Results for 'Elise M. Candy'

968 found
Order:
  1. THE DIARY OF BIDA-BIDA: UNDERSTANDING THE CONSEQUENCES OF 'SMART SHAMING' AMONG SENIOR HIGH SCHOOL STUDENT LEADERS.Anika M. Untalan, Alisson A. Abanes, Noel T. Bambao Jr, Landher J. Baon, John Cyrus M. Barrientos, John Carl C. Carenan, Rhaniel Joseph C. Lanic, Troy Christian D. Ortego, Lhei Ashera C. Bayugo, Sara S. Espole, Nicole A. Sale, Janelle D. Samillano, Candy Rose C. Simballa & Jowenie A. Mangarin - 2024 - Get International Research Journal 2 (2):47-60.
    Academic excellence and intelligence are commonly lauded as commendable attributes synonymous with success. However, a disconcerting trend has surfaced within educational institutions, challenging the prevailing narrative of scholastic accomplishment—smart shaming. This research delves into the increasing concern of smart shaming within educational settings, particularly at Immaculate Conception College of Balayan, Inc., questioning the predominant emphasis on academic excellence and intelligence. A qualitative case study design, along with judgmental sampling, was employed to examine fifteen (15) student leaders who had experienced smart (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The Ignorance Norm and Paradoxical Assertions.Elise Woodard - 2022 - Philosophical Topics 49 (2):321-332.
    Can agents rationally inquire into things that they know? On my view, the answer is yes. Call this view the Compatibility Thesis. One challenge to this thesis is to explain why assertions like “I know that p, but I’m wondering whether p” sound odd, if not Moore-Paradoxical. In response to this challenge, I argue that we can reject one or both premises that give rise to it. First, we can deny that inquiry requires interrogative attitudes. Second, we can deny the (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  3. Knowledge Based System for Diagnosing Custard Apple Diseases and Treatment.Mustafa M. K. Al-Ghoul, Mohammed H. S. Abueleiwa, Fadi E. S. Harara, Samir Okasha & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (5):41-45.
    There is no doubt that custard apple diseases are among the important reasons that destroy the Custard Apple plant and its agricultural crops. This leads to obvious damage to these plants and they become inedible. Discovering these diseases is a good step to provide the appropriate and correct treatment. Determining the treatment with high accuracy depends on the method used to correctly diagnose the disease, expert systems can greatly help in avoiding damage to these plants. The expert system correctly diagnoses (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  4. The Relationship between Correcting Deviations in Measuring Performance and Achieving the Objectives of Control - The Islamic University as a Model.Abed Alfetah M. AlFerjany, Ashraf A. M. Salama, Youssef M. Abu Amuna, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (1):74-89.
    The study aimed to identify the relationship between correcting the deviations in the measurement of performance and achieving the objectives of control and the performance of the job at the Islamic University in the Gaza Strip. To achieve the objectives of the research, the researchers used the descriptive analytical approach to collect information. The questionnaire consisted of (20) statements distributed to three categories of employees of the Islamic University (senior management, faculty members, their assistants and members of the administrative board). (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  5. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  6. CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark   116 citations  
  7. AI-Driven Innovations in Agriculture: Transforming Farming Practices and Outcomes.Jehad M. Altayeb, Hassam Eleyan, Nida D. Wishah, Abed Elilah Elmahmoum, Ahmed J. Khalil, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Applied Research (Ijaar) 8 (9):1-6.
    Abstract: Artificial Intelligence (AI) is transforming the agricultural sector, enhancing both productivity and sustainability. This paper delves into the impact of AI technologies on agriculture, emphasizing their application in precision farming, predictive analytics, and automation. AI-driven tools facilitate more efficient crop and resource management, leading to higher yields and a reduced environmental footprint. The paper explores key AI technologies, such as machine learning algorithms for crop monitoring, robotics for automated planting and harvesting, and data analytics for optimizing resource use. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  8. (1 other version)Why Double-Check?Elise Woodard - 2022 - Episteme:1-24.
