Results for 'Jeffrey M. Schwartz'

983 found
Order:
  1. A Role for Volition and Attention in the Generation of New Brain Circuitry & The Implications of Psychological Treatment Effects on Cerebral Function for the Physics of Mind-Brain Interaction.Jeffrey M. Schwartz & Henry Stapp - 1999 - Journal of Consciousness Studies 6 (8-9):115-142.
    APPENDIX: The data emerging from the clinical and brain studies described above suggest that, in the case of OCD, there are two pertinent brain mechanisms that are distinguishable both in terms of neuro-dynamics and in terms of the conscious experiences that accompany them. These mechanisms can be characterized, on anatomical and perhaps evolutionary grounds, as a lower-level and a higher-level mechanism. The clinical treatment has, when successful, an activating effect on the higher-level mechanism, and a suppressive effect on the lower-level (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  2. Older Adults and Forgoing Cancer Screening.Alexia M. Torke, Peter H. Schwartz, Laura R. Holtz, Kianna Montz & Greg A. Sachs - 2013 - Journal of the American Medical Association Internal Medicine 173 (7):526-531.
    Although there is a growing recognition that older adults and those with extensive comorbid conditions undergo cancer screening too frequently, there is little information about patients’ perceptions regarding cessation of cancer screening. Information on older adults’ views of screening cessation would be helpful both for clinicians and for those designing interventions to reduce overscreening.
    Download  
     
    Export citation  
     
    Bookmark  
  3. Is Disability a Neutral Condition?Jeffrey M. Brown - 2016 - Journal of Social Philosophy 47 (2):188-210.
    The issue of whether biological and psychological properties associated with disability can be harmful, beneficial, or neutral brings up an important philosophical question about how we evaluate disability, and disability’s impact on well-being. The debate is usually characterized as between those who argue disability is intrinsically harmful, and disability rights advocates who argue that disability is just another way of being different, in part, because disability can also provide important benefits. I argue that this debate is a false one, as (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. How Bioethics Principles Can Aid Design of Electronic Health Records to Accommodate Patient Granular Control.Eric M. Meslin & Peter H. Schwartz - 2014 - Journal of General Internal Medicine 30 (1):3-6.
    Ethics should guide the design of electronic health records (EHR), and recognized principles of bioethics can play an important role. This approach was adopted recently by a team of informaticists designing and testing a system where patients exert granular control over who views their personal health information. While this method of building ethics in from the start of the design process has significant benefits, questions remain about how useful the application of bioethics principles can be in this process, especially when (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. To Be or Not to Be – A Research Subject.Eric M. Meslin & Peter H. Schwartz - 2010 - In Thomasine Kushner, Surviving Health Care: A Manual for Patients and Their Families. Cambridge University Press. pp. 146-162.
    Most people do not know there are different kinds of medical studies; some are conducted on people who already have a disease or medical condition, and others are performed on healthy volunteers who want to help science find answers. No matter what sort of research you are invited to participate in, or whether you are a patient when you are asked, it’s entirely up to you whether or not to do it. This decision is important and may have many implications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Giving patients granular control of personal health information: Using an ethics ‘Points to Consider’ to inform informatics system designers.Eric M. Meslin, Sheri A. Alpert, Aaron E. Carroll, Jere D. Odell, William M. Tierney & Peter H. Schwartz - 2013 - International Journal of Medical Informatics 82:1136-1143.
    Objective: There are benefits and risks of giving patients more granular control of their personal health information in electronic health record (EHR) systems. When designing EHR systems and policies, informaticists and system developers must balance these benefits and risks. Ethical considerations should be an explicit part of this balancing. Our objective was to develop a structured ethics framework to accomplish this. -/- Methods: We reviewed existing literature on the ethical and policy issues, developed an ethics framework called a “Points to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  7. Patient Understanding of Benefits, Risks, and Alternatives to Screening Colonoscopy.Peter H. Schwartz, Elizabeth Edenberg, Patrick R. Barrett, Susan M. Perkins, Eric M. Meslin & Thomas F. Imperiale - 2013 - Family Medicine 45 (2):83-89.
    While several tests and strategies are recommended for colorectal cancer (CRC) screening, studies suggest that primary care providers often recommend colonoscopy without providing information about its risks or alternatives. These observations raise concerns about the quality of informed consent for screening colonoscopy.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. The Ethics of Information: Absolute Risk Reduction and Patient Understanding of Screening.Peter H. Schwartz & Eric M. Meslin - 2008 - Journal of General Internal Medicine 23 (6):867-870.
