Results for 'Alarm system'

931 found
Order:
  1. Development of AI-Based Object Detection and Alarm Generation System.P. Rathna Sekhar - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (4):1-12.
    . In this article, we propose an innovative method that utilizes AI for the real-time detection of humans and automatically triggers an alarm using the latest object detection methods based on algorithms such as YOLO (You Only Look Once). The key goal of the system is to facilitate rescue operations, enhance security surveillance, and minimize the turnaround time for any emergency actions. This allows, for example, the placement of such a system in a live video stream, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Predicting Fire Alarms in Smoke Detection using Neural Networks.Maher Wissam Attia, Baraa Akram Abu Zaher, Nidal Hassan Nasser, Ruba Raed Al-Hour, Aya Haider Asfour & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):26-33.
    Abstract: This research paper presents the development and evaluation of a neural network-based model for predicting fire alarms in smoke detection systems. Using a dataset from Kaggle containing 15 features and 3487 samples, we trained and validated a neural network with a three-layer architecture. The model achieved an accuracy of 100% and an average error of 0.0000003. Additionally, we identified the most influential features in predicting fire alarms.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  3. Smart Walking System based on Artificial Intelligence.Vanita Babanne, Simranjeet Kaur, Tejal Mehta, Divya Mulay & Rachana Nagarkar - 2018 - International Journal of Research in Engineering, Science and Management 1 (12).
    This paper shows the smart walking stick based on ultrasonic sensors and Arduino for outwardly debilitated individuals. There are roughly 37 million individuals over the globe who are visually impaired as indicated by the World Health Organization. Individuals with visual inabilities are regularly subjected to outer help which can be given by people, trained dogs, or electronic gadgets as supportive networks for basic assistance. Thus, this played as the motivation to develop a smart cane white stick to survive these restrictions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Using Inexpensive Home Alarm for Computer Based Carbon Monoxide Monitoring.Abdullah Hussein Mohammed - 2012 - Asian Transactions on Engineering 2 (02):6.
    The current increase of air pollution rates and its consequences of global warming, health problems and threats to human lives necessitate the continuous search for more efficient and cost effective gas monitoring devices. Devices that is easily available and implementable worldwide. In developing countries the cost and the availability of the equipment is one of the obstacles that contribute to not having an efficient monitoring system. Hence, modifying cheap and easily available devices to work as pollution monitoring system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  61
    Alert System Using Facial Recognition.I. Karthika Varsha - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    This research work presents a cost-effective facial recognition alert system using the ESP32 microcontroller to enhance real-time security. The system integrates high-resolution cameras with Python’s facial recognition libraries to identify individuals. When an unknown face is detected, it triggers an immediate alert via the ESP32, activating an alarm. This solution is both scalable and affordable, making advanced security accessible to small businesses and residential areas. The system improves overall security by automating surveillance, reducing the need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  91
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  25
    Smart Home Security System Using Arduino.Jay Dudhatra Karan Gori - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (10):4139-4144.
    Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Design of Interface System With Hmi (Human Machine Interface) Based For Monitoring System of Generator With 3dr Telemetry 433mhz Communication. Sudjadi, Sumardi & Wildan Abdul Jabbar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 4 (2):11-18.
    Abstract—Generator set (genset) is a backup power supply which is used when the PLN supply is off. With such an important function, the generator set maintenance must be taken care of for long life durability. Monitoring activity is usually conducted on a regular basis, but still run manually by relying on operators who go directly to the plant. This research goes over the making of HMI remote control system for generator set in order to produce effective and continuous reporting. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  18
    Real-Time Snake Detection and Alert System using YOLO and Machine Learning.S. Siddharth - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (12):1-8.
    Snake encountersin human-populated and wildlife areas pose significant threats to public safety and biodiversity. Each year, many incidents result in snakebites, often leading to serious injuries or fatalities, and frequently result in harm to snakes due to fear-driven responses. Traditional methods forsnake detection, such as visual observation, are typically slow and can lead to delayed or inaccurate responses, increasing the risks associated with human-snake encounters. This study presents a Real-Time Snake Detection and Alert System that employs advanced artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  66
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  33
    Survey on Vehicle Drowsiness Detection System.Yash Jaiswal Chirag Gandhi - 2020 - International Journal of Innovative Research in Science, Engineering and Technology 9 (4):1329-1333.