    Can you rationally double-check what you already know? In this paper, I argue that you can. Agents can know that something is true and rationally double-check it at the very same time. I defend my position by considering a wide variety of cases where agents double-check their beliefs to gain epistemic improvements beyond knowledge. These include certainty, epistemic resilience, and sensitivity to error. Although this phenomenon is widespread, my proposal faces two types of challenges. First, some have defended ignorance norms, (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  9. The grounding argument against non-reductive moral realism.Ralf M. Bader - 2017 - Oxford Studies in Metaethics 12.
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  10. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   126 citations  
  11. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   190 citations  
  12. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  13. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  14. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark   44 citations  
  15. Bad Sex and Consent.Elise Woodard - 2022 - In David Boonin, Handbook of Sexual Ethics. Palgrave. pp. 301--324.
    It is widely accepted that consent is a normative power. For instance, consent can make an impermissible act permissible. In the words of Heidi Hurd, it “turns a trespass into a dinner party... an invasion of privacy into an intimate moment.” In this chapter, I argue against the assumption that consent has such robust powers for moral transformation. In particular, I argue that there is a wide range of sex that harms or wrongs victims despite being consensual. Moreover, these cases (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  16. PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark   137 citations  
  17. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  18. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  19. Slurs.Adam M. Croom - 2011 - Language Sciences 33 (3):343-358.
    Slurs possess interesting linguistic properties and so have recently attracted the attention of linguists and philosophers of language. For instance the racial slur "nigger" is explosively derogatory, enough so that just hearing it mentioned can leave one feeling as if they have been made complicit in a morally atrocious act.. Indeed, the very taboo nature of these words makes discussion of them typically prohibited or frowned upon. Although it is true that the utterance of slurs is illegitimate and derogatory in (...)
    Download  
     
    Export citation  
     
    Bookmark   85 citations  
  20. War and murder.G. E. M. Anscombe - 1981 - In Ethics, Religion and Politics: Collected Philosophical Papers, Volume 3. Wiley-Blackwell. pp. 51-61.
    Two attitudes are possible: one, that the world is an absolute jungle and that the exercise of coercive power by rulers is only a manifestation of this; and the other, that it is both necessary and right that there should be this exercise of power, that through it the world is much less of a jungle than it could possibly be without it, so that one should in principle be glad of the existence of such power, and only take exception (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  21. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  22. Authorship and Responsibility in Health Sciences Research: A Review of Procedures for Fairly Allocating Authorship in Multi-Author Studies.Elise Smith & Bryn Williams-Jones - 2012 - Science and Engineering Ethics 18 (2):199-212.
    While there has been significant discussion in the health sciences and ethics literatures about problems associated with publication practices (e.g., ghost- and gift-authorship, conflicts of interest), there has been relatively little practical guidance developed to help researchers determine how they should fairly allocate credit for multi-authored publications. Fair allocation of credit requires that participating authors be acknowledged for their contribution and responsibilities, but it is not obvious what contributions should warrant authorship, nor who should be responsible for the quality and (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  23. Categories and foundational ontology: A medieval tutorial.Luis M. Augusto - 2022 - Journal of Knowledge Structures and Systems 3 (1):1-56.
    Foundational ontologies, central constructs in ontological investigations and engineering alike, are based on ontological categories. Firstly proposed by Aristotle as the very ur- elements from which the whole of reality can be derived, they are not easy to identify, let alone partition and/or hierarchize; in particular, the question of their number poses serious challenges. The late medieval philosopher Dietrich of Freiberg wrote around 1286 a tutorial that can help us today with this exceedingly difficult task. In this paper, I discuss (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  24. Bridging mainstream and formal ontology: A causality-based upper ontology in Dietrich of Freiberg.Luis M. Augusto - 2021 - Journal of Knowledge Structures and Systems 2 (2):35.
