Results for 'Krishnasamy T. Selvan'

964 found
Order:
  1. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  4.  87
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  84
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  6.  79
    Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  60
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  51
    AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  49
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  47
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  45
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  44
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  43
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  42
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  16.  41
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  34
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  51
    (1 other version)A PBL REPORT FOR CONTAINMENT ZONE ALERTING APPLICATION.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  19
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  52
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  42
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. (1 other version)Culture and Administration.T. W. Adorno - 1978 - Télos 1978 (37):93-111.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  23.  45
    The Ontology of Compositeness Within Quantum Field Theory.T. Peterken - manuscript
    In this work, we attempt to define a notion of compositeness compatible with Quantum Field Theory. Considering the analytic properties of the S-matrix, we conclude that there is no satisfactory definition of compositeness compatible with Quantum Field Theory. Without this notion, one must claim that all bound states are equally fundamental, that is, one cannot rigorously claim that everyday objects are made of atoms or that atoms are made of protons and neutrons. I then show how an approximate notion of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  70
    Real consciousness in an unreal world?T. Tri Le - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  25. The future won’t be pretty: The nature and value of ugly, AI-designed experiments.Michael T. Stuart - 2023 - In Milena Ivanova & Alice Murphy (eds.), The Aesthetics of Scientific Experiments. New York, NY: Routledge.
    Can an ugly experiment be a good experiment? Philosophers have identified many beautiful experiments and explored ways in which their beauty might be connected to their epistemic value. In contrast, the present chapter seeks out (and celebrates) ugly experiments. Among the ugliest are those being designed by AI algorithms. Interestingly, in the contexts where such experiments tend to be deployed, low aesthetic value correlates with high epistemic value. In other words, ugly experiments can be good. Given this, we should conclude (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  13
    The Mind's World.T. Catalan - manuscript
    In recent years, the advent of Artificial Intelligence (AI) has profoundly reshaped the way we access and utilize humanity's vast reservoir of knowledge. Equipped with this powerful tool, I have undertaken a thorough exploration of the Human Mind, motivated by a growing concern: the evident decline in students' enthusiasm for learning. More specifically, as a professor and researcher, my need for understanding has driven me to explore in depth what defines us as Human beings and what sets us apart from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Synthetic biology and the ethics of knowledge.T. Douglas & J. Savulescu - 2010 - Journal of Medical Ethics 36 (11):687-693.
    Synthetic biologists aim to generate biological organisms according to rational design principles. Their work may have many beneficial applications, but it also raises potentially serious ethical concerns. In this article, we consider what attention the discipline demands from bioethicists. We argue that the most important issue for ethicists to examine is the risk that knowledge from synthetic biology will be misused, for example, in biological terrorism or warfare. To adequately address this concern, bioethics will need to broaden its scope, contemplating (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  28. The Rational Faculty of Desire.T. A. Pendlebury & Jeremy Fix - forthcoming - In Carla Bagnoli & Stefano Bacin (eds.), Reason, Agency and Ethics. Oxford University Press.
    This essay is about the relationship between the notions of practical reason, the will, and choice in Kant’s practical philosophy. Although Kant explicitly identifies practical reason and the will, many interpreters argue that he cannot really mean it on the grounds that unless they are distinct, irrational and, especially, immoral action is impossible. Other readers affirm his identification but distinguish the will from choice on the same basis. We argue that proper attention to Kant’s conception of practical reason as a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Consciousness “within” or “without”? Review of Modeling Consciousness Across The Disciplines.T. Järvilehto - 2001 - Journal of Consciousness Studies 8 (4):89-93.
    Review of Scott Jordan , ‘Modeling Consciousness Across The Disciplines'.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Metaphysical and Ethical Perspectives on Creating Animal-Human Chimeras.J. T. Eberl & R. A. Ballard - 2009 - Journal of Medicine and Philosophy 34 (5):470-486.
    This paper addresses several questions related to the nature, production, and use of animal-human (a-h) chimeras. At the heart of the issue is whether certain types of a-h chimeras should be brought into existence, and, if they are, how we should treat such creatures. In our current research environment, we recognize a dichotomy between research involving nonhuman animal subjects and research involving human subjects, and the classification of a research protocol into one of these categories will trigger different ethical standards (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  31.  42
    Ensuring Mutual Benefit in Human-AI Coexistence.T. Niedzialek - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  32. What Is the Well-Foundedness of Grounding?T. Scott Dixon - 2016 - Mind 125 (498):439-468.
    A number of philosophers think that grounding is, in some sense, well-founded. This thesis, however, is not always articulated precisely, nor is there a consensus in the literature as to how it should be characterized. In what follows, I consider several principles that one might have in mind when asserting that grounding is well-founded, and I argue that one of these principles, which I call ‘full foundations’, best captures the relevant claim. My argument is by the process of elimination. For (...)
    Download  
     