    Drowsiness is a manner wherein one degree of awareness is reduced due to lacking of sleep or exhaustion and it may cause the driver fall into sleep quietly. A Drowsy or sleepy driver is not able to determine while he/she can have an out of control sleep. Fall asleep crushes are very extreme in terms of injury. Recent statistics estimate that annually 1,200 deaths and 76,000 injuries can be caused to exhaustion or drowsiness related crashes. More than 25% of highway (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  23
    Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Integrated DPSIR-ANP-SD framework for Sustainability Assessment of Water Resources System in Egypt.M. Siwailam, H. Abdelsalam & M. Saleh - 2019 - Ijamsr 3 (3):1-9.
    Abstract: Nowadays fresh water severe scarcity is a global concern and it is alarming for the future. In order to fully understand the progress of the water system and its impacts, a sustainability assessment of water resources is needed. This accelerates the achievement of sustainability and management of water resources. This work aims to assess the sustainability of the water resources system by applying the integration approach proposed by (Xu, 2011). This integration approach is based on integrating the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Artistic Exceptionalism and the Risks of Activist Art.Christopher Earley - 2023 - Journal of Aesthetics and Art Criticism 81 (2):141-152.
    Activist artists often face a difficult question: is striving to change the world undermined when pursued through difficult and experimental artistic means? Looking closely at Adrian Piper's 'Four Intruders plus Alarm Systems' (1980), I will consider why this is an important concern for activist art, and assess three different responses in relation to Piper’s work. What I call the conciliatory stance recommends that when activist artists encounter misunderstanding, they should downplay their experimental artistry in favor of fitting their work (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  16.  97
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset size, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  18. (1 other version)Better Scared than Sorry: The Pragmatic Account of Emotional Representation.Kris Goffin - 2021 - Erkenntnis (6):1-18.
    Some emotional representations seem to be unreliable. For instance, we are often afraid when there is no danger present. If emotions such as fear are so unreliable, what function do they have in our representational system? This is a problem for representationalist theories of emotion. I will argue that seemingly unreliable emotional representations are reliable after all. While many mental states strike an optimal balance between minimizing inaccurate representations and maximizing accurate representations, some emotional representations only aim at maximizing (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Communication before communicative intentions.Josh Armstrong - 2021 - Noûs 57 (1):26-50.
    This paper explores the significance of intelligent social behavior among non-human animals for philosophical theories of communication. Using the alarm call system of vervet monkeys as a case study, I argue that interpersonal communication (or what I call “minded communication”) can and does take place in the absence of the production and recognition of communicative intentions. More generally, I argue that evolutionary theory provides good reasons for maintaining that minded communication is both temporally and explanatorily prior to the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  20. The Lure of the Advertising Image: A Platonic Analysis.Richard Oxenberg - manuscript
    Sut Jhally begins his essay “Advertising at the Edge of the Apocalypse” with the following provocative claim: “Advertising is the most powerful and sustained system of propaganda in human history and its cumulative effects, unless quickly checked, will be responsible for destroying the world as we know it.” Jhally argues that the advertising industry, in fostering an association between human aspiration and desire for consumable goods, creates an artificial demand for such goods that is, at once, far in excess (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. A Feasibility Study of A Zero Energy Building in Egypt.Nehad Khattab - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):36-43.
