8,189 results on '"Offensive"'
Search Results
2. Pregătirea de foc a ofensivei -- necesitatea actualizării algoritmului de planificare.
- Author
-
MIREA, Adrian
- Subjects
RUSSIA-Ukraine Conflict, 2014- ,MILITARY supplies ,ARMED Forces ,BATTLEFIELDS ,ALGORITHMS - Abstract
Copyright of Bulletin of the 'Carol I' National Defence University / Buletinul Universitatii Nationale de Aparare 'Carol I' is the property of Carol I National Defence University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
3. Offensive Language and Hate Speech Detection using BERT Model
- Author
-
Fadila Shely Amalia and Yohanes Suyanto
- Subjects
hate speech ,offensive ,deep learning ,bert ,twitter ,Cybernetics ,Q300-390 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Hate speech detection is an important issue in sentiment analysis and natural language processing. This study aims to improve the effectiveness of hate speech detection in English text using the BERT model, along with modified preprocessing techniques to enhance the F1-score. The dataset, sourced from Kaggle, contains English text with hate speech content. Evaluation results show a significant improvement in the model's accuracy and overall text classification performance. The BERT model achieved 89.11% accuracy on test data, correctly predicting 85 out of 95 samples. While the model excels at classifying offensive text with around 95% accuracy, it struggles to distinguish between hate and offensive text, with some confusion between neither and offensive categories. The classification report shows F1-scores of 0.43 for the hate class, 0.94 for the offensive class, and 0.84 for the neither class, with a weighted average F1-score of 0.89 and a macro average of 0.73. These results indicate that the BERT model delivers solid performance in detecting hate speech, though there is room for improvement, particularly in distinguishing certain classes.
- Published
- 2024
- Full Text
- View/download PDF
4. Case Study of Sexual Child Abuse
- Author
-
Mohammad, Gousheen, Ram Pandu, Ch., Bushra, Saleha, Shaik, Aminabee, Shaik, Aminabee, editor, Thota, Suguna Leelavathi, editor, and Atmakuri, Lakshmana Rao, editor
- Published
- 2024
- Full Text
- View/download PDF
5. Protection of Children from Sexual Exploitation
- Author
-
Peeriga, Raveesha, Yarlagadda, Lakshmi Chakradhar, Alla, Narayana Rao, Shaik, Aminabee, editor, Thota, Suguna Leelavathi, editor, and Atmakuri, Lakshmana Rao, editor
- Published
- 2024
- Full Text
- View/download PDF
6. Ads from HELL: Complaining about the use of religion in advertising.
- Author
-
Fastnedge, Daniel and Gould, Melissa L.
- Subjects
BRANDING (Marketing) ,CULTURAL awareness ,THEMATIC analysis ,SOCIAL norms ,REPUTATION - Abstract
HELL Pizza's advertising is characterized by its provocative art, audacious copy and bold tactics that relishes in its hellish reputation. Rather than merely relying on attention-grabbing stunts, the brand employs strategies that tap into the deep-seated cultural norms of its audience. Often deemed controversial, HELL's advertising elicits strong public reactions, serving as a mirror reflecting the evolving cultural and moral sensitivities and the place of Christianity in Aotearoa New Zealand. This article critically examines the official complaints about the use of religious references in HELL's advertising to the Advertising Standards Authority (ASA) in Aotearoa New Zealand. Using thematic analysis, we analyse how 'offense' and references to Christianity are navigated by the public complainant, the ASA and the brand, in 79 rulings between 2005 and 2021. We conclude that while the brand consistently negotiates a fine line between edgy humour and potential offense, the ASA rulings suggest a societal trend leaning towards freedom of artistic expression, even when intertwined with religious undertones, particularly when a brand has a well-established identity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Political Parties and Civility in Parliament: The Case of Australia from 1901 to 2020.
- Author
-
Arranz, Alfonso Martínez, Zech, Steven T, and Bonotti, Matteo
- Subjects
- *
POLITICAL parties , *COURTESY , *GREEN movement , *LEGISLATIVE bodies , *RIGHT & left (Political science) , *GROUNDED theory , *FREEDOM of the press - Abstract
Incivility in parliaments is always prominently displayed in media reports, often with the implicit or explicit commentary that the situation is getting worse. This paper processes and analyses the records of verbal interactions in the Australian Parliament for over 100 years to provide a first approximation on the evolution of civility. It provides a framework for understanding the multidimensional nature of civility that examines both 'politeness' and 'argumentation', with the latter grounded in notions of public-mindedness. The analysis focuses on the interactions between parties of the orators and the party in power, the chamber of utterance, and the year. The results indicate that instances of impoliteness have increased since the 1970s but only modestly and remain highly infrequent. Minor parties, particularly those representing right-wing and Green politics are more likely to use dismissive or offensive language than the dominant centre-left and centre-right parties, although direct insults and swearwords are the particular remits of right-wing 'system-wrecker' parties. All these minor parties, nonetheless, also display higher levels of argumentation in their interventions. This combination of aggressive language and increased argumentation highlights the pressures on minor parties to convey their points in a forceful way, a challenge that is particularly pressing in two-party systems like the Australian one. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. An analysis of transition-resulted goal scoring patterns in football leagues: a comparison of the first 5 rounds and the last 5 rounds prior midway of the season
- Author
-
Pedro Eusebio, Pablo Prieto-González, and Rui Marcelino
- Subjects
Playing patterns ,Offensive ,Defensive processes ,Offensive transition ,Game moments ,Tactical strategies ,Sports medicine ,RC1200-1245 - Abstract
Abstract Objective This study investigated the concept of ‘game style’ in football, focusing on a team’s distinctive approach characterized by tactics, formations, and strategies. The objective is to compare goal-scoring patterns related to “non-offensive transition,” “set pieces,” “offensive transition,” and “positive outcomes” across different league groups. Methodology: The sample comprises 702 football games, categorized into three league groups: Top Leagues, Marginal Leagues, and Emerging Leagues. A total of 2140 goals were analyzed, classifying them into four types: “No Transitions”, “Set Pieces”, “Offensive Transitions (direct), and “Positive Outcomes” of offensive transitions. The study aims to identify relevant differences between two distinct competitive periods, namely “Rounds 1 to 5” and “Rounds Last 5.” Results: The analysis reveals no significant differences in scoring methods between “Rounds 1 to 5” and “Rounds Last 5” across all variables in the analyzed league groups, except for goals conceded by “No Transition” in the Emerging Leagues. Additionally, results indicate that goals resulting from direct offensive transitions and positive outcomes substantially impact the Top Leagues, constituting 54% of the total scoring. Conclusion: The study emphasizes the importance of establishing and maintaining consolidated game patterns, as demonstrated by the consistent scoring patterns across different league groups. While most leagues show no variations in scoring methods between early and late rounds, attention to goals conceded by “No Transition” in Emerging Leagues is warranted. The prominence of direct offensive transitions and positive outcomes in Top Leagues highlights the relevance of these strategies in the scoring process, emphasizing the need for teams to focus on developing and implementing effective game patterns.
