Results for 'Heather M. Maranges'

977 found
Order:
  1.  93
    Nudges for Judges: An Experiment on the Effect of Making Sentencing Costs Explicit.Eyal Aharoni, Heather M. Kleider-Offutt, Sarah F. Brosnan & Morris B. Hoffman - 2022 - Frontiers in Psychology 13.
    Judges are typically tasked to consider sentencing benefits but not costs. Previous research finds that both laypeople and prosecutors discount the costs of incarceration when forming sentencing attitudes, raising important questions about whether professional judges show the same bias during sentencing. To test this, we used a vignette-based experiment in which Minnesota state judges reviewed a case summary about an aggravated robbery and imposed a hypothetical sentence. Using random assignment, half the participants received additional information about plausible negative consequences of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Brilliance Beliefs, Not Mindsets, Explain Inverse Gender Gaps in Psychology and Philosophy.Heather Maranges, Maxine Iannuccilli, Katharina Nieswandt, Ulf Hlobil & Kristen Dunfield - 2023 - Sex Roles: A Journal of Research 89:801–817.
    Understanding academic gender gaps is difficult because gender-imbalanced fields differ across many features, limiting researchers’ ability to systematically study candidate causes. In the present preregistered research, we isolate two potential explanations—brilliance beliefs and fixed versus growth intelligence mindsets—by comparing two fields that have inverse gender gaps and historic and topical overlap: philosophy and psychology. Many more men than women study philosophy and vice versa in psychology, with disparities emerging during undergraduate studies. No prior work has examined the contributions of both (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. What Determines Feelings of Belonging and Majoring in an Academic Field? Isolating Factors by Comparing Psychology and Philosophy.Heather Maranges, Maxine Iannuccilli, Katharina Nieswandt, Ulf Hlobil & Kristen Dunfield - 2023 - Current Research in Behavioral Sciences 4:100097.
    Feelings of belonging are integral in people’s choice of what career to pursue. Women and men are disproportionately represented across careers, starting with academic training. The present research focuses on two fields that are similar in their history and subject matter but feature inverse gender gaps—psychology (more women than men) and philosophy (more men than women)—to investigate how theorized explanations for academic gender gaps contribute to feelings of belonging. Specifically, we simultaneously model the relative contribution of theoretically relevant individual differences (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. How Should We Study Animal Consciousness Scientifically?Jonathan Birch, Donald M. Broom, Heather Browning, Andrew Crump, Simona Ginsburg, Marta Halina, David Harrison, Eva Jablonka, Andrew Y. Lee, François Kammerer, Colin Klein, Victor Lamme, Matthias Michel, Françoise Wemelsfelder & Oryan Zacks - 2022 - Journal of Consciousness Studies 29 (3-4):8-28.
    This editorial introduces the Journal of Consciousness Studies special issue on "Animal Consciousness". The 15 contributors and co-editors answer the question "How should we study animal consciousness scientifically?" in 500 words or fewer.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Methodological Considerations for Comparison of Cross-species Use of Tactile Contact.K. M. Dudzinski, Hill Heather & Maria Botero - 2019 - International Journal of Comparative Psychology 32.
    Cross-species comparisons are benefited by compatible datasets; conclusions related to phylogenetic comparisons, questions on convergent and divergent evolution, or homologs versus analogs can only be made when the behaviors being measured are comparable. A direct comparison of the social function of physical contact across two disparate taxa is possible only if data collection and analyses methodologies are analogous. We identify and discuss the parameters, assumptions and measurement schemes applicable to multiple taxa and species that facilitate cross-species comparisons. To illustrate our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Review of Time, Tense, and Causation by M. Tooley. [REVIEW]Heather Dyke - 1999 - International Philosophical Quarterly 39 (1):100-101.
    Download  
     
