Results for 'Driver Drowsiness Detection'

881 found
Order:
  1. OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  79
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  78
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  20
    Road Abnormality Detection.C. Dastagiriaiah - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-13.
    Road abnormalities, such as speed breakers and potholes, pose significant risks to traffic safety, contributing to accidents, vehicle damage, and driver discomfort. Traditional methods for detecting these issues are primarily manual and reactive, leading to inefficiencies in maintenance and increased hazards for road users. To address this urgent need, the proposed project aims to develop a computer vision-based system for the automatic detection of these road anomalies. By utilizing techniques such as image processing and analysis through OpenCV, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Glocalization challenges and the contemporary architecture: systematic review of common global indicators in Aga Khan Award’s winners.Safa Salkhi Khasraghi & Asma Mehan - 2023 - Journal of Architecture and Urbanism 47 (2):135–145.
    Local reports from different international societies have considered the achievement of the successful Glocalized architecture model in line with the 2030 UN Sustainable Development Goals (SDGs). The Aga Khan Cultural Foundation’s International Program for Islamic Architecture has also prioritized the understanding of the success drivers in architectural projects. This study aimed to detect the potentials of the common global indicators to access qualitative design assessment through analyzing the Aga Khan Award’s reports. The selected methodology in the present study is a (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  6. Omissive Overdetermination: Why the Act-Omission Distinction Makes a Difference for Causal Analysis.Yuval Abrams - 2022 - University of Western Australia Law Review 1 (49):57-86.
    Analyses of factual causation face perennial problems, including preemption, overdetermination, and omissions. Arguably, the thorniest, are cases of omissive overdetermination, involving two independent omissions, each sufficient for the harm, and neither, independently, making a difference. A famous example is Saunders, where pedestrian was hit by a driver of a rental car who never pressed on the (unbeknownst to the driver) defective (and, negligently, never inspected) brakes. Causal intuitions in such cases are messy, reflected in disagreement about which omission (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Evidence amalgamation, plausibility, and cancer research.Marta Bertolaso & Fabio Sterpetti - 2019 - Synthese 196 (8):3279-3317.
    Cancer research is experiencing ‘paradigm instability’, since there are two rival theories of carcinogenesis which confront themselves, namely the somatic mutation theory and the tissue organization field theory. Despite this theoretical uncertainty, a huge quantity of data is available thanks to the improvement of genome sequencing techniques. Some authors think that the development of new statistical tools will be able to overcome the lack of a shared theoretical perspective on cancer by amalgamating as many data as possible. We think instead (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  8. Belgium: Adoption of the Sharing Economy.Liesbeth Huybrechts, Shenja van der Graaf, Ruben D'Hauwers & Jo Pierson - 2021 - In Andrzej Klimczuk, Vida Česnuityte & Gabriela Avram (eds.), The Collaborative Economy in Action: European Perspectives. Limerick: University of Limerick. pp. 52-66.
    The debate on the sharing economy in Belgium has been mainly focused on its economic, quantitative, and digital aspects. Given the fact that the adoption of the sharing economy has accelerated lately, this report wanted to contribute to further open up the debate on the adoption of this economy in relation to an aspect that is too little discussed, namely sustainability. Based on some smaller studies, this report identifies different drivers for concrete sustainable sharing economy initiatives to develop that situate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  43
    Entropy in Physics using my Universal Formula.Angelito Malicse - manuscript
    -/- 1. Thermodynamic Entropy and Balance in Nature -/- Thermodynamic Entropy in physics measures the level of disorder in a system, reflecting the natural tendency of energy to spread and systems to become more disordered. -/- Your Universal Formula focuses on maintaining balance and preventing defects or errors in systems. -/- Integration: -/- Increasing thermodynamic entropy (e.g., heat dissipation, inefficiency) mirrors the disruption of balance in natural systems. -/- Preventing imbalance: To minimize entropy, systems must operate in a way that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  23
    Real Time Effective Management of Street Parking.Amarnadh V. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    The "Smart and Effective Real-time Management of Street Parking" project is designed to enhance urban parking enforcement through the use of advanced machine learning and computer vision technologies. The system leverages CCTV cameras to continuously monitor parking spaces, detecting their availability and instances where vehicles are incorrectly parked. By analyzing video feeds, the system identifies parking violations and extracts license plate numbers using Optical Character Recognition (OCR). Notifications are promptly sent to drivers regarding their parking status, ensuring timely enforcement of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Artificial Intelligence and Punjabi Culture.D. P. Singh - 2023 - International Culture and Art (Ica) 5 (4):11-14.
