Results for 'M. Arul Selvan'

944 found
Order:
  1.  48
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  41
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  3.  41
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  39
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  7. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  86
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  81
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  10.  75
    Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  60
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  44
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  43
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  50
    (1 other version)A PBL REPORT FOR CONTAINMENT ZONE ALERTING APPLICATION.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  19
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  52
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  47
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  34
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  50
    AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  42
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Collected Papers (on Neutrosophic Theory and Applications), Volume VIII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Affirmative Action, Paternalism, and Respect.Andreas Bengtson & Viki Møller Lyngby Pedersen - forthcoming - British Journal of Political Science.
    This article investigates the hitherto under-examined relations between affirmative action, paternalism and respect. We provide three main arguments. First, we argue that affirmative action initiatives are typically paternalistic and thus disrespectful towards those intended beneficiaries who oppose the initiatives in question. Second, we argue that not introducing affirmative action can also be disrespectful towards these potential beneficiaries because such inaction involves a failure to adequately recognize their moral worth. Third, we argue that the paternalistic disrespect involved in affirmative action is (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. From tech to tact: emotion dysregulation in online communication during the COVID-19 pandemic.Mark M. James - 2023 - Phenomenology and the Cognitive Sciences (5):1-32.
    Recent theorizing argues that online communication technologies provide powerful, although precarious, means of emotional regulation. We develop this understanding further. Drawing on subjective reports collected during periods of imposed social restrictions under COVID-19, we focus on how this precarity is a source of emo-tional dysregulation. We make our case by organizing responses into five distinct but intersecting dimensions wherein the precarity of this regulation is most relevant: infrastructure, functional use, mindful design (individual and social), and digital tact. Analyzing these reports, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Understanding Critical Variables for Customer Relationship Management in Higher Education Institution from Employees Perspective.Youssef M. Abu Amuna, Mazen J. Al Shobaki, Samy S. Abu Naser & Jehad J. Badwan - 2017 - International Journal of Information Technology and Electrical Engineering 6 (1):10-16.
    The aim of this paper is to evaluate the critical success factors and investigate the benefits that might be gained once implementing Electronic Customer Relationship Management at HEI from employee perspective. The study conducted at Al Quds Open University in Palestine and data collected from (300) employee through a questionnaire which consist of four variables. A number of statistical tools were intended for hypotheses testing and data analysis, including Spearman correlation coefficient for Validity, reliability correlation using Cronbach’s alpha, and Frequency (...)
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  26. The Evil-God Challenge: Extended and Defended.John M. Collins - 2019 - Religious Studies 55 (1):85-109.
    Stephen Law developed a challenge to theism, known as the evil-god challenge (Law (2010) ). The evil-god challenge to theism is to explain why the theist’s responses to the problem of evil are any better than the diabolist’s – who believes in a supremely evil god – rejoinders to the problem of good, when all the theist’s ploys (theodicy, sceptical theism, etc.) can be parodied by the diabolist. In the first part of this article, I extend the evil-god challenge by (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. Hopes, Fears, and Other Grammatical Scarecrows.Jacob M. Nebel - 2019 - Philosophical Review 128 (1):63-105.
    The standard view of "believes" and other propositional attitude verbs is that such verbs express relations between agents and propositions. A sentence of the form “S believes that p” is true just in case S stands in the belief-relation to the proposition that p; this proposition is the referent of the complement clause "that p." On this view, we would expect the clausal complements of propositional attitude verbs to be freely intersubstitutable with their corresponding proposition descriptions—e.g., "the proposition that p"—as (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  28. Normative Reasons as Reasons Why We Ought.Jacob M. Nebel - 2019 - Mind 128 (510):459-484.
