Results for ' Things speak IoT'

960 found
Order:
  1. A Multiple Sensor Data-Fusion for EFD Using IoT.M. Madan Mohan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):70-80.
    Multi sensor data fusion allows large scale deployments for environmental monitoring applications especially in the areas like homes, other buildings and infrastructures and industries. In such areas early fire detection is of great importance as the consequences of a fire are catastrophic. This project predicts the possibility of catching fire using a multi-sensor scheme of data fusion to enhance the performance of the early fire detection process by detecting the concentration of inflammable gases in the atmosphere and by measuring the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Things begin to speak by themselves”: Pierre Schaeffer’s myth of the seashell and the epistemology of sound.Iain Campbell - 2021 - Sound Studies 7 (1):100-118.
    This paper considers the role of myth and phenomenology in Pierre Schaeffer’s research into music and sound, and argues that engagement with these themes allows us to rethink the legacy and contemporary value of Schaeffer’s thought in sound studies. In light of critique of Schaeffer’s project, in particular that developed by Brian Kane and Schaeffer’s own apparent self-disavowal, this paper returns to Schaeffer’s early remarks on the “myth of the seashell” in order to examine the conditions of this critique. While (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. H-IoT (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  6.  7
    Enhanced Campus Automation System and the emerging need for IoT integration: an automation perspective. [eCAS-IoT].J. Rajeshwar Rao & Siby Samuel - 2019 - In Cecilia Titiek Murniati & Heny Hartono (eds.), E-Proceedings International Conference on Innovation in Education: Opportunities and Challenges in Southeast Asia. Semarang: Universitas Katolik Soegijapranata. pp. 179-190.
    Technology has the power to break the limitations of traditional passive learning and innovate almost all aspects of everyday life with the power of connecting things of the world to the Internet, “Internet of Things (IoT).” IoT is no longer a phenomenon, but it has become a prevalent system in which people, processes, data, and things connect to the Internet and each other. This paper ‘Enhanced Campus Automation System and the emerging need of IoT integration: an automation (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  44
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  68
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  67
    AUGMENTED REALITY AND IOT-INTEGRATED SMART HOMES: ENHANCING USER EXPERIENCE AND AUTOMATION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The integration of Augmented Reality (AR) and the Internet of Things (IoT) within smart homes represents a significant leap forward in home automation and user experience. This paper explores a comprehensive framework that combines these technologies to create an immersive, efficient, and user-friendly smart home environment. By utilizing AR, users can interact with and control IoT-enabled devices in real time through visual and intuitive interfaces. This integration not only simplifies the management of home systems but also enhances the overall (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  40
    Towards Inclusive Societies: Leveraging IoT for Community Development and Education.Sudip Suklabaidya - 2024 - Novel Insights 1 (1):40-51.
    The proliferation of Internet of Things (IoT) technologies presents a promising avenue for fostering inclusive societies through community development and education initiatives. This paper explores the potential of leveraging IoT to address societal inequalities and empower marginalized communities. Through a multidisciplinary lens, the paper examines the intersection of IoT, community development, and education, elucidating how IoT-enabled solutions can contribute to building more resilient, connected, and equitable societies. By harnessing IoT devices, sensor networks, and data analytics, community development efforts can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. The Parliament of Things and the Anthropocene: How to Listen to ‘Quasi-Objects’.Massimiliano Simons - 2017 - Techné: Research in Philosophy and Technology 21 (2/3):1-25.
    Among the contemporary philosophers using the concept of the Anthropocene, Bruno Latour and Isabelle Stengers are prominent examples. The way they use this concept, however, diverts from the most common understanding of the Anthropocene. In fact, their use of this notion is a continuation of their earlier work around the concept of a ‘parliament of things.’ Although mainly seen as a sociology or philosophy of science, their work can be read as philosophy of technology as well. Similar to Latour’s (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  13. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various devices c,onnected (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  44
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  45
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet technology. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. When Words Speak Louder Than Actions: Delusion, Belief, and the Power of Assertion.David Rose, Wesley Buckwalter & John Turri - 2014 - Australasian Journal of Philosophy (4):1-18.
