Results for 'Keith M. Kendrick'

963 found
Order:
  1. Derrida degree: A question of honour.Barry Smith, Hans Albert, David M. Armstrong, Ruth Barcan Marcus, Keith Campbell, Richard Glauser, Rudolf Haller, Massimo Mugnai, Kevin Mulligan, Lorenzo Peña, Willard Van Orman Quine, Wolfgang Röd, Karl Schuhmann, Daniel Schulthess, Peter M. Simons, René Thom, Dallas Willard & Jan Wolenski - 1992 - The Times 9 (May 9).
    A letter to The Times of London, May 9, 1992 protesting the Cambridge University proposal to award an honorary degree to M. Jacques Derrida.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  2. Expectancy Effects in Reconstructive Memory: When the Past is Just What We Expected.Keith Markman, Edward Hirt & Hugh McDonald - 1998 - In Steven Jay Lynn & Kevin M. McConkey (eds.), Truth in Memory. Guilford Press. pp. 62-89.
    Topics include sources of schematic effects on memory; the M. Ross and M. Conway model; E. R. Hirt's model of reconstructive memory; and moderators of the relative weighting of expectancy vs memory trace.
    Download  
     
    Export citation  
     
    Bookmark  
  3. M. HEIDEGGER, Heraclitus. The Inception of Occidental Thinking and Logic: Heraclitus's Doctrine of the Logos, trans. Julia Goesser Assaiante, S. Montgomery Ewegen. [REVIEW]Keith Begley - 2020 - Classics Ireland 26:163–166.
    Download  
     
    Export citation  
     
    Bookmark  
  4. Anatomia e Fisiologia do Sistema Reprodutivo dos Animais Domésticos.Emanuel Isaque Da Silva - manuscript
    BAIXE O PDF COMPLETO COM 58 FIGURAS E 50 PÁGINAS!!! -/- INTRODUÇÃO Conhecer a anatomia de um aparelho representa a base para seu estudo amplo e profundo, além de facilitar a compreensão de seu funcionamento. Por isso é importante o conhecimento da anatomia funcional do aparelho reprodutor, já que sua análise permite fixar sólidas bases para o estudo do fenômeno pelo qual se perpetuam as espécies: a reprodução. Nos subtemas compreendidos referentes ao macho e a fêmea, descreve-se cada um dos (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Anatomia e Fisiologia das Aves Domésticas - Anatomia da Galinha.Emanuel Isaque Cordeiro da Silva - manuscript
    -/- IFPE – Campus Belo Jardim Curso Técnico em Agropecuária -/- AVICULTURA: ANATOMIA DA GALINHA -/- AVICULTURA Anatomia básica da galinha -/- INTRODUÇÃO -/- A galinha é um animal vertebrado de sangue quente, parente evoluído dos répteis. Embora haja semelhanças entre ambas as espécies (aves e répteis), também existem grandes diferenças. Os répteis são seres pecilotérmicos, isto é, possuem sangue frio, o que significa que sua temperatura corporal não é regulada pelo seu próprio corpo para uma temperatura específica e, portanto, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Comportamento Sexual dos Animais Domésticos.Emanuel Isaque Cordeiro Da Silva -
    COMPORTAMENTO SEXUAL DOS ANIMAIS OBJETIVO O estudante explicará a conduta sexual de fêmeas e machos de diferentes espécies domésticas para detectar a fase de receptividade sexual, com a finalidade de programar de maneira adequada a monta ou a inseminação artificial. A observação da conduta sexual dos animais é indispensável para o sucesso da estação reprodutiva em uma determinada propriedade. Logo, o estudante obterá o alicerce necessário sobre os pontos teóricos e práticos a serem observados para a seleção dos animais aptos (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Beauty Unlimited.Peg Zeglin Brand (ed.) - 2013 - Bloomington, IN: Indiana University Press.
    Emphasizing the human body in all of its forms, Beauty Unlimited expands the boundaries of what is meant by beauty both geographically and aesthetically. Peg Zeglin Brand and an international group of contributors interrogate the body and the meaning of physical beauty in this multidisciplinary volume. This striking and provocative book explores the history of bodily beautification; the physicality of socially or culturally determined choices of beautification; the interplay of gender, race, class, age, sexuality, and ethnicity within and on the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Fisiologia do Estro e do Serviço na Reprodução Bovina.Emanuel Isaque Cordeiro da Silva & Emanuel Isaque Da Silva - manuscript
    FISIOLOGIA DA REPRODUÇÃO BOVINA: 2 - ESTRO E SERVIÇO -/- -/- INTRODUÇÃO -/- -/- A identificação de vacas em cio (estro ou cio) é, sem dúvida, a prática mais importante no manejo da reprodução do rebanho leiteiro. Apesar dos avanços no conhecimento da fisiologia da reprodução a nível celular e molecular, a identificação de vacas em estro continua sendo o problema reprodutivo mais importante e o que mais causa prejuízos econômicos. Na indústria de laticínios no Brasil, seu impacto não foi (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Desenvolvimento Embrionário e Diferenciação Sexual nos Animais Domésticos.Emanuel Isaque Cordeiro da Silva - manuscript
    DESENVOLVIMENTO EMBRIONÁRIO E DIFERENCIAÇÃO SEXUAL -/- E. I. C. da Silva Departamento de Agropecuária – IFPE Campus Belo Jardim Departamento de Zootecnia – UFRPE sede -/- 1.1 INTRODUÇÃO O sexo foi definido como a soma das diferenças morfológicas, fisiológicas e psicológicas que distinguem o macho da fêmea permitindo a reprodução sexual e assegurando a continuidade das espécies. Os processos de diferenciação sexual são realizados durante o desenvolvimento embrionário, onde ocorre a proliferação, diferenciação e maturação das células germinativas e primordiais, precursoras (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. (2 other versions)Parts: a study in ontology.Peter M. Simons - 1987 - New York: Oxford University Press.
    Although the relationship of part to whole is one of the most fundamental there is, this is the first full-length study of this key concept. Showing that mereology, or the formal theory of part and whole, is essential to ontology, Simons surveys and critiques previous theories--especially the standard extensional view--and proposes a new account that encompasses both temporal and modal considerations. Simons's revised theory not only allows him to offer fresh solutions to long-standing problems, but also has far-reaching consequences for (...)
    Download  
     