    Export citation  
     
    Bookmark  
  7. "Diversity, Inclusion, Equity and the Threat to Academic Freedom": Preface.Martín López Corredoira, Tom Todd & Erik J. Olsson - 2022 - In M. López-Corredoira, T. Todd & E. J. Olsson, Diversity, Inclusion, Equity and the Threat to Academic Freedom. Imprint Academic.
    There can be no doubt that discrimination based on sex, race, ethnicity, religion or beliefs should not be tolerated in academia. Surprisingly, however, in recent years, policies of Diversity, Inclusion and Equity(DIE), officially introduced to counteract discrimination, have increasingly led to quite the opposite result: the exclusion of individuals who do not share a radical 'woke' ideology on identity politics (feminism, other gender activisms, critical race theory, etc.), and to the suppression of the academic freedom to discuss such dogmas. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. What Emergence Can Possibly Mean.Sean M. Carroll & Achyuth Parola - manuscript
    We consider emergence from the perspective of dynamics: states of a system evolving with time. We focus on the role of a decomposition of wholes into parts, and attempt to characterize relationships between levels without reference to whether higher-level properties are “novel” or “unexpected.” We offer a classification of different varieties of emergence, with and without new ontological elements at higher levels. -/- Submitted to a volume on Real Patterns (Tyler Milhouse, ed.), to be published by MIT Press.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Leveraging Artificial Intelligence for Strategic Business Decision-Making: Opportunities and Challenges.Mohammed Hazem M. Hamadaqa, Mohammad Alnajjar, Mohammed N. Ayyad, Mohammed A. Al-Nakhal, Basem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (8):16-23.
    Abstract: Artificial Intelligence (AI) has rapidly evolved, offering transformative capabilities for business decision-making. This paper explores how AI can be leveraged to enhance strategic decision-making in business contexts. It examines the integration of AI-driven analytics, predictive modeling, and automation to improve decision accuracy and operational efficiency. By analyzing current applications and case studies, the paper highlights the opportunities AI presents, including enhanced data insights, risk management, and personalized customer experiences. Additionally, it addresses the challenges businesses face in adopting AI, such (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  10. Much Ado About Nothing: Unmotivating "Gender Identity".E. M. Hernandez & Rowan Bell - forthcoming - Ergo: An Open Access Journal of Philosophy.
    Recently, the concept of "gender identity" has enjoyed a great deal of attention in gender metaphysics. This seems to be motivated by the goal of creating trans-inclusive theory, by explaining trans people's genders. In this paper, we aim to unmotivate this project. Notions of "gender identity" serve important pragmatic purposes for trans people, such as satisfying the curiosity of non-trans people, and, relatedly, securing our access to important goods like legal rights and medical care. However, we argue that this does (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   103 citations  
  12. Powerful Properties, Powerless Laws.Heather Demarest - 2017 - In Jonathan D. Jacobs, Causal Powers. New York, NY: Oxford University Press. pp. 38-53.
    I argue that the best scientific package is anti-Humean in its ontology, but Humean in its laws. This is because potencies and the best system account of laws complement each other surprisingly well. If there are potencies, then the BSA is the most plausible account of the laws of nature. Conversely, if the BSA is the correct theory of laws, then formulating the laws in terms of potencies rather than categorical properties avoids three serious objections: the mismatch objection, the impoverished (...)
    Download  
     
    Export citation  
     
    Bookmark   65 citations  
  13. Symmetry, Invariance, and Imprecise Probability.Zachary Goodsell & Jacob M. Nebel - forthcoming - Mind.
    It is tempting to think that a process of choosing a point at random from the surface of a sphere can be probabilistically symmetric, in the sense that any two regions of the sphere which differ by a rotation are equally likely to include the chosen point. Isaacs, Hájek, and Hawthorne (2022) argue from such symmetry principles and the mathematical paradoxes of measure to the existence of imprecise chances and the rationality of imprecise credences. Williamson (2007) has argued from a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. AI-Driven Innovations in Agriculture: Transforming Farming Practices and Outcomes.Jehad M. Altayeb, Hassam Eleyan, Nida D. Wishah, Abed Elilah Elmahmoum, Ahmed J. Khalil, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Applied Research (Ijaar) 8 (9):1-6.
    Abstract: Artificial Intelligence (AI) is transforming the agricultural sector, enhancing both productivity and sustainability. This paper delves into the impact of AI technologies on agriculture, emphasizing their application in precision farming, predictive analytics, and automation. AI-driven tools facilitate more efficient crop and resource management, leading to higher yields and a reduced environmental footprint. The paper explores key AI technologies, such as machine learning algorithms for crop monitoring, robotics for automated planting and harvesting, and data analytics for optimizing resource use. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  15. CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark   107 citations  
  16. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation of (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  17. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   124 citations  
  18. War and murder.G. E. M. Anscombe - 1981 - In Ethics, Religion and Politics: Collected Philosophical Papers, Volume 3. Wiley-Blackwell. pp. 51-61.
    Two attitudes are possible: one, that the world is an absolute jungle and that the exercise of coercive power by rulers is only a manifestation of this; and the other, that it is both necessary and right that there should be this exercise of power, that through it the world is much less of a jungle than it could possibly be without it, so that one should in principle be glad of the existence of such power, and only take exception (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  19. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   185 citations  
  20. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  21. PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark   136 citations  
  22. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  23. What should the naïve realist say about total hallucinations?Heather Logue - 2012 - Philosophical Perspectives 26 (1):173-199.
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  24. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  25. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  26. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   103 citations  
  27. Reality as a Vector in Hilbert Space.Sean M. Carroll - 2022 - In Valia Allori, Quantum Mechanics and Fundamentality: Naturalizing Quantum Theory between Scientific Realism and Ontological Indeterminacy. Cham: Springer. pp. 211-224.
    I defend the extremist position that the fundamental ontology of the world consists of a vector in Hilbert space evolving according to the Schrödinger equation. The laws of physics are determined solely by the energy eigenspectrum of the Hamiltonian. The structure of our observed world, including space and fields living within it, should arise as a higher-level emergent description. I sketch how this might come about, although much work remains to be done.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  28. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  29. Identity in the loose and popular sense.Donald L. M. Baxter - 1988 - Mind 97 (388):575-582.
    This essay interprets Butler’s distinction between identity in the loose and popular sense and in the strict and philosophical sense. Suppose there are different standards for counting the same things. Then what are two distinct things counting strictly may be one and the same thing counting loosely. Within a given standard identity is one-one. But across standards it is many-one. An alternative interpretation using the parts-whole relation fails, because that relation should be understood as many-one identity. Another alternative making identity (...)
    Download  
     