    Artificial Intelligence (AI) is a technology that makes machines smart and capable of doing things that usually require human intelligence. AI works by training machines to learn from data and experiences. Such devices can recognize patterns, understand spoken language, see and understand images, and even make predictions based on their learning. Voice assistants like Siri or Alexa can understand our voice commands, answer questions, and perform tasks for us. AI-based self-driving cars can sense their surroundings, make decisions, and drive safely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Pedestrian detection based on hierarchical co-occurrence model for occlusion handling.Xiaowei Zhang, HaiMiao Hu, Fan Jiang & Bo Li - 2015 - Neurocomputing 10.
    In pedestrian detection, occlusions are typically treated as an unstructured source of noise and explicit models have lagged behind those for object appearance, which will result in degradation of detection performance. In this paper, a hierarchical co-occurrence model is proposed to enhance the semantic representation of a pedestrian. In our proposed hierarchical model, a latent SVM structure is employed to model the spatial co-occurrence relations among the parent–child pairs of nodes as hidden variables for handling the partial occlusions. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Drivers of organizational creativity.Mats Sundgren, Elof Dimenäs, Jan-Eric Gustafsson & Marcus Selart - 2005 - RandD Management 35:359-374.
    A path model of organizational creativity was presented; it conceptualized the influences of information sharing, learning culture, motivation, and networking on creative climate. A structural equation model was fitted to data from the pharmaceutical industry to test the proposed model. The model accounted for 86% of the variance in the creative climate dependent variable. Information sharing had a positive effect on learning culture, which in turn had a positive effect on creative climate, while there were negative direct effects of information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. True Detective: Buddhism, Pessimism or Philosophy?Finn Janning - 2014 - Journal of Philosophy of Life 4 (4).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  57
    Detecting Introspective Errors in Consciousness Science.Andy Mckilliam - forthcoming - Ergo: An Open Access Journal of Philosophy.
    Detecting introspective errors about consciousness presents challenges that are widely supposed to be difficult, if not impossible, to overcome. This is a problem for consciousness science because many central questions turn on when and to what extent we should trust subjects’ introspective reports. This has led some authors to suggest that we should abandon introspection as a source of evidence when constructing a science of consciousness. Others have concluded that central questions in consciousness science cannot be answered via empirical investigation. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  17. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Download  
     
    Export citation  
     
    Bookmark   94 citations  
  18. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  66
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  99
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  97
    Detecting Experts Using a MiniRocket: Gaze Direction Time Series Classification of Real-Life Experts Playing the Sustainable Port.Gianluca Guglielmo, Michal Klincewicz, Elisabeth Huis in ’T. Veld & Pieter Spronck - 2025 - Gala 2024. Lecture Notes in Computer Science 15348:177–187.
    This study aimed to identify real-life experts working for a port authority and lay people (students) who played The Sustainable Port, a serious game aiming to simulate the dynamics occurring in a port area. To achieve this goal, we analyzed eye gaze data collected noninvasively using low-grade webcams from 28 participants working for the port authority of the Port of Rotterdam and 66 students. Such data were used for a classification task implemented using a MiniRocket classifier, an algorithm used for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A Dilemma for Driver on Virtues of Ignorance.Josh Dolin - 2020 - Ethical Theory and Moral Practice 23 (5):889-898.
    For Julia Driver, some virtues involve ignorance. Modesty, for example, is a disposition to underestimate self-worth, and blind charity is a disposition not to see others’ defects. Such “virtues of ignorance,” she argues, serve as counterexamples to the Aristotelian view that virtue requires intellectual excellence. But Driver seems to face a dilemma: if virtues of ignorance involve ignorance of valuable knowledge, then they do not merit virtue status; but if they involve ignorance of trivial knowledge, then they do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  44
    Enhancing Malware Detection by Fusing Static and Dynamic Features Using Deep Neural Networks.Navas Garcia - manuscript
    Malware detection has been an ongoing challenge for cybersecurity experts due to the evolving nature of malicious software and the ability of malware to disguise itself. Traditional methods that rely solely on static features such as file signatures or dynamic analysis have had limitations in detecting new or obfuscated malware. This paper investigates the enhancement of malware detection by integrating both static and dynamic features and utilizing deep neural networks (DNNs) for more effective classification. By combining these feature (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  26. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Introspection Is Signal Detection.Jorge Morales - forthcoming - British Journal for the Philosophy of Science.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise ratio) (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  29. Deception Detection Research: Some Lessons for Epistemology.Peter Graham - 2024 - In Waldomiro J. Silva-Filho (ed.), Epistemology of Conversation: First essays. Cham: Springer.
