Results for 'Classification Algorithms'

958 found
Order:
  1. Type-2 Fuzzy Sets and Newton’s Fuzzy Potential in an Algorithm of Classification Objects of a Conceptual Space.Adrianna Jagiełło, Piotr Lisowski & Roman Urban - 2022 - Journal of Logic, Language and Information 31 (3):389-408.
    This paper deals with Gärdenfors’ theory of conceptual spaces. Let \({\mathcal {S}}\) be a conceptual space consisting of 2-type fuzzy sets equipped with several kinds of metrics. Let a finite set of prototypes \(\tilde{P}_1,\ldots,\tilde{P}_n\in \mathcal {S}\) be given. Our main result is the construction of a classification algorithm. That is, given an element \({\tilde{A}}\in \mathcal {S},\) our algorithm classifies it into the conceptual field determined by one of the given prototypes \(\tilde{P}_i.\) The construction of our algorithm uses some physical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Lemon Classification Using Deep Learning.Jawad Yousif AlZamily & Samy Salim Abu Naser - 2020 - International Journal of Academic Pedagogical Research (IJAPR) 3 (12):16-20.
    Abstract : Background: Vegetable agriculture is very important to human continued existence and remains a key driver of many economies worldwide, especially in underdeveloped and developing economies. Objectives: There is an increasing demand for food and cash crops, due to the increasing in world population and the challenges enforced by climate modifications, there is an urgent need to increase plant production while reducing costs. Methods: In this paper, Lemon classification approach is presented with a dataset that contains approximately 2,000 (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Algorithmic Political Bias Can Reduce Political Polarization.Uwe Peters - 2022 - Philosophy and Technology 35 (3):1-7.
    Does algorithmic political bias contribute to an entrenchment and polarization of political positions? Franke argues that it may do so because the bias involves classifications of people as liberals, conservatives, etc., and individuals often conform to the ways in which they are classified. I provide a novel example of this phenomenon in human–computer interactions and introduce a social psychological mechanism that has been overlooked in this context but should be experimentally explored. Furthermore, while Franke proposes that algorithmic political classifications entrench (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Cantaloupe Classifications using Deep Learning.Basel El-Habil & Samy S. Abu-Naser - 2021 - International Journal of Academic Engineering Research (IJAER) 5 (12):7-17.
    Abstract cantaloupe and honeydew melons are part of the muskmelon family, which originated in the Middle East. When picking either cantaloupe or honeydew melons to eat, you should choose a firm fruit that is heavy for its size, with no obvious signs of bruising. They can be stored at room temperature until you cut them, after which they should be kept in the refrigerator in an airtight container for up to five days. You should always wash and scrub the rind (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  5. Classification of Sign-Language Using MobileNet - Deep Learning.Tanseem N. Abu-Jamie & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (7):29-40.
    Abstract: Sign language recognition is one of the most rapidly expanding fields of study today. Many new technologies have been developed in recent years in the fields of artificial intelligence the sign language-based communication is valuable to not only deaf and dumb community, but also beneficial for individuals suffering from Autism, downs Syndrome, Apraxia of Speech for correspondence. The biggest problem faced by people with hearing disabilities is the people's lack of understanding of their requirements. In this paper we try (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Type of Tomato Classification Using Deep Learning.Mahmoud A. Alajrami & Samy S. Abu-Naser - 2020 - International Journal of Academic Pedagogical Research (IJAPR) 3 (12):21-25.
    Abstract: Tomatoes are part of the major crops in food security. Tomatoes are plants grown in temperate and hot regions of South American origin from Peru, and then spread to most countries of the world. Tomatoes contain a lot of vitamin C and mineral salts, and are recommended for people with constipation, diabetes and patients with heart and body diseases. Studies and scientific studies have proven the importance of eating tomato juice in reducing the activity of platelets in diabetics, which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Classification of Real and Fake Human Faces Using Deep Learning.Fatima Maher Salman & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):1-14.