    Export citation  
     
    Bookmark   76 citations  
  33. Unification.T. Jones - 2005 - In Martin Curd & Stathis Psillos (eds.), The Routledge Companion to Philosophy of Science. New York: Routledge.
    Summary: Throughout the history of science, indeed throughout the history of knowledge, unification has been touted as a central aim of intellectual inquiry. We’ve always wanted to discover not only numerous bare facts about the universe, but to show how such facts are linked and interrelated. Large amounts of time and effort have been spent trying to show diverse arrays of things can be seen as different manifestations of some common underlying entities or properties. Thales is said to have originated (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  34. The Philosophical Significance of Tennenbaum’s Theorem.T. Button & P. Smith - 2012 - Philosophia Mathematica 20 (1):114-121.
    Tennenbaum's Theorem yields an elegant characterisation of the standard model of arithmetic. Several authors have recently claimed that this result has important philosophical consequences: in particular, it offers us a way of responding to model-theoretic worries about how we manage to grasp the standard model. We disagree. If there ever was such a problem about how we come to grasp the standard model, then Tennenbaum's Theorem does not help. We show this by examining a parallel argument, from a simpler model-theoretic (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  35. Retinae don't see.John T. Sanders - 2004 - Behavioral and Brain Sciences 27 (6):890-891.
    Sensation should be understood globally: some infant behaviors do not make sense on the model of separate senses; neonates of all species lack time to learn about the world by triangulating among different senses. Considerations of natural selection favor a global understanding; and the global interpretation is not as opposed to traditional work on sensation as might seem.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Responsible Innovation in Business: A critical reflection on deliberative engagement as a central governance mechanism.T. Brand & Vincent Blok - 2019 - Journal of Responsible Innovation 1 (6):4-24.
    One of the main contentions of the framework for Responsible Innovation (RI) is that social and ethical aspects have to be addressed by deliberative engagement with stakeholders and the wider public throughout the innovation process. The aim of this article is to reflect on the question to what extent is deliberative engagement suitable for conducting RI in business. We discuss several tensions that arise when this framework is applied in the business context. Further, we analyse the place of deliberative engagement (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  37. Anselmian Defense of Hell.T. Parker Haratine & Kevin A. Smith - 2024 - TheoLogica: An International Journal for Philosophy of Religion and Philosophical Theology 8 (1).
    This article constructively retrieves St. Anselm of Canterbury’s theory of retributive justice and provides a defense of what can be called the retributive model of hell. In the first part of this article, we develop the place of retributive punishment in Anselm’s thinking and discuss how and when retributive punishment is a good thing. In the second part, we apply Anselm’s thinking on retributive justice to the problem of hell and provide a defense of how hell, defined as a state (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Theodical Individualism.T. J. Mawson - 2011 - European Journal for Philosophy of Religion 3 (1):139 - 159.
    In this journal Steve Maitzen has recently advanced an argument for atheism premised on theodical individualism, the thesis that God would not permit people to suffer evils that were underserved, involuntary, and gratuitous for them. In this paper I advance reasons to think this premise mistaken.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Rethinking the Conceptual Space for Science in Society after the VFI.T. Y. Branch & Heather Douglas - 2023 - Philosophy of Science.
    Replacing the value-free ideal (VFI) for science requires attention to the broader understanding of how science in society should function. In public spaces, science needed to project the VFI in norms for science advising, science education, and science communication. This resulted in the independent science advisor model and a focus on science literacy for science education and communication. Attending to these broader implications of the VFI which structure science and society relationships is crucial if we are to properly replace the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. The Molecular Sememe: A Model for Literary Interpretation.T. Price Caldwell - 2000 - Meisei Review 15:155-162.
    In this paper I propose to describe, in brief, a semiotic paradigm which results from the redefinition of the linguistic sign as a molecular sememe. Borrowing a tactic from Wittgenstein, I wish to use the game of chess as an analogy for the sake of describing what a molecular sememe is. Then I hope to use it further to sketch several implications of this semiotic paradigm for literary criticism and critical theory.
    Download  
     
