Results for 'M. Loewenstein'

983 found
Order:
  1. Morgenbesser’s Coin.Yael Loewenstein - 2021 - Canadian Journal of Philosophy 51 (5):317-328.
    Before a fair, indeterministic coin is tossed, Lucky, who is causally isolated from the coin-tossing mechanism, declines to bet on heads. The coin lands heads. The consensus is that the following counterfactual is true: (M:) If Lucky had bet heads, he would have won the bet. It is also widely believed that to rule (M) true, any plausible semantics for counterfactuals must invoke causal independence. But if that’s so, the hope of giving a reductive analysis of causation in terms of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Against the standard solution to the grandfather paradox.Yael Loewenstein - 2022 - Synthese 200 (2).
    1000 time-travelers travel back in time, each with the intention of killing their own infant-self. If there is no branching time, then on pain of bringing about a logical contradiction, all must fail. But this seems inexplicable: what is to ensure that the time-travelers are stopped? For a time, this inexplicability objection was thought to provide evidence that there is something incoherent about the possibility of backwards time travel in a universe without branching time. There is now near-consensus, however, that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Should we be skeptics or contextualists about counterfactual conditionals?Yael Loewenstein - 2021 - Philosophy Compass 16 (10).
    Just as knowledge contextualism offers a way out of knowledge skepticism in the face of powerful skeptical arguments, counterfactual contextualism purports to answer the many compelling arguments for the skeptical thesis that most ordinary counterfactuals of the form ‘if A had happened, C would have happened’, are false. In this article I review a few of the arguments for counterfactual skepticism, before surveying the various types of contextualist responses. I then discuss some of the recent objections to counterfactual contextualism, with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Heim Sequences and Why Most Unqualified ‘Would’-Counterfactuals Are Not True.Yael Loewenstein - 2021 - Australasian Journal of Philosophy 99 (3):597-610.
    ABSTRACT The apparent consistency of Sobel sequences famously motivated David Lewis to defend a variably strict conditional semantics for counterfactuals. If Sophie had gone to the parade, she would have seen Pedro. If Sophie had gone to the parade and had been stuck behind someone tall, she would not have seen Pedro. But if the order of the counterfactuals in a Sobel sequence is reversed—in the example, if is asserted prior to —the second counterfactual asserted no longer rings true. This (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. AI-Driven Innovations in Agriculture: Transforming Farming Practices and Outcomes.Jehad M. Altayeb, Hassam Eleyan, Nida D. Wishah, Abed Elilah Elmahmoum, Ahmed J. Khalil, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Applied Research (Ijaar) 8 (9):1-6.
    Abstract: Artificial Intelligence (AI) is transforming the agricultural sector, enhancing both productivity and sustainability. This paper delves into the impact of AI technologies on agriculture, emphasizing their application in precision farming, predictive analytics, and automation. AI-driven tools facilitate more efficient crop and resource management, leading to higher yields and a reduced environmental footprint. The paper explores key AI technologies, such as machine learning algorithms for crop monitoring, robotics for automated planting and harvesting, and data analytics for optimizing resource use. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  6. The Role of Administrative Procedures and Regulations in Enhancing the Performance of The Educational Institutions - The Islamic University in Gaza is A Model.Ashraf A. M. Salama, Youssef M. Abu Amuna, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (2):14-27.
    The study aimed to identify the role of administrative procedures and systems in enhancing the performance of the educational institutions in the Islamic University in Gaza. To achieve the research objectives, the researchers used the analytical descriptive approach to collect information. The researchers used the questionnaire distributed to three categories of employees at the Islamic University (senior management, faculty members, their assistants and members of the administrative board). A random sample of 314 employees was selected and 276 questionnaires were retrieved (...)
    Download  
     