    Export citation  
     
    Bookmark   142 citations  
  30. Aggregation Without Interpersonal Comparisons of Well‐Being.Jacob M. Nebel - 2021 - Philosophy and Phenomenological Research 105 (1):18-41.
    This paper is about the role of interpersonal comparisons in Harsanyi's aggregation theorem. Harsanyi interpreted his theorem to show that a broadly utilitarian theory of distribution must be true even if there are no interpersonal comparisons of well-being. How is this possible? The orthodox view is that it is not. Some argue that the interpersonal comparability of well-being is hidden in Harsanyi's premises. Others argue that it is a surprising conclusion of Harsanyi's theorem, which is not presupposed by any one (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  31. If I Could Talk to the Animals: Measuring Subjective Animal Welfare.Heather Browning - 2019 - Dissertation, Australian National University
    Animal welfare is a concept that plays a role within both our moral deliberations and the relevant areas of science. The study of animal welfare has impacts on decisions made by legislators, producers and consumers with regards to housing and treatment of animals. Our ethical deliberations in these domains need to consider our impact on animals, and the study of animal welfare provides the information that allows us to make informed decisions. This thesis focusses on taking a philosophical perspective to (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  32. The Evolution of AI in Autonomous Systems: Innovations, Challenges, and Future Prospects.Ashraf M. H. Taha, Zakaria K. D. Alkayyali, Qasem M. M. Zarandah, Bassem S. Abu-Nasser, & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (10):1-7.
    Abstract: The rapid advancement of artificial intelligence (AI) has catalyzed significant developments in autonomous systems, which are increasingly shaping diverse sectors including transportation, robotics, and industrial automation. This paper explores the evolution of AI technologies that underpin these autonomous systems, focusing on their capabilities, applications, and the challenges they present. Key areas of discussion include the technological innovations driving autonomy, such as machine learning algorithms and sensor integration, and the practical implementations observed in autonomous vehicles, drones, and robotic systems. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  33. THE EFFICIENCY EXTENT OF THE INTERNAL CONTROL ENVIRONMENT IN THE PALESTINIAN HIGHER EDUCATIONAL INSTITUTIONS IN GAZA STRIP.Tarek M. Ammar, Mazen J. Al Shobaki & Samy S. Abu Naser - 2017 - International Journal of Digital Publication Technology 1 (2):107-126.
    The purpose of this research is to identify the extent of the efficiency of the internal control environment in the Palestinian higher educational institutions in Gaza Strip from the perspective of employees in the Palestinian universities in Gaza Strip, where researchers used in the study five universities. The researchers adopted in their study the descriptive and analytical approach. The research community consists of administrative employees and academic employees with administrative duties. Senior management or the University Council was excluded. The study (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  34. Credit Score Classification Using Machine Learning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (5):1-10.
    Abstract: Ensuring the proactive detection of transaction risks is paramount for financial institutions, particularly in the context of managing credit scores. In this study, we compare different machine learning algorithms to effectively and efficiently. The algorithms used in this study were: MLogisticRegressionCV, ExtraTreeClassifier,LGBMClassifier,AdaBoostClassifier, GradientBoostingClassifier,Perceptron,RandomForestClassifier,KNeighborsClassifier,BaggingClassifier, DecisionTreeClassifier, CalibratedClassifierCV, LabelPropagation, Deep Learning. The dataset was collected from Kaggle depository. It consists of 164 rows and 8 columns. The best classifier with unbalanced dataset was the LogisticRegressionCV. The Accuracy 100.0%, precession 100.0%,Recall100.0% and the F1-score (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. The (Dis)unity of Psychological (Social) Bias.Gabbrielle M. Johnson - 2024 - Philosophical Psychology (6):1349-1377.
    This paper explores the complex nature of social biases, arguing for a functional framework that recognizes their unity and diversity. The functional approach posits that all biases share a common functional role in overcoming underdetermination. This framework, I argue, provides a comprehensive understanding of how all psychological biases, including social biases, are unified. I then turn to the question of disunity, demonstrating how psychological social biases differ systematically in the mental states and processes that constitute them. These differences indicate that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Deductive Computing over Knowledge Bases: Prolog and Datalog.Luis M. Augusto - 2024 - Journal of Knowledge Structures and Systems 5 (1):1-62.
    Knowledge representation (KR) is actually more than representation: It involves also inference, namely inference of “new” knowledge, i.e. new facts. Logic programming is a suitable KR medium, but more often than not discussions on this programming paradigm focus on aspects other than KR. In this paper, I elaborate on the general theory of logic programming and give the essentials of two of its main implementations, to wit, Prolog and Datalog, from the viewpoint of deductive computing over knowledge bases, which includes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  87
    Music, Visualization and the Multi-Stage Account of Photography.Dawn M. Wilson - 2024 - Debates in Aesthetics 18 (2):13-46.