- Published
- 2024
- Full Text
- View/download PDF
9. An analysis of transition-resulted goal scoring patterns in football leagues: a comparison of the first 5 rounds and the last 5 rounds prior midway of the season
- Author
-
Eusebio, Pedro, Prieto-González, Pablo, and Marcelino, Rui
- Published
- 2024
- Full Text
- View/download PDF
10. Experience in the Use of Smoke to Mask the Combat Operations of the Red Army Troops During the Great Patriotic War
- Author
-
A. О. Smirnov, G. Yu. Polyakova, D. E. Mutasov, and E. V. Bondarenko
- Subjects
cover for troop maneuvers ,efficient use of fumes ,front of smoke screens ,great patriotic war ,masking smokes ,offensive ,smoke products ,Military Science - Abstract
The means of smoke camouflage made it possible to carry out many effective operations, while saving and saving many soldiers' lives. The purpose of the work is to summarize the experience of using smoke to mask the combat operations of the Red Army troops during the Great Patriotic War. Materials and research methods. In chronological order, we analyzed documents stored in the Central Archive of the Ministry of Defense of the Russian Federation (Podolsk), field manuals of the Red Army of that time, materials on various electronic resources and memoirs of participants in the events. The discussion of the results. If the first year of the war, smoke screens were used to a limited extent only on the Leningrad and Karelian fronts, then in the period from August 1942 to August 1943, 161 smoke screens were placed only on the Kalinin front in order to secure the flanks, as well as divert the attention of the enemy and blind him , which in many cases ensured the absence of irretrievable losses of personnel and combat vehicles. In 1943, the use of smoke became a means of ensuring crossings, for example, during the period of forcing the Dnieper River. The following data speak of the scale of the use of smoke in 1944: in the second half of the year alone, 1,449 smoke screens were delivered on a common front of 1,351 km. In April 1945, 630 smoke screens were delivered with a total front of 700.2 km, both on the main and secondary directions. They were used for operational camouflage on an army front scale. Conclusion. The facts of the use of masking smokes given in the review indicate that smokes were an active means of masking the military operations of troops during the Great Patriotic War, the principles of their use can be used during a special operation in Ukraine.
- Published
- 2023
- Full Text
- View/download PDF
11. Social Harassments Cyberbullying Detection Using Machine Learning
- Author
-
Jamalpur, Bhavana, Kothandaraman, D, Navya, A., Keerthi, G. Bhavya, Srijanjali, D., Sushmitha, M., Powers, David M. W., Series Editor, Leibbrandt, Richard, Series Editor, Kumar, Amit, editor, Ghinea, Gheorghita, editor, and Merugu, Suresh, editor
- Published
- 2023
- Full Text
- View/download PDF
12. Physical fitness in young top level table tennis players: differences between sex, age and playing style
- Author
-
Francisco Pradas de la Fuente, Víctor Toro-Román, Miguel Ángel Ortega-Zayas, and Alejandro Moreno-Azze
- Subjects
racket sports ,youth ,elite ,defensive ,offensive ,Sports ,GV557-1198.995 - Abstract
Understanding the physical fitness of table tennis (TT) players could be interesting in improving the training process and evaluating talent. This study aimed to assess the physical fitness of U14 TT players and differentiate between sex, age and playing style. A total of 352 players (203 males and 149 females) aged between 9 and 13 years participated in the present study. Furthermore, the sample was divided according to playing style: offensive (OFF) and mixed + defensive (M + D). A battery of tests was carried out to assess cardiorespiratory capacity, speed, strength, flexibility and power. Both sexes reported significant differences in cardiorespiratory capacity and speed (p
- Published
- 2023
- Full Text
- View/download PDF
13. Structural basis of EHEP-mediated offense against phlorotannin-induced defense from brown algae to protect akuBGL activity
- Author
-
Xiaomei Sun, Yuxin Ye, Naofumi Sakurai, Hang Wang, Koji Kato, Jian Yu, Keizo Yuasa, Akihiko Tsuji, and Min Yao
- Subjects
EHEP ,akuBGL ,phlorotannin ,offensive ,Medicine ,Science ,Biology (General) ,QH301-705.5 - Abstract
The defensive–offensive associations between algae and herbivores determine marine ecology. Brown algae utilize phlorotannin as their chemical defense against the predator Aplysia kurodai, which uses β-glucosidase (akuBGL) to digest the laminarin in algae into glucose. Moreover, A. kurodai employs Eisenia hydrolysis-enhancing protein (EHEP) as an offense to protect akuBGL activity from phlorotannin inhibition by precipitating phlorotannin. To underpin the molecular mechanism of this digestive–defensive–offensive system, we determined the structures of the apo and tannic acid (TNA, a phlorotannin analog) bound forms of EHEP, as well as the apo akuBGL. EHEP consisted of three peritrophin-A domains arranged in a triangular shape and bound TNA in the center without significant conformational changes. Structural comparison between EHEP and EHEP–TNA led us to find that EHEP can be resolubilized from phlorotannin precipitation at an alkaline pH, which reflects a requirement in the digestive tract. akuBGL contained two GH1 domains, only one of which conserved the active site. Combining docking analysis, we propose the mechanisms by which phlorotannin inhibits akuBGL by occupying the substrate-binding pocket, and EHEP protects akuBGL against this inhibition by binding with phlorotannin to free the akuBGL pocket.
