Results for 'Detection'

633 found
Order:
  1. True Detective: Buddhism, Pessimism or Philosophy?Finn Janning - 2014 - Journal of Philosophy of Life 4 (4).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Download  
     
    Export citation  
     
    Bookmark   92 citations  
  3. Pedestrian detection based on hierarchical co-occurrence model for occlusion handling.Xiaowei Zhang, HaiMiao Hu, Fan Jiang & Bo Li - 2015 - Neurocomputing 10.
    In pedestrian detection, occlusions are typically treated as an unstructured source of noise and explicit models have lagged behind those for object appearance, which will result in degradation of detection performance. In this paper, a hierarchical co-occurrence model is proposed to enhance the semantic representation of a pedestrian. In our proposed hierarchical model, a latent SVM structure is employed to model the spatial co-occurrence relations among the parent–child pairs of nodes as hidden variables for handling the partial occlusions. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Deception Detection Research: Some Lessons for Epistemology.Peter Graham - 2024 - In Waldomiro J. Silva-Filho (ed.), Epistemology of Conversation: First essays. Cham: Springer.
    According to our folk theory of lying, liars leak observable cues of their insincerity, observable cues that make it easy to catch a liar in real time. Various prominent social epistemologists rely on the correctness of our folk theory as empirically well-confirmed when building their normative accounts of the epistemology of testimony. Deception detection research in communication studies, however, has shown that our folk-theory is mistaken. It is not empirically well-confirmed but empirically refuted. Michaelian (2010) and Shieber (2012) have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Introspection Is Signal Detection.Jorge Morales - forthcoming - British Journal for the Philosophy of Science.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise ratio) (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  8. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  10.  62
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Lung Cancer Detection Using Artificial Neural Network.Ibrahim M. Nasser & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):17-23.
    In this paper, we developed an Artificial Neural Network (ANN) for detect the absence or presence of lung cancer in human body. Symptoms were used to diagnose the lung cancer, these symptoms such as Yellow fingers, Anxiety, Chronic Disease, Fatigue, Allergy, Wheezing, Coughing, Shortness of Breath, Swallowing Difficulty and Chest pain. They were used and other information about the person as input variables for our ANN. Our ANN established, trained, and validated using data set, which its title is “survey lung (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  12. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  13. Direct Detection of Relic Neutrino Background remains impossible: A review of more recent arguments.Florentin Smarandache & Victor Christianto - manuscript
    The existence of big bang relic neutrinos—exact analogues of the big bang relic photons comprising the cosmic microwave background radiation—is a basic prediction of standard cosmology. The standard big bang theory predicts the existence of 1087 neutrinos per flavour in the visible universe. This is an enormous abundance unrivalled by any other known form of matter, falling second only to the cosmic microwave background (CMB) photon. Yet, unlike the CMB photon which boasts its first (serendipitous) detection in the 1960s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  87
    Breakthroughs in Breast Cancer Detection: Emerging Technologies and Future Prospects.Ola I. A. Lafi, Rawan N. A. Albanna, Dina F. Alborno, Raja E. Altarazi, Amal Nabahin, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Health and Medical Research (IJAHMR) 8 (9):8-15.
    Abstract: Early detection of breast cancer is vital for improving patient outcomes and reducing mortality rates. Technological advancements have significantly enhanced the accuracy and efficiency of screening methods. This paper explores recent innovations in early detection, focusing on the evolution of digital mammography, the benefits of 3D mammography (tomosynthesis), and the application of advanced imaging techniques such as molecular imaging and MRI. It also examines the role of artificial intelligence (AI) in diagnostic tools, showing how machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Failure to detect mismatches between intention and outcome in a simple decision task.Petter Johansson, Lars Hall, Sverker Sikstrom & Andreas Olsson - 2005 - Science 310 (5745):116-119.
    A fundamental assumption of theories of decision-making is that we detect mismatches between intention and outcome, adjust our behavior in the face of error, and adapt to changing circumstances. Is this always the case? We investigated the relation between intention, choice, and introspection. Participants made choices between presented face pairs on the basis of attractiveness, while we covertly manipulated the relationship between choice and outcome that they experienced. Participants failed to notice conspicuous mismatches between their intended choice and the outcome (...)
    Download  
     