    I defend the view that a reason for someone to do something is just a reason why she ought to do it. This simple view has been thought incompatible with the existence of reasons to do things that we may refrain from doing or even ought not to do. For it is widely assumed that there are reasons why we ought to do something only if we ought to do it. I present several counterexamples to this principle and reject some (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  29. Extensive Measurement in Social Choice.Jacob M. Nebel - forthcoming - Theoretical Economics.
    Extensive measurement is the standard measurement-theoretic approach for constructing a ratio scale. It involves the comparison of objects that can be concatenated in an additively representable way. This paper studies the implications of extensively measurable welfare for social choice theory. We do this in two frameworks: an Arrovian framework with a fixed population and no interpersonal comparisons, and a generalized framework with variable populations and full interpersonal comparability. In each framework we use extensive measurement to introduce novel domain restrictions, independence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The physiological and morphological benefits of shadowboxing.Adam M. Croom - 2023 - International Journal of Physical Education, Fitness and Sports 12 (2):8-29.
    Is shadowboxing an effective form of functional exercise? What physiological and morphological changes result from an exercise program based exclusively on shadowboxing for 3 weeks? To date, no empirical research has focused specifically on addressing these questions. Since mixed martial arts (MMA) is the fastest growing sport in the world, and since boxing and kickboxing fitness classes are among the most popular in gyms and fitness clubs worldwide, the lack of research on shadowboxing and martial arts-based fitness programs in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Self‐Differing, Aspects, and Leibniz's Law.Donald L. M. Baxter - 2018 - Noûs 52:900-920.
    I argue that an individual has aspects numerically identical with it and each other that nonetheless qualitatively differ from it and each other. This discernibility of identicals does not violate Leibniz's Law, however, which concerns only individuals and is silent about their aspects. They are not in its domain of quantification. To argue that there are aspects I will appeal to the internal conflicts of conscious beings. I do not mean to imply that aspects are confined to such cases, but (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  32. What Does it Mean to Say “The Criminal Justice System is Racist”?Amelia M. Wirts - 2023 - American Philosophical Quarterly 60 (4):341-354.
    This paper considers three possible ways of understanding the claim that the American criminal justice system is racist: individualist, “patterns”-based, and ideology-based theories of institutional racism. It rejects an individualist explanation of institutional racism because such an explanation fails to explain the widespread prevalence of anti-black racism in this system or indeed in the United States. It considers a “patterns” account of institutional racism, where consistent patterns of disparate racial effect mimic the structure of intentional projects of racial subjugation like (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Strange Nature of Quantum Entanglement: Can Observers of Entangled Photons Become Entangled With Each Other?Steven M. Rosen - 2023 - Journal of Mind and Behavior 44 (3 and 4):157-170.
    This paper seeks to extend my recent work on quantum perception (Rosen, 2021) to the phenomenon of quantum entanglement. In the first section, I summarize the earlier work, noting how the conventional approach to observing photons is rooted in an objectivist philosophy that serves as an obstacle to probing the underlying quantum reality. In the summary provided, I bring out the intimate relationship between observer and observed in the quantum world, and the need for a new, proprioceptive mode of observation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Schiller’s Dancing Vanguard: From Grace and Dignity to Utopian Freedom.Joshua M. Hall - 2023 - Idealistic Studies 53 (1):1-21.
    Against caricatures of the poet-philosopher Friedrich Schiller as an unoriginal popularizer of Kant, or a forerunner of totalitarianism, Frederick Beiser reinterprets him as an innovative, classical republican, broadening his analysis to include Schiller’s poetry, plays, and essays not widely available in English translation, such as the remarkable essay, “On Grace and Dignity.” In that spirit, the present article argues that the latter text, misperceived by Anglophone critics as self-contradictory, is better understood as centering on gender and dance. In brief, grace (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. On Three Arguments Against Metaphysical Libertarianism.Ken M. Levy - 2023 - Review of Metaphysics 76 (4):725-748.
    I argue that the three strongest arguments against metaphysical libertarianism—the randomness objection, the constitutive luck objection, and the physicalist objection—are actually unsuccessful and therefore that metaphysical libertarianism is more plausible than the common philosophical wisdom allows. My more positive thesis, what I will refer to as “Agent Exceptionalism,” is that, when making decisions and performing actions, human beings can indeed satisfy the four conditions of metaphysical libertarianism: the control condition, the rationality condition, the ultimacy condition, and the physicalism condition.
    Download  
     