    Export citation  
     
    Bookmark   64 citations  
  7. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  8. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   70 citations  
  9. CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark   50 citations  
  10. War and murder.G. E. M. Anscombe - 1981 - In Ethics, Religion and Politics: Collected Philosophical Papers, Volume 3. Wiley-Blackwell. pp. 51-61.
    Two attitudes are possible: one, that the world is an absolute jungle and that the exercise of coercive power by rulers is only a manifestation of this; and the other, that it is both necessary and right that there should be this exercise of power, that through it the world is much less of a jungle than it could possibly be without it, so that one should in principle be glad of the existence of such power, and only take exception (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  11. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation of (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  12. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  13. PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  14. Reality as a Vector in Hilbert Space.Sean M. Carroll - 2022 - In Valia Allori, Quantum Mechanics and Fundamentality: Naturalizing Quantum Theory between Scientific Realism and Ontological Indeterminacy. Cham: Springer. pp. 211-224.
    I defend the extremist position that the fundamental ontology of the world consists of a vector in Hilbert space evolving according to the Schrödinger equation. The laws of physics are determined solely by the energy eigenspectrum of the Hamiltonian. The structure of our observed world, including space and fields living within it, should arise as a higher-level emergent description. I sketch how this might come about, although much work remains to be done.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  15. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  16. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  17. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  18. Deductive Computing over Knowledge Bases: Prolog and Datalog.Luis M. Augusto - 2024 - Journal of Knowledge Structures and Systems 5 (1):1-62.
    Knowledge representation (KR) is actually more than representation: It involves also inference, namely inference of “new” knowledge, i.e. new facts. Logic programming is a suitable KR medium, but more often than not discussions on this programming paradigm focus on aspects other than KR. In this paper, I elaborate on the general theory of logic programming and give the essentials of two of its main implementations, to wit, Prolog and Datalog, from the viewpoint of deductive computing over knowledge bases, which includes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  20. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  21. Expert System for Castor Diseases and Diagnosis.Fatima M. Salman & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):1-10.
    Background: The castor bean is a large grassy or semi-wooden shrub or small tree. Any part of the castor plant parts can suffering from a disease that weakens the ability to grow and eliminates its production. Therefore, in this paper will identify the pests and diseases present in castor culture and detect the symptoms in each disease. Also images is showing the symptom form in this disease. Objectives: The main objective of this expert system is to obtain appropriate diagnosis of (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  22. Aggregation Without Interpersonal Comparisons of Well‐Being.Jacob M. Nebel - 2021 - Philosophy and Phenomenological Research 105 (1):18-41.
    This paper is about the role of interpersonal comparisons in Harsanyi's aggregation theorem. Harsanyi interpreted his theorem to show that a broadly utilitarian theory of distribution must be true even if there are no interpersonal comparisons of well-being. How is this possible? The orthodox view is that it is not. Some argue that the interpersonal comparability of well-being is hidden in Harsanyi's premises. Others argue that it is a surprising conclusion of Harsanyi's theorem, which is not presupposed by any one (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  23. THE EFFICIENCY EXTENT OF THE INTERNAL CONTROL ENVIRONMENT IN THE PALESTINIAN HIGHER EDUCATIONAL INSTITUTIONS IN GAZA STRIP.Tarek M. Ammar, Mazen J. Al Shobaki & Samy S. Abu Naser - 2017 - International Journal of Digital Publication Technology 1 (2):107-126.
    The purpose of this research is to identify the extent of the efficiency of the internal control environment in the Palestinian higher educational institutions in Gaza Strip from the perspective of employees in the Palestinian universities in Gaza Strip, where researchers used in the study five universities. The researchers adopted in their study the descriptive and analytical approach. The research community consists of administrative employees and academic employees with administrative duties. Senior management or the University Council was excluded. The study (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  24. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  25. (1 other version)After the Ascent: Plato on Becoming Like God.John M. Armstrong - 2004 - Oxford Studies in Ancient Philosophy 26:171-183.
    Plato is associated with the idea that the body holds us back from knowing ultimate reality and so we should try to distance ourselves from its influence. This sentiment appears is several of his dialogues including Theaetetus where the flight from the physical world is compared to becoming like God. In some major dialogues of Plato's later career such as Philebus and Laws, however, the idea of becoming like God takes a different turn. God is an intelligent force that tries (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  26. The Relationship between Performance Standards and Achieving the Objectives of Supervision at the Islamic University in Gaza.Ashraf A. M. Salama, Mazen Al Shobaki, Samy S. Abu-Naser, Abed Alfetah M. AlFerjany & Youssef M. Abu Amuna - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 1 (10):89-101.
    The aim of the research is to identify the relationship between the performance criteria and the achievement of the objectives of supervision which is represented in the performance of the job at the Islamic University in Gaza Strip. To achieve the objectives of the research, the researchers used the descriptive analytical approach to collect information. The questionnaire consisted of (22) paragraphs distributed to three categories of employees of the Islamic University (senior management, faculty members, their assistants and members of the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  27. Grape Leaf Species Classification Using CNN.Mohammed M. Almassri & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):66-72.
    Abstract: Context: grapevine leaves are an important agricultural product that is used in many Middle Eastern dishes. The species from which the grapevine leaf originates can differ in terms of both taste and price. Method: In this study, we build a deep learning model to tackle the problem of grape leaf classification. 500 images were used (100 for each species) that were then increased to 10,000 using data augmentation methods. Convolutional Neural Network (CNN) algorithms were applied to build this model (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset size, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  29. "Deterrence,".S. M. Amadae - 2015 - In Prisoners of Reason: Game Theory and Neoliberal Political Economy. New York: Cambridge University Press. pp. 99-140.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  30. Identity in the loose and popular sense.Donald L. M. Baxter - 1988 - Mind 97 (388):575-582.
    This essay interprets Butler’s distinction between identity in the loose and popular sense and in the strict and philosophical sense. Suppose there are different standards for counting the same things. Then what are two distinct things counting strictly may be one and the same thing counting loosely. Within a given standard identity is one-one. But across standards it is many-one. An alternative interpretation using the parts-whole relation fails, because that relation should be understood as many-one identity. Another alternative making identity (...)
    Download  
     
