Results for 'M. Arul Selvan'

958 found
Order:
  1. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  85
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  72
    IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  4.  59
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  59
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  6.  49
    Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  50
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  46
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  40
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  38
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  11.  36
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  83
    (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  32
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  35
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  43
    (1 other version)A PBL REPORT FOR CONTAINMENT ZONE ALERTING APPLICATION.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  43
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  45
    AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  43
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  33
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  37
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Collected Papers (on Neutrosophic Theory and Applications), Volume VIII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Apparent mental causation: Sources of the experience of will.Daniel M. Wegner & T. Wheatley - 1999 - American Psychologist 54:480-492.
    Download  
     
    Export citation  
     
    Bookmark   251 citations  
  23. Why Is There Something, Rather Than Nothing?Sean M. Carroll - 2022 - In Eleanor Knox & Alastair Wilson (eds.), The Routledge Companion to Philosophy of Physics. London, UK: Routledge.
    It seems natural to ask why the universe exists at all. Modern physics suggests that the universe can exist all by itself as a self-contained system, without anything external to create or sustain it. But there might not be an absolute answer to why it exists. I argue that any attempt to account for the existence of something rather than nothing must ultimately bottom out in a set of brute facts; the universe simply is, without ultimate cause or explanation.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. I Ought, Therefore I Can.Peter B. M. Vranas - 2007 - Philosophical Studies 136 (2):167-216.
    I defend the following version of the ought-implies-can principle: (OIC) by virtue of conceptual necessity, an agent at a given time has an (objective, pro tanto) obligation to do only what the agent at that time has the ability and opportunity to do. In short, obligations correspond to ability plus opportunity. My argument has three premises: (1) obligations correspond to reasons for action; (2) reasons for action correspond to potential actions; (3) potential actions correspond to ability plus opportunity. In the (...)
    Download  
     
    Export citation  
     
    Bookmark   136 citations  
  25. Identity in the loose and popular sense.Donald L. M. Baxter - 1988 - Mind 97 (388):575-582.
    This essay interprets Butler’s distinction between identity in the loose and popular sense and in the strict and philosophical sense. Suppose there are different standards for counting the same things. Then what are two distinct things counting strictly may be one and the same thing counting loosely. Within a given standard identity is one-one. But across standards it is many-one. An alternative interpretation using the parts-whole relation fails, because that relation should be understood as many-one identity. Another alternative making identity (...)
    Download  
     
    Export citation  
     
    Bookmark   141 citations  
  26. Replicability or reproducibility? On the replication crisis in computational neuroscience and sharing only relevant detail.Marcin Miłkowski, Witold M. Hensel & Mateusz Hohol - 2018 - Journal of Computational Neuroscience 3 (45):163-172.
    Replicability and reproducibility of computational models has been somewhat understudied by “the replication movement.” In this paper, we draw on methodological studies into the replicability of psychological experiments and on the mechanistic account of explanation to analyze the functions of model replications and model reproductions in computational neuroscience. We contend that model replicability, or independent researchers' ability to obtain the same output using original code and data, and model reproducibility, or independent researchers' ability to recreate a model without original code, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  27. Measuring the Dominant Pattern of Leadership and Its Relation to the Functional Performance of Administrative Staff in Palestinian Universities.Ahmed M. A. FarajAllah, Suliman A. El Talla, Samy S. Abu-Naser & Mazen J. Al Shobaki - 2019 - International Journal of Information Technology and Electrical Engineering 7 (5):13-34.
    The study aimed at measuring the dominant pattern of leadership and its relation to the performance of the administrative staff in the Palestinian universities. The study community consists of all the administrative staff from Al-Azhar University and the Islamic University, and through the census of the study society it was found to consist of (655) administrative staff. In order to achieve the objectives of the study, the researchers used the method of random sample in the study, and the study was (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  28. Instantiation as partial identity.Donald L. M. Baxter - 2001 - Australasian Journal of Philosophy 79 (4):449 – 464.
    Construing the instantiation of a universal by a particular in terms of my theory of aspects resolves the basic mystery of this "non-relational tie", and gives theoretical unity to the four characteristics of instantiation discerned by Armstrong. Taking aspects as distinct in a way akin to Scotus's formal distinction, I suggest that instantiation is the sharing of an aspect by a universal and a particular--a kind of partial identity. This approach allows me to address Plato's multiple location and One over (...)
    Download  
     
