Results for 'Hybrid learning'

967 found
Order:
  1. Strategy of Digital Competence Formation Using a Hybrid Learning Environment Based on Microsoft 365 Services.Maksym Bezpartochnyi - 2022 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    COVID-19 and military actions on the territory of Ukraine fundamentally changed the organization of the educational process, forcing educational institutions to transfer classroom learning to virtual space. To organize the educational process remotely, we need to organize an educational environment in which we can ensure the implementation of all types of educational activities, as well as creation and selection of e-resources depending on their types. Having guidelines in the form of modes, forms and learning outcomes, it is necessary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Information and Communication Technology in Elementary Schools: A Comparison Between Hybrid and Face-to-Face Learning Systems.Wisnu Zakaria, Turmudi Turmudi & Jupeth Pentang - 2022 - Profesi Pendidikan Dasar 9 (1):46-54.
    At the beginning of 2020, the world was experiencing the Covid-19 pandemic, and Indonesia was no exception. The occurrence of this affects the learning system in Indonesia, the learning system that was originally face-to-face was forced to online form, in this case the teachers are required to provide a creative, efficient and optimal learning system for students. So the purpose of this study is to find out the difference in the average learning result of elementary school (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  3.  52
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  35
    A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. A hybrid Automated Intelligent COVID-19 Classification System Based on Neutrosophic Logic and Machine Learning Techniques Using Chest X-ray Images.Ibrahim Yasser, Aya A. Abd El-Khalek, A. A. Salama, Abeer Twakol, Mohy-Eldin Abo-Elsoud & Fahmi Khalifa - forthcoming - In Ibrahim Yasser, Aya A. Abd El-Khalek, A. A. Salama, Abeer Twakol, Mohy-Eldin Abo-Elsoud & Fahmi Khalifa (eds.), Advances in Data Science and Intelligent Data Communication Technologies for COVID-19 Pandemic (DSIDC-COVID-19) ,Studies in Systems, Decision and Control.
    Download  
     
    Export citation  
     
    Bookmark  
  7. A pluralist hybrid model for moral AIs.Fei Song & Shing Hay Felix Yeung - forthcoming - AI and Society:1-10.
    With the increasing degrees A.I.s and machines are applied across different social contexts, the need for implementing ethics in A.I.s is pressing. In this paper, we argue for a pluralist hybrid model for the implementation of moral A.I.s. We first survey current approaches to moral A.I.s and their inherent limitations. Then we propose the pluralist hybrid approach and show how these limitations of moral A.I.s can be partly alleviated by the pluralist hybrid approach. The core ethical decision-making (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  30
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  24
    Smart Deduplication Framework for Optimized Data Management in Hybrid Cloud.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  32
    Innovative Deduplication Strategies for Cost-Effective Data Management in Hybrid Cloud Models.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Continuing The Distance Learning Modality of Graduate Studies in Post-Covid Philippines: A Survey.Jayrome Nuñez, Louie P. Gula, Evaflor Alindan, John Clinton Colcol, Aristonie Sangco, Jairoh Taracina, Sammy Dolba, Al John Escobañez, Kevin Sumayang, Mark Anthony Jamisal & Francis Jim Tuscano - 2023 - FDLA Journal 7 (1):1-17.
    Getting a graduate education is one of the most important parts of a professional in a field. It allows them to climb higher in the professional rankings or even get higher pay for their academic work. All graduate students are adults and self-directed due to their past experiences in work or practice. However, when the pandemic hit the world, these self-directed learners were not spared from shutting of schools. In the Philippines, most graduate schools deliver their lessons through the traditional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  32
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  23
    Evaluating Advanced Deep Learning Methods for Regional Air Quality Index Forecasting.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):600-620.
    We investigate the application of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels based on historical data. Our experimental setup uses real-world air quality datasets from multiple regions, containing measurements of pollutants like PM2.5, PM10, CO, NO2, and SO2, alongside meteorological data such as temperature, humidity, and wind speed. The models are trained, validated, and tested using a split dataset, and their accuracy is evaluated using performance metrics like (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  36
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  27
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Human-Aided Artificial Intelligence: Or, How to Run Large Computations in Human Brains? Towards a Media Sociology of Machine Learning.Rainer Mühlhoff - 2019 - New Media and Society 1.