    Like his contemporary, Edward Weston, Ansel Adams claimed that visualization is essential for creating fine art photography. But, unlike Weston, he believed that a print from a negative is like a performance from a score. In his analogy, a photographer’s visualization is like a musician’s composition: once it has been set down in a ‘score’, it can be expressively rendered by different performers, making it possible to create and critically appreciate ‘performances’ with different qualities. I argue that this music-photography analogy (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. (1 other version)After the Ascent: Plato on Becoming Like God.John M. Armstrong - 2004 - Oxford Studies in Ancient Philosophy 26:171-183.
    Plato is associated with the idea that the body holds us back from knowing ultimate reality and so we should try to distance ourselves from its influence. This sentiment appears is several of his dialogues including Theaetetus where the flight from the physical world is compared to becoming like God. In some major dialogues of Plato's later career such as Philebus and Laws, however, the idea of becoming like God takes a different turn. God is an intelligent force that tries (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  39. Grape Leaf Species Classification Using CNN.Mohammed M. Almassri & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):66-72.
    Abstract: Context: grapevine leaves are an important agricultural product that is used in many Middle Eastern dishes. The species from which the grapevine leaf originates can differ in terms of both taste and price. Method: In this study, we build a deep learning model to tackle the problem of grape leaf classification. 500 images were used (100 for each species) that were then increased to 10,000 using data augmentation methods. Convolutional Neural Network (CNN) algorithms were applied to build this model (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  40. "Deterrence,".S. M. Amadae - 2015 - In Prisoners of Reason: Game Theory and Neoliberal Political Economy. New York: Cambridge University Press. pp. 99-140.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  41. Is Humane Slaughter Possible?Heather Browning & Walter Veit - 2020 - Animals 10 (5):799.
    One of the biggest ethical issues in animal agriculture is that of the welfare of animals at the end of their lives, during the process of slaughter. Much work in animal welfare science is focussed on finding humane ways to transport and slaughter animals, to minimise the harm done during this process. In this paper, we take a philosophical look at what it means to perform slaughter humanely, beyond simply reducing pain and suffering during the slaughter process. In particular, we (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  42. Can Chatbots Preserve Our Relationships with the Dead?Stephen M. Campbell, Pengbo Liu & Sven Nyholm - forthcoming - Journal of the American Philosophical Association.
    Imagine that you are given access to an AI chatbot that compellingly mimics the personality and speech of a deceased loved one. If you start having regular interactions with this “thanabot,” could this new relationship be a continuation of the relationship you had with your loved one? And could a relationship with a thanabot preserve or replicate the value of a close human relationship? To the first question, we argue that a relationship with a thanabot cannot be a true continuation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Ethics in AI: Balancing Innovation and Responsibility.Mosa M. M. Megdad, Mohammed H. S. Abueleiwa, Mohammed Al Qatrawi, Jehad El-Tantaw, Fadi E. S. Harara, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Pedagogical Research (IJAPR) 8 (9):20-25.
    Abstract: As artificial intelligence (AI) technologies become more integrated across various sectors, ethical considerations in their development and application have gained critical importance. This paper delves into the complex ethical landscape of AI, addressing significant challenges such as bias, transparency, privacy, and accountability. It explores how these issues manifest in AI systems and their societal impact, while also evaluating current strategies aimed at mitigating these ethical concerns, including regulatory frameworks, ethical guidelines, and best practices in AI design. Through a comprehensive (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. The future of pharmacy in Libya.Fathi M. Sherif - 2023 - Mediterranean Journal of Pharmacy and Pharmaceutical Sciences 3 (1):1-2.
    One must accept the complexity of modern society as a multifaceted influence that will direct the future of all social organizations. Technology has brought the people of the world into almost instant communication. Biomedical science has conquered most infectious, acute diseases and has provided several medicines for the successful maintenance therapy of chronic diseases. The lifestyle of some people as smoking and drug addiction remains a strong factor in their achievement of the health goals of the good life. Universally, economic (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. A Dual Aspect Theory of Shared Intention.Facundo M. Alonso - 2016 - Journal of Social Ontology 2 (2):271–302.
    In this article I propose an original view of the nature of shared intention. In contrast to psychological views (Bratman, Searle, Tuomela) and normative views (Gilbert), I argue that both functional roles played by attitudes of individual participants and interpersonal obligations are factors of central and independent significance for explaining what shared intention is. It is widely agreed that shared intention (I) normally motivates participants to act, and (II) normally creates obligations between them. I argue that the view I propose (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  46. Instantiation as partial identity.Donald L. M. Baxter - 2001 - Australasian Journal of Philosophy 79 (4):449 – 464.
    Construing the instantiation of a universal by a particular in terms of my theory of aspects resolves the basic mystery of this "non-relational tie", and gives theoretical unity to the four characteristics of instantiation discerned by Armstrong. Taking aspects as distinct in a way akin to Scotus's formal distinction, I suggest that instantiation is the sharing of an aspect by a universal and a particular--a kind of partial identity. This approach allows me to address Plato's multiple location and One over (...)
    Download  
     