    Export citation  
     
    Bookmark   116 citations  
  17. Human Symmetry Uncertainty Detected by a Self-Organizing Neural Network Map.Birgitta Dresp-Langley - 2021 - Symmetry 13:299.
    Symmetry in biological and physical systems is a product of self-organization driven by evolutionary processes, or mechanical systems under constraints. Symmetry-based feature extraction or representation by neural networks may unravel the most informative contents in large image databases. Despite significant achievements of artificial intelligence in recognition and classification of regular patterns, the problem of uncertainty remains a major challenge in ambiguous data. In this study, we present an artificial neural network that detects symmetry uncertainty states in human observers. To this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  67
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game addictions (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Detecting Ideology in Our Understanding of Objectivity.Markus Gabriel - 2015 - In Channa van Dijk, Eva van der Graaf, Michiel den Haan, Rosa de Jong, Christiaan Roodenburg, Dyane Til & Deva Waal (eds.), Under Influence - Philosophical Festival Drift (2014). Omnia. pp. 44-63.
    Download  
     
    Export citation  
     
    Bookmark  
  22.  50
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Autism spectrum and cheaters detection.Miguel Lopez Astorga - 2014 - Dialogues in Philosophy, Mental and Neuro Sciences 7 (1):1-10.
    Rutherford and Ray think that human beings have mental mechanisms that help them to detect individuals that, deliberately, do not follow a rule. In the same way, they hold that autism is not a disorder in which these mechanisms are damaged. This idea seems contrary to the thesis, supported by some researchers, that autistic people have a theory of mind deficit. This is because of, if Rutherford and Ray are right, autistic people can detect other people’s intentions. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Detecting the Factors Affecting Classroom Dialogue Quality.Chrysi Rapanta, Merce Garcia-Milà, Andrea Miralda Banda & Fabrizio Macagno - 2023 - Linguistics and Education 77:101223.
    Despite the emphasis on dialogue and argumentation in educational settings, still not much is known about how best we can support learners in their interthinking, reasoning, and metadialogic understanding. The goal of this classroom intervention study is to explore the degree of students’ dialogicity and its possible increase during a learning programme implementing dialogic and argument-based teaching goals and principles. In particular, we focus on how students from 5 to 15 years old engage with each other's ideas, and whether/how this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. In defence of gullibility: The epistemology of testimony and the psychology of deception detection.Kourken Michaelian - 2010 - Synthese 176 (3):399-427.
    Research in the psychology of deception detection implies that Fricker, in making her case for reductionism in the epistemology of testimony, overestimates both the epistemic demerits of the antireductionist policy of trusting speakers blindly and the epistemic merits of the reductionist policy of monitoring speakers for trustworthiness: folk psychological prejudices to the contrary notwithstanding, it turns out that monitoring is on a par (in terms both of the reliability of the process and of the sensitivity of the beliefs that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  26.  38
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to rank (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  78
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  65
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Can Gravitons be Detected?Tony Rothman & Stephen Boughn - 2006 - Foundations of Physics 36 (12):1801-1825.
    Freeman Dyson has questioned whether any conceivable experiment in the real universe can detect a single graviton. If not, is it meaningful to talk about gravitons as physical entities? We attempt to answer Dyson’s question and find it is possible concoct an idealized thought experiment capable of detecting one graviton; however, when anything remotely resembling realistic physics is taken into account, detection becomes impossible, indicating that Dyson’s conjecture is very likely true. We also point out several mistakes in the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. Wave detected by LIGO is not gravitational wave.Alfonso Leon Guillen Gomez - manuscript
    General Relativity defines gravity like the metric of a Lorentzian manifold. Einstein formulated spacetime as quality structural of gravity, i.e, circular definition between gravity and spacetime, also Einstein denoted "Space and time are modes by which we think, not conditions under which we live" and “We denote everything but the gravitational field as matter”, therefore, spacetime is nothing and gravity in first approximation an effect of coordinates, and definitely a geometric effect. The mathematical model generates quantitative predictions coincident in high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Ontology-based error detection in SNOMED-CT.Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Proceedings of Medinfo 2004:482-6.
    Quality assurance in large terminologies is a difficult issue. We present two algorithms that can help terminology developers and users to identify potential mistakes. We demon­strate the methodology by outlining the different types of mistakes that are found when the algorithms are applied to SNOMED-CT. On the basis of the results, we argue that both formal logical and linguistic tools should be used in the development and quality-assurance process of large terminologies.
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  32. Autism spectrum and cheaters detection.Miguel López Astorga - 2014 - Dialogues in Philosophy, Mental and Neuro Sciences 7 (1):1-10.
    Rutherford and Ray think that human beings have mental mechanisms that help them to detect individuals that, deliberately, do not follow a rule. In the same way, they hold that autism is not a disorder in which these mechanisms are damaged. This idea seems contrary to the thesis, supported by some researchers, that autistic people have a theory of mind deficit. This is because of, if Rutherford and Ray are right, autistic people can detect other people's intentions. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Using Deep Learning to Detect the Quality of Lemons.Mohammed B. Karaja & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):97-104.
    Abstract: Lemons are an important fruit that have a wide range of uses and benefits, from culinary to health to household and beauty applications. Deep learning techniques have shown promising results in image classification tasks, including fruit quality detection. In this paper, we propose a convolutional neural network (CNN)-based approach for detecting the quality of lemons by analysing visual features such as colour and texture. The study aims to develop and train a deep learning model to classify lemons based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Forest Fire Detection using Deep Leaning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):59-65.
