Results for 'M. Arul Selvan'

978 found
Order:
  1.  47
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel capacity of main (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  2. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  3. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   103 citations  
  4. CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark   107 citations  
  5. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   125 citations  
  6. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   186 citations  
  7. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  8. PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark   136 citations  
  9. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  10. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  11. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  12. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   103 citations  
  13. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  14.  94
    3D Convolutional Neural Networks for Accurate Reconstruction of Distorted Faces.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (4):560-570.
    The core objective of this project is to recognize and reconstruct distorted facial images, particularly in the context of accidents. This involves using deep learning techniques to analyze the features of a distorted face and regenerate it into a recognizable form. Deep learning models are wellsuited for this task due to their ability to learn complex patterns and representations from data the input data consists of distorted facial images, typically obtained from MRI scans of accident victims. These images may contain (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  15. Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Bridging Professional and Personal Lives: The Role of Telemedicine in Doctors' Work-Life Equilibrium.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-535.
    The rapid adoption of telemedicine has transformed healthcare delivery, especially during the COVID-19 pandemic. This digital shift has enabled medical professionals to offer consultations and manage patients remotely, ensuring continuity of care while reducing exposure risks. However, the integration of telemedicine has presented both opportunities and challenges for doctors, particularly in terms of their work-life balance. This paper explores the digital adaptation of doctors in public and private hospitals concerning telemedicine practices and its impact on their work-life harmony. The study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  96
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Artificial Intelligence in HR: Driving Agility and Data-Informed Decision-Making.Madhavan Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):506-515.
    In today’s rapidly evolving business landscape, organizations must continuously adapt to stay competitive. AI-driven human resource (HR) analytics has emerged as a strategic tool to enhance workforce agility and inform decision-making processes. By leveraging advanced algorithms, machine learning models, and predictive analytics, HR departments can transform vast data sets into actionable insights, driving talent management, employee engagement, and overall organizational efficiency. AI’s ability to analyze patterns, forecast trends, and offer data-driven recommendations empowers HR professionals to make proactive decisions in hiring, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  22.  90
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  97
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  89
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  26
    Detection of Covid-19 based on convolutional neural networks using pre-processed chest X-ray images (14th edition).and Ahmed Said Badawy Arul Raj A. M., Sugumar R., Padmkala S., Jayant Giri, Naim Ahmad - 2024 - Aip Advances 14 (3):1-11.
    The global catastrophe known as COVID-19 has shattered the world’s socioeconomic structure. Effective and affordable diagnosis techniques are crucial for better COVID-19 therapy and the eradication of bogus cases. Due to the daily upsurge in cases, hospitals only have a small supply of COVID-19 test kits. The study describes a deep Convolutional Neural Network (CNN) design for categorizing chest x-ray images in the diagnosis of COVID-19. The lack of a substantial, high-quality chest x-ray picture collection made efficient and exact CNN (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Collected Papers (on Neutrosophic Theory and Applications), Volume VIII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Are Algorithms Value-Free?Gabbrielle M. Johnson - 2023 - Journal Moral Philosophy 21 (1-2):1-35.
    As inductive decision-making procedures, the inferences made by machine learning programs are subject to underdetermination by evidence and bear inductive risk. One strategy for overcoming these challenges is guided by a presumption in philosophy of science that inductive inferences can and should be value-free. Applied to machine learning programs, the strategy assumes that the influence of values is restricted to data and decision outcomes, thereby omitting internal value-laden design choice points. In this paper, I apply arguments from feminist philosophy of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  29. What Emergence Can Possibly Mean.Sean M. Carroll & Achyuth Parola - manuscript
    We consider emergence from the perspective of dynamics: states of a system evolving with time. We focus on the role of a decomposition of wholes into parts, and attempt to characterize relationships between levels without reference to whether higher-level properties are “novel” or “unexpected.” We offer a classification of different varieties of emergence, with and without new ontological elements at higher levels. -/- Submitted to a volume on Real Patterns (Tyler Milhouse, ed.), to be published by MIT Press.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Ectogestation and the Problem of Abortion.Christopher M. Stratman - 2020 - Philosophy and Technology 34 (4):683-700.