    Export citation  
     
    Bookmark   64 citations  
  29. The indeterminacy paradox: Character evaluations and human psychology.Peter B. M. Vranas - 2005 - Noûs 39 (1):1–42.
    You may not know me well enough to evaluate me in terms of my moral character, but I take it you believe I can be evaluated: it sounds strange to say that I am indeterminate, neither good nor bad nor intermediate. Yet I argue that the claim that most people are indeterminate is the conclusion of a sound argument—the indeterminacy paradox—with two premises: (1) most people are fragmented (they would behave deplorably in many and admirably in many other situations); (2) (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  30. New foundations for imperative logic I: Logical connectives, consistency, and quantifiers.Peter B. M. Vranas - 2008 - Noûs 42 (4):529-572.
    Imperatives cannot be true or false, so they are shunned by logicians. And yet imperatives can be combined by logical connectives: "kiss me and hug me" is the conjunction of "kiss me" with "hug me". This example may suggest that declarative and imperative logic are isomorphic: just as the conjunction of two declaratives is true exactly if both conjuncts are true, the conjunction of two imperatives is satisfied exactly if both conjuncts are satisfied—what more is there to say? Much more, (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  31. Epsilon-ergodicity and the success of equilibrium statistical mechanics.Peter B. M. Vranas - 1998 - Philosophy of Science 65 (4):688-708.
    Why does classical equilibrium statistical mechanics work? Malament and Zabell (1980) noticed that, for ergodic dynamical systems, the unique absolutely continuous invariant probability measure is the microcanonical. Earman and Rédei (1996) replied that systems of interest are very probably not ergodic, so that absolutely continuous invariant probability measures very distant from the microcanonical exist. In response I define the generalized properties of epsilon-ergodicity and epsilon-continuity, I review computational evidence indicating that systems of interest are epsilon-ergodic, I adapt Malament and Zabell’s (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  32. Two ways to smoke a cigarette.R. M. Sainsbury - 2001 - Ratio 14 (4):386–406.
    In the early part of the paper, I attempt to explain a dispute between two parties who endorse the compositionality of language but disagree about its implications: Paul Horwich, and Jerry Fodor and Ernest Lepore. In the remainder of the paper, I challenge the thesis on which they are agreed, that compositionality can be taken for granted. I suggest that it is not clear what compositionality involves nor whether it obtains. I consider some kinds of apparent counterexamples, and compositionalist responses (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  33. The Gettier Problem.Ian M. Church - 2019 - In Ian M. Church & Robert J. Hartman (eds.), The Routledge Handbook of the Philosophy and Psychology of Luck. New York: Routledge. pp. 261-271.
    In this chapter, we will explore the luck at issue in Gettier-styled counterexamples and the subsequent problem it poses to any viable reductive analysis of knowledge. In the 1st section, we will consider the specific species of luck that is at issue in Gettier counterexamples, then, in the next section, I will briefly sketch a diagnosis of the Gettier Problem and try to explain why the relevant species of luck has proven to be extremely difficult to avoid. And finally, I (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Hempel's Raven paradox: A lacuna in the standard bayesian solution.Peter B. M. Vranas - 2004 - British Journal for the Philosophy of Science 55 (3):545-560.
    According to Hempel's paradox, evidence (E) that an object is a nonblack nonraven confirms the hypothesis (H) that every raven is black. According to the standard Bayesian solution, E does confirm H but only to a minute degree. This solution relies on the almost never explicitly defended assumption that the probability of H should not be affected by evidence that an object is nonblack. I argue that this assumption is implausible, and I propose a way out for Bayesians. Introduction Hempel's (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  35. Impartiality, compassion, and modal imagination.Adrian M. S. Piper - 1991 - Ethics 101 (4):726-757.
    We need modal imagination in order to extend our conception of reality - and, in particular, of human beings - beyond our immediate experience in the indexical present; and we need to do this in order to preserve the significance of human interaction. To make this leap of imagination successfully is to achieve not only insight but also an impartial perspective on our own and others' inner states. This perspective is a necessary condition of experiencing compassion for others. This is (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  36. Democracy without preference.David M. Estlund - 1990 - Philosophical Review 99 (3):397-423.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  37. Who's afraid of undermining?Peter B. M. Vranas - 2002 - Erkenntnis 57 (2):151-174.
