Results for 'M. Kolotylo'

984 found
Order:
  1. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  2. The Harm of Ableism: Medical Error and Epistemic Injustice.David M. Peña-Guzmán & Joel Michael Reynolds - 2019 - Kennedy Institute of Ethics Journal 29 (3):205-242.
    This paper argues that epistemic errors rooted in group- or identity- based biases, especially those pertaining to disability, are undertheorized in the literature on medical error. After sketching dominant taxonomies of medical error, we turn to the field of social epistemology to understand the role that epistemic schemas play in contributing to medical errors that disproportionately affect patients from marginalized social groups. We examine the effects of this unequal distribution through a detailed case study of ableism. There are four primary (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  3. CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark   116 citations  
  4. AI-Driven Innovations in Agriculture: Transforming Farming Practices and Outcomes.Jehad M. Altayeb, Hassam Eleyan, Nida D. Wishah, Abed Elilah Elmahmoum, Ahmed J. Khalil, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Applied Research (Ijaar) 8 (9):1-6.
    Abstract: Artificial Intelligence (AI) is transforming the agricultural sector, enhancing both productivity and sustainability. This paper delves into the impact of AI technologies on agriculture, emphasizing their application in precision farming, predictive analytics, and automation. AI-driven tools facilitate more efficient crop and resource management, leading to higher yields and a reduced environmental footprint. The paper explores key AI technologies, such as machine learning algorithms for crop monitoring, robotics for automated planting and harvesting, and data analytics for optimizing resource use. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  5. A Bundle Theory of Words.J. T. M. Miller - 2021 - Synthese 198 (6):5731–5748.
    It has been a common assumption that words are substances that instantiate or have properties. In this paper, I question the assumption that our ontology of words requires posting substances by outlining a bundle theory of words, wherein words are bundles of various sorts of properties (such as semantic, phonetic, orthographic, and grammatical properties). I argue that this view can better account for certain phenomena than substance theories, is ontologically more parsimonious, and coheres with claims in linguistics.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  6. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   126 citations  
  7. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   190 citations  
  8. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  9. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  10. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark   44 citations  
  11. PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark   137 citations  
  12. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  13. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  14. First Come, First Served?Tyler M. John & Joseph Millum - 2020 - Ethics 130 (2):179-207.
    Waiting time is widely used in health and social policy to make resource allocation decisions, yet no general account of the moral significance of waiting time exists. We provide such an account. We argue that waiting time is not intrinsically morally significant, and that the first person in a queue for a resource does not ipso facto have a right to receive that resource first. However, waiting time can and sometimes should play a role in justifying allocation decisions. First, there (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  15. War and murder.G. E. M. Anscombe - 1981 - In Ethics, Religion and Politics: Collected Philosophical Papers, Volume 3. Wiley-Blackwell. pp. 51-61.
    Two attitudes are possible: one, that the world is an absolute jungle and that the exercise of coercive power by rulers is only a manifestation of this; and the other, that it is both necessary and right that there should be this exercise of power, that through it the world is much less of a jungle than it could possibly be without it, so that one should in principle be glad of the existence of such power, and only take exception (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  16. Reality as a Vector in Hilbert Space.Sean M. Carroll - 2022 - In Valia Allori, Quantum Mechanics and Fundamentality: Naturalizing Quantum Theory between Scientific Realism and Ontological Indeterminacy. Cham: Springer. pp. 211-224.
    I defend the extremist position that the fundamental ontology of the world consists of a vector in Hilbert space evolving according to the Schrödinger equation. The laws of physics are determined solely by the energy eigenspectrum of the Hamiltonian. The structure of our observed world, including space and fields living within it, should arise as a higher-level emergent description. I sketch how this might come about, although much work remains to be done.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  17. Supported Decision-Making: Non-Domination Rather than Mental Prosthesis.Allison M. McCarthy & Dana Howard - 2023 - American Journal of Bioethics Neuroscience 14 (3):227-237.
    Recently, bioethicists and the UNCRPD have advocated for supported medical decision-making on behalf of patients with intellectual disabilities. But what does supported decision-making really entail? One compelling framework is Anita Silvers and Leslie Francis’ mental prosthesis account, which envisions supported decision-making as a process in which trustees act as mere appendages for the patient’s will; the trustee provides the cognitive tools the patient requires to realize her conception of her own good. We argue that supported decision-making would be better understood (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  18. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  19. On Scepticism about Unconscious Perception.J. Berger & M. Mylopoulos - 2019 - Journal of Consciousness Studies 26 (11-12):8-32.