    Today, artificial intelligence, especially machine learning, is structurally dependent on human participation. Technologies such as Deep Learning (DL) leverage networked media infrastructures and human-machine interaction designs to harness users to provide training and verification data. The emergence of DL is therefore based on a fundamental socio-technological transformation of the relationship between humans and machines. Rather than simulating human intelligence, DL-based AIs capture human cognitive abilities, so they are hybrid human-machine apparatuses. From a perspective of media philosophy and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Menschengestützte Künstliche Intelligenz: Über die soziotechnischen Voraussetzungen von "deep learning".Rainer Mühlhoff - 2019 - Zeitschrift Für Medienwissenschaft (ZfM) 21 (2):56–64.
    Die aktuellen Erfolge von Künstlicher Intelligenz beruhen nicht nur auf technologischen Fortschritten, sondern auch auf einem grundlegenden soziotechnischen Strukturwandel. Denn maschinelle Lernverfahren wie Deep Learning benötigen eine große Menge Trainingsdaten, die nur über menschliche Mitarbeit gewonnen werden können. In einer Konvergenz von Methoden der Human-Computer-Interaction und der KI ist in den letzten zehn Jahren eine Fülle von Mensch-Maschine-Interfaces und medialen Infrastrukturen entstanden, durch die menschliche kognitive Ressourcen in hybride Mensch-Maschine-Apparate eingespannt werden. Diese Apparate vollbringen im Ganzen jene Leistung, die (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  17
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  18
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  27
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  17
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  23. Filipino Students’ Standpoint on Going Back to Traditional Schooling in the New Normal.Louie Gula, Jayrome L. Nunez, Alvin L. Barnachea, Jover B. Jabagat & Jomar M. Urbano - 2022 - Journal of Teacher Education and Research 17 (1):16-21.
    Schools worldwide have started opening doors to welcome back students who, for almost two years, have been stuck studying at home. This study looks at the standpoint of Filipino students on going back to regular face-to-face schooling. There were 2,274 students of different tiers of education (high school, collegiate, graduate) from different major island groups of the Philippines (Luzon, Visayas, Mindanao) who participated in the study. The study used a mixed-method of descriptive statistics to present the quantitative data gathered and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Challenges in Teaching Science and its Transition to Post-Pandemic Education.Nemalynne Atriginio Amigo, Thelma Coloma Damaso, Sharmaine Agustin Diego, Jessica Rabor Laciste, Romelyn Tutaan Lagura, Ryan Bautista Tagata, Nove Lheen Castillo Taguicana & Eisle Keith Rivera Tapia - 2023 - American Journal of Multidisciplinary Research and Innovation 2 (3):15-22.
    The COVID-19 pandemic has had a significant impact on the education sector globally, with over one billion students being held out of school as a result of quarantine measures. In response, education systems had to quickly shift to online learning to ensure that students could continue their education. The sudden shift to online learning has resulted in educators having to adapt to the use of technology in education rapidly. The COVID-19 pandemic has highlighted the importance of digital literacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Absolutely No Free Lunches!Gordon Belot - forthcoming - Theoretical Computer Science.
    This paper is concerned with learners who aim to learn patterns in infinite binary sequences: shown longer and longer initial segments of a binary sequence, they either attempt to predict whether the next bit will be a 0 or will be a 1 or they issue forecast probabilities for these events. Several variants of this problem are considered. In each case, a no-free-lunch result of the following form is established: the problem of learning is a formidably difficult one, in (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  26. Divulging the Lived Experiences of Public School Teachers in the USA during COVID-19 Pandemic: Phenomenological Analysis.Jaypee Lopres, Glendale Niadas, Geraldine Minez, Greatchie Lopres, Madeleine Gutierrez, Albert Marion Quiap & Saturnino Renante Bangot Jr - 2023 - International Journal of Learning, Teaching and Educational Research 22 (5):180-205.