    People suffering from severe monothematic delusions, such as Capgras, Fregoli, or Cotard patients, regularly assert extraordinary and unlikely things. For example, some say that their loved ones have been replaced by impostors. A popular view in philosophy and cognitive science is that such monothematic delusions aren't beliefs because they don't guide behaviour and affect in the way that beliefs do. Or, if they are beliefs, they are somehow anomalous, atypical, or marginal beliefs. We present evidence from five studies that (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  21. Compound Metric Assisted Trust Aware Routing for Internet of Things through Firefly Algorithm.Mohammad Osman, Kaleem Fatima & P. Naveen Kumar - 2023 - International Journal of Intelligent Engineering and Systems 16 (3):280-291.
    Security and privacy are the major concerns in the internet of things (IoT) which are uncertain and unpredictable. Trust aware routing is one of the recent and effective strategies which ensure better resilience for IoT nodes from different security threats. Towards such concern, this paper proposes a new strategy called independent onlooker withstanding trust aware routing (IOWTAR) for IoT. IOWTAR introduced a new compound trust metric by combining three individual metrics namely independent trust, onlooker trust, and withstanding trust (a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Things Fall Apart: Reflections on the Dying of My Dad.Richard Oxenberg - manuscript
    In December of 2013, my Dad died of advanced Alzheimer's and a condition called Myasthenia Gravis. This is a selection of journal entries I made over the course of the two years leading up to my Dad's death. It is not a philosophical essay, but a personal reflection, in "real time" so to speak, on the nature of the dying process in relation to questions of faith, hope, despair, and the meaning of a man's life. I offer it here (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Towards the Epistemology of the Internet of Things Techno-Epistemology and Ethical Considerations Through the Prism of Trust.Ori Freiman - 2014 - International Review of Information Ethics 22:6-22.
    This paper discusses the epistemology of the Internet of Things [IoT] by focusing on the topic of trust. It presents various frameworks of trust, and argues that the ethical framework of trust is what constitutes our responsibility to reveal desired norms and standards and embed them in other frameworks of trust. The first section briefly presents the IoT and scrutinizes the scarce philosophical work that has been done on this subject so far. The second section suggests that the field (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  24. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Thinking Impossible Things.Sten Lindström - 2002 - In Sten Lindström & Pär Sundström (eds.), Physicalism, Consciousness, and Modality: Essays in the Philosophy of Mind. Umeå: Department of Philosophy and Linguistics, Umeå University. pp. 125-132.
    “There is no use in trying,” said Alice; “one can’t believe impossible things.” “I dare say you haven’t had much practice,” said the Queen. “When I was your age, I always did it for half an hour a day. Why, sometimes I’ve believed as many as six impossible things before breakfast”. Lewis Carroll, Through the Looking Glass. -/- It is a rather common view among philosophers that one cannot, properly speaking, be said to believe, conceive, imagine, hope for, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. To Will One Thing.Alexander Jech - 2013 - American Philosophical Quarterly 50 (2):153-166.
    Before committing suicide, Othello says, "Speak of me as I am; . . . speak of one who loved not wisely, but too well." Thinking of his love for Desdemona, we are not likely to agree with his assessment that he loved her "too well," especially if loving well is supposed to require some kind of dependability or concern for her well-being; we would be loath even to grant that he loved her "too much." Othello's love for his (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. How to Speak of Existence.Uriah Kriegel - 2015 - In S. Lapointe (ed.), Themes from Ontology, Mind, and Logic: Essays in Honor of Peter Simons. Brill. pp. 81-106.
    To a first approximation, ontology is concerned with what exists, metaontology with what it means to say that something exists. So understood, metaontology has been dominated by three views: (i) existence as a substantive first-order property that some things have and some do not, (ii) existence as a formal first-order property that everything has, and (iii) existence as a second-order property of existents’ distinctive properties. Each of these faces well-documented difficulties. In this chapter, I want to expound a fourth (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. The Mark, the Thing, and the Object: On What Commands Repetition in Freud and Lacan.Gertrudis Van de Vijver, Ariane Bazan & Sandrine Detandt - 2017 - Frontiers in Psychology 8.
    In Logique du Fantasme, Lacan argues that the compulsion to repeat does not obey the same discharge logic as homeostatic processes. Repetition installs a realm that is categorically different from the one related to homeostatic pleasure seeking, a properly subjective one, one in which the mark “stands for,” “takes the place of,” what we have ventured to call “an event,” and what only in the movement of return, in what Lacan calls a “thinking of repetition,” confirms and ever reconfirms this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  61
    If the Body Is Part of Our Discourse, Why Not Let It Speak? Five Critical Perspectives.Maxine Sheets-Johnstone - 2018 - In Anthony Steinbock & Natalie Depraz (eds.), Surprise: An Emotion? Cham: Springer Verlag. pp. 83-95.
