Results for 'Data mining'

965 found
Order:
  1. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Retractions Data Mining #1.Quan-Hoang Vuong & Viet-Phuong La - 2019 - Open Science Framework 2019 (2):1-3.
    Motivation: • Breaking barriers in publishing demands a proactive attitude • Open data, open review and open dialogue in making social sciences plausible .
    Download  
     
    Export citation  
     
    Bookmark  
  3.  70
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  6. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Data Mining the Brain to Decode the Mind.Daniel Weiskopf - 2020 - In Fabrizio Calzavarini & Marco Viola (eds.), Neural Mechanisms: New Challenges in the Philosophy of Neuroscience. Springer.
    In recent years, neuroscience has begun to transform itself into a “big data” enterprise with the importation of computational and statistical techniques from machine learning and informatics. In addition to their translational applications such as brain-computer interfaces and early diagnosis of neuropathology, these tools promise to advance new solutions to longstanding theoretical quandaries. Here I critically assess whether these promises will pay off, focusing on the application of multivariate pattern analysis (MVPA) to the problem of reverse inference. I argue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. A Comparative Analysis of Data Mining Techniques on Breast Cancer Diagnosis Data using WEKA Toolbox.Majdah Alshammari & Mohammad Mezher - 2020 - (IJACSA) International Journal of Advanced Computer Science and Applications 8:224-229.
    Abstract—Breast cancer is considered the second most common cancer in women compared to all other cancers. It is fatal in less than half of all cases and is the main cause of mortality in women. It accounts for 16% of all cancer mortalities worldwide. Early diagnosis of breast cancer increases the chance of recovery. Data mining techniques can be utilized in the early diagnosis of breast cancer. In this paper, an academic experimental breast cancer dataset is used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Data Mining & Big Data: Strategic Anticipation & Decision-making support, SciencesPo, 24h, 2018.Marc-Olivier Boisset & Jean Langlois-Berthelot - unknown
    In the end of the course the student will be able to: • Understand the functioning of data mining tools and their contributions to managerial professions • Master the use of dynamic search tools on the open web and on the dark web. • Use the proper tools according to the objectives sought • Master the latest trends and innovations in Business Analytics • Analyze the opportunities offered in terms of data mining by artificial intelligence and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. A Framework Proposal for Developing Historical Video Games Based on Player Review Data Mining to Support Historic Preservation.Sarvin Eshaghi, Sepehr Vaez Afshar & Mahyar Hadighi - 2023 - In Saif Haq, Adil Sharag-Eldin & Sepideh Niknia (eds.), ARCC 2023 CONFERENCE PROCEEDING: The Research Design Interface. Architectural Research Centers Consortium, Inc.. pp. 297-305.
    Historic preservation, which is a vital act for conveying people’s understanding of the past, such as events, ideas, and places to the future, allows people to preserve history for future generations. Additionally, since the historic properties are currently concentrated in urban areas, an urban-oriented approach will contribute to the issue. Hence, public awareness is a key factor that paves the way for this conservation. Public history, a history with a public audience and special methods of representation, can serve society in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Ontology-based knowledge representation of experiment metadata in biological data mining.Scheuermann Richard, Kong Megan, Dahlke Carl, Cai Jennifer, Lee Jamie, Qian Yu, Squires Burke, Dunn Patrick, Wiser Jeff, Hagler Herb, Herb Hagler, Barry Smith & David Karp - 2009 - In Chen Jake & Lonardi Stefano (eds.), Biological Data Mining. Chapman Hall / Taylor and Francis. pp. 529-559.
    According to the PubMed resource from the U.S. National Library of Medicine, over 750,000 scientific articles have been published in the ~5000 biomedical journals worldwide in the year 2007 alone. The vast majority of these publications include results from hypothesis-driven experimentation in overlapping biomedical research domains. Unfortunately, the sheer volume of information being generated by the biomedical research enterprise has made it virtually impossible for investigators to stay aware of the latest findings in their domain of interest, let alone to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. (1 other version)Ontology-assisted database integration to support natural language processing and biomedical data-mining.Jean-Luc Verschelde, Marianna C. Santos, Tom Deray, Barry Smith & Werner Ceusters - 2004 - Journal of Integrative Bioinformatics. Repr. In: Yearbook of Bioinformatics , 39–48 1:1-10.