    This research examined the lived experiences of public school teachers in the United States during the COVID-19 pandemic. A qualitative design was performed using interpretative phenomenological analysis. Twenty public school teachers in the United States formed the sample, with the inclusion criterion being a minimum of three years’ teaching experience, including the pandemic. To meet the safety measure protocols set by the U.S. government, the data gathering was conducted online using Microsoft Forms. The semi-structured interviews comprised two sections: the first (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Automatic Face Mask Detection Using Python.M. Madan Mohan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):91-100.
    The corona virus COVID-19 pandemic is causing a global health crisis so the effective protection methods is wearing a face mask in public areas according to the World Health Organization (WHO). The COVID-19 pandemic forced governments across the world to impose lockdowns to prevent virus transmissions. Reports indicate that wearing facemasks while at work clearly reduces the risk of transmission. An efficient and economic approach of using AI to create a safe environment in a manufacturing setup. A hybrid model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  23
    Comparing LSTM, GRU, and CNN Approaches in Air Quality Prediction Models.A. Manoj Prabharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):576-585.
    The results show that the hybrid CNN-LSTM model outperforms the individual models in terms of prediction accuracy and robustness, suggesting that combining convolutional layers with recurrent units is beneficial for capturing both spatial and temporal patterns in air quality data. This study demonstrates the potential of deep learning methods to offer real-time, accurate air quality forecasting systems, which can aid policymakers and urban planners in managing air pollution more effectively.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Advances and Applications of DSmT for Information Fusion. Collected Works, Volume 5.Florentin Smarandache - 2023 - Edited by Smarandache Florentin, Dezert Jean & Tchamova Albena.
    This fifth volume on Advances and Applications of DSmT for Information Fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics, and is available in open-access. The collected contributions of this volume have either been published or presented after disseminating the fourth volume in 2015 in international conferences, seminars, workshops and journals, or they are new. The contributions of each part of this volume are chronologically ordered. First Part of this book presents some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Artificial morality: Making of the artificial moral agents.Marija Kušić & Petar Nurkić - 2019 - Belgrade Philosophical Annual 1 (32):27-49.
    Abstract: Artificial Morality is a new, emerging interdisciplinary field that centres around the idea of creating artificial moral agents, or AMAs, by implementing moral competence in artificial systems. AMAs are ought to be autonomous agents capable of socially correct judgements and ethically functional behaviour. This request for moral machines comes from the changes in everyday practice, where artificial systems are being frequently used in a variety of situations from home help and elderly care purposes to banking and court algorithms. It (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  59
    Advanced Phishing Content Identification Using Dynamic Weighting Integrated with Genetic Algorithm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):500-520.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time. The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Bootstrapping of integer concepts: the stronger deviant-interpretation challenge.Markus Pantsar - 2021 - Synthese 199 (3-4):5791-5814.
    Beck presents an outline of the procedure of bootstrapping of integer concepts, with the purpose of explicating the account of Carey. According to that theory, integer concepts are acquired through a process of inductive and analogous reasoning based on the object tracking system, which allows individuating objects in a parallel fashion. Discussing the bootstrapping theory, Beck dismisses what he calls the "deviant-interpretation challenge"—the possibility that the bootstrapped integer sequence does not follow a linear progression after some point—as being general to (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  33.  98
    Why Does AI Lie So Much? The Problem Is More Deep Rooted Than You Think.Mir H. S. Quadri - 2024 - Arkinfo Notes.
    The rapid advancements in artificial intelligence, particularly in natural language processing, have brought to light a critical challenge, i.e., the semantic grounding problem. This article explores the root causes of this issue, focusing on the limitations of connectionist models that dominate current AI research. By examining Noam Chomsky's theory of Universal Grammar and his critiques of connectionism, I highlight the fundamental differences between human language understanding and AI language generation. Introducing the concept of semantic grounding, I emphasise the need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Evaluation and Design of Generalist Systems (EDGeS).John Beverley & Amanda Hicks - 2023 - Ai Magazine.