    Artificial intelligence (AI), deep learning, machine learning and neural networks represent extremely exciting and powerful machine learning-based techniques used to solve many real-world problems. Artificial intelligence is the branch of computer sciences that emphasizes the development of intelligent machines, thinking and working like humans. For example, recognition, problem-solving, learning, visual perception, decision-making and planning. Deep learning is a subset of machine learning in artificial intelligence that has networks capable of learning unsupervised from data that is unstructured or unlabeled. Deep learning (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  8. Grape Leaf Species Classification Using CNN.Mohammed M. Almassri & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):66-72.
    Abstract: Context: grapevine leaves are an important agricultural product that is used in many Middle Eastern dishes. The species from which the grapevine leaf originates can differ in terms of both taste and price. Method: In this study, we build a deep learning model to tackle the problem of grape leaf classification. 500 images were used (100 for each species) that were then increased to 10,000 using data augmentation methods. Convolutional Neural Network (CNN) algorithms were applied to build (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Classification of Sign-Language Using Deep Learning by ResNet.Tanseem N. Abu-Jamie & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (8):25-34.
    American Sign Language, or ASL as its acronym is commonly known, is a fascinating language, and many people outside of the Deaf community have begun to recognize its value and purpose. It is a visual language consisting of coordinated hand gestures, body movements, and facial expressions. Sign language is not a universal language; it varies by country and is heavily influenced by the native language and culture. The American Sign Language alphabet and the British Sign Language alphabet are completely contrary. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Classification of Sign-Language Using Deep Learning - A Comparison between Inception and Xception models.Tanseem N. Abu-Jamie & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (8):9-19.
    there is a communication gap between hearing-impaired people and those with normal hearing, sign language is the main means of communication in the hearing-impaired population. Continuous sign language recognition, which can close the communication gap, is a difficult task since the ordered annotations are weakly supervised and there is no frame-level label. To solve this issue, we compare the accuracy of each model using two deep learning models, Inception and Xception . To that end, the purpose of this paper is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. A potential theory approach to an algorithm of conceptual space partitioning.Roman Urban & Magdalena Grzelińska - 2017 - Cognitive Science 17:1-10.
    This paper proposes a new classification algorithm for the partitioning of a conceptual space. All the algorithms which have been used until now have mostly been based on the theory of Voronoi diagrams. This paper proposes an approach based on potential theory, with the criteria for measuring similarities between objects in the conceptual space being based on the Newtonian potential function. The notion of a fuzzy prototype, which generalizes the previous definition of a prototype, is introduced. Furthermore, the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Medical Image Classification with Machine Learning Classifier.Destiny Agboro - forthcoming - Journal of Computer Science.
    In contemporary healthcare, medical image categorization is essential for illness prediction, diagnosis, and therapy planning. The emergence of digital imaging technology has led to a significant increase in research into the use of machine learning (ML) techniques for the categorization of images in medical data. We provide a thorough summary of recent developments in this area in this review, using knowledge from the most recent research and cutting-edge methods.We begin by discussing the unique challenges and opportunities associated with medical image (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Credit Score Classification Using Machine Learning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (5):1-10.
    Abstract: Ensuring the proactive detection of transaction risks is paramount for financial institutions, particularly in the context of managing credit scores. In this study, we compare different machine learning algorithms to effectively and efficiently. The algorithms used in this study were: MLogisticRegressionCV, ExtraTreeClassifier,LGBMClassifier,AdaBoostClassifier, GradientBoostingClassifier,Perceptron,RandomForestClassifier,KNeighborsClassifier,BaggingClassifier, DecisionTreeClassifier, CalibratedClassifierCV, LabelPropagation, Deep Learning. The dataset was collected from Kaggle depository. It consists of 164 rows and 8 columns. The best classifier with unbalanced dataset was the LogisticRegressionCV. The Accuracy 100.0%, precession 100.0%,Recall100.0% and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Informational richness and its impact on algorithmic fairness.Marcello Di Bello & Ruobin Gong - forthcoming - Philosophical Studies:1-29.