    Ontologies are some of the most central constructs in today's large plethora of knowledge technologies, namely in the context of the semantic web. As their coinage indicates, they are direct heirs to the ontological investigations in the long Western philosophical tradition, but it is not easy to make bridges between them. Contemporary ontological commitments often take causality as a central aspect for the ur-segregation of entities, especially in scientific upper ontologies; theories of causality and philosophical ontological investigations often go hand-in-hand, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  25. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset size, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  26. The Construction of Epistemic Normativity.Michael Hannon & Elise Woodard - manuscript
    This paper aims to solve a puzzle for instrumental conceptions of epistemic normativity. The puzzle is this: if the usefulness of epistemic norms explains their normative grip on us, why does it seem improper to violate these norms even when doing so would benefit us? To solve this puzzle, we argue that epistemic instrumentalists must adopt a more social approach to normativity. In particular, they should not account for the nature of epistemic normativity by appealing to the goals of individual (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  27. Deductive Computing over Knowledge Bases: Prolog and Datalog.Luis M. Augusto - 2024 - Journal of Knowledge Structures and Systems 5 (1):1-62.
    Knowledge representation (KR) is actually more than representation: It involves also inference, namely inference of “new” knowledge, i.e. new facts. Logic programming is a suitable KR medium, but more often than not discussions on this programming paradigm focus on aspects other than KR. In this paper, I elaborate on the general theory of logic programming and give the essentials of two of its main implementations, to wit, Prolog and Datalog, from the viewpoint of deductive computing over knowledge bases, which includes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Toward a general theory of knowledge.Luis M. Augusto - 2020 - Journal of Knowledge Structures and Systems 1 (1):63-97.
    For millennia, knowledge has eluded a precise definition. The industrialization of knowledge (IoK) and the associated proliferation of the so-called knowledge communities in the last few decades caused this state of affairs to deteriorate, namely by creating a trio composed of data, knowledge, and information (DIK) that is not unlike the aporia of the trinity in philosophy. This calls for a general theory of knowledge (ToK) that can work as a foundation for a science of knowledge (SoK) and additionally distinguishes (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  29. What's Wrong with Partisan Deference?Elise Woodard - forthcoming - In Tamar Szabó Gendler, John Hawthorne, Julianne Chung & Alex Worsnip, Oxford Studies in Epistemology, Vol. 8. Oxford University Press.
    Deference in politics is often necessary. To answer questions like, “Should the government increase the federal minimum wage?” and “Should the state introduce a vaccine mandate?”, we need to know relevant scientific and economic facts, make complex value judgments, and answer questions about incentives and implementation. Lay citizens typically lack the time, resources, and competence to answer these questions on their own. Hence, they must defer to others. But to whom should they defer? A common answer is that they should—or (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Epistemic Atonement.Elise Woodard - 2023 - In Russ Shafer-Landau, Oxford Studies in Metaethics Volume 18. Oxford University Press.
    When we think about agents who change a long-standing belief, we sometimes have conflicting reactions. On the one hand, such agents often epistemically improve. For example, their new belief may be better supported by the evidence or closer to the truth. On the other hand, such agents are often subject to criticism. Examples include politicians who change their minds on whether climate change is occurring or whether vaccines cause autism. What explains this criticism, and is it ever justified? To answer (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Grape Leaf Species Classification Using CNN.Mohammed M. Almassri & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):66-72.
    Abstract: Context: grapevine leaves are an important agricultural product that is used in many Middle Eastern dishes. The species from which the grapevine leaf originates can differ in terms of both taste and price. Method: In this study, we build a deep learning model to tackle the problem of grape leaf classification. 500 images were used (100 for each species) that were then increased to 10,000 using data augmentation methods. Convolutional Neural Network (CNN) algorithms were applied to build this model (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32. From symbols to knowledge systems: A. Newell and H. A. Simon's contribution to symbolic AI.Luis M. Augusto - 2021 - Journal of Knowledge Structures and Systems 2 (1):29 - 62.
    A. Newell and H. A. Simon were two of the most influential scientists in the emerging field of artificial intelligence (AI) in the late 1950s through to the early 1990s. This paper reviews their crucial contribution to this field, namely to symbolic AI. This contribution was constituted mostly by their quest for the implementation of general intelligence and (commonsense) knowledge in artificial thinking or reasoning artifacts, a project they shared with many other scientists but that in their case was theoretically (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Fintech: Creative Innovation for Entrepreneurs.Youssef M. Abu Amuna, Samy S. Abu-Naser, Mazen J. Al Shobaki & Yasser A. Abu Mostafa - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (3):8-15.