- Published
- 2023
- Full Text
- View/download PDF
14. The #MeToo movement in paradise: An assessment of the restaurant industry.
- Author
-
Min, Jihye, Lee, Harold, Lema, Joseph, Agrusa, Jerome, and Linnes, Cathrine
- Subjects
- *
RESTAURANTS , *METOO movement , *HARASSMENT , *RESTAURANT personnel , *SEXUAL harassment - Abstract
No industry has been immune to the #MeToo movement since its inception. The restaurant industry is especially susceptible to incidents of sexual harassing behaviors due to certain characteristics of the business itself. The purpose of this research paper is to evaluate restaurant employees' perceptions of sexual harassment and the effects of the #MeToo movement has had on those perceptions. By analyzing the responses of restaurant employees in Hawaii, significant differences in sexual harassment perceptions were found among different groups depending on age, generation and job position. Through quantitative and qualitative examinations, the influence of the #MeToo movement on restaurant employees' perceptions of sexual harassment is explored. This study will provide timely information when it comes to sexual harassment in the restaurant industry and suggest policies and implications for the field. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. A Deep Learning-Based Framework for Offensive Text Detection in Unstructured Data for Heterogeneous Social Media
- Author
-
Jamshid Bacha, Farman Ullah, Jebran Khan, Abdul Wasay Sardar, and Sungchang Lee
- Subjects
Cyberbully ,unstructured data ,deep learning ,YOLO ,social media ,offensive ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Social media such as Facebook, Instagram, and Twitter are powerful and essential platforms where people express and share their ideas, knowledge, talents, and abilities with others. Users on social media also share harmful content, such as targeting gender, religion, race, and trolling. These posts may be in the form of tweets, videos, images, and memes. A meme is one of the mediums on social media which has an image and embedded text in it. These memes convey various views, including fun or offensiveness, that may be a personal attack, hate speech, or racial abuse. Such posts need to be filtered out immediately from social media. This paper presents a framework that detects offensive text in memes and prevents such nuisance from being posted on social media, using the collected KAU-Memes dataset 2582. The latter combines the “2016 U.S. Election” dataset with the newly generated memes from a series of offensive and non-offensive tweets datasets. In fact, this model uses the KAU-Memes dataset containing symbolic images and the corresponding text to validate the proposed model. We compare the performance of three proposed deep-learning algorithms to train and detect offensive text in memes. To the best of the authors knowledge and literature review, this is the first approach based on You Only Look Once (YOLO) for offensive text detection in memes. This framework uses YOLOv4, YOLOv5, and SSD MobileNetV2 to compare the model’s performance on the newly labeled KAU-Memes dataset. The results show that the proposed model achieved 81.74%, 84.1%, mAP, and F1-score, respectively, for SSD-MobileNet V2, and 85.20%, 84.0%, mAP, and F1-score, respectively for YOLOv4. YOLOv5 had the best performance and achieved the highest possible mAP, F1-score, precision, and recall which are 88.50%, 88.8%, 90.2%, and 87.5%, respectively, for YOLOv5.
- Published
- 2023
- Full Text
- View/download PDF
16. Strategic crisis response: managerial implications and direction for recovery and survival
- Author
-
Thakur, Ramendra and Hale, Dena
- Published
- 2022
- Full Text
- View/download PDF
17. Detection of Offensive Comments for Textual Data Using Machine Learning
- Author
-
Hooda, Rhea, Jaiswal, Arunima, Bansal, Isha, Jain, Mehak, Singh, Pranjli, Sachdeva, Nitin, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Sugumaran, Vijayan, editor, Upadhyay, Divya, editor, and Sharma, Shanu, editor
- Published
- 2022
- Full Text
- View/download PDF
18. Interpretable and High-Performance Hate and Offensive Speech Detection
- Author
-
Babaeianjelodar, Marzieh, Poorna Prudhvi, Gurram, Lorenz, Stephen, Chen, Keyu, Mondal, Sumona, Dey, Soumyabrata, Kumar, Navin, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Chen, Jessie Y. C., editor, Fragomeni, Gino, editor, Degen, Helmut, editor, and Ntoa, Stavroula, editor
- Published
- 2022
- Full Text
- View/download PDF
19. Hateful Memes, Offensive or Non-offensive!
- Author
-
Khedkar, Sujata, Karsi, Priya, Ahuja, Devansh, Bahrani, Anshul, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Khanna, Ashish, editor, Gupta, Deepak, editor, Bhattacharyya, Siddhartha, editor, Hassanien, Aboul Ella, editor, Anand, Sameer, editor, and Jaiswal, Ajay, editor
- Published
- 2022
- Full Text
- View/download PDF
20. CMHE-AN: Code mixed hybrid embedding based attention network for aggression identification in hindi english code-mixed text.