    The field of AI has undergone a series of transformations, each marking a new phase of development. The initial phase emphasized curation of symbolic models which excelled in capturing reasoning but were fragile and not scalable. The next phase was characterized by machine learning models—most recently large language models (LLMs)—which were more robust and easier to scale but struggled with reasoning. Now, we are witnessing a return to symbolic models as complementing machine learning. Successes of LLMs contrast with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Developing a Knowledge-Based System for Diagnosis and Treatment Recommendation of Neonatal Diseases Using CLIPS.Nida D. Wishah, Abed Elilah Elmahmoum, Husam A. Eleyan, Walid F. Murad & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (6):38-50.
    A newborn baby is an infant within the first 28 days of birth. Diagnosis and treatment of infant diseases require specialized medical resources and expert knowledge. However, there is a shortage of such professionals globally, particularly in low-income countries. To address this challenge, a knowledge-based system was designed to aid in the diagnosis and treatment of neonatal diseases. The system utilizes both machine learning and health expert knowledge, and a hybrid data mining process model was used to extract (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Neutrosophic Algebraic Structures and Their Applications.Florentin Smarandache, Memet Şahin, Derya Bakbak, Vakkas Uluçay & Abdullah Kargın - 2022 - Gallup, NM, USA: NSIA Publishing House.
    Neutrosophic theory and its applications have been expanding in all directions at an astonishing rate especially after of the introduction the journal entitled “Neutrosophic Sets and Systems”. New theories, techniques, algorithms have been rapidly developed. One of the most striking trends in the neutrosophic theory is the hybridization of neutrosophic set with other potential sets such as rough set, bipolar set, soft set, hesitant fuzzy set, etc. The different hybrid structures such as rough neutrosophic set, single valued neutrosophic rough (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The meaning of ‘reasonable’: Evidence from a corpus-linguistic study.Lucien Baumgartner & Markus Kneer - forthcoming - In Kevin P. Tobia (ed.), The Cambridge Handbook of Experimental Jurisprudence. Cambridge University Press.
    The reasonable person standard is key to both Criminal Law and Torts. What does and does not count as reasonable behavior and decision-making is frequently deter- mined by lay jurors. Hence, laypeople’s understanding of the term must be considered, especially whether they use it predominately in an evaluative fashion. In this corpus study based on supervised machine learning models, we investigate whether laypeople use the expression ‘reasonable’ mainly as a descriptive, an evaluative, or merely a value-associated term. We find (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Can Deep CNNs Avoid Infinite Regress/Circularity in Content Constitution?Jesse Lopes - 2023 - Minds and Machines 33 (3):507-524.
    The representations of deep convolutional neural networks (CNNs) are formed from generalizing similarities and abstracting from differences in the manner of the empiricist theory of abstraction (Buckner, Synthese 195:5339–5372, 2018). The empiricist theory of abstraction is well understood to entail infinite regress and circularity in content constitution (Husserl, Logical Investigations. Routledge, 2001). This paper argues these entailments hold a fortiori for deep CNNs. Two theses result: deep CNNs require supplementation by Quine’s “apparatus of identity and quantification” in order to (1) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. NeutroAlgebra Theory, volume I.Florentin Smarandache, Memet Şahin, Derya Bakbak, Vakkas Uluçay & Abdullah Kargın - 2021 - Grandview Heights, OH, USA: Educational Publisher.