    Ectogestation involves the gestation of a fetus in an ex utero environment. The possibility of this technology raises a significant question for the abortion debate: Does a woman’s right to end her pregnancy entail that she has a right to the death of the fetus when ectogestation is possible? Some have argued that it does not Mathison & Davis. Others claim that, while a woman alone does not possess an individual right to the death of the fetus, the genetic parents (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  31. Transforming Human Resource Management: The Impact of Artificial Intelligence on Recruitment and Beyond.Hazem A. S. Alrakhawi, Randa Elqassas, Mohammed M. Elsobeihi, Basel Habil, Basem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (8):1-5.
    Abstract: The integration of Artificial Intelligence (AI) into Human Resource Management (HRM) is fundamentally transforming how organizations approach recruitment, performance management, and employee engagement. This paper explores the multifaceted impact of AI on HR practices, highlighting its role in enhancing efficiency, reducing bias, and driving strategic decision-making. Through an in-depth analysis of AI-driven recruitment tools, performance management systems, and personalized employee engagement strategies, this study examines both the opportunities and challenges associated with AI in HRM. Ethical considerations, including data privacy, (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  32.  55
    Chapter 7 Cryptocurrency, Distributed Ledger Technology and Blockchain Tokens.S. M. Amadae - 2023 - In Sustainable Consumption: Political Economy of Sustainable Food. Aalto University. pp. 199-241.
    This chapter discusses cryptocurrency, distributed ledger technology and blockchain tokens within the context of technological innovation, the history of money and accounting practices, and their multiple functionalities beyond those of standard currencies. This discussion is motivated by the design of cryptocurrencies for specific community needs, and to reflect anti-rival, positive sum value.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Multidimensional Concepts and Disparate Scale Types.Brian Hedden & Jacob M. Nebel - 2024 - Philosophical Review 133 (3):265-308.
    Multidimensional concepts are everywhere, and they are important. Examples include moral value, welfare, scientific confirmation, democracy, and biodiversity. How, if at all, can we aggregate the underlying dimensions of a multidimensional concept F to yield verdicts about which things are Fer than which overall? Social choice theory can be used to model and investigate this aggregation problem. Here, we focus on a particularly thorny problem made salient by this social choice-theoretic framework: the underlying dimensions of a given concept might be (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34. Predicting Tumor Category Using Artificial Neural Networks.Ibrahim M. Nasser & Samy S. Abu-Naser - 2019 - International Journal of Academic Health and Medical Research (IJAHMR) 3 (2):1-7.
    In this paper an Artificial Neural Network (ANN) model, for predicting the category of a tumor was developed and tested. Taking patients’ tests, a number of information gained that influence the classification of the tumor. Such information as age, sex, histologic-type, degree-of-diffe, status of bone, bone-marrow, lung, pleura, peritoneum, liver, brain, skin, neck, supraclavicular, axillar, mediastinum, and abdominal. They were used as input variables for the ANN model. A model based on the Multilayer Perceptron Topology was established and trained using (...)
    Download  
     
    Export citation  
     
    Bookmark   66 citations  
  35. Advancements in AI for Medical Imaging: Transforming Diagnosis and Treatment.Zakaria K. D. Alkayyali, Ashraf M. H. Taha, Qasem M. M. Zarandah, Bassem S. Abunasser, Alaa M. Barhoom & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (8):8-15.
    Abstract: The integration of Artificial Intelligence (AI) into medical imaging represents a transformative shift in healthcare, offering significant improvements in diagnostic accuracy, efficiency, and patient outcomes. This paper explores the application of AI technologies in the analysis of medical images, focusing on techniques such as convolutional neural networks (CNNs) and deep learning models. We discuss how these technologies are applied to various imaging modalities, including X-rays, MRIs, and CT scans, to enhance disease detection, image segmentation, and diagnostic support. Additionally, the (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  36. Luck: An Introduction.Ian M. Church & Robert J. Hartman - 2019 - In Ian M. Church & Robert J. Hartman, The Routledge Handbook of the Philosophy and Psychology of Luck. New York: Routledge. pp. 1-10.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Extensive Measurement in Social Choice.Jacob M. Nebel - 2024 - Theoretical Economics 19 (4):1581-1618.