    Export citation  
     
    Bookmark   503 citations  
  11. Conspiracy Theories, Populism, and Epistemic Autonomy.Keith Raymond Harris - 2023 - Journal of the American Philosophical Association 9 (1):21-36.
    Quassim Cassam has argued that psychological and epistemological analyses of conspiracy theories threaten to overlook the political nature of such theories. According to Cassam, conspiracy theories are a form of political propaganda. I develop a limited critique of Cassam's analysis.This paper advances two core theses. First, acceptance of conspiracy theories requires a rejection of epistemic authority that renders conspiracy theorists susceptible to co-option by certain political programs while insulating such programs from criticism. I argue that the contrarian nature of conspiracy (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  12. The Relationship between Performance Standards and Achieving the Objectives of Supervision at the Islamic University in Gaza.Ashraf A. M. Salama, Mazen Al Shobaki, Samy S. Abu-Naser, Abed Alfetah M. AlFerjany & Youssef M. Abu Amuna - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 1 (10):89-101.
    The aim of the research is to identify the relationship between the performance criteria and the achievement of the objectives of supervision which is represented in the performance of the job at the Islamic University in Gaza Strip. To achieve the objectives of the research, the researchers used the descriptive analytical approach to collect information. The questionnaire consisted of (22) paragraphs distributed to three categories of employees of the Islamic University (senior management, faculty members, their assistants and members of the (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  13. A taxonomy of multinational ethical and methodological standards for clinical trials of therapeutic interventions.C. M. Ashton, N. P. Wray, A. F. Jarman, J. M. Kolman, D. M. Wenner & B. A. Brody - 2011 - Journal of Medical Ethics 37 (6):368-373.
    Background If trials of therapeutic interventions are to serve society's interests, they must be of high methodological quality and must satisfy moral commitments to human subjects. The authors set out to develop a clinical - trials compendium in which standards for the ethical treatment of human subjects are integrated with standards for research methods. Methods The authors rank-ordered the world's nations and chose the 31 with >700 active trials as of 24 July 2008. Governmental and other authoritative entities of the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  14. Mango Pests Identification Expert System.Jehad M. Altayeb, Samy S. Abu-Naser, Shahd J. Albadrasawi & Mohammed M. Almzainy - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (6):19-26.
    Mango is an economically significant fruit crop cultivated in various tropical and subtropical regions around the world. However, the productivity and quality of mangoes can be severely impacted by a range of pests. This research paper introduces an innovative approach to identify mango pests using an expert system. The expert system integrates knowledge from entomology and plants to provide accurate identification of common mango pests. The paper outlines the development and implementation of the expert system using Clips shell, which utilizes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. The Sum of Well-Being.Jacob M. Nebel - 2023 - Mind 132 (528):1074–1104.
    Is well-being the kind of thing that can be summed across individuals? This paper takes a measurement-theoretic approach to answering this question. To make sense of adding well-being, we would need to identify some natural "concatenation" operation on the bearers of well-being that satisfies the axioms of extensive measurement and can therefore be represented by the arithmetic operation of addition. I explore various proposals along these lines, involving the concatenation of segments within lives over time, of entire lives led alongside (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. The Auditory Field: The Spatial Character of Auditory Experience.Keith A. Wilson - 2023 - Ergo: An Open Access Journal of Philosophy 9 (40):1080-1106.
    It is widely accepted that there is a visual field, but the analogous notion of an auditory field is rejected by many philosophers on the grounds that the metaphysics or phenomenology of audition lack the necessary spatial or phenomenological structure. In this paper, I argue that many of the common objections to the existence of an auditory field are misguided and that, contrary to a tradition of philosophical scepticism about the spatiality of auditory experience, it is as richly spatial as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  87
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  74
    IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  19.  62
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  59
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  21.  51
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  50
    Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Where conspiracy theories come from, what they do, and what to do about them.Keith Raymond Harris - 2024 - Inquiry: An Interdisciplinary Journal of Philosophy.
    Philosophers who study conspiracy theories have increasingly addressed the questions of where conspiracy theories come from, what such theories do, and what to do about them. This essay serves as a commentary on the answers to these questions offered by contributors to this special issue.
    Download  
     