    While there seems to be much evidence that perceptual states can occur without being conscious, some theorists recently express scepticism about unconscious perception. We explore here two kinds of such scepticism: Megan Peters and Hakwan Lau's experimental work regarding the well-known problem of the criterion -- which seems to show that many purported instances of unconscious perception go unreported but are weakly conscious -- and Ian Phillips' theoretical consideration, which he calls the 'problem of attribution' -- the worry that many (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  20. Consciousness and the Laws of Physics.Sean M. Carroll - 2021 - Journal of Consciousness Studies 28 (9-10):16-31.
    We have a much better understanding of physics than we do of consciousness. I consider ways in which intrinsically mental aspects of fundamental ontology might induce modifications of the known laws of physics, or whether they could be relevant to accounting for consciousness if no such modifications exist. I suggest that our current knowledge of physics should make us skeptical of hypothetical modifications of the known rules, and that without such modifications it’s hard to imagine how intrinsically mental aspects could (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  21. Normative Reasons as Reasons Why We Ought.Jacob M. Nebel - 2019 - Mind 128 (510):459-484.
    I defend the view that a reason for someone to do something is just a reason why she ought to do it. This simple view has been thought incompatible with the existence of reasons to do things that we may refrain from doing or even ought not to do. For it is widely assumed that there are reasons why we ought to do something only if we ought to do it. I present several counterexamples to this principle and reject some (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  22. No entailing laws, but enablement in the evolution of the biosphere.G. Longo, M. Montévil & S. Kauffman - 2012 - In G. Longo, M. Montévil & S. Kauffman, Genetic and Evolutionary Computation Conference. Acm. pp. 1379 -1392.
    Biological evolution is a complex blend of ever changing structural stability, variability and emergence of new phe- notypes, niches, ecosystems. We wish to argue that the evo- lution of life marks the end of a physics world view of law entailed dynamics. Our considerations depend upon dis- cussing the variability of the very ”contexts of life”: the in- teractions between organisms, biological niches and ecosys- tems. These are ever changing, intrinsically indeterminate and even unprestatable: we do not know ahead of (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  23. Calibration dilemmas in the ethics of distribution.Jacob M. Nebel & H. Orri Stefánsson - 2023 - Economics and Philosophy 39 (1):67-98.
    This paper presents a new kind of problem in the ethics of distribution. The problem takes the form of several “calibration dilemmas,” in which intuitively reasonable aversion to small-stakes inequalities requires leading theories of distribution to recommend intuitively unreasonable aversion to large-stakes inequalities. We first lay out a series of such dilemmas for prioritarian theories. We then consider a widely endorsed family of egalitarian views and show that they are subject to even more forceful calibration dilemmas than prioritarian theories. Finally, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  24. Aggregation Without Interpersonal Comparisons of Well‐Being.Jacob M. Nebel - 2021 - Philosophy and Phenomenological Research 105 (1):18-41.
    This paper is about the role of interpersonal comparisons in Harsanyi's aggregation theorem. Harsanyi interpreted his theorem to show that a broadly utilitarian theory of distribution must be true even if there are no interpersonal comparisons of well-being. How is this possible? The orthodox view is that it is not. Some argue that the interpersonal comparability of well-being is hidden in Harsanyi's premises. Others argue that it is a surprising conclusion of Harsanyi's theorem, which is not presupposed by any one (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  25. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset size, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  26. Conservatisms about the Valuable.Jacob M. Nebel - 2021 - Australasian Journal of Philosophy 100 (1):180-194.
    ABSTRACT Sometimes it seems that an existing bearer of value should be preserved even though it could be destroyed and replaced with something of equal or greater value. How can this conservative intuition be explained and justified? This paper distinguishes three answers, which I call existential, attitudinal, and object-affecting conservatism. I raise some problems for existential and attitudinal conservatism, and suggest how they can be solved by object-affecting conservatism.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  27. Formal logic: Classical problems and proofs.Luis M. Augusto - 2019 - London, UK: College Publications.