    Extensive measurement is the standard measurement-theoretic approach for constructing a ratio scale. It involves the comparison of objects that can be concatenated in an additively representable way. This paper studies the implications of extensively measurable welfare for social choice theory. We do this in two frameworks: an Arrovian framework with a fixed population and no interpersonal comparisons, and a generalized framework with variable populations and full interpersonal comparability. In each framework we use extensive measurement to introduce novel domain restrictions, independence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Calibration dilemmas in the ethics of distribution.Jacob M. Nebel & H. Orri Stefánsson - 2023 - Economics and Philosophy 39 (1):67-98.
    This paper presents a new kind of problem in the ethics of distribution. The problem takes the form of several “calibration dilemmas,” in which intuitively reasonable aversion to small-stakes inequalities requires leading theories of distribution to recommend intuitively unreasonable aversion to large-stakes inequalities. We first lay out a series of such dilemmas for prioritarian theories. We then consider a widely endorsed family of egalitarian views and show that they are subject to even more forceful calibration dilemmas than prioritarian theories. Finally, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. Afro-Latin Dance as Reconstructive Gestural Discourse: The Figuration Philosophy of Dance on Salsa.Joshua M. Hall - 2020 - Research in Dance Education 22:1-15.
    The Afro-Latin dance known as ‘salsa’ is a fusion of multiple dances from West Africa, Muslim Spain, enslaved communities in the Caribbean, and the United States. In part due to its global origins, salsa was pivotal in the development of the Figuration philosophy of dance, and for ‘dancing with,’ the theoretical method for social justice derived therefrom. In the present article, I apply the completed theory Figuration exclusively to salsa for the first time, after situating the latter in the dance (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Existing Ethical Tensions in Xenotransplantation.L. Syd M. Johnson - 2022 - Cambridge Quarterly of Healthcare Ethics 31 (3):355-367.
    The genetic modification of pigs as a source of transplantable organs is one of several possible solutions to the chronic organ shortage. This paper describes existing ethical tensions in xenotransplantation (XTx) that argue against pursuing it. Recommendations for lifelong infectious disease surveillance and notification of close contacts of recipients are in tension with the rights of human research subjects. Parental/guardian consent for pediatric xenograft recipients is in tension with a child’s right to an open future. Individual consent to transplant is (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  41. The Zygote Argument Is Still Invalid: So What?Kristin M. Mickelson - 2020 - Philosophia 49 (2):705-722.
    In this essay, I explain why Gabriel De Marco's attempts to "solve" the invalidity problem for the Zygote Argument were non-starters. The first solution he describes was originally developed by Mickelson (2012/2015) and already adopted by Mele (2013), but De Marco presents it as his own (using an idiosyncratic labelling system). De Marco's second response fails because it is grounded in a patently invalid argument. Most importantly, De Marco (like Mele before him) fails to even mention that Mickelson wasn't interested (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Advancements in Early Detection of Breast Cancer: Innovations and Future Directions.Izzeddin A. Alshawwa, Hosni Qasim El-Mashharawi, Fatima M. Salman, Mohammed Naji Abu Al-Qumboz, Bassem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (8):15-24.
    Abstract: Early detection of breast cancer plays a pivotal role in improving patient prognosis and reducing mortality rates. Recent technological advancements have significantly enhanced the accuracy and effectiveness of breast cancer screening methods. This paper explores the latest innovations in early detection, including the evolution of digital mammography, the impact of 3D mammography (tomosynthesis), and the use of advanced imaging techniques such as molecular imaging and MRI. Furthermore, the integration of artificial intelligence (AI) in diagnostic tools is discussed, highlighting how (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  43. AI in Leadership: Transforming Decision-Making and Strategic Vision.Mohran H. Al-Bayed, Mohanad Hilles, Ibrahim Haddad, Marah M. Al-Masawabe, Mohammed Ibrahim Alhabbash, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Pedagogical Research (IJAPR) 8 (9):1-7.
    Abstract: The integration of Artificial Intelligence (AI) into leadership practices is rapidly transforming organizational dynamics and decision-making processes. This paper explores the ways in which AI enhances leadership effectiveness by providing data- driven insights, optimizing decision-making, and automating routine tasks. Additionally, it examines the challenges leaders face when adopting AI, including ethical considerations, potential biases in AI systems, and the need for upskilling. By analyzing current applications of AI in leadership and discussing future trends, this study aims to offer a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  44. Fintech: Creative Innovation for Entrepreneurs.Youssef M. Abu Amuna, Samy S. Abu-Naser, Mazen J. Al Shobaki & Yasser A. Abu Mostafa - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (3):8-15.