    Export citation  
     
    Bookmark  
  24. Mint Expert System Diagnosis and Treatment.Mosa M. M. Megdad, Mohammed N. Ayyad, Mohanad H. Al-Qadi, Mohammed F. El-Habibi, Mohammed J. A. AlQatrawi, Raed Z. Sababa & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (5):22-28.
    Background: Mint is a grassy, perennial plant, belonging to the oral platoon, fast growing and spreading, its leaves are green in color, fragrant, tart, refreshing, square-shaped leg, bifurcated, erect, ranging in height from (10 - 201 cm). Home to Europe and Asia. The mint plant has many benefits, the most important of which are pain relief, treatment of gallbladder disorders, the expulsion of gases, anti-inflammatory, and relaxing nerves. While the mint plant is the ideal option for the start of gardens, (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  25.  40
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  26.  86
    (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  36
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  36
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  34
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Intentionality without exotica.R. M. Sainsbury - 2010 - In Robin Jeshion (ed.), New Essays on Singular Thought. Oxford, GB: Oxford University Press.
    The paper argues that intensional phenomena can be explained without appealing to "exotic" entities: one that don't exist, are merely possible, or are essentially abstract.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  31. Gender Equality through “Daddy Quotas”? Paternalism and the Limits of Parental Autonomy.Viki Møller Lyngby Pedersen - forthcoming - Social Theory and Practice.
    The policy of earmarked paternity leave aims to promote mothers’ position in the labor market and fathers’ relationship with their child. Critics argue that the policy prevents parents from pursuing their own ideas about what is best for them. This provides reason to consider whether the policy is paternalistic or, in other ways, disrespectful of parental autonomy. I argue that the state implicates itself in the gender inequalities that result from parents’ unequal parental leave agreements when the state financially facilitates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  47
    (1 other version)A PBL REPORT FOR CONTAINMENT ZONE ALERTING APPLICATION.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Rules, Regularities, Randomness. Festschrift for Michiel van Lambalgen.Keith Stenning & Martin Stokhof (eds.) - 2022 - Amsterdam, The Netherlands: Institute for Logic, Language and Computation.
    Festschrift for Michiel van Lambalgen on the occasion of his retirement as professor of logic and cognitive science at the University of Amsterdam.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. (1 other version)Outward-facing epistemic vice.Keith Raymond Harris - 2022 - Synthese 200 (6):1-16.
    The epistemic virtues and vices are typically defined in terms of effects or motivations related to the epistemic states of their possessors. However, philosophers have recently begun to consider _other-regarding_ epistemic virtues, traits oriented toward the epistemic flourishing of others. In a similar vein, this paper discusses _outward-facing_ epistemic vices, properties oriented toward the epistemic languishing of others. I argue for the existence of both reliabilist and responsibilist outward-facing vices, and illustrate how such vices negatively bear on the epistemic prospects (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  49
    Algorithmic Decision-Making, Agency Costs, and Institution-Based Trust.Keith Dowding & Brad R. Taylor - 2024 - Philosophy and Technology 37 (2):1-22.
    Algorithm Decision Making (ADM) systems designed to augment or automate human decision-making have the potential to produce better decisions while also freeing up human time and attention for other pursuits. For this potential to be realised, however, algorithmic decisions must be sufficiently aligned with human goals and interests. We take a Principal-Agent (P-A) approach to the questions of ADM alignment and trust. In a broad sense, ADM is beneficial if and only if human principals can trust algorithmic agents to act (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  82
    How to use imaginary cases in normative theory.Keith Dowding - 2022 - Metaphilosophy 53 (4):512-525.
    This paper defends the use of imaginary cases in normative theorizing. Imaginary cases are used as a part of an argument and should be assessed in terms of the role they play within arguments. The paper identifies five ways in which they are used and then uses some of the best examples to bring out how they contribute to debates. While not directly akin to empirical experiments, criticisms of imaginary cases can be represented in terms of the well‐known distinction between (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Extensive Measurement in Social Choice.Jacob M. Nebel - forthcoming - Theoretical Economics.
    Extensive measurement is the standard measurement-theoretic approach for constructing a ratio scale. It involves the comparison of objects that can be concatenated in an additively representable way. This paper studies the implications of extensively measurable welfare for social choice theory. We do this in two frameworks: an Arrovian framework with a fixed population and no interpersonal comparisons, and a generalized framework with variable populations and full interpersonal comparability. In each framework we use extensive measurement to introduce novel domain restrictions, independence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Strange Nature of Quantum Entanglement: Can Observers of Entangled Photons Become Entangled With Each Other?Steven M. Rosen - 2023 - Journal of Mind and Behavior 44 (3 and 4):157-170.
    This paper seeks to extend my recent work on quantum perception (Rosen, 2021) to the phenomenon of quantum entanglement. In the first section, I summarize the earlier work, noting how the conventional approach to observing photons is rooted in an objectivist philosophy that serves as an obstacle to probing the underlying quantum reality. In the summary provided, I bring out the intimate relationship between observer and observed in the quantum world, and the need for a new, proprioceptive mode of observation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Human reasoning and cognitive science.Keith Stenning & Michiel van Lambalgen - 2008 - Boston, USA: MIT Press.
    In the late summer of 1998, the authors, a cognitive scientist and a logician, started talking about the relevance of modern mathematical logic to the study of human reasoning, and we have been talking ever since. This book is an interim report of that conversation. It argues that results such as those on the Wason selection task, purportedly showing the irrelevance of formal logic to actual human reasoning, have been widely misinterpreted, mainly because the picture of logic current in psychology (...)
    Download  
     