- Author
-
Mundra, Shikha and Mittal, Namita
- Subjects
DEEP learning ,ENGLISH language ,SOCIAL media ,HINDI language ,AGGRESSION (Psychology) ,HATE speech - Abstract
The widespread growth in social media platforms provides a plethora of opportunities to enhance interaction and bring awareness about recent activities happening across the countries. Many people use social media to share their thoughts and opinions on societal and political issues. Nonetheless, some individuals misuse these platforms by posting toxic, hostile, and insulting comments. Hence, detecting and controlling such content at its earliest stage is crucial since its spread can harm social relations and negatively impact a person's life. In current scenarios, social media text consisting non-English languages is increasing due to active participation from multilingual societies. Of several non-English languages, Hindi English code-mixed is more prevalent in India. Most of the previous work to detect cyber aggression concentrates on English texts; therefore, there is high scope left to work on other languages such as Hindi English code-mixed. This paper has proposed a code-mixed hybrid embedding (CMHE) at the character and word level to capture similarly spelled and contextually related words. Furthermore, proposed embedding contributes significantly to the reduction of out of vocabulary words and capture words having similar polarity. After this, a deep learning framework based on CMHE, and a self-attention mechanism is proposed to retrieve significant features for classification. To evaluate proposed model, experiments were performed with two publicly available datasets: TRAC 2-2020 Hindi English code-mixed dataset (77.54% accuracy, 77.09% weighted average f1 score) and hate speech dataset (75.23% accuracy, 73.34% weighted average f1 score). The attained experimental results validate the effectiveness of proposed approach against the state-of-the-art. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. A Review on Detection of Offensive Language in Social Media.
- Author
-
A. S., Raghuram, B. R., Bhoomika, D., Gokul, Kuppanda, Malavika, and Khaleeq, Mohammed
- Subjects
SOCIAL media ,SOCIAL media in business ,HATE speech ,WELL-being ,MENTAL health ,LANGUAGE & languages - Abstract
Since the textual contents on online social media are highly unstructured, informal, and often misspelled, existing research on message-level offensive language detection cannot accurately detect offensive content. This feature of the social media to express something openly to the world have created the major problems for these online businesses and negatively impacted the well-being of the societal decorum. There are increasing cases of the abuse or offense on the social media like Hate speech, Cyber-bullying, Aggression or general Profanity. It is very much important to understand that this behavior can not only immensely affect the life of an individual or a group but could be suicidal in some cases adversely hampering the mental health of the victims. [ABSTRACT FROM AUTHOR]
- Published
- 2023
22. The Dismal Predicament of Kashmir from since Emancipation of India-Pakistan
- Author
-
Bashir, Rida
- Published
- 2022
- Full Text
- View/download PDF
23. On the morality of taking offence.
- Author
-
Parvaresh, Vahid
- Subjects
- *
INTUITION , *LINGUISTIC politeness , *OFFENSIVE behavior , *HARM (Ethics) - Abstract
This study explores occasions during which offendees make intuitive judgments about, or offer reasons for, why they feel offended. In this respect, and by drawing on a corpus of online Twitter posts featuring #offended, the study discusses some of the judgments and reasons that offendees most frequently refer to when 'sanctioning' their offence. The study reveals that taking offence involves the offence taker attributing blame to the person who has caused the offence. These attributions of blame appear to be rooted in higher-order moral norms and are typically couched in the format of a complaint about the behaviour in question with a view to causing some remedial action on the part of the person who has caused the offence. • Taking offence involves a perceived clash between observed and expected behaviour. • When we take offence, we attribute some form of blame to the person who has allegedly caused the offence. • Interactants' perception of moral norms is an assumed ability. • Morally informed norms continue to exert an influence on the taking of offence. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. توازن القوى عند الواقعيين الجدد والقطبية الدولية بالقرن الحادي والعشرين.
- Author
-
عبيد الحليمي
- Abstract
Copyright of Strategic Affairs Magazine is the property of Strategic Affairs Magazine and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
25. Dictionaries as instruments of exclusion and inclusion: some South African dictionaries as case in point.
- Author
-
Gouws, Rufus H.
- Abstract
Copyright of Lexicographica is the property of De Gruyter and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
26. Machine Learning for Offensive Security: Sandbox Classification Using Decision Trees and Artificial Neural Networks
- Author
-
Pearce, Will, Landers, Nick, Fulda, Nancy, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Arai, Kohei, editor, Kapoor, Supriya, editor, and Bhatia, Rahul, editor
- Published
- 2020
- Full Text
- View/download PDF
27. THE INTRODUCTION OF NET-PLATFORM-CENTRIC WARFARE IN THE CHINESE ARMY (PLA)
- Author
-
ARTSRUN HOVHANNISYAN
- Subjects
army ,china ,usa ,pla ,supremacy ,air force ,navy ,missile ,fighter ,defense ,offensive ,attack ,strikes ,Oriental languages and literatures ,PJ - Abstract
It is no surprise that just like the previous years, this year as well China has expanded its military budget, put another ship to sea, demonstrated new weaponary at the military parade, etc. For the last two decades, all the combat arms of the Chinese army has been developing at a high rate. Many authors claim very specific reasons for the Chinese armaments especially highlighting the conflicts with its immediate neighbors. From a geopolitical point of view, an interesting balance of power is being formed in the East. It’s been several years now that there are some precise problems in China-Japan conflict related to the power over some islands. China actively builds artificial islands which can serve as military bases far away from its shores approximately at an operative depth. And this matter deeply concerns the Philippines and Vietnam. In this light, it would be very interesting to study the balance of forces in the region and to analyze the American military doctrine on the one hand and the Chinese specific military and military-political attempts to appose it on the other hand. It is common knowledge that in political and professional circles in the USA are concerned about the actions and capabilities of China and Russia, which can considerably restrict the US access to key regions of Eurasia: Today, China and Russia have great potential to influence on the traditional American Net-platform weaponary, Air Forces, Navy, command and control networks, and even the orbital groupings. The two countries mentioned above, which are perceived as potential adversaries in the USA, strive to reach the level of the American military by all possible means and develop powerful techonologies. Russia and especially China are designing powerful satellite systems, various long-range missiles, fighter jets, UAVs, etc. New Electronic Warfare (EW) systems are being developed, to suppress or weaken the command and management systems of the US or its allies. The People’s Liberation Army (PLA) of China also has the capacity to destroy settelites, disrupt extraterrestrial intelligence, wreck command and control networks, etc. According to experts, there is no guarantee that the armed forces of the USA can ensure reliable and secure communication and conncetion during conflicts on the theater of military operations, in particular on operational and strategic levels.