    Abstract: Of the five perspectives set forth in this essay, four of them specify obstacles that block experiential understandings of emotions. The obstacles in one way and another subvert the living body, whether presenting it as a mere face or as an ahistorical adult body, as an embodied phenomenon or as a brain unattached to a whole-body nervous system. Such accounts bypass the affective dynamics that move through bodies and move them to move. Being true to the truths of experience, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Musik und Begriff. How to do things with Music.Simone Mahrenholz - 2021 - Zeitschrift für Ästhetik Und Allgemeine Kunstwissenschaft 66 (2):43-54.
    (For English, scroll down) Der Text präsentiert drei miteinander verbundene Thesen. (1) Philosophie der Musik modifiziert philosophische Grundbegriffe. (2) Eine gemeinsame Eigenschaft in der Vielfalt der Musikformen liegt im Effekt einer Wahrnehmungsveränderung: oft subtil, unterschwellig und zuweilen als ekstatisch erlebte Selbst- und Welt-Transformation. (3) Strenggenommen nehmen wir nicht Töne wahr, sondern a) unsere Hör-Physiologie wandelt Schwingungsfrequenzen ab circa 18 Hz in Tonhöhen um und damit Zeit-Organisation in ein Raum-Äquivalent. (Musik mit tiefen Tönen an der Grenze zur Wahrnehmung, etwa mittels großer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice command (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. AI Can Help Us Live More Deliberately.Julian Friedland - 2019 - MIT Sloan Management Review 60 (4).
    Our rapidly increasing reliance on frictionless AI interactions may increase cognitive and emotional distance, thereby letting our adaptive resilience slacken and our ethical virtues atrophy from disuse. Many trends already well underway involve the offloading of cognitive, emotional, and ethical labor to AI software in myriad social, civil, personal, and professional contexts. Gradually, we may lose the inclination and capacity to engage in critically reflective thought, making us more cognitively and emotionally vulnerable and thus more anxious and prone to manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Modes of Thinking in Language Study.Jesús Gerardo Martínez del Castillo - 2015 - International Journal of Language and Linguistics 3 (6-1):77-84.
    When we speak of language we usually use the concept of a particular language. In this sense the concept denoted with the word language may vary from one language to another. Real language (=the language spoken) on the contrary is the reality lived by speakers thus encompassing complex and multifarious activities. Depending on the language spoken, the modes of thinking, modes of being in the conception of things, and systems of beliefs transmitted by means of particular languages, denote (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Fixing the contents created in the act of knowing.Jesús Gerardo Martínez del Castillo - 2015 - International Journal of Language and Linguistics 3 (6-1):24-30.
    The human subject in as much as he knows transforms the sensitive and concrete (the thing perceived) into abstract (an image of the thing perceived), the abstract into an idea (imaginative representation of the thing abstracted), and ideas into contents of conscience (meanings). The last step in the creation of meanings, something being executed in the speech act, consists in fixing the construct mentally created thus making it objectified meanings in the conscience of speakers. The interchange amongst the different steps (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. Reading the Philosophy of Right in light of the Logic: Hegel on the Possibility of Multiple Modernities.Arash Abazari - 2022 - In Dean Moyar, Kate Padgett Walsh & Sebastian Rand (eds.), Hegel's philosophy of right: critical perspectives on freedom and history. New York, NY: Routledge.
    Broadly speaking, two views of modernity are prevalent in contemporary debates. According to the first view, i.e. “modernization theory,” there is one single form of modernity, which is tantamount to liberal, capitalist modernity. The West has already and fully achieved modernity; non-Western societies have lagged behind and must simply catch up with the West. In contrast, according to the second view, “post-colonial theory,” there is no such thing as modernity. What the West erroneously calls “modernity” is nothing but a highly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally handled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. The Life Forms and Their Model in Plato's Timaeus.Karel Thein - 2006 - Rhizai. A Journal for Ancient Philosophy and Science 2:241-273.
    The Intelligible Living Thing, posited as the model of our visible and tangible universe in Plato’s Timaeus, is often taken for a richly structured whole, which is not a simple sum of its four major parts. This assumption seems unwarranted – most specifically, the dialogue contains no hint at any complex intelligible blue print of the world as a teleologically arranged whole, whose goodness is irreducible to the well-being and individual perfection of its parts. To construe the rich structure of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. The Physical Action Theory of Trying.David-Hillel Ruben - 2015 - Methode 4 (6).