    The Principal Principle (PP) says that, for any proposition A, given any admissible evidence and the proposition that the chance of A is x%, one's conditional credence in A should be x%. Humean Supervenience (HS) claims that, among possible worlds like ours, no two differ without differing in the spacetime-point-by-spacetime-point arrangement of local properties. David Lewis (1986b, 1994a) has argued that PP contradicts HS, and the validity of his argument has been endorsed by Bigelow et al. (1993), Thau (1994), Hall (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  38. ‘Wholly Present’ Defined.Thomas M. Crisp & Donald P. Smith - 2005 - Philosophy and Phenomenological Research 71 (2):318–344.
    Three-dimensionalists , sometimes referred to as endurantists, think that objects persist through time by being “wholly present” at every time they exist. But what is it for something to be wholly present at a time? It is surprisingly difficult to say. The threedimensionalist is free, of course, to take ‘is wholly present at’ as one of her theory’s primitives, but this is problematic for at least one reason: some philosophers claim not to understand her primitive. Clearly the three-dimensionalist would be (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  39. Moral theory and moral alienation.Adrian M. S. Piper - 1987 - Journal of Philosophy 84 (2):102-118.
    Most moral theories share certain features in common with other theories. They consist of a set of propositions that are universal, general, and hence impartial. The propositions that constitute a typical moral theory are (1) universal, in that they apply to all subjects designated as within their scope. They are (2) general, in that they include no proper names or definite descriptions. They are therefore (3) impartial, in that they accord no special privilege to any particular agent's situation which cannot (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  40. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  41. Socializing naturalized philosophy of science.Stephen M. Downes - 1993 - Philosophy of Science 60 (3):452-468.
    I propose an approach to naturalized philosophy of science that takes the social nature of scientific practice seriously. I criticize several prominent naturalistic approaches for adopting "cognitive individualism", which limits the study of science to an examination of the internal psychological mechanisms of scientists. I argue that this limits the explanatory capacity of these approaches. I then propose a three-level model of the social nature of scientific practice, and use the model to defend the claim that scientific knowledge is socially (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  42. (1 other version)Have your cake and eat it too: The old principal principle reconciled with the new.Peter B. M. Vranas - 2004 - Philosophy and Phenomenological Research 69 (2):368–382.
    David Lewis (1980) proposed the Principal Principle (PP) and a “reformulation” which later on he called ‘OP’ (Old Principle). Reacting to his belief that these principles run into trouble, Lewis (1994) concluded that they should be replaced with the New Principle (NP). This conclusion left Lewis uneasy, because he thought that an inverse form of NP is “quite messy”, whereas an inverse form of OP, namely the simple and intuitive PP, is “the key to our concept of chance”. I argue (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  43. Experimental Philosophy and the Problem of Evil.Ian M. Church, Blake McAllister & James Spiegel - forthcoming - Religious Studies.
    The problem of evil is an ideal topic for experimental philosophy. Suffering--which is at the heart of most prominent formulations of the problem of evil--is a universal human experience and has been the topic of careful reflection for millennia. However, interpretations of suffering and how it bears on the existence of God are tremendously diverse and nuanced. We might immediately find ourselves wondering why (and how!) something so universal might be understood in so many different ways. Why does suffering push (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. (1 other version)A paradox of promising.Holly M. Smith - 1997 - Philosophical Review 106 (2):153-196.