- Published
- 2021
- Full Text
- View/download PDF
28. Levantine hate speech detection in twitter.
- Author
-
AbdelHamid, Medyan, Jafar, Assef, and Rahal, Yasser
- Abstract
Nowadays, people use Online Social Networks to express feelings and ideas and to communicate and share information. With the freedom space provided by such networks, some people tend to propagate hate speech and insults. An early detection of such content is crucial for predicting conflicts and could prevent the emotions from becoming actions or spreading widely. Hate speech detection work on the Arabic text is sparse and scant compared to other languages like English. Furthermore, the Arabic corpora of short texts in the Levantine dialect for hate speech are also scant. In this paper, we build our dataset of Arabic tweets from Syria and its neighbors with annotations of Normal and Hate. Therefore, word embedding with a combination of term frequency and inverse document frequency (TF-IDF) was concatenated for text representation in traditional classifiers; we used multiple classification algorithms, including Random Forest, Support Vector Machines, and three deep learning classifiers (AraBERT, ArabicBERT, and GigaBERT) which provide on our dataset to validate the effectiveness of our augmented dataset and different used feature representations. The experiment results show that concatenating word embedding and TF-IDF can improve the classification performance; besides, deep learning classifiers show better results compared to traditional ones. Our best model with GigaBERT significantly outperforms other used models with a 94.6% under the AUC-ROC curve (0.81 macro F1-score). These tests were made against other several datasets, and we got the best results for our dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
29. FA-Net: fused attention-based network for Hindi English code-mixed offensive text classification.
- Author
-
Mundra, Shikha and Mittal, Namita
- Abstract
Widespread usage of social media platforms like Twitter, Facebook, and YouTube allows sharing of opinions and suggestions across countries. On the contrary, these platforms are often misused to disseminate hate speech and offensive content. Moreover, in a multilingual society such as India, many users resort to code-mixing while typing on social media. Thus, we have focused on Hindi English (Hi–En) Code-Mixed hate speech and offensive text classification. Recently, numerous approaches have emerged, and most of these approaches use CNN and LSTM in a stacked manner to extract local and sequential semantic features. However, these arrangements diminish the comprehensive effect of local and sequential features. In addition, deep framework suffers from issue of vanising gradient. Therefore, in our work, we have proposed, local and sequential knowledge aware Fused Attention-based Network (FA-Net), which introduces a fusion of attention mechanism of collective and mutual learning between local and sequential features. The proposed network (FA-Net) is lower in depth more in breadth in comparison to the existing architectures. It has three building blocks: Code Mixed Hybrid Embedding, Locally Driven Sequential Attention-2 (LDSA-2), Locally Driven Sequential Attention-3 (LDSA-3). CMHE is developed using customized Hi-En code mixed data, aiming the network to initialize with relevant weights. LDSA-2 and LDSA-3 equip the model to build a comprehensive representation having past, future, and local contextual knowledge w.r.t any location in the sentence. Extensive experimentation on two benchmark datasets shows that FA-Net has outperformed other state of the art. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
30. Franco-British military co-operation in the Great Gas War 1915-1918.
- Author
-
Zoghlami, Hanene
- Subjects
- *
WORLD War I , *COOPERATION , *CHEMICAL weapons , *WEAPONS design & construction , *CHEMICAL plants - Abstract
Because the Anglophone historiography has tended to marginalize the French contribution to the allied chemical war during the Great War 1914-1918, this study has attempted to re-balance the historical narrative by emphasizing the collective nature and importance of this joint Franco-British enterprise. By interrogating a raft of under-utilized primary evidence in the French and British archives, elements of the two armies' defensive and offensive gas warfare performance have been reassessed through the co-operation prism. The investigation demonstrates how closely, comprehensively, and effectively the two allies worked together in chemical weapon production and exchange, research and development, anti-gas protection, and indirect battlefield applications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. Arms and ammunitions of ancient tamil's-An historical perspective
- Author
-
Iniyan, E.
- Published
- 2020
- Full Text
- View/download PDF
32. IRAN DEFENSIVE ATTITUDES TOWARDS UNITED STATES' OFFENSIVE POLITICS: ANALYSIS OF IRAN’S NUCLEAR DEVELOPMENT PROGRAMS
- Author
-
Ahmad Zainal Mustofa
- Subjects
offensive ,defensive ,iran's nuclear development ,united states ,social politics ,Political science - Abstract
This article explains the attitude that Iran shows towards the attacks, pressures, and condemnation of the United States, especially in its nuclear development program. Through Stephen van Evera's offensive-defensive theory, this article explains four determinants that led Iran to finally adopt a defensive attitude towards all offensive from the United States. The four determinants include the development of military technology, geographical conditions, socio-political constellation, and the order of diplomacy. Furthermore, this article describes the four determinants and relates them to Iran's nuclear development program and the response of the United States. Thus, it appears that Iran is showing a defensive towards the United States offensive.
- Published
- 2020
- Full Text
- View/download PDF
33. Effect of Healthy Training According to Lactic Threshold to Develop Performance Tolerance (Defensive and Offensive) and Some Functions of Blood and Liver for Young Football Players
- Author
-
Mansour, Fadhil Daham, Ridha, Khalid Mohammed, and Abdulhussein, Ahmed Murtada
- Published
- 2019
- Full Text
- View/download PDF
34. COMPARAÇÃO DO NÍVEL OFENSIVO E DEFENSIVO ENTRE GOLEIRAS DE UM CAMPEONATO ESTADUAL DE FUTSAL FEMININO ADULTO.
- Author
-
Galvão de Miranda, Bruno Luiz, Navarro, Antonio Coppi, Barros da Silva, Diogo Matheus, Caldas, Ester Silva, Marques, Raphael Furtado, Navarro, Francisco, and Araújo, Marlon Lemos
- Published
- 2021
35. Effect of the Dynamic Lactate Style to Developing Defensive and Offensive Performance Endurance for Handball Players Under 19 Years.