    Abstract— According to studies, buildings use around 40% of the total energy consumption in the world. Most of this consumed energy comes from fossil fuel, one of the sources of environmental pollution. The Net Zero Energy Building (NZEB) is an alternative to this alarming pollution. With its reduced energy needs and renewable energy systems, a ZEB can return as much energy as it takes from the utility on an annual basis. Thus the main objective of this study is to discuss (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  65
    Overpopulation, Continuous Economic Growth, and the Unfeasibility of Supply-Side Economics.Angelito Malicse - manuscript
    Overpopulation, Continuous Economic Growth, and the Unfeasibility of Supply-Side Economics -/- The concepts of overpopulation, continuous economic growth, and supply-side economics have been at the forefront of societal and economic discussions for decades. While these ideas may seem appealing in the short term, their long-term sustainability is questionable and ultimately self-destructive. Overpopulation and continuous economic growth both strain natural resources, disrupt ecological balances, and create unsustainable pressures on society. Furthermore, the idea that supply-side economics—the notion that reducing taxes and increasing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  16
    Nature’s Way of Optimization and the Law of Balance.Angelito Malicse - manuscript
    Nature’s Way of Optimization and the Law of Balance -/- Nature is the ultimate example of efficiency, balance, and sustainability. Everything in the natural world—from how animals survive to how ecosystems function to how the human body works—is designed to maximize effectiveness while minimizing waste. If we observe how nature operates, we can learn valuable lessons about how to make decisions, govern societies, and live our daily lives. -/- This understanding aligns with the universal law of balance in nature, which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Design and Implementation of an Automatic High-Performance Voltage Stabilizer.Ibrahim Adabara - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 4 (2):1-10.
    Abstract: This research aims at the design and implementation of an automatic high-performance voltage stabilizer which helps to detect inappropriate voltage levels and correct them to produce a reasonably stable output. The system consists of five dependent architectural designs which involve the power supply, delay switching circuit, monitoring circuit and load changeover circuit using 555 ic which produces the required signal when switched on by a relay to activate the alarm. The system uses a relay to charge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. FACTORS WHICH MILITATE AGAINST THE YOUTH ENTREPRENEURSHIP IN N’DJAMENA.Robertson K. Tengeh & Doudoua Hadje Koubra Bichara - 2020 - Cape Town: The 6th International Conference on Business and Management Dynamics.
    Although the country is endowed with abundant natural resources, rates of unemployment among the youth of Chad remain alarmingly high. Aim: To determine the factors which militate against the youth engaging in entrepreneurial activities in N’Djamena, the capital city of Chad. Method: A random sample 150 young Chadian entrepreneurs was selected from a research population which comprised all of the young entrepreneurs in N’Djamena who were registered on the databases of the FONAJ, a national fund which provides financial support to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Prediction of Heart Disease Using a Collection of Machine and Deep Learning Algorithms.Ali M. A. Barhoom, Abdelbaset Almasri, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):1-13.
    Abstract: Heart diseases are increasing daily at a rapid rate and it is alarming and vital to predict heart diseases early. The diagnosis of heart diseases is a challenging task i.e. it must be done accurately and proficiently. The aim of this study is to determine which patient is more likely to have heart disease based on a number of medical features. We organized a heart disease prediction model to identify whether the person is likely to be diagnosed with a (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  28. Democratic Alarmism: Coherent Notion or Contradiction in Terms?James S. Pearson - forthcoming - Constellations.
    Political leaders engage in alarmism when they inflate threats to the commonweal in order to influence citizens' behavior. A range of democratic theorists argue that alarmism is necessary to maintain political order, with some even contending that alarmism is particularly necessary in democratic polities. Yet there appear to be strong grounds for thinking that alarmism is incompatible with the democratic ethos, namely insofar as it contravenes the principle of collective self-determination. Prima facie, alarmism seems to violate this principle because it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Envelope culture in the healthcare system: happy poison for the vulnerable.Quan-Hoang Vuong, Viet-Phuong La, Giang Hoang, Quang-Loc Nguyen, Thu-Trang Vuong & Minh-Hoang Nguyen - manuscript
    Bribing doctors for preferential treatment is rampant in the healthcare system of developing countries like Vietnam. Although bribery raises the out-of-pocket expenditures of patients, it is so common to be deemed an “envelope culture.” Given the little understanding of the underlying mechanism of the culture, this study employed the mindsponge theory for reasoning the mental processes of both patients and doctors for why they embrace the “envelope culture” and used the Bayesian Mindsponge Framework (BMF) analytics to validate our reasoning. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Bad Feelings, Best Explanations: In Defence of the Propitiousness Theory of the Low Mood System.James Turner - 2024 - Erkenntnis:1-26.
