Chow, Willy Susilo, Jianfang Wang, Richard Buckland, Joon Sang Baek, Jongkil Kim, Nan Li

Faculty of Engineering and Information Sciences - Papers: Part B

Machine learning is becoming increasingly popular in modern technology and has been adopted in various application areas. However, researchers have demonstrated that machine learning models are vulnerable to adversarial examples in their inputs, which has given rise to a field of research known as adversarial machine learning. Potential adversarial attacks include methods of poisoning datasets by perturbing input samples to mislead machine learning models into producing undesirable results. While such perturbations are often subtle and imperceptible from the perspective of a human, they can greatly affect the performance of machine learning models. This paper presents two methods of verifying the …


Young People’S Perceptions Towards Librarians: An Exploratory Study Of Students Of Five Senior High Schools In Ghana, Samuel Abban, Reuben Saah Jan 2021

Young People’S Perceptions Towards Librarians: An Exploratory Study Of Students Of Five Senior High Schools In Ghana, Samuel Abban, Reuben Saah

Library Philosophy and Practice (e-journal)

This study sought to discover young people’s impressions of librarians and their work. Three Hundred and Fifty Three Senior High School (SHS) students were selected using proportionate stratified sampling technique for the study. Using the survey descriptive method, structured questionnaires were randomly administered. Three Hundred and Twenty Six, representing 92% of the questionnaires were retrieved and found usable. The study includes a comparison of a librarian with nine other professional groups based on five criteria considered to be essential determining factors when choosing a profession. The study revealed that the students’ had low level of awareness of librarians, lacked understanding …