- Author
-
Hassan, Zahra Ali and Sachit, Hussein Mnaty
- Subjects
HANDBALL players ,RESISTANCE training ,LACTIC acid ,SCIENTIFIC community ,ATHLETIC clubs ,YOUTH societies & clubs - Abstract
The importance of the research lies in the application of a modern training method for training handball in order to raise the player’s physiological and skill efficiency throughout the game and maintain a constant level of performance and resistance to fatigue, especially the ability to perform with the presence of lactic acid and benefit from it after converting it to energy. The research aims: To identify the effect of the dynamic lactate method on developing the tolerance for defensive and offensive performance of handball players under 19 years of age. The researchers used the experimental design with two groups of experimental and control, with pre and post- test, for its suitability to the nature of the problem. The researcher identified the research community with handball players in the Karbala Sports Club for the youth category of under 19 years of age for the 2020-2021 training season, whose number is (16) players. By (7) players for each group. As for the most important conclusions, the results of this study demonstrated the effectiveness of the dynamic lactate method in developing endurance of defensive and offensive performance with handball among the players of the research sample, while the recommendations were, the researchers recommended that the dynamic lactate method should be used in the training units.. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. WAYS TO CARRY OUT THE MECHANISED BRIGADE COMBAT DISPOSITION IN THE OFFENSIVE OPERATION BY EFFICIENTLY USING MISSION COMMAND.
- Author
-
ȚECU, Cristian and PÎNZARIU, Sorin
- Subjects
ROMANIAN literature ,ARMED Forces ,MILITARY technology ,AERIAL bombing ,LOGISTICS - Abstract
Due to the modern war conditions, governed by the avant-garde technologies, the military actions of all the forces services acquire new features and dimensions with special implications for the participating forces. Carrying out a campaign involves combat-type actions that only a military force can accomplish, and its objectives are achieved both through a wide range of offensive or defensive operations, and through interaction with other military and non-military entities. At the tactical level, commanders must ensure a balance between the various elements of the functional framework to achieve the objectives set, in accordance with the campaign purpose. In line with current trends in the field of modern armed struggle, the issue of the combat disposition of the forces in order to conduct operations must be addressed, in the context of the development of military technology, increasing force mobility, maneuverability and combat power. reconsidering, at the same time, the role of different categories of armed forces, in the sense of ensuring interoperability with NATO partner forces, spatial extension of the direct engagement of supple and mobile combat disposition. Nowdays, in the Romanian military literature, it is considered that the joint tactical large units combat disposition consists of: the command system, maneuver forces, the reserve and the logistics system. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
37. Britain Polices Speech but Not Much Else.
- Author
-
Green, Dominic
- Published
- 2024
38. Not Taking a Joke: The Influence of Target Status, Sex, and Age on Reactions to Workplace Humor.
- Author
-
Sacco, Donald F., Brown, Mitch, and May, Haley D.
- Subjects
- *
YOUNG workers , *WOMEN employees , *MALE employees , *OLDER men , *WIT & humor - Abstract
The current study tasked undergraduates with serving as hypothetical human resource workers to evaluate complaints of offensive and inoffensive humor used by male and female employees in a fictitious company who varied in employment status and age. Offensive humor was deemed more problematic in its usage, particularly among female perceivers. Contrary to hypotheses, its usage was more problematic for male and older employees than for female and younger employees. In addition, participants were more averse to both offensive and inoffensive humor from high-status and older men relative to women with similar characteristics. We frame results with consideration of recent social trends. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
39. Defensive vs offensive style on clay courts.
- Author
-
FARZAT, Sara Maria and NAGEL, Adrian
- Subjects
OFFENSIVE players ,DEFENSIVE players ,COMPARATIVE studies - Abstract
Copyright of Timisoara Physical Education & Rehabilitation Journal is the property of Sciendo and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
40. Designing and codifying offensive technical skills tests for National Volunteer Talent Center players (18 years old).
- Author
-
SHEHAB, MUHAMMAD WALID, JABBAR, NIZAR ALI, and HAMID, BASEM IBRAHEEM
- Subjects
- *
VOLLEYBALL players , *VOLLEYBALL competitions , *TALENT development , *SCIENTIFIC community , *ACCURACY - Abstract
In order for the evaluation to be accurate, the researchers found that it is necessary to build the test in order to reveal the strengths and weaknesses of the trait that is intended to be measured, and because most tests are applied in cases other than real competition cases, so tests must be something that fits the ability to control and guide the accuracy of placing the ball in its place. The flour. Therefore, tests were designed and built to represent the offensive technical skills in volleyball for the National Center for Talent Care in Iraq. The research community was divided into a survey sample of (15) players, a construction sample of (60) players, and a rationing sample of (55) players. Standard grading extraction The research community must have (130) players, and the research tests have proven its validity in measuring offensive volleyball technical skills generated (2002) by distributing it moderately to the construction sample and its ability to distinguish between the achievement of high and low level sample members in a single test as well as achieving honesty, consistency and high objectivity transactions The levels varied in three tests. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
41. Characterization and mechanical properties of offensive language taxonomy and detection techniques
- Author
-
S.V. Kogilavani, K.R. Jaiabinaya, M. Malini, M. Manisha Kokila, and S. Malliga
- Subjects
010302 applied physics ,Language identification ,Computer science ,business.industry ,Deep learning ,Offensive ,02 engineering and technology ,General Medicine ,021001 nanoscience & nanotechnology ,computer.software_genre ,01 natural sciences ,Data science ,Abstract machine ,Identification (information) ,Scripting language ,Taxonomy (general) ,0103 physical sciences ,Social media ,Artificial intelligence ,0210 nano-technology ,business ,computer - Abstract
Machine learning is the sub field of Artificial Intelligence which is responsible for developing a system that has the capability to learn and improve from past experience. There is an increasing demand for the offensive language detection because there is a large code-mixed text. Sometimes there is a possibility of code-mixed texts which are written using native scripts. If the system is getting trained on the data which is created using single language then it will leads to failure because of complexity. Using online communities and social media platforms has become increasing now. Recently many of the researchers have been investigating different ways of identifying the abusive content and developing systems to detect its different types like aggression identification, cyber bullying detection, hate speech identification, offensive language identification and toxic comments identification. Developing mechanisms to detect this is a challenging task. In the last few years, machine learning techniques and deep learning concept has been playing a significant role in the development of solutions for offensive language detection. So, considerable efforts have also been devoted to the development of machine learning techniques and deep learning models which is used to identify toxic content in recent years. First, this survey provides offensive language taxonomy and detection approaches. Then, the article focuses on the offensive language identification and toxic comments identification approaches. This article reviews various models used, type of learning model, languages for which the developed model is applied, other methods or approaches that were compared against this model, dataset used, offensive language detection type and performance metrics. The findings from the review are as well summarized and they urge that further effort is required to get improvement in the current state-of-the art approaches. This article also focuses on future work to improve the offensive language classification and toxic comments identification.