    Some experts have argued that patients should routinely be told the specific magnitude and absolute probability of potential risks and benefits of screening tests. This position is motivated by the idea that framing risk information in ways that are less precise violates the ethical principle of respect for autonomy and its application in informed consent or shared decisionmaking. In this Perspective, we consider a number of problems with this view that have not been adequately addressed. The most important challenges stem (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  9. One Goodness, Many Goodnesses.Thomas M. Ward & Anne Jeffrey - 2024 - Religious Studies 2024.
    Some theories of goodness are descriptively rich: they have much to say about what makes things good. Neo-Aristotelian accounts, for instance, detail the various features that make a human being, a dog, a bee good relative to facts about those forms of life. Famously, such theories of relative goodness tend to be comparatively poor: they have little or nothing to say about what makes one kind of being better than another kind. Other theories of goodness—those that take there to be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Achieving Goals and Making Meanings: Toward a Unified Model of Recreational Experience.Peter J. Fix, J. Brooks, Jeffrey & M. Harrington, Andrew - 2018 - Journal of Outdoor Recreation and Tourism 23:16-25.
    Understanding recreational experiences is a longstanding research tradition and key to effective management. Given the complexities of human experience, many approaches have been applied to study recreational experience. Two such approaches are the experiential approach (based in a positivistic paradigm) and emergent experience (based in an interpretive paradigm). While viewed as being complementary, researchers have not offered guidance for incorporating the approaches into a common model of recreational experience. This study utilized longitudinal, qualitative data to examine aspects of recreational experience (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Authority or Autonomy? Philosophical and Psychological Perspectives on Deference to Experts.Alex Worsnip, Devin Lane, Samuel Pratt, M. Giulia Napolitano, Kurt Gray & Jeffrey A. Greene - forthcoming - Philosophical Psychology.
    Several decades of work in both philosophy and psychology acutely highlights our limitations as individual inquirers. One way to recognize these limitations is to defer to experts: roughly, to form one’s beliefs on the basis of expert testimony. Yet, as has become salient in the age of Brexit, Trumpist politics, and climate change denial, people are often mistrustful of experts, and unwilling to defer to them. It’s a trope of highbrow public discourse that this unwillingness is a serious pathology. But (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Relativism, Reflective Equilibrium, and Justice.Schwartz Justin - 1997 - Legal Studies 17:128-68.
    THIS PAPER IS THE CO-WINNER OF THE FRED BERGER PRIZE IN PHILOSOPHY OF LAW FOR THE 1999 AMERICAN PHILOSOPHICAL ASSOCIATION FOR THE BEST PUBLISHED PAPER IN THE PREVIOUS TWO YEARS. -/- The conflict between liberal legal theory and critical legal studies (CLS) is often framed as a matter of whether there is a theory of justice that the law should embody which all rational people could or must accept. In a divided society, the CLS critique of this view is overwhelming: (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Dance as Portrayed in the Media.Ishtiyaque Haji, Stefaan E. Cuypers, Yannick Joye, S. K. Wertz, Estelle R. Jorgensen, Iris M. Yob, Jeffrey Wattles, Sabrina D. Misirhiralall, Eric C. Mullis & Seth Lerer - 2013 - The Journal of Aesthetic Education 47 (3):72-95.
    This article attempts to answer a question that many dancers and non-dancers may have. What is dance according to the media? Furthermore, how does the written word portray dance in the media? To answer these ques-tions, this research focuses on the role that the discourse of dance in media plays in the public sphere’s knowledge construction of dance. This is impor-tant to study because the public sphere’s meaning of dance will determine whether dance education is promoted or banned in schools (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. “Say ‘Yes!’ to the Demon: Amor Fati in the Eternal Hourglass”.Jeffrey Lucas - 2018 - The Agonist : A Nietzsche Circle Journal 11 (II):82-100.
    Rather than assume—based on the contents of the Nachlass—that the Eternal Recurrence, in its initial formulation, coheres with the later theoretico-metaphysical sense (i.e., sharing abstract space with the Will to Power) I propose the inverse (contrary to Heidegger, Deleuze, and Nehamas (whose Proustian exegesis (Nietzsche: Life as Literature) I’m obliged to radically extend)); namely, that the rotary cosmology of recurrence, as a literal proposition, is a consequence of the poetic sense of the earlier parable (GS)–which, I find, ultimately prefigures the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Anscombe, Anarchism, and Authority.Anne Jeffrey - forthcoming - Ergo.
