Results for 'M. M. Kozlov'

955 found
Order:
  1. Forest Fire Detection using Deep Leaning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):59-65.
    Abstract: Forests are areas with a high density of trees, and they play a vital role in the health of the planet. They provide a habitat for a wide variety of plant and animal species, and they help to regulate the climate by absorbing carbon dioxide from the atmosphere. While in 2010, the world had 3.92Gha of forest cover, covering 30% of its land area, in 2019, there was a loss of forest cover of 24.2Mha according to the Global Forest (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Gender Prediction from Retinal Fundus Using Deep Learning.Ashraf M. Taha, Qasem M. M. Zarandah, Bassem S. Abu-Nasser, Zakaria K. D. AlKayyali & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (5):57-63.
    Deep learning may transform health care, but model development has largely been dependent on availability of advanced technical expertise. The aim of this study is to develop a deep learning model to predict the gender from retinal fundus images. The proposed model was based on the Xception pre-trained model. The proposed model was trained on 20,000 retinal fundus images from Kaggle depository. The dataset was preprocessed them split into three datasets (training, validation, Testing). After training and cross-validating the proposed model, (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  3. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  4. Manejo nutricional para obtenção de melhores índices zootécnicos em propriedades leiteiras no agreste de Pernambuco.M. M. A. da Silveira - 2024 - Trabalho de Conclusão de Curso (Técnico Subsequente Em Agropecuária) - Ifpe Campus Belo Jardim 1 (1):39.
    O Agreste de Pernambuco é conhecido como a bacia leiteira do estado, por possuir não apenas um efetivo bovino leiteiro significativo, mas por apresentar características edafoclimáticas que tornaram possível o desenvolvimento da atividade leiteira. Entretanto, uma vez que possui um clima Semiárido, o cruzamento de raças taurinas com zebuínas é de suma importância, logo, um dos métodos de cruzamento mais abrangente e expressivo no estado é acasalar touro holandês PO com vacas Gir, obtendo F1 ½ HG, que são acasaladas com (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Slurs.Adam M. Croom - 2011 - Language Sciences 33 (3):343-358.
    Slurs possess interesting linguistic properties and so have recently attracted the attention of linguists and philosophers of language. For instance the racial slur "nigger" is explosively derogatory, enough so that just hearing it mentioned can leave one feeling as if they have been made complicit in a morally atrocious act.. Indeed, the very taboo nature of these words makes discussion of them typically prohibited or frowned upon. Although it is true that the utterance of slurs is illegitimate and derogatory in (...)
    Download  
     
    Export citation  
     
    Bookmark   80 citations  
  6. Muay Thai, psychological well-being, and cultivation of combat-relevant affordances.Adam M. Croom - 2022 - Philosophies 7 (3):65.
    Some philosophers argue that martial arts training is maladaptive, contributes to psychological illness, and provides a social harm, whereas others argue that martial arts training is adaptive, contributes to psychological wellness, and provides a social benefit. This debate is important to scholars and the general public since beliefs about martial arts training can have a real impact on how we evaluate martial artists for job opportunities and career advancement, and in general, how we treat martial artists from different cultures in (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  7. Mint Expert System Diagnosis and Treatment.Mosa M. M. Megdad, Mohammed N. Ayyad, Mohanad H. Al-Qadi, Mohammed F. El-Habibi, Mohammed J. A. AlQatrawi, Raed Z. Sababa & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (5):22-28.
    Background: Mint is a grassy, perennial plant, belonging to the oral platoon, fast growing and spreading, its leaves are green in color, fragrant, tart, refreshing, square-shaped leg, bifurcated, erect, ranging in height from (10 - 201 cm). Home to Europe and Asia. The mint plant has many benefits, the most important of which are pain relief, treatment of gallbladder disorders, the expulsion of gases, anti-inflammatory, and relaxing nerves. While the mint plant is the ideal option for the start of gardens, (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  8. What Emergence Can Possibly Mean.Sean M. Carroll & Achyuth Parola - manuscript
    We consider emergence from the perspective of dynamics: states of a system evolving with time. We focus on the role of a decomposition of wholes into parts, and attempt to characterize relationships between levels without reference to whether higher-level properties are “novel” or “unexpected.” We offer a classification of different varieties of emergence, with and without new ontological elements at higher levels. -/- Submitted to a volume on Real Patterns (Tyler Milhouse, ed.), to be published by MIT Press.
    Download  
     