    There are three main accounts of the proper function of the low mood system (LMS): the social risk theory, the disease theory, and the propitiousness theory. Adjudicating between these accounts has proven difficult, as there is little agreement in the literature about what a theory of the LMS’s proper function is supposed to explain. In this article, drawing upon influential work on the evolution of other affective systems, such as the disgust system and the fear system, I (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Abolish! Against the Use of Risk Assessment Algorithms at Sentencing in the US Criminal Justice System.Katia Schwerzmann - 2021 - Philosophy and Technology 34 (4):1883-1904.
    In this article, I show why it is necessary to abolish the use of predictive algorithms in the US criminal justice system at sentencing. After presenting the functioning of these algorithms in their context of emergence, I offer three arguments to demonstrate why their abolition is imperative. First, I show that sentencing based on predictive algorithms induces a process of rewriting the temporality of the judged individual, flattening their life into a present inescapably doomed by its past. Second, I (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32. The value of vague ideas in the development of the periodic system of chemical elements.Vogt Thomas - 2021 - Synthese 199 (3-4):10587-10614.
    The exploration of chemical periodicity over the past 250 years led to the development of the Periodic System of Elements and demonstrates the value of vague ideas that ignored early scientific anomalies and instead allowed for extended periods of normal science where new methodologies and concepts are developed. The basic chemical element provides this exploration with direction and explanation and has shown to be a central and historically adaptable concept for a theory of matter far from the reductionist frontier. (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  33. The Stoics and their Philosophical System.William O. Stephens - 2020 - In Kelly Arenson, The Routledge Handbook of Hellenistic Philosophy. Routledge. pp. 22-34.
    An overview of the ancient philosophers and their philosophical system (divided into the fields of logic, physics, and ethics) comprising the living, organic, enduring, and evolving body of interrelated ideas identifiable as the Stoic perspective.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34. Does legal epistemology rest on a mistake? On fetishism, two‐tier system design, and conscientious fact‐finding.David Enoch, Talia Fisher & Levi Spectre - 2021 - Philosophical Issues 31 (1):85-103.
    Philosophical Issues, Volume 31, Issue 1, Page 85-103, October 2021.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  35. Establishment of a Dialectical Logic Symbol System: Inspired by Hegel’s Logic and Buddhist Philosophy.Chia Jen Lin - manuscript
    This paper presents an original dialectical logic symbol system designed to transcend the limitations of traditional logical symbols in capturing subjectivity, qualitative aspects, and contradictions inherent in the human mind. By introducing new symbols, such as “ὄ” (being) and “⌀” (nothing), and arranging them based on principles of symmetry, the system’s operations capture complex dialectical relationships essential to both Hegelian philosophy and Buddhist thought. The operations of this system are primarily structured around the categories found in Hegel’s (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. What Does it Mean to Say “The Criminal Justice System is Racist”?Amelia M. Wirts - 2023 - American Philosophical Quarterly 60 (4):341-354.
    This paper considers three possible ways of understanding the claim that the American criminal justice system is racist: individualist, “patterns”-based, and ideology-based theories of institutional racism. It rejects an individualist explanation of institutional racism because such an explanation fails to explain the widespread prevalence of anti-black racism in this system or indeed in the United States. It considers a “patterns” account of institutional racism, where consistent patterns of disparate racial effect mimic the structure of intentional projects of racial (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  92
    Leibniz’s Filters (Translation of a Chapter from Michel Serres's The System of Leibniz and its Mathematical Models).Michel Serres & Martijn Boven - manuscript
    This chapter from Michel Serres’s comprehensive study on Leibniz—"The System of Leibniz and its Mathematical Models [Le système de Leibniz et ses modèles mathématiques]"—examines Leibniz’s epistemological framework. This framework, which Leibniz developed for a large part in his “Meditations on Knowledge, Truth, and Ideas [Meditationes de cognitione, veritate et ideis],” is pitched against Descartes’s "Meditations on First Philosophy [Meditationes de Prima Philosophia]" and the method of systematic doubt developed therein. While Descartes rejects any knowledge with the slightest possibility of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  97
    A global framework for integrating public health into well-being: why a public well-being system is needed.Laszlo L. Lippai, Klara Tarkó, Attila Tanyi, Zsofia Kollányi, Maria Arapovics & Jozsef Vitrai - 2025 - Frontiers in Public Health 13:1-12.