    Philosophical anarchism, in its strongest form, says that a right to be obeyed would run up against the duty to act autonomously, so there must be no one with a right to be obeyed. More recently, a parallel criticism of moral testimony has been advanced according to which there can be no right to be believed about moral matters because it would lead us to fail in our duty to form our moral beliefs for ourselves, and thus to bear responsibility (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Conscience: the mechanism of morality.Jeffrey White - manuscript
    Conscience is often referred to yet not understood. This text develops a theory of cognition around a model of conscience, the ACTWith model. It represents a synthesis of results from contemporary neuroscience with traditional philosophy, building from Jamesian insights into the emergence of the self to narrative identity, all the while motivated by a single mechanism as represented in the ACTWith model. Emphasis is placed on clarifying historical expressions and demonstrations of conscience - Socrates, Heidegger, Kant, M.L. King - in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Controlling for performance capacity confounds in neuroimaging studies of conscious awareness.Jorge Morales, Jeffrey Chiang & Hakwan Lau - 2015 - Neuroscience of Consciousness 1:1-11.
    Studying the neural correlates of conscious awareness depends on a reliable comparison between activations associated with awareness and unawareness. One particularly difficult confound to remove is task performance capacity, i.e. the difference in performance between the conditions of interest. While ideally task performance capacity should be matched across different conditions, this is difficult to achieve experimentally. However, differences in performance could theoretically be corrected for mathematically. One such proposal is found in a recent paper by Lamy, Salti and Bar-Haim [Lamy (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  18. Globalization, International Law, and Human Rights, by Jeffrey F. Addicott, Md. Jahid Hossain Bhuiyan, Tareq M.R. Chowdhury (eds.), 2012. [REVIEW]Deepa Kansra - 2013 - Journal of the Indian Law Institute 55:245-248.
    Download  
     
    Export citation  
     
    Bookmark  
  19. Knowledge Based System for Diagnosing Custard Apple Diseases and Treatment.Mustafa M. K. Al-Ghoul, Mohammed H. S. Abueleiwa, Fadi E. S. Harara, Samir Okasha & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (5):41-45.
    There is no doubt that custard apple diseases are among the important reasons that destroy the Custard Apple plant and its agricultural crops. This leads to obvious damage to these plants and they become inedible. Discovering these diseases is a good step to provide the appropriate and correct treatment. Determining the treatment with high accuracy depends on the method used to correctly diagnose the disease, expert systems can greatly help in avoiding damage to these plants. The expert system correctly diagnoses (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  20. The Relationship between Correcting Deviations in Measuring Performance and Achieving the Objectives of Control - The Islamic University as a Model.Abed Alfetah M. AlFerjany, Ashraf A. M. Salama, Youssef M. Abu Amuna, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (1):74-89.
    The study aimed to identify the relationship between correcting the deviations in the measurement of performance and achieving the objectives of control and the performance of the job at the Islamic University in the Gaza Strip. To achieve the objectives of the research, the researchers used the descriptive analytical approach to collect information. The questionnaire consisted of (20) statements distributed to three categories of employees of the Islamic University (senior management, faculty members, their assistants and members of the administrative board). (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  21. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  22. CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark   116 citations  
  23. AI-Driven Innovations in Agriculture: Transforming Farming Practices and Outcomes.Jehad M. Altayeb, Hassam Eleyan, Nida D. Wishah, Abed Elilah Elmahmoum, Ahmed J. Khalil, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Applied Research (Ijaar) 8 (9):1-6.
    Abstract: Artificial Intelligence (AI) is transforming the agricultural sector, enhancing both productivity and sustainability. This paper delves into the impact of AI technologies on agriculture, emphasizing their application in precision farming, predictive analytics, and automation. AI-driven tools facilitate more efficient crop and resource management, leading to higher yields and a reduced environmental footprint. The paper explores key AI technologies, such as machine learning algorithms for crop monitoring, robotics for automated planting and harvesting, and data analytics for optimizing resource use. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  24. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  25. The grounding argument against non-reductive moral realism.Ralf M. Bader - 2017 - Oxford Studies in Metaethics 12.