    The article studies the impact of Fintech on entrepreneurship in Arabic region by using Crowdfunding platforms as the field of study. The article focuses on Arabic Crowdfunding platforms. The population of (12) platforms consist of: individuals, entrepreneurs, investors, employees at Crowdfunding platforms. Descriptive and quantitative approach used in this article, and a questionnaire used as a tool to collect primary data. The results indicate an impact for Fintech on entrepreneurship in general and obvious obstacles to use it widely in Arabic (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  34. Languages, machines, and classical computation.Luis M. Augusto - 2019 - London, UK: College Publications.
    3rd ed, 2021. A circumscription of the classical theory of computation building up from the Chomsky hierarchy. With the usual topics in formal language and automata theory.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  35. A puzzle about fickleness.Elise Woodard - 2020 - Noûs 56 (2):323-342.
    In this paper, I motivate a puzzle about epistemic rationality. On the one hand, there seems to be something problematic about frequently changing your mind. On the other hand, changing your mind once is often permissible. Why do one-off changes of mind seem rationally permissible, even admirable, while constant changes seem quintessentially irrational? The puzzle of fickleness is to explain this asymmetry. To solve the puzzle, I propose and defend the Ratifiable Reasoning Account. According to this solution, as agents redeliberate, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  36. Formal logic: Classical problems and proofs.Luis M. Augusto - 2019 - London, UK: College Publications.
    Not focusing on the history of classical logic, this book provides discussions and quotes central passages on its origins and development, namely from a philosophical perspective. Not being a book in mathematical logic, it takes formal logic from an essentially mathematical perspective. Biased towards a computational approach, with SAT and VAL as its backbone, this is an introduction to logic that covers essential aspects of the three branches of logic, to wit, philosophical, mathematical, and computational.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  37. Words, Species, and Kinds.J. T. M. Miller - 2021 - Metaphysics 4 (1):18–31.
    It has been widely argued that words are analogous to species such that words, like species, are natural kinds. In this paper, I consider the metaphysics of word-kinds. After arguing against an essentialist approach, I argue that word-kinds are homeostatic property clusters, in line with the dominant approach to other biological and psychological kinds.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  38. Why Composition Matters.Andrew M. Bailey & Andrew Brenner - 2020 - Canadian Journal of Philosophy 50 (8):934-949.
    Many say that ontological disputes are defective because they are unimportant or without substance. In this paper, we defend ontological disputes from the charge, with a special focus on disputes over the existence of composite objects. Disputes over the existence of composite objects, we argue, have a number of substantive implications across a variety of topics in metaphysics, science, philosophical theology, philosophy of mind, and ethics. Since the disputes over the existence of composite objects have these substantive implications, they are (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  39. Prisoners of Reason: Game Theory and Neoliberal Political Economy.S. M. Amadae (ed.) - 2015 - New York: Cambridge University Press.
    Is capitalism inherently predatory? Must there be winners and losers? Is public interest outdated and free-riding rational? Is consumer choice the same as self-determination? Must bargainers abandon the no-harm principle? Prisoners of Reason recalls that classical liberal capitalism exalted the no-harm principle. Although imperfect and exclusionary, modern liberalism recognized individual human dignity alongside individuals' responsibility to respect others. Neoliberalism, by contrast, views life as ceaseless struggle. Agents vie for scarce resources in antagonistic competition in which every individual seeks dominance. This (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  40. Papaya Maturity Classifications using Deep Convolutional Neural Networks.Marah M. Al-Masawabe, Lamis F. Samhan, Amjad H. AlFarra, Yasmeen E. Aslem & Samy S. Abu-Naser - 2021 - International Journal of Engineering and Information Systems (IJEAIS) 5 (12):60-67.