    The literature on algorithmic fairness has examined exogenous sources of biases such as shortcomings in the data and structural injustices in society. It has also examined internal sources of bias as evidenced by a number of impossibility theorems showing that no algorithm can concurrently satisfy multiple criteria of fairness. This paper contributes to the literature stemming from the impossibility theorems by examining how informational richness affects the accuracy and fairness of predictive algorithms. With the aid of a computer simulation, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  39
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Real Attribute Learning Algorithm.Julio Michael Stern, Marcelo de Souza Lauretto, Fabio Nakano & Celma de Oliveira Ribeiro - 1998 - ISAS-SCI’98 2:315-321.
    This paper presents REAL, a Real-Valued Attribute Classification Tree Learning Algorithm. Several of the algorithm's unique features are explained by úe users' demands for a decision support tool to be used for evaluating financial operations strategies. Compared to competing algorithms, in our applications, REAL presents maj or advantages : (1) The REAL classification trees usually have smaller error rates. (2) A single conviction (or trust) measure at each leaf is more convenient than the traditional (probability, confidence-level) pair. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  37
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  22
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  28
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Scientific essentialism in the light of classification practice in biology – a case study of phytosociology.Adam P. Kubiak & Rafał R. Wodzisz - 2012 - Zagadnienia Naukoznawstwa 48 (194):231-250.
    In our paper we investigate a difficulty arising when one tries to reconsiliateessentialis t’s thinking with classification practice in the biological sciences. The article outlinessome varieties of essentialism with particular attention to the version defended by Brian Ellis. Weunderline the basic difference: Ellis thinks that essentialism is not a viable position in biology dueto its incompatibility with biological typology and other essentialists think that these two elementscan be reconciled. However, both parties have in common metaphysical starting point and theylack (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated by deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. A Comparative Analysis of Data Mining Techniques on Breast Cancer Diagnosis Data using WEKA Toolbox.Majdah Alshammari & Mohammad Mezher - 2020 - (IJACSA) International Journal of Advanced Computer Science and Applications 8:224-229.
    Abstract—Breast cancer is considered the second most common cancer in women compared to all other cancers. It is fatal in less than half of all cases and is the main cause of mortality in women. It accounts for 16% of all cancer mortalities worldwide. Early diagnosis of breast cancer increases the chance of recovery. Data mining techniques can be utilized in the early diagnosis of breast cancer. In this paper, an academic experimental breast cancer dataset is used to perform a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Diagnosis of Blood Cells Using Deep Learning.Ahmed J. Khalil & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (2):69-84.
    In computer science, Artificial Intelligence (AI), sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. Computer science defines AI research as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals. Deep Learning is a new field of research. One of the branches of Artificial Intelligence Science deals with the creation of theories and algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  24. Forest Fire Detection using Deep Leaning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):59-65.
    Abstract: Forests are areas with a high density of trees, and they play a vital role in the health of the planet. They provide a habitat for a wide variety of plant and animal species, and they help to regulate the climate by absorbing carbon dioxide from the atmosphere. While in 2010, the world had 3.92Gha of forest cover, covering 30% of its land area, in 2019, there was a loss of forest cover of 24.2Mha according to the Global Forest (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Entropy of Polysemantic Words for the Same Part of Speech.Mihaela Colhon, Florentin Smarandache & Dan Valeriu Voinea - unknown
    In this paper, a special type of polysemantic words, that is, words with multiple meanings for the same part of speech, are analyzed under the name of neutrosophic words. These words represent the most dif cult cases for the disambiguation algorithms as they represent the most ambiguous natural language utterances. For approximate their meanings, we developed a semantic representation framework made by means of concepts from neutrosophic theory and entropy measure in which we incorporate sense related data. We show (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Semantic Information G Theory and Logical Bayesian Inference for Machine Learning.Chenguang Lu - 2019 - Information 10 (8):261.
    An important problem with machine learning is that when label number n>2, it is very difficult to construct and optimize a group of learning functions, and we wish that optimized learning functions are still useful when prior distribution P(x) (where x is an instance) is changed. To resolve this problem, the semantic information G theory, Logical Bayesian Inference (LBI), and a group of Channel Matching (CM) algorithms together form a systematic solution. MultilabelMultilabel A semantic channel in the G theory (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Prognostic System for Heart Disease using Machine Learning: A Review.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):33-38.