    According to our folk theory of lying, liars leak observable cues of their insincerity, observable cues that make it easy to catch a liar in real time. Various prominent social epistemologists rely on the correctness of our folk theory as empirically well-confirmed when building their normative accounts of the epistemology of testimony. Deception detection research in communication studies, however, has shown that our folk-theory is mistaken. It is not empirically well-confirmed but empirically refuted. Michaelian (2010) and Shieber (2012) have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. True Detective : Pessimism, Buddhism or Philosophy?Finn Janning - 2015 - Journal of Philosophy of Life 5 (1).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Belief as the driver to experience and imagine the cosmic energy but with limitations.Contzen Pereira - 2016 - Journal ofMetaphysics and Connected Consciousness 2.
    Believing is what makes the believer believe what the believer wants to believe and this belief lures the energy to flow from the external to the internal; from the invisible to the visible; what we consider as a phenomenon or fulfilment of dreams in our lifetime. Cosmic energy naively progresses to create and recreate; to form and reform; to rise and give rise to and to fill and fulfil the desires of a being. Belief drives the experience of the experiencer; (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Drivers for the Formation of Informal Financial Associations by Immigrant Entrepreneurs in South Africa: the Case of Cameroonians.Linus Nkem & Robertson K. Tengeh - 2017 - Economica 13 (5):107-122.
    The sometimes, selective exclusion by the legislation and the financial houses of the host country, force immigrants of African origin to setup stokvels to sustain their businesses and livelihood in South Africa. Aim: To provide the basis for inclusive policy initiatives, this paper investigated the drivers for the formation of business support stokvels by Cameroonians in South Africa. Method: The paper adopted a mix research paradigm with the survey questionnaire and personal interviews as the tools of choice. The purposive sampling (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Wave detected by LIGO is not gravitational wave.Alfonso Leon Guillen Gomez - manuscript
    General Relativity defines gravity like the metric of a Lorentzian manifold. Einstein formulated spacetime as quality structural of gravity, i.e, circular definition between gravity and spacetime, also Einstein denoted "Space and time are modes by which we think, not conditions under which we live" and “We denote everything but the gravitational field as matter”, therefore, spacetime is nothing and gravity in first approximation an effect of coordinates, and definitely a geometric effect. The mathematical model generates quantitative predictions coincident in high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  43
    Enhancing Malicious Code Detection With Boosted N-Gram Analysis and Efficient Feature Selection.Nastooh Taheri Javan - 2024 - IEEE Access 12:147400-147421.
    A fundamental challenge in virology research lies in effectively detecting malicious code. N-gram analysis has become a cornerstone technique, but selecting the most informative features, especially for longer n-grams, remains crucial for efficient detection. This paper addresses this challenge by introducing a novel feature extraction method that leverages both adjacent and non-adjacent bi-grams, providing a richer set of information for malicious code identification. Additionally, we propose a computationally efficient feature selection approach that utilizes a genetic algorithm combined with Boosting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  79
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  37.  36
    Agricultural Innovation: Automated Detection of Plant Diseases through Deep Learning.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):630-640.
    The health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Failure to detect mismatches between intention and outcome in a simple decision task.Petter Johansson, Lars Hall, Sverker Sikstrom & Andreas Olsson - 2005 - Science 310 (5745):116-119.
    A fundamental assumption of theories of decision-making is that we detect mismatches between intention and outcome, adjust our behavior in the face of error, and adapt to changing circumstances. Is this always the case? We investigated the relation between intention, choice, and introspection. Participants made choices between presented face pairs on the basis of attractiveness, while we covertly manipulated the relationship between choice and outcome that they experienced. Participants failed to notice conspicuous mismatches between their intended choice and the outcome (...)