    For centuries it has been a mainstay of European and American moral thought that keeping promises—and the allied activity of upholding contracts—is one of the most important requirements of morality. On some historically powerful views the obligation to uphold promises or contracts not only regulates private relationships, but also provides the moral foundation for our duty to support and obey legitimate governments. Some theorists believe that the concept of keeping promises has gradually moved to center stage in European moral thought. (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  45. Resolving the Gettier Problem in the Smith Case: The Donnellan Linguistic Approach.Joseph Martin M. Jose & Mabaquiao Jr - 2018 - Kritike 12 (2):108-125.
    In this paper, we contend that the “Smith case” in Gettier’s attempt to refute the justified true belief (JTB) account of knowledge does not work. This is because the said case fails to satisfy the truth condition, and thus is not a case of JTB at all. We demonstrate this claim using the framework of Donnellan’s distinction between the referential and attributive uses of definite descriptions. Accordingly, the truth value of Smith’s proposition “The man who will get the job has (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Stories and the development of virtue.Adam M. Willows - 2017 - Ethics and Education 12 (3):337-350.
    From folk tales to movies, stories possess features which naturally suit them to contribute to the growth of virtue. In this article I show that the fictional exemplars help the learner to grasp the moral importance of internal states and resolves a tension between existing kinds of exemplars discussed by virtue ethicists. Stories also increase the information conveyed by virtue terms and aid the growth of prudence. Stories can provide virtuous exemplars, inform learners as to the nature of the virtues (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. Encountering Finitude: On the Hermeneutic Radicalization of Experience.Jussi M. Backman - 2018 - In Antonio Cimino & Cees Leijenhorst (eds.), Phenomenology and Experience: New Perspectives. Boston: Brill. pp. 46-62.
    The chapter approaches the hermeneutic concept of experience introduced by Hans-Georg Gadamer in Truth and Method (1960) from the perspective of the conceptual history of experience in the Western philosophical tradition. Through an overview of the concept and the epistemological function of experience (empeiria, experientia, Erfahrung) in Aristotle, Francis Bacon, and Hegel, it is shown that the tradition has considered experience first and foremost in methodological terms, that is, as a pathway towards a form of scientific knowledge that is itself (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Special Relativity as a Step in the Development of the Quantum Programme: Revolution in a Revolution.R. M. Nugayev - 1986 - Centaurus 29 (2):100-109.
    To make out in what way Einstein’s 1905 ‘annus mirabilis’ writings hang together one has to hang on Einstein’s strive for unity evinced in his stubborn attempts to coordinate with one another the basic research traditions of classical physics. Light quanta hypothesis and special theory of relativity turn out to be mere milestones of maxwellian electrodynamics and statistical thermodynamics reconciliation programme. The conception of luminiferous ether was an insurmountable stumbling block for Einstein’s statistical thermodynamics programme in which the leading role (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. State-Sponsored Injustice: The Case of Eugenic Sterilization.Jennifer M. Page - 2019 - Social Theory and Practice 45 (1):75-101.
    In analytic political philosophy, it is common to view state-sponsored injustice as the work of a corporate agent. But as I argue, structural injustice theory provides grounds for reassessing the agential approach, producing new insights into state-sponsored injustice. Using the case of eugenic sterilization in the United States, this article proposes a structurally-sensitive conception of state-sponsored injustice with six components: authorization, protection, systemization, execution, enablement, and norm- and belief-influence. Iris Marion Young’s models of responsibility for agential and structural injustice, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Reinterpreting Ryle: A nonbehaviorist analysis.Shelley M. Park - 1994 - Journal of the History of Philosophy 32 (2):265-90.
    This paper argues that the behaviorist label yields a caricature of Ryle's position in The Concept of Mind that cannot be adequately fleshed out by reference to the larger corpus of Rylean texts. On the interpretation of Ryle that I offer here, he is best characterized as an "ontological agnostic." Ryle's aim, I believe, is to develop a nondenotational theory of meaning for mental-conduct terms--a theory of meaning which does not presuppose any metaphysical or ontological theory and, hence, does not (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
1 — 50 / 958