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  26. Understanding Critical Variables for Customer Relationship Management in Higher Education Institution from Employees Perspective.Youssef M. Abu Amuna, Mazen J. Al Shobaki, Samy S. Abu Naser & Jehad J. Badwan - 2017 - International Journal of Information Technology and Electrical Engineering 6 (1):10-16.
    The aim of this paper is to evaluate the critical success factors and investigate the benefits that might be gained once implementing Electronic Customer Relationship Management at HEI from employee perspective. The study conducted at Al Quds Open University in Palestine and data collected from (300) employee through a questionnaire which consist of four variables. A number of statistical tools were intended for hypotheses testing and data analysis, including Spearman correlation coefficient for Validity, reliability correlation using Cronbach’s alpha, and Frequency (...)
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  27. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   126 citations  
  28. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   190 citations  
  29. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  30. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  31. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark   44 citations  
  32. PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark   137 citations  
  33. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  34. Why Mary left her room.Michaela M. McSweeney - 2023 - Philosophy and Phenomenological Research 109 (1):261-287.
    I argue for an account of grasping, or understanding that, on which we grasp via a higher‐order mental act of Husserlian fulfillment. Fulfillment is the act of matching up the objects of our phenomenally presentational experiences with those of our phenomenally representational thought. Grasping‐by‐fulfilling is importantly different from standard epistemic aims, in part because it is phenomenal rather than inferential. (I endorse Bourget's (2017) arguments to that effect.) I show that grasping‐by‐fulfilling cannot be a species of propositional knowledge or belief, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  35. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  36. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation of (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  37. War and murder.G. E. M. Anscombe - 1981 - In Ethics, Religion and Politics: Collected Philosophical Papers, Volume 3. Wiley-Blackwell. pp. 51-61.
    Two attitudes are possible: one, that the world is an absolute jungle and that the exercise of coercive power by rulers is only a manifestation of this; and the other, that it is both necessary and right that there should be this exercise of power, that through it the world is much less of a jungle than it could possibly be without it, so that one should in principle be glad of the existence of such power, and only take exception (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  38. Empirical Challenges to the Evidential Problem of Evil.Blake McAllister, Ian M. Church, Paul Rezkalla & Long Nguyen - 2024 - In Shaun Nichols & Joshua Knobe, Oxford Studies in Experimental Philosophy, Volume 5. Oxford University Press.
    The problem of evil is broadly considered to be one of the greatest intellectual threats to traditional brands of theism. And William Rowe’s 1979 formulation of the problem in “The Problem of Evil and Some Varieties of Atheism” is the most cited formulation in the contemporary philosophical literature. In this paper, we explore how the tools and resources of experimental philosophy might be brought to bear on Rowe’s seminal formulation, arguing that our empirical findings raise significant questions regarding the ultimate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  40. How to theorize about hope.Jack M. C. Kwong - 2022 - European Journal of Philosophy 30 (4):1426-1439.
    In order to better understand the topic of hope, this paper argues that two separate theories are needed: One for hoping, and the other for hopefulness. This bifurcated approach is warranted by the observation that the word ‘hope’ is polysemous: It is sometimes used to refer to hoping and sometimes, to feeling or being hopeful. Moreover, these two senses of 'hope' are distinct, as a person can hope for some outcome yet not simultaneously feel hopeful about it. I argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  41. Categories and foundational ontology: A medieval tutorial.Luis M. Augusto - 2022 - Journal of Knowledge Structures and Systems 3 (1):1-56.
    Foundational ontologies, central constructs in ontological investigations and engineering alike, are based on ontological categories. Firstly proposed by Aristotle as the very ur- elements from which the whole of reality can be derived, they are not easy to identify, let alone partition and/or hierarchize; in particular, the question of their number poses serious challenges. The late medieval philosopher Dietrich of Freiberg wrote around 1286 a tutorial that can help us today with this exceedingly difficult task. In this paper, I discuss (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  42. Bridging mainstream and formal ontology: A causality-based upper ontology in Dietrich of Freiberg.Luis M. Augusto - 2021 - Journal of Knowledge Structures and Systems 2 (2):35.
    Ontologies are some of the most central constructs in today's large plethora of knowledge technologies, namely in the context of the semantic web. As their coinage indicates, they are direct heirs to the ontological investigations in the long Western philosophical tradition, but it is not easy to make bridges between them. Contemporary ontological commitments often take causality as a central aspect for the ur-segregation of entities, especially in scientific upper ontologies; theories of causality and philosophical ontological investigations often go hand-in-hand, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  43. Hope and Hopefulness.Jack M. C. Kwong - 2020 - Canadian Journal of Philosophy 50 (7):832-843.