    Export citation  
     
    Bookmark   89 citations  
  40. Credit Score Classification Using Machine Learning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (5):1-10.
    Abstract: Ensuring the proactive detection of transaction risks is paramount for financial institutions, particularly in the context of managing credit scores. In this study, we compare different machine learning algorithms to effectively and efficiently. The algorithms used in this study were: MLogisticRegressionCV, ExtraTreeClassifier,LGBMClassifier,AdaBoostClassifier, GradientBoostingClassifier,Perceptron,RandomForestClassifier,KNeighborsClassifier,BaggingClassifier, DecisionTreeClassifier, CalibratedClassifierCV, LabelPropagation, Deep Learning. The dataset was collected from Kaggle depository. It consists of 164 rows and 8 columns. The best classifier with unbalanced dataset was the LogisticRegressionCV. The Accuracy 100.0%, precession 100.0%,Recall100.0% and the F1-score (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  59
    Trading on Shifting Grounds: Risse and Wollner’s On Trade Justice.Joshua M. Hall - forthcoming - Transactions of the Charles S. Peirce Society.
    Though Mathias Risse and Gabriel Wollner’s On Trade Justice admirably incorporates the history of European philosophy and U.S. government, their otherwise reasonable proposals rest on dubious grounds. The book derives both much of its appeal, and its primary vulnerability, from a cluster of central terms that are situated precariously at the intersection of metaphors and concepts, or what Lakoff and Johnson call “metaphorical concepts.” In this article, I explore the three most important such terms, as featured in the following paraphrase (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. "I Couldn't Have Known": Accountability, Foreseeability, and Counterfactual Denials of Responsibility.Keith Markman & Philip Tetlock - 2000 - British Journal of Social Psychology 39:313-325.
    This article explores situational determinants and psychological consequences of counterfactual excuse-making - denying responsibility by declaring `I couldn’t have known.’ Participants who were made accountable for a stock investment decision that resulted in an outcome caused by unforeseeable circumstances were particularly likely to generate counterfactual excuses and, as a result, to deny responsibility for the outcome of their choices and minimize their perceptions of control over the decision process. The article discusses the implications of these findings for structuring accountability reporting (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. The Direct Argument and the burden of proof.Ira M. Schnall & David Widerker - 2012 - Analysis 72 (1):25-36.
    Peter van Inwagen's Direct Argument (DA) for incompatibilism purports to establish incompatibilism with respect to moral responsibility and determinism without appealing to assumptions that compatibilists usually consider controversial. Recently, Michael McKenna has presented a novel critique of DA. McKenna's critique raises important issues about philosophical dialectics. In this article, we address those issues and contend that his argument does not succeed.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  44. Accountability and Close-Call Counterfactuals: The Loser Who Nearly Won and the Winner Who Nearly Lost.Keith Markman & Philip Tetlock - 2000 - Personality and Social Psychology Bulletin 26 (10):1213-1224.
    This article links recent work on assimilative and contrastive counterfactual thinking with research on the impact of accountability on judgment and choice. Relative to participants who felt accountable solely for bottom-line performance outcomes, participants who were accountable for their decision-making process (a) had more pronounced differential reactions to clearly winning versus (winning but) nearly losing and to clearly losing versus (losing but) nearly winning; (b) were less satisfied with the quality of their decisions when they nearly lost and more satisfied (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Deconstructing Self-Blame Following Sexual Assault: The Critical Roles of Cognitive Content and Process.Keith Markman, Audrey Miller, Ian Handley & Janel Miller - 2010 - Violence Against Women 16 (10):1120-1137.