    Export citation  
     
    Bookmark   142 citations  
  31. A Dual Aspect Theory of Shared Intention.Facundo M. Alonso - 2016 - Journal of Social Ontology 2 (2):271–302.
    In this article I propose an original view of the nature of shared intention. In contrast to psychological views (Bratman, Searle, Tuomela) and normative views (Gilbert), I argue that both functional roles played by attitudes of individual participants and interpersonal obligations are factors of central and independent significance for explaining what shared intention is. It is widely agreed that shared intention (I) normally motivates participants to act, and (II) normally creates obligations between them. I argue that the view I propose (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  32. Intending, Settling, and Relying.Facundo M. Alonso - 2017 - In David Shoemaker, Oxford Studies in Agency and Responsibility Volume 4. Oxford University Press. pp. 50-74.
    Philosophers of action of different persuasions have suggested that there is a tight connection between the phenomenon of intending and the phenomena of “being settled on” and of “settling” a course of action. For many, this connection supports an important constraint on intention: one may only intend what one takes one’s so intending as settling. Traditionally, this has been understood as a doxastic constraint on intention: what one takes one’s intention as settling is what one believes one’s so intending as (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  33. Concepts without boundaries.R. M. Sainsbury - 1996 - In Rosanna Keefe & Peter Smith, Vagueness: A Reader. MIT Press. pp. 186-205.
    Download  
     