- Published
- 2023
- Full Text
- View/download PDF
42. Primele acţiuni militare pe Frontul din Dobrogea. Bătălia de la Turtucaia şi consecinţele acesteia asupra evoluţiei militare de pe Frontul de Sud
- Author
-
Leonida MOISE
- Subjects
strategy ,army ,war ,front ,offensive ,campaign ,military units ,International relations ,JZ2-6530 - Abstract
A The actions of the Romanian Army on the South Front were decisively influenced by the Turtucaia battles. Although there was a secondary front, there were enough forces and means, which through a judicious planning and cooperation could have stopped the German-Bulgarian offensive. Unfortunately, the lack of a realistic strategy and faulty coordination of the units and large units arranged in Dobrogea, Romanian army suffered the most resounding defeat, a situation that had affected the entire campaign in 1916 and at the same time had a negative impact on the morale of Romanian soldiers, but also on public opinion. One of the major consequences was stopping military operations on the main Northern Front and the deployment of seven divisions from this front to the south, allowing the Austro-Hungarian and German armies to recoil in Transylvania, thus being compromised the Romanian offensive, which had been successful on this front. Turtucaia remained a lesson of strategy and military art, which was widely debated in military historiography, with lessons and conclusions for the Romanian army's operative military units.
- Published
- 2018
43. Wednesday, May 15. Russia's War On Ukraine: News And Information From Ukraine.
- Author
-
Soldak, Katya
- Subjects
GUITARS - Abstract
Dispatches from Ukraine. Day 812. [ABSTRACT FROM AUTHOR]
- Published
- 2024
44. Building a Cognitive Test For Offensive and Defensive Formations in Volleyball and Codifying it for the Fourth Stage Students, College of Physical Education and Sports Science, Diyala University.
- Author
-
Hamid, Basem Ibraheem and Shehab, Muhammad Walid
- Subjects
PHYSICAL sciences education ,COGNITIVE testing ,HIGHER education ,COACH-athlete relationships ,VOLLEYBALL players ,VOLLEYBALL - Abstract
The importance of the research was evident because the volleyball player does not depend on mastery and mastery of only one skill, but full knowledge of all skills and their knowledge in terms of movement to different playing centers and their work requires him to have special mobility capabilities that qualify him to perform such a role, and here the guidance of the coach plays an important role. The exchange of information between the athlete and the coach (the teacher and the learner), as well as receiving information before the motor performance, “and during it provides an opportunity to fine-tune and organize the behavior commensurate with the situation facing or required despite knowledge of the performance requirements. This in itself is a good measure by which the trainer can know the athlete’s ability to analyze. Correct and solving the kinetic duty intellectually and applying it in practice, that is, standing on a level. [ABSTRACT FROM AUTHOR]
- Published
- 2020
45. WARFARE AND WOMEN IN THE ANCIENT WORLD.
- Author
-
de Marre, M.
- Subjects
MILITARY science ,WOMEN in war - Abstract
The present article explores the often ambivalent relationship our ancient sources had with the role of women in times of war, from the Homeric to the early Byzantine period. The article takes the view that these roles were not something invariably imposed by men, but were part of a more general societal development, in which women as much as men supported the status quo, and for a variety of reasons. [ABSTRACT FROM AUTHOR]
- Published
- 2020
46. Tashi waza en judocas pioneriles
- Author
-
Hernández, Guillermo, Bouly Wualton, Malvis, Rodríguez Barthelemy, Anailis Victoria, Hernández, Guillermo, Bouly Wualton, Malvis, and Rodríguez Barthelemy, Anailis Victoria
- Abstract
The work addresses a topic of vital importance, for the process of perfecting the offensive technique, it responds to the technological demand, declared by the provincial basketball commission. In the diagnostic phase different empirical methods were applied defining the scientific problem of the same: How to perfect the offensive technique in the perimeter players of basketball? The work has as objective to plan a system of exercises, for the improvement of the offensive technique, in the players of the perimeter in the team bigger than basketball in Guantánamo. We employ different research methods, from the theoretical level to the historical logic, analysis and synthesis, inductive-deductive and the functional structural systemic, from the empirical observation, the experiment, analysis of documents, as techniques: the interview and the survey. From the mathematical level, the technique of percentage calculation. The exercises used, as well as the application of instruments for the and evaluation during preparatory and fundamental competitions, show the feasibility of the results obtained, El deporte es catalogado como uno de los fenómenos sociales más notables del siglo XXI, por los millones de seres humanos que siguen sus brillantes manifestaciones, es por ello que la práctica sistemática de la actividad física, bien sea institucionalizada o espontánea, se haya relacionado con otras esferas de la vida social de la humanidad, así distinguimos la relación deporte-arte, deporte-espectáculo, deporte- recreación, etc.; sin embargo, pocas veces se menciona la relación deporte-ciencia. Por esta razón nuestra investigación tiene como objetivo elaborar ejercicios para mejorar la efectividad del calentamiento especial al Tachi Waza en judocas categoría pioneril 11-12 años del Combinado Deportivo San Justo de Guantánamo, a partir de una problemática existente. Para el desarrollo de esta investigación se utilizaron métodos científicos del nivel teórico, del nivel empírico y del nivel matemático. Los ejercicios propuestos en nuestro trabajo permitirán que en el proceso de entrenamiento en las nuevas generaciones de judocas en esta categoría de edades propicie un mejor rendimiento del calentamiento especial al Tachi Waza, sirviéndoles a los profesores como herramienta metodológica para el proceso de entrenamiento previsto en el Programa de Preparación del Deportista.