    Not focusing on the history of classical logic, this book provides discussions and quotes central passages on its origins and development, namely from a philosophical perspective. Not being a book in mathematical logic, it takes formal logic from an essentially mathematical perspective. Biased towards a computational approach, with SAT and VAL as its backbone, this is an introduction to logic that covers essential aspects of the three branches of logic, to wit, philosophical, mathematical, and computational.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  28. Bridging mainstream and formal ontology: A causality-based upper ontology in Dietrich of Freiberg.Luis M. Augusto - 2021 - Journal of Knowledge Structures and Systems 2 (2):35.
    Ontologies are some of the most central constructs in today's large plethora of knowledge technologies, namely in the context of the semantic web. As their coinage indicates, they are direct heirs to the ontological investigations in the long Western philosophical tradition, but it is not easy to make bridges between them. Contemporary ontological commitments often take causality as a central aspect for the ur-segregation of entities, especially in scientific upper ontologies; theories of causality and philosophical ontological investigations often go hand-in-hand, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  29. Deductive Computing over Knowledge Bases: Prolog and Datalog.Luis M. Augusto - 2024 - Journal of Knowledge Structures and Systems 5 (1):1-62.
    Knowledge representation (KR) is actually more than representation: It involves also inference, namely inference of “new” knowledge, i.e. new facts. Logic programming is a suitable KR medium, but more often than not discussions on this programming paradigm focus on aspects other than KR. In this paper, I elaborate on the general theory of logic programming and give the essentials of two of its main implementations, to wit, Prolog and Datalog, from the viewpoint of deductive computing over knowledge bases, which includes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Binding Specificity and Causal Selection in Drug Design.Oliver M. Lean - 2020 - Philosophy of Science 87 (1):70-90.
    Binding specificity is a centrally important concept in molecular biology, yet it has received little philosophical attention. Here I aim to remedy this by analyzing binding specificity as a causal property. I focus on the concept’s role in drug design, where it is highly prized and hence directly studied. From a causal perspective, understanding why binding specificity is a valuable property of drugs contributes to an understanding of causal selection—of how and why scientists distinguish between causes, not just causes from (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  31. Grape Leaf Species Classification Using CNN.Mohammed M. Almassri & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):66-72.
    Abstract: Context: grapevine leaves are an important agricultural product that is used in many Middle Eastern dishes. The species from which the grapevine leaf originates can differ in terms of both taste and price. Method: In this study, we build a deep learning model to tackle the problem of grape leaf classification. 500 images were used (100 for each species) that were then increased to 10,000 using data augmentation methods. Convolutional Neural Network (CNN) algorithms were applied to build this model (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32. Identity, Discernibility, and Composition.Donald L. M. Baxter - 2014 - In Aaron J. Cotnoir & Donald L. M. Baxter, Composition as Identity. Oxford: Oxford University Press USA. pp. 244-253.
    There is more than one way to say that composition is identity. Yi has distinguished the Weak Composition thesis from the Strong Composition thesis and attributed the former to David Lewis while noting that Lewis associates something like the latter with me. Weak Composition is the thesis that the relation between the parts collectively and their whole is closely analogous to identity. Strong Composition is the thesis that the relation between the parts collectively and their whole is identity. Yi is (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  33. Consequences of Comparability.Cian Dorr, Jacob M. Nebel & Jake Zuehl - 2021 - Philosophical Perspectives 35 (1):70-98.
    We defend three controversial claims about preference, credence, and choice. First, all agents (not just rational ones) have complete preferences. Second, all agents (again, not just rational ones) have real-valued credences in every proposition in which they are confident to any degree. Third, there is almost always some unique thing we ought to do, want, or believe.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34. Oneness, Aspects, and the Neo-Confucians.Donald L. M. Baxter - 2017 - In Philip J. Ivanhoe, Owen Flanagan, Victoria S. Harrison, Hagop Sarkissian & Eric Schwitzgebel, The Oneness Hypothesis: Beyond the Boundary of Self. New York, NY, USA: Columbia University Press.
    Confucius gave counsel that is notoriously hard to follow: "What you do not wish for yourself, do not impose on others" (Huang 1997: 15.24). People tend to be concerned with themselves and to be indifferent to most others. We are distinct from others so our self-concern does not include them, or so it seems. Were we to realize this distinctness is merely apparent--that our true self includes others--Confucius's counsel would be easier to follow. Concern for our true self would extend (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  35. (1 other version)After the Ascent: Plato on Becoming Like God.John M. Armstrong - 2004 - Oxford Studies in Ancient Philosophy 26:171-183.