    In today’s world it became difficult for daily routine check-up. The Heart disease system is an end user support and online consultation project. Here the motto behind it is to make a person to know about their heart related problem and according to it formulate them how much vital the disease is. It will be easy to access and keep track of their respective health. Thus, it’s important to predict the disease as earliest. Attributes such as Bp, Cholesterol, Diabetes are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Identification of Babbitt Damage and Excessive Clearance in Journal Bearings through an Intelligent Recognition Approach.Joel Pino Gómez, Fidel Ernesto Hernández Montero, Julio César Gómez Mancilla & Yenny Villuendas Rey - 2021 - International Journal of Advanced Computer Science and Applications 12 (4):526-533.
    Journal bearings play an important role on many rotating machines placed on industrial environments, especially in steam turbines of thermoelectric power plants. Babbitt damage (BD) and excessive clearance (C) are usual faults of steam turbine journal bearings. This paper is focused on achieving an effective identification of these faults through an intelligent recognition approach. The work was carried out through the processing of real data obtained from an industrial environment. In this work, a feature selection procedure was applied in order (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Cross Validation Component Based Reduction for Divorce Rate Prediction.M. Shyamala Devi - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (6):7716-7729.
    Concurring to information from the Centresfor Illness Control and Anticipation, instruction and religion are both capable indicators of lasting or dissolving unions. The chance of a marriage finishing in separate was lower for individuals with more knowledge, with over half of relational unions of those who did not complete high school having finished in separate compared with roughly 30 percent of relational unions of college graduates. With this overview, the divorce rate dataset from UCI dataset repository is used for predicting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Adversarial Sampling for Fairness Testing in Deep Neural Network.Tosin Ige, William Marfo, Justin Tonkinson, Sikiru Adewale & Bolanle Hafiz Matti - 2023 - International Journal of Advanced Computer Science and Applications 14 (2).
    In this research, we focus on the usage of adversarial sampling to test for the fairness in the prediction of deep neural network model across different classes of image in a given dataset. While several framework had been proposed to ensure robustness of machine learning model against adversarial attack, some of which includes adversarial training algorithm. There is still the pitfall that adversarial training algorithm tends to cause disparity in accuracy and robustness among different group. Our research is aimed at (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Mistakes in medical ontologies: Where do they come from and how can they be detected?Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Studies in Health and Technology Informatics 102:145-164.
    We present the details of a methodology for quality assurance in large medical terminologies and describe three algorithms that can help terminology developers and users to identify potential mistakes. The methodology is based in part on linguistic criteria and in part on logical and ontological principles governing sound classifications. We conclude by outlining the results of applying the methodology in the form of a taxonomy different types of errors and potential errors detected in SNOMED-CT.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  32. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  33. Diagnosis of Pneumonia Using Deep Learning.Alaa M. A. Barhoom & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (2):48-68.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and react like humans. Some of the activities computers with artificial intelligence are designed for include, Speech, recognition, Learning, Planning and Problem solving. Deep learning is a collection of algorithms used in machine learning, It is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is a technique (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  34. Predictive Modeling of Obesity and Cardiovascular Disease Risk: A Random Forest Approach.Mohammed S. Abu Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 7 (12):26-38.
    Abstract: This research employs a Random Forest classification model to predict and assess obesity and cardiovascular disease (CVD) risk based on a comprehensive dataset collected from individuals in Mexico, Peru, and Colombia. The dataset comprises 17 attributes, including information on eating habits, physical condition, gender, age, height, and weight. The study focuses on classifying individuals into different health risk categories using machine learning algorithms. Our Random Forest model achieved remarkable performance with an accuracy, F1-score, recall, and precision all (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Upright posture and the meaning of meronymy: A synthesis of metaphoric and analytic accounts.Jamin Pelkey - 2018 - Cognitive Semiotics 11 (1):1-18.