    Export citation  
     
    Bookmark   65 citations  
  47. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  48. Intending, Settling, and Relying.Facundo M. Alonso - 2017 - In David Shoemaker, Oxford Studies in Agency and Responsibility Volume 4. Oxford University Press. pp. 50-74.
    Philosophers of action of different persuasions have suggested that there is a tight connection between the phenomenon of intending and the phenomena of “being settled on” and of “settling” a course of action. For many, this connection supports an important constraint on intention: one may only intend what one takes one’s so intending as settling. Traditionally, this has been understood as a doxastic constraint on intention: what one takes one’s intention as settling is what one believes one’s so intending as (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  49. Mixed Messages: How Criminal Law Fails to Express Feminist Values.Amelia M. Wirts - forthcoming - Criminal Law and Philosophy.
    Criminal law practices in the US, including policing and incarceration, have drawn heavy criticism for their disproportionate impact on black people, particularly black men. At the same time, some feminist scholars and activists advocate for increases in criminal law responses to sexual assault, including expanding criminal statutes to cover more instances of sexual assault and increasing sentencing guidelines. These reforms are often justified by claims that criminal law should express more feminist values and reject sexist social schemas. This paper makes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. An Existential Attention Norm for Affectively Biased Sentient Beings: A Buddhist Intervention from Buddhaghosa.Sean M. Smith - 2025 - Journal of the American Philosophical Association:20.
    This article argues that our attention is pervasively biased by embodied affects and that we are normatively assessable in light of this. From a contemporary perspective, normative theorizing about attention is a relatively new trend (Siegel 2017: Ch. 9, Irving 2019, Bommarito 2018: Ch. 5). However, Buddhist philosophy has provided us with a well-spring of normatively rich theorizing about attention from its inception. This article will address how norms of attention are dealt with in Buddhaghosa’s (5th-6th CE) claims about how (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 977