    Successful biomedical data mining and information extraction require a complete picture of biological phenomena such as genes, biological processes, and diseases; as these exist on different levels of granularity. To realize this goal, several freely available heterogeneous databases as well as proprietary structured datasets have to be integrated into a single global customizable scheme. We will present a tool to integrate different biological data sources by mapping them to a proprietary biomedical ontology that has been developed for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and competence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Identifying Virtues and Values Through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - 2018 - Journal of Value Inquiry 52 (1).
    Because obituaries are succinct and explicitly intended to summarize their subjects’ lives, they may be expected to include only the features that the author finds most salient but also to signal to others in the community the socially-recognized aspects of the deceased’s character. We begin by reviewing studies 1 and 2, in which obituaries were carefully read and labeled. We then report study 3, which further develops these results with a semi-automated, large-scale semantic analysis of several thousand obituaries. Geography, gender, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  17. Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. (1 other version)Mapping Human Values: Enhancing Social Marketing through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - forthcoming - In Lynn Kahle & Eda Atay (eds.), Social and Cultural Values in a Global and Digital Age.
    Download  
     
    Export citation  
     
    Bookmark  
  19. (1 other version)Ethical issues of 'morality mining': When the moral identity of individuals becomes a focus of data-mining.Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley - 2013 - In Hakikur Rahman & Isabel Ramos (eds.), Ethical Data Mining Applications for Socio-Economic Development. IGI Global. pp. 1-21.
    Download  
     
    Export citation  
     
    Bookmark  
  20. Neutrosophic Association Rule Mining Algorithm for Big Data Analysis.Mohamed Abdel-Basset, Mai Mohamed, Florentin Smarandache & Victor Chang - 2018 - Symmetry 10 (4):1-19.
    Big Data is a large-sized and complex dataset, which cannot be managed using traditional data processing tools. Mining process of big data is the ability to extract valuable information from these large datasets. Association rule mining is a type of data mining process, which is indented to determine interesting associations between items and to establish a set of association rules whose support is greater than a specific threshold. The classical association rules can only (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  21. Experiences in Mining Educational Data to Analyze Teacher's Performance: A Case Study with High Educational Teachers.Abdelbaset Almasri - 2017 - International Journal of Hybrid Information Technology 10 (12):1-12.
    Educational Data Mining (EDM) is a new paradigm aiming to mine and extract knowledge necessary to optimize the effectiveness of teaching process. With normal educational system work it’s often unlikely to accomplish fine system optimizing due to large amount of data being collected and tangled throughout the system. EDM resolves this problem by its capability to mine and explore these raw data and as a consequence of extracting knowledge. This paper describes several experiments on real educational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Mineness without Minimal Selves.M. V. P. Slors & F. Jongepier - 2014 - Journal of Consciousness Studies 21 (7-8):193-219.
    In this paper we focus on what is referred to as the ‘mineness’ of experience, that is, the intimate familiarity we have with our own thoughts, perceptions, and emotions. Most accounts characterize mineness in terms of an experiential dimension, the first-person givenness of experience, that is subsumed under the notion of minimal self-consciousness or a ‘minimal self’. We argue that this account faces problems and develop an alternative account of mineness in terms of the coherence of experiences with what we (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  23. NEUTROSOPHIC THEORY AND SENTIMENT ANALYSIS TECHNIQUE FOR MINING AND RANKING BIG DATA FROM ONLINE EVALUATION.C. Manju Priya - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):124-142.