    Plato is associated with the idea that the body holds us back from knowing ultimate reality and so we should try to distance ourselves from its influence. This sentiment appears is several of his dialogues including Theaetetus where the flight from the physical world is compared to becoming like God. In some major dialogues of Plato's later career such as Philebus and Laws, however, the idea of becoming like God takes a different turn. God is an intelligent force that tries (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  36. The Role of Kant’s Refutation of Idealism.Ralf M. Bader - 2012 - Archiv für Geschichte der Philosophie 94 (1):53-73.
    This paper assesses the role of the Refutation of Idealism within the Critique of Pure Reason, as well as its relation to the treatment of idealism in the First Edition and to transcendental idealism more generally. It is argued that the Refutation is consistent with the Fourth Paralogism and that it can be considered as an extension of the Transcendental Deduction. While the Deduction, considered on its own, constitutes a 'regressive argument', the Refutation allows us to turn the Transcendental Analytic (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  37. The Quantum Field Theory on Which the Everyday World Supervenes.Sean M. Carroll - 2022 - In Meir Hemmo, Stavros Ioannidis, Orly Shenker & Gal Vishne, Levels of Reality in Science and Philosophy: Re-Examining the Multi-Level Structure of Reality. Springer. pp. 27-46.
    Effective Field Theory (EFT) is the successful paradigm underlying modern theoretical physics, including the "Core Theory" of the Standard Model of particle physics plus Einstein's general relativity. I will argue that EFT grants us a unique insight: each EFT model comes with a built-in specification of its domain of applicability. Hence, once a model is tested within some domain (of energies and interaction strengths), we can be confident that it will continue to be accurate within that domain. Currently, the Core (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. How to allocate scarce health resources without discriminating against people with disabilities.Tyler M. John, Joseph Millum & David Wasserman - 2017 - Economics and Philosophy 33 (2):161-186.
    One widely used method for allocating health care resources involves the use of cost-effectiveness analysis (CEA) to rank treatments in terms of quality-adjusted life-years (QALYs) gained. CEA has been criticized for discriminating against people with disabilities by valuing their lives less than those of non-disabled people. Avoiding discrimination seems to lead to the ’QALY trap’: we cannot value saving lives equally and still value raising quality of life. This paper reviews existing responses to the QALY trap and argues that all (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  39. A fixed-population problem for the person-affecting restriction.Jacob M. Nebel - 2020 - Philosophical Studies 177 (9):2779-2787.
    According to the person-affecting restriction, one distribution of welfare can be better than another only if there is someone for whom it is better. Extant problems for the person-affecting restriction involve variable-population cases, such as the nonidentity problem, which are notoriously controversial and difficult to resolve. This paper develops a fixed-population problem for the person-affecting restriction. The problem reveals that, in the presence of incommensurable welfare levels, the person-affecting restriction is incompatible with minimal requirements of impartial beneficence even in fixed-population (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  40. From symbols to knowledge systems: A. Newell and H. A. Simon's contribution to symbolic AI.Luis M. Augusto - 2021 - Journal of Knowledge Structures and Systems 2 (1):29 - 62.
    A. Newell and H. A. Simon were two of the most influential scientists in the emerging field of artificial intelligence (AI) in the late 1950s through to the early 1990s. This paper reviews their crucial contribution to this field, namely to symbolic AI. This contribution was constituted mostly by their quest for the implementation of general intelligence and (commonsense) knowledge in artificial thinking or reasoning artifacts, a project they shared with many other scientists but that in their case was theoretically (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Energy Non-conservation in Quantum Mechanics.Sean M. Carroll & Jackie Lodman - 2021 - Foundations of Physics 51 (4):1-15.
    We study the conservation of energy, or lack thereof, when measurements are performed in quantum mechanics. The expectation value of the Hamiltonian of a system changes when wave functions collapse in accordance with the standard textbook treatment of quantum measurement, but one might imagine that the change in energy is compensated by the measuring apparatus or environment. We show that this is not true; the change in the energy of a state after measurement can be arbitrarily large, independent of the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Geographical Categories: An Ontological Retrospective.Barry Smith & David M. Mark - 2001 - International Journal of Geographical Information Science 15 (7):507–512.