    Cross-linguistic strategies for mapping lexical and spatial relations from body partonym systems to external object meronymies (as in English ‘table leg’, ‘mountain face’) have attracted substantial research and debate over the past three decades. Due to the systematic mappings, lexical productivity and geometric complexities of body-based meronymies found in many Mesoamerican languages, the region has become focal for these discussions, prominently including contrastive accounts of the phenomenon in Zapotec and Tzeltal, leading researchers to question whether such systems should be explained (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Russell and the Newman Problem Revisited.Marc Champagne - 2012 - Analysis and Metaphysics 11:65 - 74.
    In his 1927 Analysis of Matter and elsewhere, Russell argued that we can successfully infer the structure of the external world from that of our explanatory schemes. While nothing guarantees that the intrinsic qualities of experiences are shared by their objects, he held that the relations tying together those relata perforce mirror relations that actually obtain (these being expressible in the formal idiom of the Principia Mathematica). This claim was subsequently criticized by the Cambridge mathematician Max Newman as true but (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Search Engines, White Ignorance, and the Social Epistemology of Technology.Joshua Habgood-Coote - manuscript
    How should we think about the ways search engines can go wrong? Following the publication of Safiya Noble’s Algorithms of Oppression (Noble 2018), a view has emerged that racist, sexist, and other problematic results should be thought of as indicative of algorithmic bias. In this paper, I offer an alternative angle on these results, building on Noble’s suggestion that search engines are complicit in a racial contract (Mills 1990). I argue that racist and sexist results should be thought of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Diagnostic Criteria for Temporomandibular Disorders (DC/TMD) for clinical and research applications.Eric Schiffman, Richard Ohrbach, E. Truelove, Edmond Truelove, John Look, Gary Anderson, Werner Ceusters, Barry Smith & Others - 2014 - Journal of Oral and Facial Pain and Headache 28 (1):6-27.
    Aims: The Research Diagnostic Criteria for Temporomandi¬bular Disorders (RDC/TMD) Axis I diagnostic algorithms were demonstrated to be reliable but below target sensitivity and specificity. Empirical data supported Axis I algorithm revisions that were valid. Axis II instruments were shown to be both reliable and valid. An international consensus workshop was convened to obtain recommendations and finalization of new Axis I diagnostic algorithms and new Axis II instruments. Methods: A comprehensive search of published TMD diagnostic literature was followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  81
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. The paradox of the artificial intelligence system development process: the use case of corporate wellness programs using smart wearables.Alessandra Angelucci, Ziyue Li, Niya Stoimenova & Stefano Canali - forthcoming - AI and Society:1-11.
    Artificial intelligence systems have been widely applied to various contexts, including high-stake decision processes in healthcare, banking, and judicial systems. Some developed AI models fail to offer a fair output for specific minority groups, sparking comprehensive discussions about AI fairness. We argue that the development of AI systems is marked by a central paradox: the less participation one stakeholder has within the AI system’s life cycle, the more influence they have over the way the system will function. This means that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Application of Naive Bayes Model, SVM and Deep Learning Predicting.Martono Aris, Padeli Padeli & Sudaryono Sudaryono - 2023 - Cices (Cyberpreneurship Innovative and Creative Exact and Social Science) 9 (1):93-101.
    The college hopes that every semester students are able to pay tuition properly and smoothly. The hope is that the institution will be able to maintain monthly cash flow so that its operational and maintenance costs can be met. Therefore, this study was conducted to predict and fulfill the institution's cash-in from the method of paying tuition fees either by cash, installments, or sometimes late payments every semester. In predicting the method of paying tuition fees, using student profile data (name, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. THE SPECTACLE OF REFLECTION: ON DREAMS, NEURAL NETWORKS AND THE VISUAL NATURE OF THOUGHT.Magdalena Szalewicz - manuscript
    The article considers the problem of images and the role they play in our reflection turning to evidence provided by two seemingly very distant theories of mind together with two sorts of corresponding visions: dreams as analyzed by Freud who claimed that they are pictures of our thoughts, and their mechanical counterparts produced by neural networks designed for object recognition and classification. Freud’s theory of dreams has largely been ignored by philosophers interested in cognition, most of whom focused solely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Kuznetsov V. From studying theoretical physics to philosophical modeling scientific theories: Under influence of Pavel Kopnin and his school.Volodymyr Kuznetsov - 2017 - ФІЛОСОФСЬКІ ДІАЛОГИ’2016 ІСТОРІЯ ТА СУЧАСНІСТЬ У НАУКОВИХ РОЗМИСЛАХ ІНСТИТУТУ ФІЛОСОФІЇ 11:62-92.