    Abstract: Forests are areas with a high density of trees, and they play a vital role in the health of the planet. They provide a habitat for a wide variety of plant and animal species, and they help to regulate the climate by absorbing carbon dioxide from the atmosphere. While in 2010, the world had 3.92Gha of forest cover, covering 30% of its land area, in 2019, there was a loss of forest cover of 24.2Mha according to the Global Forest (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Predicting Fire Alarms in Smoke Detection using Neural Networks.Maher Wissam Attia, Baraa Akram Abu Zaher, Nidal Hassan Nasser, Ruba Raed Al-Hour, Aya Haider Asfour & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):26-33.
    Abstract: This research paper presents the development and evaluation of a neural network-based model for predicting fire alarms in smoke detection systems. Using a dataset from Kaggle containing 15 features and 3487 samples, we trained and validated a neural network with a three-layer architecture. The model achieved an accuracy of 100% and an average error of 0.0000003. Additionally, we identified the most influential features in predicting fire alarms.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Advancements in Early Detection of Breast Cancer: Innovations and Future Directions.Izzeddin A. Alshawwa, Hosni Qasim El-Mashharawi, Fatima M. Salman, Mohammed Naji Abu Al-Qumboz, Bassem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (8):15-24.
    Abstract: Early detection of breast cancer plays a pivotal role in improving patient prognosis and reducing mortality rates. Recent technological advancements have significantly enhanced the accuracy and effectiveness of breast cancer screening methods. This paper explores the latest innovations in early detection, including the evolution of digital mammography, the impact of 3D mammography (tomosynthesis), and the use of advanced imaging techniques such as molecular imaging and MRI. Furthermore, the integration of artificial intelligence (AI) in diagnostic tools is discussed, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Assyrian Merchants meet Nuclear Physicists: History of the Early Contributions from Social Sciences to Computer Science. The Case of Automatic Pattern Detection in Graphs (1950s-1970s).Sébastien Plutniak - 2021 - Interdisciplinary Science Reviews 46 (4):547-568.
    Community detection is a major issue in network analysis. This paper combines a socio-historical approach with an experimental reconstruction of programs to investigate the early automation of clique detection algorithms, which remains one of the unsolved NP-complete problems today. The research led by the archaeologist Jean-Claude Gardin from the 1950s on non-numerical information and graph analysis is retraced to demonstrate the early contributions of social sciences and humanities. The limited recognition and reception of Gardin's innovative computer application to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Responsible Innovation in Social Epistemic Systems: The P300 Memory Detection Test and the Legal Trial.John Danaher - forthcoming - In Van den Hoven (ed.), Responsible Innovation Volume II: Concepts, Approaches, Applications. Springer.
    Memory Detection Tests (MDTs) are a general class of psychophysiological tests that can be used to determine whether someone remembers a particular fact or datum. The P300 MDT is a type of MDT that relies on a presumed correlation between the presence of a detectable neural signal (the P300 “brainwave”) in a test subject, and the recognition of those facts in the subject’s mind. As such, the P300 MDT belongs to a class of brain-based forensic technologies which have proved (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  84
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. (1 other version)A problem with detecting problem-solving outside the natural sciences.Terence Rajivan Edward -
    In this paper, I draw attention to an obstacle to determining to what extent the portrait of normal science as a problem-solving activity applies outside the natural sciences. I give two examples from social anthropology, one from the heyday of British structural-functionalism and one from recent British anthropology, “responding” to Marilyn Strathern’s problem of the feminist fieldworker. (NOTE: there is a duplicate of this but neither may be showing on my profile. A proverb: the guest hates the other guest; the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Automatic Face Mask Detection Using Python.M. Madan Mohan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):91-100.
    The corona virus COVID-19 pandemic is causing a global health crisis so the effective protection methods is wearing a face mask in public areas according to the World Health Organization (WHO). The COVID-19 pandemic forced governments across the world to impose lockdowns to prevent virus transmissions. Reports indicate that wearing facemasks while at work clearly reduces the risk of transmission. An efficient and economic approach of using AI to create a safe environment in a manufacturing setup. A hybrid model using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. COVID-19 Face Mask Detection Alert System.McDonald Moyo & Cen Yuefeng - 2022 - Computer Engineering and Intelligent Systems 13 (2):1-15.
    Study shows that mask-wearing is a critical factor in stopping the COVID-19 transmission. By the time of this article, most states have mandated face masking in public space. Therefore, real-time face mask detection becomes an essential application to prevent the spread of the pandemic. This study will present a face mask detection system that can detect and monitor mask-wearing from camera feeds and alert when there is a violation. The face mask detection algorithm uses a haar cascade (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  79
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  46.  58
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Attention to mental paint and change detection.Assaf Weksler - 2017 - Philosophical Studies 174 (8):1991-2007.
    According to the influential thesis of attentional transparency, in having or reflecting on an ordinary visual experience, we can attend only outwards, to qualities the experience represents, never to intrinsic qualities of the experience itself, i.e., to “mental paint.” According to the competing view, attentional semitransparency, although we usually attend outwards, to qualities the experience represents, we can also attend inwards, to mental paint. So far, philosophers have debated this topic in strictly armchair means, especially phenomenological reflection. My aim in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Detection of dopamine neurotransmission in ‘real time’.Rajendra Badgaiyan - 2013 - Frontiers in Neuroscience 7 (125).
    Download  
     