    Export citation  
     
    Bookmark   66 citations  
  34. A Hybrid View of Commitment.Facundo M. Alonso - forthcoming - In David W. Shoemaker, Oxford Studies in Agency and Responsibility, Volume 9. Oxford: Oxford University Press.
    We often appeal to the notion of an agent’s commitment to action to characterize, e.g., an agent’s faithfulness to a promise she has given to another, her robust disposition to pursue a goal she values or cares about, and her determination to stick to that goal. In the philosophy of action, that notion is often associated with the idea of an agent’s intention to act. In ethics, it is associated primarily with the idea of an agent’s commitment to, or endorsement (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Lost in dissociation: The main paradigms in unconscious cognition.Luis M. Augusto - 2016 - Consciousness and Cognition 42:293-310.
    Contemporary studies in unconscious cognition are essentially founded on dissociation, i.e., on how it dissociates with respect to conscious mental processes and representations. This is claimed to be in so many and diverse ways that one is often lost in dissociation. In order to reduce this state of confusion we here carry out two major tasks: based on the central distinction between cognitive processes and representations, we identify and isolate the main dissociation paradigms; we then critically analyze their key tenets (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  36. Lucky Libertarianism.Mike Almeida & M. Bernstein - 2003 - Philosophical Studies 113 (2):93-119.
    Perhaps the greatest impediment to a viable libertarianism is the provision of a satisfactory explanation of how actions that are undetermined by an agent's character can still be under the control of, or ‘up to’, the agent. The ‘luck problem’ has been most assiduously examined by Robert Kane who supplies a detailed account of how this problem can be resolved. Although Kane's theory is innovative, insightful, and more resourceful than most of his critics believe, it ultimately cannot account for the (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  37. Self‐Differing, Aspects, and Leibniz's Law.Donald L. M. Baxter - 2018 - Noûs 52:900-920.
    I argue that an individual has aspects numerically identical with it and each other that nonetheless qualitatively differ from it and each other. This discernibility of identicals does not violate Leibniz's Law, however, which concerns only individuals and is silent about their aspects. They are not in its domain of quantification. To argue that there are aspects I will appeal to the internal conflicts of conscious beings. I do not mean to imply that aspects are confined to such cases, but (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  38. Mechanism schemas and the relationship between biological theories.Tudor M. Baetu - 2011 - In Phyllis McKay Illari Federica Russo, Causality in the Sciences. Oxford University Press.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  39. The non-transitivity of the contingent and occasional identity relations.Ralf M. Bader - 2012 - Philosophical Studies 157 (1):141-152.
    This paper establishes that the occasional identity relation and the contingent identity relation are both non-transitive and as such are not properly classified as identity relations. This is achieved by appealing to cases where multiple fissions and fusions occur simultaneously. These cases show that the contingent and occasional identity relations do not even satisfy the time-indexed and world-indexed versions of the transitivity requirement and hence are non-transitive relations.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  40. Hope and Hopefulness.Jack M. C. Kwong - 2020 - Canadian Journal of Philosophy 50 (7):832-843.
    This paper proposes a new framework for thinking about hope, with certain unexpected consequences. Specifically, I argue that a shift in focus from locutions like “x hopes that” and “x is hoping that” to “x is hopeful that” and “x has hope that” can improve our understanding of hope. This approach, which emphasizes hopefulness as the central concept, turns out to be more revealing and fruitful in tackling some of the issues that philosophers have raised about hope, such as the (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  41. Reductive Views of Shared Intention.Facundo M. Alonso - 2016 - In Kirk Ludwig & Marija Jankovic, The Routledge Handbook of Collective Intentionality. New York: Routledge.
    This is a survey article on reductive views of shared intention.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Invisible Images and Indeterminacy: Why We Need a Multi-stage Account of Photography.Dawn M. Wilson - 2021 - Journal of Aesthetics and Art Criticism 79 (2):161-174.
    Some photographs show determinate features of a scene because the photographed scene had those features. This dependency relation is, rightly, a consensus in philosophy of photography. I seek to refute many long-established theories of photography by arguing that they are incompatible with this commitment. In Section II, I classify accounts of photography as either single-stage or multi-stage. In Section III, I analyze the historical basis for single-stage accounts. In Section IV, I explain why the single-stage view led scientists to postulate (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  43. Instantiation as partial identity.Donald L. M. Baxter - 2001 - Australasian Journal of Philosophy 79 (4):449 – 464.
    Construing the instantiation of a universal by a particular in terms of my theory of aspects resolves the basic mystery of this "non-relational tie", and gives theoretical unity to the four characteristics of instantiation discerned by Armstrong. Taking aspects as distinct in a way akin to Scotus's formal distinction, I suggest that instantiation is the sharing of an aspect by a universal and a particular--a kind of partial identity. This approach allows me to address Plato's multiple location and One over (...)
    Download  
     