    Since it is only five years since the publication of our paper, "Geographical categories: An ontological investigation" (Smith and Mark 2001), it seems somewhat strange to be making retrospective comments on the piece. Nevertheless, the field is moving quickly, and much has happened since the article appeared. A large number of papers have already cited the work, which suggests that there is a seam here that people find worthy of being mined. In this short essay, we first review the paper (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  43. On Law as Poetry: Shelley and Tocqueville.Joshua M. Hall - forthcoming - South African Journal of Philosophy 3 (40).
    Consonant with the ongoing “aesthetic turn” in legal scholarship, this article pursues a new conception of law as poetry. Gestures in this law-as-poetry direction appear in all three main schools in the philosophy of law’s history, as follows. First, natural law sees law as divinely-inspired prophetic poetry. Second, positive law sees the law as a creative human positing (from poetry’s poesis). And third, critical legal theory sees these posited laws as calcified prose prisons, vulnerable to poetic liberation. My first two (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  98
    3D Convolutional Neural Networks for Accurate Reconstruction of Distorted Faces.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (4):560-570.
    The core objective of this project is to recognize and reconstruct distorted facial images, particularly in the context of accidents. This involves using deep learning techniques to analyze the features of a distorted face and regenerate it into a recognizable form. Deep learning models are wellsuited for this task due to their ability to learn complex patterns and representations from data the input data consists of distorted facial images, typically obtained from MRI scans of accident victims. These images may contain (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  45. What is the environment in environmental health research? Perspectives from the ethics of science.David M. Frank - 2021 - Studies in History and Philosophy of Science Part A 88 (C):172-180.
    Environmental health research produces scientific knowledge about environmental hazards crucial for public health and environmental justice movements that seek to prevent or reduce exposure to these hazards. The environment in environmental health research is conceptualized as the range of possible social, biological, chemical, and/or physical hazards or risks to human health, some of which merit study due to factors such as their probability and severity, the feasibility of their remediation, and injustice in their distribution. This paper explores the ethics of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  47. Invisible Images and Indeterminacy: Why We Need a Multi-stage Account of Photography.Dawn M. Wilson - 2021 - Journal of Aesthetics and Art Criticism 79 (2):161-174.
    Some photographs show determinate features of a scene because the photographed scene had those features. This dependency relation is, rightly, a consensus in philosophy of photography. I seek to refute many long-established theories of photography by arguing that they are incompatible with this commitment. In Section II, I classify accounts of photography as either single-stage or multi-stage. In Section III, I analyze the historical basis for single-stage accounts. In Section IV, I explain why the single-stage view led scientists to postulate (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  48. Rights and consent in mixed martial arts.Stephen Kershnar & Robert M. Kelly - 2019 - Journal of the Philosophy of Sport 47 (1):105-120.
    MMA fighting in a competition is not necessarily wrong and is often, as far as we can tell, permissible. Our argument has two premises. First, if an act does not infringe on anyone’s moral right or violate another side-constraint, then it is morally permissible. Second, MMA-violence does not infringe on anyone’s moral right or violate another side-constraint. The first premise rested on two assumptions. First, if a person does a wrong act, then he wrongs someone. Second, if one person wrongs (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49. A Hybrid View of Commitment.Facundo M. Alonso - forthcoming - In David W. Shoemaker, Oxford Studies in Agency and Responsibility, Volume 9. Oxford: Oxford University Press.
    We often appeal to the notion of an agent’s commitment to action to characterize, e.g., an agent’s faithfulness to a promise she has given to another, her robust disposition to pursue a goal she values or cares about, and her determination to stick to that goal. In the philosophy of action, that notion is often associated with the idea of an agent’s intention to act. In ethics, it is associated primarily with the idea of an agent’s commitment to, or endorsement (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Chemical arbitrariness and the causal role of molecular adapters.Oliver M. Lean - 2019 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 78:101180.
    Jacques Monod (1971) argued that certain molecular processes rely critically on the property of chemical arbitrariness, which he claimed allows those processes to “transcend the laws of chemistry”. It seems natural, as some philosophers have done, to interpret this in modal terms: a biological relationship is chemically arbitrary if it is possible, within the constraints of chemical “law”, for that relationship to have been otherwise than it is. But while modality is certainly important for understanding chemical arbitrariness, understanding its biological (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 984