    Export citation  
     
    Bookmark  
  36. What Is a Photographic Register?Dawn M. Wilson - 2023 - Journal of Aesthetics and Art Criticism 81 (3):408-413.
    This Discussion Piece is a response to Mark Windsor's Discussion Piece (2023) 'Photographic Registers are Latent Images', which is a response to my article, (2021) 'Invisible Images and Indeterminacy: Why we need a Multi-stage Account of Photography' JAAC 79(2) 161-174.. -/- I argue that a photosensitive surface does not produce invisible pictorial features when it is exposed to light, and conclude, contra Windsor, that a photographic register is not a latent image. I argue that Windsor does not succeed in defending (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Reality of Spreading the Culture of Entrepreneurship and Proposals for Activating It (An Applied Study on the University of Al-Azhar in Gaza).Wael M. Thabet, Yousef Shafeeq Abusultan, Riyad Awad Diab, Adnan Atiah Alajrami & Samy S. Abu-Naser - 2023 - International Journal of Academic Management Science Research (IJAMSR) 7 (6):43-63.
    The study aimed to investigate the reality of spreading the culture of entrepreneurship at Al-Azhar University from the point of view of students of the Faculty of Engineering and Information Technology and diagnose the most important obstacles that limit its activation. The researchers used the descriptive approach (survey) to achieve the objectives of the study, and relied on the questionnaire as a tool for applied study. The study concluded that: The reality of spreading the culture of entrepreneurship at Al-Azhar University (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. The concepts and origins of cell mortality.Pierre M. Durand & Grant Ramsey - 2023 - History and Philosophy of the Life Sciences 45 (23):1-23.
    Organismal death is foundational to the evolution of life, and many biological concepts such as natural selection and life history strategy are so fashioned only because individuals are mortal. Organisms, irrespective of their organization, are composed of basic functional units—cells—and it is our understanding of cell death that lies at the heart of most general explanatory frameworks for organismal mortality. Cell death can be exogenous, arising from transmissible diseases, predation, or other misfortunes, but there are also endogenous forms of death (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. On Robust Discursive Equality.Thomas M. Besch - 2019 - Dialogue 58 (3):1-26.
    This paper explores the idea of robust discursive equality on which respect-based conceptions of justificatory reciprocity often draw. I distinguish between formal and substantive discursive equality and argue that if justificatory reciprocity requires that people be accorded formally equal discursive standing, robust discursive equality should not be construed as requiring standing that is equal substantively, or in terms of its discursive purchase. Still, robust discursive equality is purchase sensitive: it does not obtain when discursive standing is impermissibly unequal in purchase. (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  40. A Metaphysical Demonstration of the Existence of God.Steven M. Duncan - manuscript
    This is an earlier version of the argument presented as the appendix to the author's final book, Peri Physeos.
    Download  
     