    Export citation  
     
    Bookmark  
  41. Plural Slot Theory.T. Scott Dixon - 2018 - In Karen Bennett & Dean W. Zimmerman (eds.), Oxford Studies in Metaphysics Volume 11. Oxford University Press. pp. 193-223.
    Kit Fine (2000) breaks with tradition, arguing that, pace Russell (e.g., 1903: 228), relations have neither directions nor converses. He considers two ways to conceive of these new "neutral" relations, positionalism and anti-positionalism, and argues that the latter should be preferred to the former. Cody Gilmore (2013) argues for a generalization of positionalism, slot theory, the view that a property or relation is n-adic if and only if there are exactly n slots in it, and (very roughly) that each slot (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  42. Why Trust Raoult? How Social Indicators Inform the Reputations of Experts.T. Y. Branch, Gloria Origgi & Tiffany Morisseau - 2022 - Social Epistemology 36 (3):299-316.
    The COVID-19 crisis has highlighted the considerable challenge of sourcing expertise and determining which experts to trust. Dissonant information fostered controversy in public discourse and encouraged an appeal to a wide range of social indicators of trustworthiness in order to decide whom to trust. We analyze public discourse on expertise by examining how social indicators inform the reputation of Dr. Didier Raoult, the French microbiologist who rose to international prominence as an early advocate for using hydroxychloroquine to treat COVID-19. To (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Why Can’t the Impassible God Suffer? Analytic Reflections on Divine Blessedness.R. T. Mullins - 2018 - TheoLogica: An International Journal for Philosophy of Religion and Philosophical Theology 2 (1):3-22.
    According to classical theism, impassibility is said to be systematically connected to divine attributes like timelessness, immutability, simplicity, aseity, and self-sufficiency. In some interesting way, these attributes are meant to explain why the impassible God cannot suffer. I shall argue that these attributes do not explain why the impassible God cannot suffer. In order to understand why the impassible God cannot suffer, one must examine the emotional life of the impassible God. I shall argue that the necessarily happy emotional life (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. A categorical model of the Elementary Process Theory incorporating Special Relativity.Marcoen J. T. F. Cabbolet - 2022 - In And now for something completely different: the Elementary Process Theory. Revised, updated and extended 2nd edition of the dissertation with almost the same title. Utrecht: Eburon Academic Publishers. pp. 399-452.
    The purpose of this paper is to show that the Elementary Process Theory (EPT) agrees with the knowledge of the physical world obtained from the successful predictions of Special Relativity (SR). For that matter, a recently developed method is applied: a categorical model of the EPT that incorporates SR is fully specified. Ultimate constituents of the universe of the EPT are modeled as point-particles, gamma-rays, or time-like strings, all represented by integrable hyperreal functions on Minkowski space. This proves that the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Apparent mental causation: Sources of the experience of will.Daniel M. Wegner & T. Wheatley - 1999 - American Psychologist 54:480-492.
    Download  
     
    Export citation  
     
    Bookmark   251 citations  
  46. Eliminativism and Reading One's Own Mind.T. Parent - manuscript
    Some contemporary philosophers suggest that we know just by introspection that folk psychological states exist. However, such an "armchair refutation" of eliminativism seems too easy. I first attack two strategems, inspired by Descartes, on how such a refutation might proceed. However, I concede that the Cartesian intuition that we have direct knowledge of representational states is very powerful. The rest of this paper then offers an error theory of how that intuition might really be mistaken. The idea is that introspection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. On Determining How Important It Is Whether or Not There Is a God.T. J. Mawson - 2012 - European Journal for Philosophy of Religion 4 (4):95--105.
    Can the issue of how important it is whether or not there is a God be decided prior to deciding whether or not there is a God? In this paper, I explore some difficulties that stand in the way of answering this question in the affirmative and some of the implications of these difficulties for that part of the Philosophy of Religion which concerns itself with assessing arguments for and against the existence of God, the implications for how its importance (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  48. Categorical phenomenalism about sexual orientation.T. R. Whitlow & N. G. Laskowski - 2022 - Philosophy and Phenomenological Research 106 (3):581-596.
    What is sexual orientation? The contemporary consensus among philosophers is that it is a disposition. Unsurprisingly, recent debates about the metaphysics of sexual orientation are almost entirely intramural. Behavioral dispositionalists argue that sexual orientation is a disposition to behave sexually. Desire dispositionalists argue that it is a disposition to desire sexually. We argue that sexual orientation is not best understood in terms of dispositions to behave or dispositions to desire before arguing that dispositions tout court fail to illuminate sexual orientation. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Enhanced Epistemic Trust and the Value-Free Ideal as a Social Indicator of Trust.T. Y. Branch - 2022 - Social Epistemology 36 (5):561-575.
    Publics trust experts for personal and pro-social reasons. Scientists are among the experts publics trust most, and so, epistemic trust is routinely afforded to them. The call for epistemic trust to be more socially situated in order to account for the impact of science on society and public welfare is at the forefront of enhanced epistemic trust. I argue that the value-free ideal for science challenges establishing enhanced epistemic trust by preventing the inclusion of non-epistemic values throughout the evaluation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. The Awe-some Argument for Pantheism.T. Ryan Byerly - 2019 - European Journal for Philosophy of Religion 11 (2):1-21.
    Many pantheists have claimed that their view of the divine is motivated by a kind of spiritual experience. In this paper, I articulate a novel argument, inspired by recent work on moral exemplarism, that gives voice to this kind of motivation for pantheism. The argument is based on two claims about the emotion of awe, each of which is defended primarily via critical engagement with empirical research on the emotion. I also illustrate how this pathway to pantheism offers pantheists distinctive (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 964