    Download  
     
    Export citation  
     
    Bookmark   120 citations  
  39. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  40. OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  58
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Direct Detection of Relic Neutrino Background remains impossible: A review of more recent arguments.Florentin Smarandache & Victor Christianto - manuscript
    The existence of big bang relic neutrinos—exact analogues of the big bang relic photons comprising the cosmic microwave background radiation—is a basic prediction of standard cosmology. The standard big bang theory predicts the existence of 1087 neutrinos per flavour in the visible universe. This is an enormous abundance unrivalled by any other known form of matter, falling second only to the cosmic microwave background (CMB) photon. Yet, unlike the CMB photon which boasts its first (serendipitous) detection in the 1960s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Economic drivers of biological complexity.Steve Phelps & Yvan I. Russell - 2015 - Adaptive Behavior 23:315-326.
    The complexity that we observe in nature can often be explained in terms of cooperative behavior. For example, the major transitions of evolution required the emergence of cooperation among the lower-level units of selection, which led to specialization through division-of-labor ultimately resulting in spontaneous order. There are two aspects to address explaining how such cooperation is sustained: how free-riders are prevented from free-riding on the benefits of cooperative tasks, and just as importantly, how those social benefits arise. We review these (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Breakthroughs in Breast Cancer Detection: Emerging Technologies and Future Prospects.Ola I. A. Lafi, Rawan N. A. Albanna, Dina F. Alborno, Raja E. Altarazi, Amal Nabahin, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Health and Medical Research (IJAHMR) 8 (9):8-15.
    Abstract: Early detection of breast cancer is vital for improving patient outcomes and reducing mortality rates. Technological advancements have significantly enhanced the accuracy and efficiency of screening methods. This paper explores recent innovations in early detection, focusing on the evolution of digital mammography, the benefits of 3D mammography (tomosynthesis), and the application of advanced imaging techniques such as molecular imaging and MRI. It also examines the role of artificial intelligence (AI) in diagnostic tools, showing how machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Human Symmetry Uncertainty Detected by a Self-Organizing Neural Network Map.Birgitta Dresp-Langley - 2021 - Symmetry 13:299.
    Symmetry in biological and physical systems is a product of self-organization driven by evolutionary processes, or mechanical systems under constraints. Symmetry-based feature extraction or representation by neural networks may unravel the most informative contents in large image databases. Despite significant achievements of artificial intelligence in recognition and classification of regular patterns, the problem of uncertainty remains a major challenge in ambiguous data. In this study, we present an artificial neural network that detects symmetry uncertainty states in human observers. To this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. (1 other version)Technology as Driver for Morally Motivated Conceptual Engineering.Herman Veluwenkamp, Marianna Capasso, Jonne Maas & Lavinia Marin - 2022 - Philosophy and Technology 35 (3):1-25.
    New technologies are the source of uncertainties about the applicability of moral and morally connotated concepts. These uncertainties sometimes call for conceptual engineering, but it is not often recognized when this is the case. We take this to be a missed opportunity, as a recognition that different researchers are working on the same kind of project can help solve methodological questions that one is likely to encounter. In this paper, we present three case studies where philosophers of technology implicitly engage (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  48.  45
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  48
    DETECTION OFTHYROIDABNORMALITY USING VISION TRANSFORMER (ViT).Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    . Thyroid diseases represent a significant global health concern, necessitating accurate and timely diagnostic methods for effective treatment. Traditional diagnostic approaches often rely on complex blood tests and imaging techniques that can be challenging to interpret. This paper explores the application of machine learning (ML) and deep learning (DL) techniques, particularly Vision Transformers (ViT), for thyroid disease detection. We conducted a comprehensive literature survey that highlights various studies employing ML and DL models, revealing high accuracy rates but also significant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  43
    Fraud Detection and Analysis for Insurance Claim using Machine Learning.S. Ramasamy - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-13.
    Fraudulent activities in insurance claims have become a significant challenge for the insurance industry, leading to substantial financial losses annually. This project, titled "Fraud Detection and Analysis for Insurance Claim using Machine Learning" aims to develop a robust and an efficient system to identify and analyze fraudulent claims. The system leverages machine learning techniques to analyze patterns, anomalies, and inconsistencies in claim data, enabling early detection of potentially fraudulent activities.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 881