    A huge amount of data is being generated everyday through different transactions in industries, social networking, communication systems etc. Big data is a term that represents vast volumes of high speed, complex and variable data that require advanced procedures and technologies to enable the capture, storage, management, and analysis of the data. Big data analysis is the capacity of representing useful information from these large datasets. Due to characteristics like volume, veracity, and velocity, big (...) analysis is becoming one of the most challenging research problems. Semantic analysis is method to better understand the implied or practical meaning of the input dataset. It is mostly applied with ontology to analyze content mainly in web resources. This field of research combines text analysis and Semantic Web technologies. The use semantic knowledge is to aid sentiment analysis of queries like emotion mining, popularity analysis, recommendation systems, user profiling, etc. A new method has been proposed to extract semantic relationships between different data attributes of big data which can be applied to a decision system. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Ethical Issues in Text Mining for Mental Health.Joshua Skorburg & Phoebe Friesen - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    A recent systematic review of Machine Learning (ML) approaches to health data, containing over 100 studies, found that the most investigated problem was mental health (Yin et al., 2019). Relatedly, recent estimates suggest that between 165,000 and 325,000 health and wellness apps are now commercially available, with over 10,000 of those designed specifically for mental health (Carlo et al., 2019). In light of these trends, the present chapter has three aims: (1) provide an informative overview of some of the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Questões Epistemológicas em Mineração de Dados Educacionais.Esdras L. Bispo Jr - 2019 - Brazilian Symposium on Computers in Education.
    Educational Data Mining (EDM) shows interesting scientific results lately. However, little has been discussed about philosophical questions regarding the type of knowledge produced in this area. This paper aims to present two epistemological issues in EDM: (i) a question of ontological nature about the content of the knowledge obtained; and (ii) a question of deontological nature, about the guidelines and principles adopted by the researcher in education, to the detriment of the results of his own research. In the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining qualitative and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  62
    Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.), Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the general (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Small-scale mining in South Africa: an assessment of the success factors and support structures for entrepreneurs.Zandisile Mkubukeli & Robertson K. Tengeh - 2015 - Environmental Economics 6 (4):15-24.
    One of the negative legacies of the apartheid era is a markedly skewed mining sector that favours the established companies, and almost completely neglects small-scale mining enterprises. Though a major source of revenue for South Africa(SA), the current state of the mining sector does not directly benefit the previously disadvantaged who dominate small-scale mining. The aim of this study is to explore the support structures and success factors relevant to small scale mining entrepreneurs in South (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. A Survey on Idea Mining: Techniques and Application.Nicholaus J. Gati & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):1-4.
    Abstract: Idea mining is an interesting field in the area of information retrieval and it is increasingly becoming important asset for decision makers. Huge volumes of high quality data from various sources such as scanners, mobile phones, loyalty cards, the web, and social media platforms presents enormous opportunity for organization to achieve success in their businesses. It is possible to achieve this by properly analysing data to reveal feature patterns; hence decision makers can capitalize upon the resulting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Prospects and Challenges for Small-Scale Mining Entrepreneurs in South Africa.Zandisile Mkubukeli & Robertson K. Tengeh - 2016 - Journal of Entrepreneurship and Organization Management 5 (4):2-10.
    Small-scale mining entrepreneurs are confronted with a variety of challenges during both the start-up and growth phase of their businesses not only in South Africa, but all over the world. Therefore, losing prospects available to them. The aim of this paper was to explore prospects and challenges faced by small scale mining entrepreneurs in South Africa (SA). To attain this end, a qualitative research paradigm was instituted for both data collection and analysis. The findings of this study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. How Archaeological Evidence Bites Back: Strategies for Putting Old Data to Work in New Ways.Alison Wylie - 2017 - Science, Technology, and Human Values 42 (2):203-225.
    Archaeological data are shadowy in a number of senses. Not only are they notoriously fragmentary but the conceptual and technical scaffolding on which archaeologists rely to constitute these data as evidence can be as constraining as it is enabling. A recurrent theme in internal archaeological debate is that reliance on sedimented layers of interpretative scaffolding carries the risk that “preunderstandings” configure what archaeologists recognize and record as primary data, and how they interpret it as evidence. The selective (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  33. A Review Paper on Scope of Big Data Analysis in Heath Informatics.Kazi Md Shahiduzzaman, Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (5):1-8.