    Export citation  
     
    Bookmark   65 citations  
  44. Little ado about meaning: The intrinsic semantics of van Wijngaarden grammars.Luis M. Augusto - 2024 - Journal of Knowledge Structures and Systems 5 (2):1-42.
    Much ado – and increased complexity – is generally the case when it comes to checking formally the (intended) meaning of programs, as formal semantics for programs are typically extrinsic to both them and the formal grammars that generate the programming languages in which they are written. The van Wijngaarden grammars, on the contrary, have an intrinsic semantics in the sense that their rules contain or express the (intended) meaning of the terminal strings generated by them. This intrinsicness allows for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Mango Pests Identification Expert System.Jehad M. Altayeb, Samy S. Abu-Naser, Shahd J. Albadrasawi & Mohammed M. Almzainy - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (6):19-26.
    Mango is an economically significant fruit crop cultivated in various tropical and subtropical regions around the world. However, the productivity and quality of mangoes can be severely impacted by a range of pests. This research paper introduces an innovative approach to identify mango pests using an expert system. The expert system integrates knowledge from entomology and plants to provide accurate identification of common mango pests. The paper outlines the development and implementation of the expert system using Clips shell, which utilizes (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  46. Intellectual Property and the Pharmaceutical Industry: A Moral Crossroads Between Health and Property.Rivka Amado & Nevin M. Gewertz - 2004 - Journal of Business Ethics 55 (3):295-308.
    The moral justification of intellectual property is often called into question when placed in the context of pharmaceutical patents and global health concerns. The theoretical accounts of both John Rawls and Robert Nozick provide an excellent ethical framework from which such questions can be clarified. While Nozick upholds an individuals right to intellectual property, based upon its conformation with Lockean notions of property and Nozicks ideas of just acquisition and transfer, Rawls emphasizes the importance of basic liberties, such as an (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  47. Many-valued logics. A mathematical and computational introduction.Luis M. Augusto - 2020 - London: College Publications.
    2nd edition. Many-valued logics are those logics that have more than the two classical truth values, to wit, true and false; in fact, they can have from three to infinitely many truth values. This property, together with truth-functionality, provides a powerful formalism to reason in settings where classical logic—as well as other non-classical logics—is of no avail. Indeed, originally motivated by philosophical concerns, these logics soon proved relevant for a plethora of applications ranging from switching theory to cognitive modeling, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Dancing-with Cognitive Science: Three Therapeutic Provocations.Joshua M. Hall - forthcoming - Middle Voices.
    According to the “Embodied Cognition” entry in the Stanford Encyclopedia of Philosophy, the three landmark texts in the 4E cognitive science tradition are Lakoff and Johnson’s Metaphors We Live By, Varela, Thompson, and Rosch’s The Embodied Mind, and Andy Clark’s Being There. In my first section, I offer a phenomenological interpretation of these three texts, identifying recuring affirmations of the figure of dance alongside explicit marginalization of the practice of dance, perhaps in part due to cognitive science’s overemphasis on cognition (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49. Introspection.D. M. Armstrong - 1994 - In Quassim Cassam, Self-Knowledge. New York: Oxford University Press. pp. 109--117.
    This paper will argue that there is no such thing as introspective access to judgments and decisions. I t won't challenge the existence of introspective access to perceptual and imagistic states, nor to emotional feelings and bodily sensations. On the contrary, the model presented in Section 2 presumes such access. Hence introspection is here divided into two categories: introspection of propositional attitude events, on the one hand, and introspection of broadly perceptual events, on the other. I shall assume that the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  50. On Justification, Idealization, and Discursive Purchase.Thomas M. Besch - 2019 - Philosophia 47 (3):601-623.
    Conceptions of acceptability-based moral or political justification take it that authoritative acceptability constitutes, or contributes to, validity, or justification. There is no agreement as to what bar for authoritativeness such justification may employ. The paper engages the issue in relation to (i) the level of idealization that a bar for authoritativeness, ψ, imparts to a standard of acceptability-based justification, S, and (ii) the degree of discursive purchase of the discursive standing that S accords to people when it builds ψ. I (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
1 — 50 / 983