    As part of a larger study, predictors of self-blame were investigated in a sample of 149 undergraduate sexual assault survivors. Each participant completed questionnaires regarding their preassault, peritraumatic, and post assault experiences and participated in an individual interview. Results confirmed the central hypothesis that, although several established correlates independently relate to self-blame, only cognitive content and process variables—negative self-cognitions and counterfactual-preventability cognitions—uniquely predict self-blame in a multivariate model.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  43
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Peers and Performance: How In-Group and Out-Group Comparisons Moderate Stereotype Threat Effects.Keith Markman & Ronald Elizaga - 2008 - Current Psychology 27:290-300.
    The present study examined how exposure to the performance of in-group and out-group members can both exacerbate and minimize the negative effects of stereotype threat. Female participants learned that they would be taking a math test that was either diagnostic or nondiagnostic of their math ability. Prior to taking the test, participants interacted with either an in-group peer (a female college student) or an out-group peer (a male college student) who had just taken the test and learned that the student (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. THE DIARY OF BIDA-BIDA: UNDERSTANDING THE CONSEQUENCES OF 'SMART SHAMING' AMONG SENIOR HIGH SCHOOL STUDENT LEADERS.Anika M. Untalan, Alisson A. Abanes, Noel T. Bambao Jr, Landher J. Baon, John Cyrus M. Barrientos, John Carl C. Carenan, Rhaniel Joseph C. Lanic, Troy Christian D. Ortego, Lhei Ashera C. Bayugo, Sara S. Espole, Nicole A. Sale, Janelle D. Samillano, Candy Rose C. Simballa & Jowenie A. Mangarin - 2024 - Get International Research Journal 2 (2):47-60.
    Academic excellence and intelligence are commonly lauded as commendable attributes synonymous with success. However, a disconcerting trend has surfaced within educational institutions, challenging the prevailing narrative of scholastic accomplishment—smart shaming. This research delves into the increasing concern of smart shaming within educational settings, particularly at Immaculate Conception College of Balayan, Inc., questioning the predominant emphasis on academic excellence and intelligence. A qualitative case study design, along with judgmental sampling, was employed to examine fifteen (15) student leaders who had experienced smart (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  53
    Cell Fate: What’s Evolution Got to Do With It?Grant Ramsey & Pierre M. Durand - 2023 - Yale Journal of Biology and Medicine 96 (4):565–568.
    Theoretical frameworks concerning cell fate typically center on proximate causes to explain how cells know what type they are meant to become. While major advances in cell fate theory have been achieved by these mechanism-focused frameworks, there are some aspects of cell decision-making that require an evolutionary interpretation. While mechanistic biologists sometimes turn to evolutionary theory to gain insights about cell fate (cancer is a good example), it is not entirely clear in cell fate theory what insights evolutionary theory can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Who's Afraid of Idealism?: Epistemological Idealism From the Kantian and Nietzschean Points of View.Luis M. Augusto - 2005 - University Press of America.
    In Who's Afraid of Idealism? the philosophical concept of idealism, the extent to which reality is mind-made, is examined in new light. Author Luis M. Augusto explores epistemological idealism, at the source of all other kinds of idealism, from the viewpoints of Immanuel Kant and Friedrich Nietzsche, two philosophers who spent a large part of their lives denigrating the very concept. Working from Kant and Nietzsche's viewpoints that idealism was a scandal to philosophy and the cause of nihilism, Augusto evaluates (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 963