    Abstract— The term Health Informatics represent a huge volume of data that is collected from different source of health sector. Because of its’ diversity in nature, quite a big number of attributes, numerous amount data, health informatics can be considered as Big Data. Therefore, different techniques used for analyzing Big Data will also fit for Health Informatics. In recent years, implementation of Data Mining on Health Informatics brings a lot of fruitful outcomes that improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. On the application of formal principles to life science data: A case study in the Gene Ontology.Jacob Köhler, Anand Kumar & Barry Smith - 2004 - In Köhler Jacob, Kumar Anand & Smith Barry (eds.), Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics 2994). Springer. pp. 79-94.
    Formal principles governing best practices in classification and definition have for too long been neglected in the construction of biomedical ontologies, in ways which have important negative consequences for data integration and ontology alignment. We argue that the use of such principles in ontology construction can serve as a valuable tool in error-detection and also in supporting reliable manual curation. We argue also that such principles are a prerequisite for the successful application of advanced data integration techniques such (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  36. (1 other version)Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Beyond categorical definitions of life: a data-driven approach to assessing lifeness.Christophe Malaterre & Jean-François Chartier - 2019 - Synthese 198 (5):4543-4572.
    The concept of “life” certainly is of some use to distinguish birds and beavers from water and stones. This pragmatic usefulness has led to its construal as a categorical predicate that can sift out living entities from non-living ones depending on their possessing specific properties—reproduction, metabolism, evolvability etc. In this paper, we argue against this binary construal of life. Using text-mining methods across over 30,000 scientific articles, we defend instead a degrees-of-life view and show how these methods can contribute (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  38. PREDICTION OF EDUCATIONAL DATA USING DEEP CONVOLUTIONAL NEURAL NETWORK.K. Vijayalakshmi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):93-111.
    : One of the most active study fields in natural language processing, web mining, and text mining is sentiment analysis. Big data is an important research component in education that is used to advance the value of education by watching students' performance and understanding their learning habits. Real-time student feedback will enable teachers and students to understand teaching and learning challenges in the most user-friendly manner for students. By linking learning analytics to grounded theory, the proposed Deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Jacques Lacan’s Registers of the Psychoanalytic Field, Applied using Geometric Data Analysis to Edgar Allan Poe’s “The Purloined Letter”.Fionn Murtagh & Giuseppe Iurato - manuscript
    In a first investigation, a Lacan-motivated template of the Poe story is fitted to the data. A segmentation of the storyline is used in order to map out the diachrony. Based on this, it will be shown how synchronous aspects, potentially related to Lacanian registers, can be sought. This demonstrates the effectiveness of an approach based on a model template of the storyline narrative. In a second and more Comprehensive investigation, we develop an approach for revealing, that is, uncovering, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Philosophy’s gender gap and argumentative arena: an empirical study.Moti Mizrahi & Michael Adam Dickinson - 2022 - Synthese 200 (2):1-34.
    While the empirical evidence pointing to a gender gap in professional, academic philosophy in the English-speaking world is widely accepted, explanations of this gap are less so. In this paper, we aim to make a modest contribution to the literature on the gender gap in academic philosophy by taking a quantitative, corpus-based empirical approach. Since some philosophers have suggested that it may be the argumentative, “logic-chopping,” and “paradox-mongering” nature of academic philosophy that explains the underrepresentation of women in the discipline, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. The Case Study Method in Philosophy of Science: An Empirical Study.Moti Mizrahi - 2020 - Perspectives on Science 28 (1):63-88.
    There is an ongoing methodological debate in philosophy of science concerning the use of case studies as evidence for and/or against theories about science. In this paper, I aim to make a contribution to this debate by taking an empirical approach. I present the results of a systematic survey of the PhilSci-Archive, which suggest that a sizeable proportion of papers in philosophy of science contain appeals to case studies, as indicated by the occurrence of the indicator words “case study” and/or (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  42. Development of Keyword Trend Prediction Models for Obesity Before and After the COVID-19 Pandemic Using RNN and LSTM: Analyzing the News Big Data of South Korea.Gayeong Eom & Haewon Byeon - 2022 - Frontiers in Public Health 10:894266.