    This paper proposes a new framework for thinking about hope, with certain unexpected consequences. Specifically, I argue that a shift in focus from locutions like “x hopes that” and “x is hoping that” to “x is hopeful that” and “x has hope that” can improve our understanding of hope. This approach, which emphasizes hopefulness as the central concept, turns out to be more revealing and fruitful in tackling some of the issues that philosophers have raised about hope, such as the (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  44. The Phenomenology of Hope.Jack M. C. Kwong - 2022 - American Philosophical Quarterly 59 (3):313-325.
    What is the phenomenology of hope? A common view is that hope has a generally positive and pleasant affective tone. This rosy depiction, however, has recently been challenged. Certain hopes, it has been objected, are such that they are either entirely negative in valence or neutral in tone. In this paper, I argue that this challenge has only limited success. In particular, I show that it only applies to one sense of hope but leaves another sense—one that is implicitly but (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  12
    Person-affecting utilitarianism.Ralf M. Bader - 2022 - In Gustaf Arrhenius, Krister Bykvist, Tim Campbell & Elizabeth Finneron-Burns, The Oxford Handbook of Population Ethics. Oxford University Press. pp. 251-270.
    This paper argues that impersonal versions of utilitarianism involve an objectionable axiology that does not take personal good seriously. Rather than attributing ethical significance to personal good, they only consider it to be ethically relevant. As a result, they end up sub-ordinating and sacrificing personal good for the sake of impersonal good and thereby treat persons as mere containers of impersonal good. This gives rise to particularly troubling implications in variable-population cases. The paper then evaluates the prospects for person-affecting versions (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  46. No entailing laws, but enablement in the evolution of the biosphere.G. Longo, M. Montévil & S. Kauffman - 2012 - In G. Longo, M. Montévil & S. Kauffman, Genetic and Evolutionary Computation Conference. Acm. pp. 1379 -1392.
    Biological evolution is a complex blend of ever changing structural stability, variability and emergence of new phe- notypes, niches, ecosystems. We wish to argue that the evo- lution of life marks the end of a physics world view of law entailed dynamics. Our considerations depend upon dis- cussing the variability of the very ”contexts of life”: the in- teractions between organisms, biological niches and ecosys- tems. These are ever changing, intrinsically indeterminate and even unprestatable: we do not know ahead of (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  47. Despair and Hopelessness.Jack M. C. Kwong - 2024 - Journal of the American Philosophical Association 10 (2):225-242.
    It has recently been argued that hope is polysemous in that it sometimes refers to hoping and other times to being hopeful. That it has these two distinct senses is reflected in the observation that a person can hope for an outcome without being hopeful that it will occur. Below, I offer a new argument for this distinction. My strategy is to show that accepting this distinction yields a rich account of two distinct ways in which hope can be lost, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Credit Score Classification Using Machine Learning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (5):1-10.
    Abstract: Ensuring the proactive detection of transaction risks is paramount for financial institutions, particularly in the context of managing credit scores. In this study, we compare different machine learning algorithms to effectively and efficiently. The algorithms used in this study were: MLogisticRegressionCV, ExtraTreeClassifier,LGBMClassifier,AdaBoostClassifier, GradientBoostingClassifier,Perceptron,RandomForestClassifier,KNeighborsClassifier,BaggingClassifier, DecisionTreeClassifier, CalibratedClassifierCV, LabelPropagation, Deep Learning. The dataset was collected from Kaggle depository. It consists of 164 rows and 8 columns. The best classifier with unbalanced dataset was the LogisticRegressionCV. The Accuracy 100.0%, precession 100.0%,Recall100.0% and the F1-score (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  49. Performance Efficiency of University Education from Students Perspective.Samia A. M. Abdalmenem, Rasha O. Owda, Amal A. Al Hila, Samy S. Abu-Naser & Mazen J. Al Shobaki - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (11):10-24.
    The study aims to identify the efficiency of the university education performance from the perspective of postgraduate and undergraduate students in international and Palestinian universities. The analytical descriptive approach was used for this purpose and the questionnaire was used as a main tool for data collection. The study community consists of: post graduate students, (23850) graduate students and (146355) undergraduate students. The sample of the study was 378 graduate students and 383 undergraduate students. The random stratified sample was used. The (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  50. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset size, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
1 — 50 / 983