    Metaphysically speaking, just what is trying? There appear to be two options: to place it on the side of the mind or on the side of the world. Volitionists, who think that to try is to engage in a mental act, perhaps identical to willing and perhaps not, take the mind-side option. The second, or world-side option identifies trying to do something with one of the more basic actions by which one tries to do that thing. The trying is then (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  43. Lewisian Worlds and Buridanian Possibilia.Boaz Faraday Schuman - forthcoming - Dialectica.
    Many things can be other than they are. Many other things cannot. But what are statements like these about? One answer to this question is that we are speaking of possible worlds: if something can be other than it is, then it actually is that way in some possible world. If something cannot be otherwise, it is not otherwise in any world. This answer is presently dominant in analytical philosophy of language and logic. What are these worlds? David (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Augustine's Argument for the Existence of God.Hugh Chandler - manuscript
    Roughly speaking, Augustine claims that ‘Immutable Truth’ is superior to the human mind and, consequently a legitimate candidate for the role of God. Clearly there is such a thing as Immutable Truth. So either that is God, or there is something superior to Immutable Truth, and that superior thing is God. I spell out this argument, and offer some objections to it.
    Download  
     
    Export citation  
     
    Bookmark  
  45.  88
    RESEARCH ASPECTS IN WASTE MANAGEMENT AND THE USE OF INTELLIGENT TECHNOLOGIES.Mohit Gangwar - 2024 - Annals of the Bhandarkar Oriental Research Institute (6):151-157.
    The management of waste has become an increasingly critical issue as urbanization and industrial activities surge globally. Traditional waste management practices are struggling to keep pace with the rising quantities and complexities of waste. This paper delves into the integration of intelligent technologies, such as Artificial Intelligence (AI), the Internet of Things (IoT), and data analytics, into waste management systems. By examining current practices, methodologies, experiments, and results, this study aims to highlight the transformative potential of intelligent technologies in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. On The Sense and Reference of A Logical Constant.Harold Hodes - 2004 - Philosophical Quarterly 54 (214):134-165.
    Logicism is, roughly speaking, the doctrine that mathematics is fancy logic. So getting clear about the nature of logic is a necessary step in an assessment of logicism. Logic is the study of logical concepts, how they are expressed in languages, their semantic values, and the relationships between these things and the rest of our concepts, linguistic expressions, and their semantic values. A logical concept is what can be expressed by a logical constant in a language. So the question (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  47. Bayesian Perspectives on Mathematical Practice.James Franklin - 2024 - In Bharath Sriraman (ed.), Handbook of the History and Philosophy of Mathematical Practice. Cham: Springer. pp. 2711-2726.
    Mathematicians often speak of conjectures as being confirmed by evidence that falls short of proof. For their own conjectures, evidence justifies further work in looking for a proof. Those conjectures of mathematics that have long resisted proof, such as the Riemann hypothesis, have had to be considered in terms of the evidence for and against them. In recent decades, massive increases in computer power have permitted the gathering of huge amounts of numerical evidence, both for conjectures in pure mathematics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Go Figure: Understanding Figurative Talk.Mihaela Popa-Wyatt - 2017 - Philosophical Studies 174 (1):1-12.
    We think and speak in figures. This is key to our creativity. We re-imagine one thing as another, pretend ourself to be another, do one thing in order to achieve another, or say one thing to mean another. This comes easily because of our abilities both to work out meaning in context and re-purpose words. Figures of speech are tools for this re-purposing. Whether we use metaphor, simile, irony, hyperbole, and litotes individually, or as compound figures, the uses are (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. ‘Peer Disagreement’ and Evidence of Evidence.John Biro & Fabio Lampert - 2018 - Logos and Episteme 9 (4):379-402.
    What the rational thing to do in the face of disagreement by an epistemic peer is has been much discussed recently. Those who think that a peer’s disagreement is itself evidence against one’s belief, as many do, are committed to a special form of epistemic dependence. If such disagreement is really evidence, it seems reasonable to take it into account and to adjust one’s belief accordingly. But then it seems that the belief one ends up with depends, in part, on (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. (1 other version)Como os sete sociopaths que governam China estão ganhando a guerra de mundo três e três maneiras de pará-los.Michael Richard Starks - 2019 - In Michael Starks (ed.), Suicídio pela democracia - Um obituário para América e o mundo. Las Vegas, NV USA: Reality Press. pp. 52-56.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 960