    The article studies the impact of Fintech on entrepreneurship in Arabic region by using Crowdfunding platforms as the field of study. The article focuses on Arabic Crowdfunding platforms. The population of (12) platforms consist of: individuals, entrepreneurs, investors, employees at Crowdfunding platforms. Descriptive and quantitative approach used in this article, and a questionnaire used as a tool to collect primary data. The results indicate an impact for Fintech on entrepreneurship in general and obvious obstacles to use it widely in Arabic (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  45. Let's Not Do Responsibility Skepticism.Ken M. Levy - 2023 - Journal of Applied Philosophy 40 (3):458-73.
    I argue for three conclusions. First, responsibility skeptics are committed to the position that the criminal justice system should adopt a universal nonresponsibility excuse. Second, a universal nonresponsibility excuse would diminish some of our most deeply held values, further dehumanize criminals, exacerbate mass incarceration, and cause an even greater number of innocent people (nonwrongdoers) to be punished. Third, while Saul Smilansky's ‘illusionist’ response to responsibility skeptics – that even if responsibility skepticism is correct, society should maintain a responsibility‐realist/retributivist criminal justice (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Presentation. Reason, reasoning and action: puzzling out the mark of Anscombe.Sofia Miguens & M. Dolores García-Arnaldos - 2020 - Enrahonar: Quaderns de Filosofía 64 (I):7-17.
    Download  
     
    Export citation  
     
    Bookmark  
  47. Developing an Expert System to Diagnose Tomato Diseases.Mohanad H. Al-Qadi, Mohammed F. El-Habibi, Mosa M. M. Megdad, Mohammed J. A. AlQatrawi, Raed Z. Sababa & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (5):34-40.
    There is no doubt that tomato diseases are one of the important reasons that destroy the tomato plant and its crops. This leads to clear damage to these plants and they become inedible. Discovering these diseases after a good step for proper and correct treatment. Determining the treatment with high accuracy depends on the method used in the diagnosis. Correctly, expert systems can greatly help to avoid damage to these plants. The expert system diagnoses tomato disease correctly to facilitate farmers (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  48. Parkinson’s Disease Prediction Using Artificial Neural Network.Ramzi M. Sadek, Salah A. Mohammed, Abdul Rahman K. Abunbehan, Abdul Karim H. Abdul Ghattas, Majed R. Badawi, Mohamed N. Mortaja, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2019 - International Journal of Academic Health and Medical Research (IJAHMR) 3 (1):1-8.
    Parkinson's Disease (PD) is a long-term degenerative disorder of the central nervous system that mainly affects the motor system. The symptoms generally come on slowly over time. Early in the disease, the most obvious are shaking, rigidity, slowness of movement, and difficulty with walking. Doctors do not know what causes it and finds difficulty in early diagnosing the presence of Parkinson’s disease. An artificial neural network system with back propagation algorithm is presented in this paper for helping doctors in identifying (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  49. Replicability or reproducibility? On the replication crisis in computational neuroscience and sharing only relevant detail.Marcin Miłkowski, Witold M. Hensel & Mateusz Hohol - 2018 - Journal of Computational Neuroscience 3 (45):163-172.
    Replicability and reproducibility of computational models has been somewhat understudied by “the replication movement.” In this paper, we draw on methodological studies into the replicability of psychological experiments and on the mechanistic account of explanation to analyze the functions of model replications and model reproductions in computational neuroscience. We contend that model replicability, or independent researchers' ability to obtain the same output using original code and data, and model reproducibility, or independent researchers' ability to recreate a model without original code, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  50. (1 other version)Music, neuroscience, and the psychology of wellbeing: A précis.Adam M. Croom - 2012 - Frontiers in Theoretical and Philosophical Psychology 2 (393):393.
    In Flourish, the positive psychologist Martin Seligman (2011) identifies five commonly recognized factors that are characteristic of human flourishing or wellbeing: (1) “positive emotion,” (2) “relationships,” (3) “engagement,” (4) “achievement,” and (5) “meaning” (p. 24). Although there is no settled set of necessary and sufficient conditions neatly circumscribing the bounds of human flourishing (Seligman, 2011), we would mostly likely consider a person that possessed high levels of these five factors as paradigmatic or prototypical of human flourishing. Accordingly, if we wanted (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 978