    There is a growing focus on public health initiatives that prioritise well-being. The main question of our study is whether this, in its current form, can really represent a new response to the challenges of previous strategies, or whether there is a greater chance that it will essentially reproduce the problems associated with the paradoxical situation of public health. Based on a review, analysis and evaluation of the literature on well-being in public health, we outlined the foundations of a new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Teaching Critical Thinking with the Personalized System of Instruction.Javier S. Hidalgo - 2024 - Teaching Philosophy 47 (4):521-543.
    A large body of evidence suggests that the Personalized System of Instruction (PSI) improves learning. In courses that use PSI, the material is divided into units, students must pass a test on each unit before advancing to the next unit, there’s no group-level instruction, and students advance in the course at their own pace. While studies find that PSI improves learning outcomes in a wide range of settings, researchers haven’t studied the effectiveness of PSI in critical thinking classes. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Normalisation and subformula property for a system of intuitionistic logic with general introduction and elimination rules.Nils Kürbis - 2021 - Synthese 199 (5-6):14223-14248.
    This paper studies a formalisation of intuitionistic logic by Negri and von Plato which has general introduction and elimination rules. The philosophical importance of the system is expounded. Definitions of ‘maximal formula’, ‘segment’ and ‘maximal segment’ suitable to the system are formulated and corresponding reduction procedures for maximal formulas and permutative reduction procedures for maximal segments given. Alternatives to the main method used are also considered. It is shown that deductions in the system convert into normal form (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Normalisation and subformula property for a system of classical logic with Tarski’s rule.Nils Kürbis - 2021 - Archive for Mathematical Logic 61 (1):105-129.
    This paper considers a formalisation of classical logic using general introduction rules and general elimination rules. It proposes a definition of ‘maximal formula’, ‘segment’ and ‘maximal segment’ suitable to the system, and gives reduction procedures for them. It is then shown that deductions in the system convert into normal form, i.e. deductions that contain neither maximal formulas nor maximal segments, and that deductions in normal form satisfy the subformula property. Tarski’s Rule is treated as a general introduction rule (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Learning in the social being system.Zoe Jenkin & Lori Markson - 2024 - Behavioral and Brain Sciences 47:e132.
    We argue that the core social being system is unlike other core systems in that it participates in frequent, widespread learning. As a result, the social being system is less constant throughout the lifespan and less informationally encapsulated than other core systems. This learning supports the development of the precursors of bias, but also provides avenues for preempting it.
    Download  
     
    Export citation  
     
    Bookmark  
  43. The Abolition of Punishment: Is a Non-Punitive Criminal Justice System Ethically Justified?Przemysław Zawadzki - 2024 - Diametros 21 (79):1-9.
    Punishment involves the intentional infliction of harm and suffering. Both of the most prominent families of justifications of punishment – retributivism and consequentialism – face several moral concerns that are hard to overcome. Moreover, the effectiveness of current criminal punishment methods in ensuring society’s safety is seriously undermined by empirical research. Thus, it appears to be a moral imperative for a modern and humane society to seek alternative means of administering justice. The special issue of Diametros “The Abolition of Punishment: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Policy Response, Social Media and Science Journalism for the Sustainability of the Public Health System Amid the COVID-19 Outbreak: The Vietnam Lessons.La Viet Phuong, Pham Thanh Hang, Manh-Toan Ho, Nguyen Minh Hoang, Nguyen Phuc Khanh Linh, Vuong Thu Trang, Nguyen To Hong Kong, Tran Trung, Khuc Van Quy, Ho Manh Tung & Quan-Hoang Vuong - 2020 - Sustainability 12:2931.