    Export citation  
     
    Bookmark  
  41. The Perfect Politician.Theodore M. Lechterman - 2024 - In David Edmonds (ed.), AI Morality. Oxford: Oxford University Press USA.
    Ideas for integrating AI into politics are now emerging and advancing at accelerating pace. This chapter highlights a few different varieties and show how they reflect different assumptions about the value of democracy. We cannot make informed decisions about which, if any, proposals to pursue without further reflection on what makes democracy valuable and how current conditions fail to fully realize it. Recent advances in political philosophy provide some guidance but leave important questions open. If AI advances to a state (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Mango Pests Identification Expert System.Jehad M. Altayeb, Samy S. Abu-Naser, Shahd J. Albadrasawi & Mohammed M. Almzainy - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (6):19-26.
    Mango is an economically significant fruit crop cultivated in various tropical and subtropical regions around the world. However, the productivity and quality of mangoes can be severely impacted by a range of pests. This research paper introduces an innovative approach to identify mango pests using an expert system. The expert system integrates knowledge from entomology and plants to provide accurate identification of common mango pests. The paper outlines the development and implementation of the expert system using Clips shell, which utilizes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Abortion Bans and Cruelty.F. M. Kamm - forthcoming - Journal of Practical Ethics.
    Abortion bans have been characterized as cruel especially in not allowing exceptions for rape or incest. The article first examines one approach to morally justifying bans based on the Doctrine of Double Effect (DDE) which distinguishes morally between killing or letting die intending death versus doing so only foreseeing death. It then presents some criticisms of the implications of the DDE but also argues that what the doctrine permits helps provide a ground for the permissibility of abortions even if the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Claims of Animals and the Needs of Strangers: Two Cases of Imperfect Right.Christine M. Korsgaard - 2018 - Journal of Practical Ethics 6 (1):19-51.
    This paper argues for a conception of the natural rights of non-human animals grounded in Kant’s explanation of the foundation of human rights. The rights in question are rights that are in the first instance held against humanity collectively speaking—against our species conceived as an organized body capable of collective action. The argument proceeds by first developing a similar case for the right of every human individual who is in need of aid to get it, and then showing why the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  45. Intellectual Humility.Ian M. Church & Justin Barrett - 2016 - In Everett L. Worthington Jr, Don E. Davis & Joshua N. Hook (eds.), Routledge Handbook of Humility. Springer.
    We critique two popular philosophical definitions of intellectual humility: the “low concern for status” and the “limitations-owning.” accounts. Based upon our analysis, we offer an alternative working definition of intellectual humility: the virtue of accurately tracking what one could non-culpably take to be the positive epistemic status of one’s own beliefs. We regard this view of intellectual humility both as a virtuous mean between intellectual arrogance and diffidence and as having advantages over other recent conceptions of intellectual humility. After defending (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  46. The Short Way with the Problem of Evil.Steven M. Duncan - manuscript
    The author presents reasons for thinking that the evil we observe in the world is not even prima facie evidence against the existence of God.
    Download  
     
    Export citation  
     
    Bookmark  
  47. How do we regard fictional people? How do they regard us?Meghan M. Salomon-Amend & Lance J. Rips - forthcoming - Psychonomic Bulletin and Review.
    Readers assume that commonplace properties of the real world also hold in realistic fiction. They believe, for example, that the usual physical laws continue to apply. But controversy exists in theories of fiction about whether real individuals exist in the story’s world. Does Queen Victoria exist in the world of Jane Eyre, even though Victoria is not mentioned in it? The experiments we report here find that when participants are prompted to consider the world of a fictional individual (“Consider the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Arrogance Under Oppression.E. M. Hernandez - manuscript
    There is a curious phenomenon where people from marginalized populations are taken to be arrogant when they show no signs of superiority. In effect, their actions are misconstrued, and their attitudes are rendered unintelligible. Given that arrogance is standardly taken to be a flaw in one’s moral character, understanding such misattributions should give us insight into the affective marginalization many people face. This talk aims to give a thorough exploration of arrogance under oppression. I argue that arrogance is a kind (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Racial Veil: Racial Perception and The Inner Moral Life.E. M. Hernandez - manuscript
    Philosophers of race and other writers in the Black and Latinx intellectual traditions have remarked on what it is like to live under “the racial gaze,” to be shaped and limited by the way whites perceive us. However, little work has been spent developing how the racial gaze functions in whites’, and other racially privileged people’s, moral psychology. I argue in this paper that there is a morally objectionable way of perceiving people of color. This claim builds on an insight (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Aspects and the Alteration of Temporal Simples.Donald L. M. Baxter - 2016 - Manuscrito 39 (4):169-181.
    ABSTRACT According to David Lewis, alteration is "qualitative difference between temporal parts of something." It follows that moments, since they are simple and lack temporal parts, cannot alter from future to present to past. Here then is another way to put McTaggart's paradox about change in tense. I will appeal to my theory of Aspects to rebut the thought behind this rendition of McTaggart. On my theory, it is possible that qualitatively differing things be numerically identical. I call these differing, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
1 — 50 / 944