    The Korea National Health and Nutrition Examination Survey (2020) reported that the prevalence of obesity (≥19 years old) was 31.4% in 2011, but it increased to 33.8% in 2019 and 38.3% in 2020, which confirmed that it increased rapidly after the outbreak of COVID-19. Obesity increases not only the risk of infection with COVID-19 but also severity and fatality rate after being infected with COVID-19 compared to people with normal weight or underweight. Therefore, identifying the difference in potential factors for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Philosophical reasoning about science: a quantitative, digital study.Moti Mizrahi & Michael Adam Dickinson - 2022 - Synthese 200 (2).
    In this paper, we set out to investigate the following question: if science relies heavily on induction, does philosophy of science rely heavily on induction as well? Using data mining and text analysis methods, we study a large corpus of philosophical texts mined from the JSTOR database (n = 14,199) in order to answer this question empirically. If philosophy of science relies heavily on induction, just as science supposedly does, then we would expect to find significantly more inductive (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  78
    Visualizing Values.Mark Alfano, Andrew Higgins, Jacob Levernier & Veronica Alfano - forthcoming - In David Rheams, Tai Neilson & Lewis Levenberg (eds.), Handbook of Methods in the Digital Humanities. Rowman & Littlefield.
    Digital humanities research has developed haphazardly, with substantive contributions in some disciplines and only superficial uses in others. It has made almost no inroads in philosophy; for example, of the nearly two million articles, chapters, and books housed at philpapers.org, only sixteen pop up when one searches for ‘digital humanities’. In order to make progress in this field, we demonstrate that a hypothesis-driven method, applied by experts in data-collection, -aggregation, -analysis, and -visualization, yields philosophical fruits. “Call no one happy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. An Exploratory Analysis of the Development of Philippine Regions.Starr Clyde Sebial - 2019 - International Journal of Innovation, Creativity and Change 8 (2):129-145.
    The Philippines is one of the fast-growing economies in the South-East Asian and the Pacific region. This study considered eight factors: HEI PRC rate, crime rate, education, employment, health, poverty, income, and basic family amenities of the 17 regions of the country, all taken from the year 2012 databases of the Philippine Statistics Authority (PSA), the Philippine Institute for Development Studies (PIDS) and Open Data Philippines. Principal Component Analysis (PCA) generated the indices of the six factors and Cluster Analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. ANN for Lung Cancer Detection.Nassar AlIbrahim & Murshidy Suheil - 2020 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):17-21.
    In this paper, we developed an Artificial Neural Network (ANN) for detect the absence or presence of lung cancer in human body. Symptoms were used to diagnose the lung cancer, these symptoms such as Yellow fingers, Anxiety, Chronic Disease, Fatigue, Allergy, Wheezing, Coughing, Shortness of Breath, Swallowing Difficulty and Chest pain. They were used and other information about the person as input variables for our ANN. Our ANN established, trained, and validated using data set, which its title is “survey (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Saliva Ontology: An ontology-based framework for a Salivaomics Knowledge Base.Jiye Ai, Barry Smith & David Wong - 2010 - BMC Bioinformatics 11 (1):302.
    The Salivaomics Knowledge Base (SKB) is designed to serve as a computational infrastructure that can permit global exploration and utilization of data and information relevant to salivaomics. SKB is created by aligning (1) the saliva biomarker discovery and validation resources at UCLA with (2) the ontology resources developed by the OBO (Open Biomedical Ontologies) Foundry, including a new Saliva Ontology (SALO). We define the Saliva Ontology (SALO; http://www.skb.ucla.edu/SALO/) as a consensus-based controlled vocabulary of terms and relations dedicated to the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  49. Extended knowledge, the recognition heuristic, and epistemic injustice.Mark Alfano & Joshua August Skorburg - 2018 - In Duncan Pritchard, Jesper Kallestrup, Orestis Palermos & Adam Carter (eds.), Extended Knowledge. Oxford University Press. pp. 239-256.
    We argue that the interaction of biased media coverage and widespread employment of the recognition heuristic can produce epistemic injustices. First, we explain the recognition heuristic as studied by Gerd Gigerenzer and colleagues, highlighting how some of its components are largely external to, and outside the control of, the cognitive agent. We then connect the recognition heuristic with recent work on the hypotheses of embedded, extended, and scaffolded cognition, arguing that the recognition heuristic is best understood as an instance of (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  50. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And it (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 965