    Vietnam, with a geographical proximity and a high volume of trade with China, was the first country to record an outbreak of the new Coronavirus disease (COVID-19), caused by the Severe Acute Respiratory Syndrome Coronavirus 2 or SARS-CoV-2. While the country was expected to have a high risk of transmission, as of April 4, 2020—in comparison to attempts to contain the disease around the world—responses from Vietnam are being seen as prompt and effective in protecting the interests of its citizens, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  73
    Bring Them Home: Creating a Humane and Enforceable POW Parole System.Maciej Zając - 2024 - Journal of Military Ethics 23 (3):182-200.
    There are several strong moral reasons for restoring the practice of parole for prisoners of war (POWs), that is, allowing them to spend their POW internment in a neutral country or in their own country provided they abstain from any military activity. This article makes an ethical case for parole, while discussing thoroughly theoretical as well as practical arguments against its reintroduction. The article suggests ways to create a reliable, internationally recognized way of paroling POWs. It concludes that the reintroduction (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The alternative food movement in Japan: Challenges, limits, and resilience of the teikei system.Kazumi Kondoh - 2015 - Agriculture and Human Values 32 (1):143-153.
    The teikei movement is a Japanese version of the alternative food movement, which emerged around the late 1960s and early 1970s. Similar to now well-known Community Supported Agriculture, it is a farmer-consumer partnership that involves direct exchanges of organic foods. It also aims to build a community that coexists with the natural environment through mutually supportive relationships between farmers and consumers. This article examined the history of the teikei movement. The movement began as a reaction to negative impacts of mechanized (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. The theory of the organism-environment system: II. Significance of nervous activity in the organism-environment system.Timo Jarvilehto - 1998 - Integrative Physiological and Behavioral Science 33 (4):335-342.
    The relation between mental processes and brain activity is studied from the point of view of the theory of the organism-environment system. It is argued that the systemic point of view leads to a new kind of definition of the primary tasks of neurophysiology and to a new understanding of the traditional neurophysiological concepts. Neurophysiology is restored to its place as a part of biology: its task is the study of neurons as living units, not as computer chips. Neurons (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. Foundations of Metaphysical Cosmology : Type System and Computational Experimentation.Elliott Bonal - manuscript
    The ambition of this paper is extensive: to bring about a new paradigm and firm mathematical foundations to Metaphysics, to aid its progress from the realm of mystical speculation to the realm of scientific scrutiny. -/- More precisely, this paper aims to introduce the field of Metaphysical Cosmology. The Metaphysical Cosmos here refers to the complete structure containing all entities, both existent and non-existent, with the physical universe as a subset. Through this paradigm, future endeavours in Metaphysical Science could thus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The influence of private interests on research in behavioural public policy: A system-level problem.Liam Kofi Bright, Jonathan Parry & Johanna Thoma - 2023 - Behavioral and Brain Sciences 46:e150.
    Chater & Loewenstein argue that i-frame research has been coopted by private interests opposed to system-level reform, leading to ineffective interventions. They recommend that behavioural scientists refocus on system-level interventions. We suggest that the influence of private interests on research is problematic for wider normative and epistemic reasons. A system-level intervention to shield research from private influence is needed.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Informational Mode of the Brain Operation and Consciousness as an Informational Related System.Florin Gaiseanu - 2019 - Archives in Biomedical Engineering and Biotechnology 1 (5):1-7.
    Introduction: the objective of the investigation is to analyse the informational operating-mode of the brain and to extract conclusions on the structure of the informational system of the human body and consciousness. Analysis: the mechanisms and processes of the transmission of information in the body both by electrical and non-electrical ways are analysed in order to unify the informational concepts and to identify the specific essential requirements supporting the life. It is shown that the electrical transmission can be described (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 931