    The paper explicates the stages of the author’s philosophical evolution in the light of Kopnin’s ideas and heritage. Starting from Kopnin’s understanding of dialectical materialism, the author has stated that category transformations of physics has opened from conceptualization of immutability to mutability and then to interaction, evolvement and emergence. He has connected the problem of physical cognition universals with an elaboration of the specific system of tools and methods of identifying, individuating and distinguishing objects from a scientific theory domain. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. (1 other version)subregular tetrahedra.John Corcoran - 2008 - Bulletin of Symbolic Logic 14 (3):411-2.
    This largely expository lecture deals with aspects of traditional solid geometry suitable for applications in logic courses. Polygons are plane or two-dimensional; the simplest are triangles. Polyhedra [or polyhedrons] are solid or three-dimensional; the simplest are tetrahedra [or triangular pyramids, made of four triangles]. -/- A regular polygon has equal sides and equal angles. A polyhedron having congruent faces and congruent [polyhedral] angles is not called regular, as some might expect; rather they are said to be subregular—a word coined for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  41
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Identification of plant Syndrome using IPT.M. Madan Mohan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):60-69.
    Agricultural productivity is something on which Indian economy highly depends. This is the one of the reasons that disease detection in plants plays a vital role in agriculture field, as having disease in plants are unavoidable. If proper care is not taken in this area, then it causes serious effects on plants and due to which the overall agriculture yield will be affected. For instance, a disease named little leaf disease is a hazardous disease found in pine trees in United (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Exploring Machine Learning Techniques for Coronary Heart Disease Prediction.Hisham Khdair - 2021 - International Journal of Advanced Computer Science and Applications 12 (5):28-36.
    Coronary Heart Disease (CHD) is one of the leading causes of death nowadays. Prediction of the disease at an early stage is crucial for many health care providers to protect their patients and save lives and costly hospitalization resources. The use of machine learning in the prediction of serious disease events using routine medical records has been successful in recent years. In this paper, a comparative analysis of different machine learning techniques that can accurately predict the occurrence of CHD events (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Intelligent Neurtosophic Diagnostic System for Cardiotcography data.Belal Amin, A. A. Salama, Mona G. Gafar & Khaled Mahfouz, - 2021 - Computational Intelligence and Neuroscience 2021:15-21.
    Cardiotocography data uncertainty is a critical task for the classification in biomedical field. Constructing good and efficient classifier via machine learning algorithms is necessary to help doctors in diagnosing the state of fetus heart rate. *e proposed neutrosophic diagnostic system is an Interval Neutrosophic Rough Neural Network framework based on the backpropagation algorithm. It benefits from the advantages of neutrosophic set theory not only to improve the performance of rough neural networks but also to achieve a better performance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Affiliative Subgroups in Preschool Classrooms: Integrating Constructs and Methods from Social Ethology and Sociometric Traditions.António J. Santos, João R. Daniel, Carla Fernandes & Brian E. Vaughn - 2015 - PLoS ONE 7 (10):1-17.
    Recent studies of school-age children and adolescents have used social network analyses to characterize selection and socialization aspects of peer groups. Fewer network studies have been reported for preschool classrooms and many of those have focused on structural descriptions of peer networks, and/or, on selection processes rather than on social functions of subgroup membership. In this study we started by identifying and describing different types of affiliative subgroups (HMP- high mutual proximity, LMP- low mutual proximity, and ungrouped children) in a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 958