    Export citation  
     
    Bookmark  
  49. Can We Detect Bias in Political Fact-Checking? Evidence from a Spanish Case Study.David Teira, Alejandro Fernandez-Roldan, Carlos Elías & Carlos Santiago-Caballero - 2023 - Journalism Practice 10.
    Political fact-checkers evaluate the truthfulness of politicians’ claims. This paper contributes to an emerging scholarly debate on whether fact-checkers treat political parties differently in a systematic manner depending on their ideology (bias). We first examine the available approaches to analyze bias and then present a new approach in two steps. First, we propose a logistic regression model to analyze the outcomes of fact-checks and calculate how likely each political party will obtain a truth score. We test our model with a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. The Comparative Advantages of Brain-Based Lie Detection: The P300 Concealed Information Test and Pre-trial Bargaining.John Danaher - 2015 - International Journal of Evidence and Proof 19 (1).
    The lie detector test has long been treated with suspicion by the law. Recently, several authors have called this suspicion into question. They argue that the lie detector test may have considerable forensic benefits, particularly if we move past the classic, false-positive prone, autonomic nervous system-based (ANS-based) control question test, to the more reliable, brain-based, concealed information test. These authors typically rely on a “comparative advantage” argument to make their case. According to this argument, we should not be so suspicious (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 633