    Papaya is a tropical fruit with a green cover, yellow pulp, and a taste between mango and cantaloupe, having commercial importance because of its high nutritive and medicinal value. The process of sorting papaya fruit based on maturely is one of the processes that greatly determine the mature of papaya fruit that will be sold to consumers. The manual grading of papaya fruit based on human visual perception is time-consuming and destructive. The objective of this paper is to the status (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  41. (1 other version)After the Ascent: Plato on Becoming Like God.John M. Armstrong - 2004 - Oxford Studies in Ancient Philosophy 26:171-183.
    Plato is associated with the idea that the body holds us back from knowing ultimate reality and so we should try to distance ourselves from its influence. This sentiment appears is several of his dialogues including Theaetetus where the flight from the physical world is compared to becoming like God. In some major dialogues of Plato's later career such as Philebus and Laws, however, the idea of becoming like God takes a different turn. God is an intelligent force that tries (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  42. Causal inference in biomedical research.Tudor M. Baetu - 2020 - Biology and Philosophy 35 (4):1-19.
    Current debates surrounding the virtues and shortcomings of randomization are symptomatic of a lack of appreciation of the fact that causation can be inferred by two distinct inference methods, each requiring its own, specific experimental design. There is a non-statistical type of inference associated with controlled experiments in basic biomedical research; and a statistical variety associated with randomized controlled trials in clinical research. I argue that the main difference between the two hinges on the satisfaction of the comparability requirement, which (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  43. The Role of Kant’s Refutation of Idealism.Ralf M. Bader - 2012 - Archiv für Geschichte der Philosophie 94 (1):53-73.
    This paper assesses the role of the Refutation of Idealism within the Critique of Pure Reason, as well as its relation to the treatment of idealism in the First Edition and to transcendental idealism more generally. It is argued that the Refutation is consistent with the Fourth Paralogism and that it can be considered as an extension of the Transcendental Deduction. While the Deduction, considered on its own, constitutes a 'regressive argument', the Refutation allows us to turn the Transcendental Analytic (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  44. How to do things with slurs: Studies in the way of derogatory words.Adam M. Croom - 2013 - Language and Communication 33:177-204.
    This article provides an original account of slurs and how they may be differentially used by in-group and out-group speakers. Slurs are first distinguished from other terms and their role in social interaction is discussed. A new distinction is introduced between three different uses of slurs : the paradigmatic derogatory use, non-paradigmatic derogatory use, and non-paradigmatic non-derogatory use. I then account for their literal meaning and explain how a family-resemblance conception of category membership can clarify our understanding of the various (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  45. Diagnosis of Pneumonia Using Deep Learning.Alaa M. A. Barhoom & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (2):48-68.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and react like humans. Some of the activities computers with artificial intelligence are designed for include, Speech, recognition, Learning, Planning and Problem solving. Deep learning is a collection of algorithms used in machine learning, It is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is a technique used (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  46. "Deterrence,".S. M. Amadae - 2015 - In Prisoners of Reason: Game Theory and Neoliberal Political Economy. New York: Cambridge University Press. pp. 99-140.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  47.  98
    3D Convolutional Neural Networks for Accurate Reconstruction of Distorted Faces.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (4):560-570.
    The core objective of this project is to recognize and reconstruct distorted facial images, particularly in the context of accidents. This involves using deep learning techniques to analyze the features of a distorted face and regenerate it into a recognizable form. Deep learning models are wellsuited for this task due to their ability to learn complex patterns and representations from data the input data consists of distorted facial images, typically obtained from MRI scans of accident victims. These images may contain (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  48. Two-level grammars: Some interesting properties of van Wijngaarden grammars.Luis M. Augusto - 2023 - Omega - Journal of Formal Languages 1:3-34.
    The van Wijngaarden grammars are two-level grammars that present many interesting properties. In the present article I elaborate on six of these properties, to wit, (i) their being constituted by two grammars, (ii) their ability to generate (possibly infinitely many) strict languages and their own metalanguage, (iii) their context-sensitivity, (iv) their high descriptive power, (v) their productivity, or the ability to generate an infinite number of production rules, and (vi) their equivalence with the unrestricted, or Type-0, Chomsky grammars.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  50. Pain in psychology, biology and medicine: Some implications for pain eliminativism.Tudor M. Baetu - 2020 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 82:101292.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 968