    Neutrosophic theory and its applications have been expanding in all directions at an astonishing rate especially after of the introduction the journal entitled “Neutrosophic Sets and Systems”. New theories, techniques, algorithms have been rapidly developed. One of the most striking trends in the neutrosophic theory is the hybridization of neutrosophic set with other potential sets such as rough set, bipolar set, soft set, hesitant fuzzy set, etc. The different hybrid structures such as rough neutrosophic set, single valued neutrosophic rough (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  59
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  41.  82
    Algebraic Structures in the Universe of Neutrosophic: Analysis with Innovative Algorithmic Approaches.Florentin Smarandache, Derya Bakbak, Vakkas Uluçay, Abdullah Kargın & Necmiye Merve Şahin (eds.) - 2024
    Neutrosophic theory and its applications have been expanding in all directions at an astonishing rate especially after of the introduction the journal entitled “Neutrosophic Sets and Systems”. New theories, techniques, algorithms have been rapidly developed. One of the most striking trends in the neutrosophic theory is the hybridization of neutrosophic set with other potential sets such as rough set, bipolar set, soft set, hesitant fuzzy set, etc. The different hybrid structures such as rough neutrosophic set, single valued neutrosophic rough (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. New Trends in Neutrosophic Theories and Applications, Volume III.Florentin Smarandache & Surapati Pramanik (eds.) - 2024
    The field of neutrosophic set theory and its applications has been rapidly expanding, particularly since the introduction of the journal "Neutrosophic Sets and Systems." New theories, techniques, and algorithms are being developed at a very high rate. One of the most notable trends in neutrosophic theory is its hybridization with other set theories such as rough set theory, bipolar set theory, soft set theory, hesitant fuzzy set theory, and more. Various hybrid structures like rough neutrosophic sets, neutrosophic soft set, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  50
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Adversarial Attacks on Image Generation With Made-Up Words.Raphaël Millière - manuscript
    Text-guided image generation models can be prompted to generate images using nonce words adversarially designed to robustly evoke specific visual concepts. Two approaches for such generation are introduced: macaronic prompting, which involves designing cryptic hybrid words by concatenating subword units from different languages; and evocative prompting, which involves designing nonce words whose broad morphological features are similar enough to that of existing words to trigger robust visual associations. The two methods can also be combined to generate images associated with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  25
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. How AI can AID bioethics.Walter Sinnott Armstrong & Joshua August Skorburg - forthcoming - Journal of Practical Ethics.
    This paper explores some ways in which artificial intelligence (AI) could be used to improve human moral judgments in bioethics by avoiding some of the most common sources of error in moral judgment, including ignorance, confusion, and bias. It surveys three existing proposals for building human morality into AI: Top-down, bottom-up, and hybrid approaches. Then it proposes a multi-step, hybrid method, using the example of kidney allocations for transplants as a test case. The paper concludes with brief remarks (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Structure-mapping: Directions from simulation to theory.Theodore Bach - 2011 - Philosophical Psychology 24 (1):23-51.
    The theory of mind debate has reached a “hybrid consensus” concerning the status of theory-theory and simulation-theory. Extant hybrid models either specify co-dependency and implementation relations, or distribute mentalizing tasks according to folk-psychological categories. By relying on a non-developmental framework these models fail to capture the central connection between simulation and theory. I propose a “dynamic” hybrid that is informed by recent work on the nature of similarity cognition. I claim that Gentner’s model of structure-mapping allows us (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  48. On Philomatics and Psychomatics for Combining Philosophy and Psychology with Mathematics.Benyamin Ghojogh & Morteza Babaie - manuscript
    We propose the concepts of philomatics and psychomatics as hybrid combinations of philosophy and psychology with mathematics. We explain four motivations for this combination which are fulfilling the desire of analytical philosophy, proposing science of philosophy, justifying mathematical algorithms by philosophy, and abstraction in both philosophy and mathematics. We enumerate various examples for philomatics and psychomatics, some of which are explained in more depth. The first example is the analysis of relation between the context principle, semantic holism, and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Theories and Tenets: An Impalpable Troll for the Policy Makers, Research Officers and Administrators?Kiyoung Kim - 2014 - International Journal of Interdisciplinary and Multidisciplinary Studies 1 (8):30-50.
    Now we live in the age of professionalism, and the public office in any nation is some reservoir of intelligent competition in their specific field. They are the leaders and paragon of community as a loyal and professional fiduciary. A hybrid nature of officers creates the rules and exercises their professional knowledge to serve a public good. The not unusual word,“scholar practitioner” may reflect the tendency of learning community within the business and government officers. They wish to overcome (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  28
    AI-Driven Air Quality Forecasting Using Multi-Scale Feature Extraction and Recurrent Neural Networks.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):575-590.
    We investigate the application of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels based on historical data. Our experimental setup uses real-world air quality datasets from multiple regions, containing measurements of pollutants like PM2.5, PM10, CO, NO2, and SO2, alongside meteorological data such as temperature, humidity, and wind speed. The models are trained, validated, and tested using a split dataset, and their accuracy is evaluated using performance metrics like (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 967