- Published
- 2023
47. The Realignment of Political Tolerance in the United States
- Author
-
Morris Levy, Jack Citrin, and Dennis Chong
- Subjects
History ,Polymers and Plastics ,business.industry ,media_common.quotation_subject ,Offensive ,Public opinion ,Social learning ,Industrial and Manufacturing Engineering ,Politics ,Politics of the United States ,Political science ,Political economy ,Political Science and International Relations ,Mainstream ,Norm (social) ,Ideology ,Business and International Management ,business ,media_common - Abstract
Studies conducted between the 1950s and 1970s found that the principles embodied in the First Amendment constituted a “clear norm” endorsed by large majorities of community leaders and virtually all legal practitioners and scholars. This consensus has since weakened under the strain of arguments that racist slurs, epithets, and other forms of expression that demean social identities are an intolerable affront to egalitarian values. Guided by the theory that norms are transmitted through social learning, we show that these developments have spurred a dramatic realignment in public tolerance of offensive expression about race, gender, and religious groups. Tolerance of such speech has declined overall, and its traditional relationships with ideology, education, and age have diminished or reversed. Speech subject to changing norms of tolerance ranges from polemic to scientific inquiry, the fringes to the mainstream of political discourse, and left to right, raising profound questions about the scope of permissible debate in contemporary American politics.
- Published
- 2022
- Full Text
- View/download PDF
48. Could a Conversational AI Identify Offensive Language?
- Author
-
Daniela America da Silva, Henrique Duarte Borges Louro, Gildarcio Sousa Goncalves, Johnny Cardoso Marques, Luiz Alberto Vieira Dias, Adilson Marques da Cunha, and Paulo Marcelo Tasinaffo
- Subjects
offensive ,dictionary ,natural language ,AI ethics ,fairness ,Information technology ,T58.5-58.64 - Abstract
In recent years, we have seen a wide use of Artificial Intelligence (AI) applications in the Internet and everywhere. Natural Language Processing and Machine Learning are important sub-fields of AI that have made Chatbots and Conversational AI applications possible. Those algorithms are built based on historical data in order to create language models, however historical data could be intrinsically discriminatory. This article investigates whether a Conversational AI could identify offensive language and it will show how large language models often produce quite a bit of unethical behavior because of bias in the historical data. Our low-level proof-of-concept will present the challenges to detect offensive language in social media and it will discuss some steps to propitiate strong results in the detection of offensive language and unethical behavior using a Conversational AI.
- Published
- 2021
- Full Text
- View/download PDF
49. A multilingual offensive language detection method based on transfer learning from transformer fine-tuning model
- Author
-
Noureddine En Nahnahi, Said Ouatik El Alaoui, and Fatima-Zahra El-Alami
- Subjects
General Computer Science ,Language identification ,Computer science ,business.industry ,Offensive ,computer.software_genre ,Semantics ,Conjunction (grammar) ,Preprocessor ,Multilingualism ,Artificial intelligence ,Transfer of learning ,business ,computer ,Natural language processing ,Transformer (machine learning model) - Abstract
Offensive communications have invaded social media content. One of the most effective solutions to cope with this problem is using computational techniques to discriminate offensive content. Moreover, social media users are from linguistically different communities. This study aims to tackle the Multilingual Offensive Language Detection (MOLD) task using transfer learning models and the fine-tuning phase. We propose an effective approach based on the Bidirectional Encoder Representations from Transformers (BERT) that has shown great potential in capturing the semantics and contextual information within texts. The proposed system consists of several stages: (1) Preprocessing, (2) Text representation using BERT models, and (3) Classification into two categories: Offensive and non-offensive. To handle multilingualism, we explore different techniques such as the joint-multilingual and translation-based ones. The first consists in developing one classification system for different languages, and the second involves the translation phase to transform all texts into one universal language then classify them. We conduct several experiments on a bilingual dataset extracted from the Semi-supervised Offensive Language Identification Dataset (SOLID). The experimental findings show that the translation-based method in conjunction with Arabic BERT (AraBERT) achieves over 93% and 91% in terms of F1-score and accuracy, respectively.
- Published
- 2022
- Full Text
- View/download PDF
50. Feasibility Study on Virtual Reality Based Basketball Tactic Training
- Author
-
Tse-Yu Pan, Min-Chun Hu, and Wan-Lun Tsai
- Subjects
Basketball ,Computer science ,media_common.quotation_subject ,Training system ,Virtual Reality ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Offensive ,Fidelity ,Virtual reality ,Basketball court ,Computer Graphics and Computer-Aided Design ,education.educational_institution_campus ,Human–computer interaction ,Signal Processing ,Computer Graphics ,Feasibility Studies ,Humans ,Learning ,Computer Vision and Pattern Recognition ,education ,Software ,media_common - Abstract
In this work, a VR-based basketball training system comprising a standalone VR device and a tablet is proposed. The system is intended to improve the ability of players to understand offensive tactics and to enable them to perform these tactics correctly. We compare the training effectiveness of various degrees of immersion fidelity, including a conventional basketball tactic board, a 2D monitor, and virtual reality. A multi-camera-based human tracking system is developed and built around a real-world basketball court to record and analyze the running trajectory of each player during tactical execution. The accuracy of the running path and hesitation time at each tactical step is evaluated for each participant. Furthermore, we assess several subjective measurements, including simulator sickness, presence, and sport imagery ability, to carry out a more comprehensive exploration of the feasibility of the proposed VR framework for basketball tactics training. The results indicate that the proposed system is useful for learning complex tactics. Also, high VR immersion training benefits athletes in terms of abilities related to strategic imagery.
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.