    Export citation  
     
    Bookmark  
  9. Consciousness and the Laws of Physics.Sean M. Carroll - 2021 - Journal of Consciousness Studies 28 (9-10):16-31.
    We have a much better understanding of physics than we do of consciousness. I consider ways in which intrinsically mental aspects of fundamental ontology might induce modifications of the known laws of physics, or whether they could be relevant to accounting for consciousness if no such modifications exist. I suggest that our current knowledge of physics should make us skeptical of hypothetical modifications of the known rules, and that without such modifications it’s hard to imagine how intrinsically mental aspects could (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  10. Reality as a Vector in Hilbert Space.Sean M. Carroll - 2022 - In Valia Allori (ed.), Quantum Mechanics and Fundamentality: Naturalizing Quantum Theory between Scientific Realism and Ontological Indeterminacy. Cham: Springer. pp. 211-224.
    I defend the extremist position that the fundamental ontology of the world consists of a vector in Hilbert space evolving according to the Schrödinger equation. The laws of physics are determined solely by the energy eigenspectrum of the Hamiltonian. The structure of our observed world, including space and fields living within it, should arise as a higher-level emergent description. I sketch how this might come about, although much work remains to be done.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  11. How Should We Study Animal Consciousness Scientifically?Jonathan Birch, Donald M. Broom, Heather Browning, Andrew Crump, Simona Ginsburg, Marta Halina, David Harrison, Eva Jablonka, Andrew Y. Lee, François Kammerer, Colin Klein, Victor Lamme, Matthias Michel, Françoise Wemelsfelder & Oryan Zacks - 2022 - Journal of Consciousness Studies 29 (3-4):8-28.
    This editorial introduces the Journal of Consciousness Studies special issue on "Animal Consciousness". The 15 contributors and co-editors answer the question "How should we study animal consciousness scientifically?" in 500 words or fewer.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Diagnosis of Pneumonia Using Deep Learning.Alaa M. A. Barhoom & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (2):48-68.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and react like humans. Some of the activities computers with artificial intelligence are designed for include, Speech, recognition, Learning, Planning and Problem solving. Deep learning is a collection of algorithms used in machine learning, It is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is a technique used (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  13. Recovery without normalisation: It's not necessary to be normal, not even in psychiatry.Zsuzsanna Chappell & Sofia M. I. Jeppsson - 2023 - Clinical Ethics 18 (3):298-305.
    In this paper, we argue that there are reasons to believe that an implicit bias for normalcy influences what are considered medically necessary treatments in psychiatry. First, we outline two prima facie reasons to suspect that this is the case. A bias for ‘the normal’ is already documented in disability studies; it is reasonable to suspect that it affects psychiatry too, since psychiatric patients, like disabled people, are often perceived as ‘weird’ by others. Secondly, psychiatry's explicitly endorsed values of well-being (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Racial epithets: What we say and mean by them.Adam M. Croom - 2008 - Dialogue 51:34-45.
    Racial epithets are terms used to characterize people on the basis of their race, and are often used to harm the people that they target. But what do racial epithets mean, and how do they work to harm in the way that they do? In this essay I set out to answer these questions by offering a pragmatic view of racial epithets, while contrasting my position with Christopher Hom's semantic view.
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  15. Credit Score Classification Using Machine Learning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (5):1-10.
    Abstract: Ensuring the proactive detection of transaction risks is paramount for financial institutions, particularly in the context of managing credit scores. In this study, we compare different machine learning algorithms to effectively and efficiently. The algorithms used in this study were: MLogisticRegressionCV, ExtraTreeClassifier,LGBMClassifier,AdaBoostClassifier, GradientBoostingClassifier,Perceptron,RandomForestClassifier,KNeighborsClassifier,BaggingClassifier, DecisionTreeClassifier, CalibratedClassifierCV, LabelPropagation, Deep Learning. The dataset was collected from Kaggle depository. It consists of 164 rows and 8 columns. The best classifier with unbalanced dataset was the LogisticRegressionCV. The Accuracy 100.0%, precession 100.0%,Recall100.0% and the F1-score (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  18. The impact of shadowboxing on the psychological well‐being of professional martial artists.Adam M. Croom - 2023 - Discover Psychology 3:4.
    Does martial arts practice contribute to psychological well-being in professional martial artists? If so, what are the specific ways that martial arts practice accomplishes this? It has been a long-standing and widely held belief that martial arts practice can contribute to psychological well-being, however, there has been a lack of empirical research in the psychological literature focused on investigating the details of this hypothesis. The purpose of this research is therefore to investigate the impact of a paradigmatic martial arts practice—shadowboxing—on (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Subjective probability and quantum certainty.Carlton M. Caves, Christopher A. Fuchs & Rüdiger Schack - 2007 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 38 (2):255-274.
    In the Bayesian approach to quantum mechanics, probabilities—and thus quantum states—represent an agent’s degrees of belief, rather than corresponding to objective properties of physical systems. In this paper we investigate the concept of certainty in quantum mechanics. Particularly, we show how the probability-1 predictions derived from pure quantum states highlight a fundamental difference between our Bayesian approach, on the one hand, and Copenhagen and similar interpretations on the other. We first review the main arguments for the general claim that probabilities (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  21. Energy Non-conservation in Quantum Mechanics.Sean M. Carroll & Jackie Lodman - 2021 - Foundations of Physics 51 (4):1-15.
    We study the conservation of energy, or lack thereof, when measurements are performed in quantum mechanics. The expectation value of the Hamiltonian of a system changes when wave functions collapse in accordance with the standard textbook treatment of quantum measurement, but one might imagine that the change in energy is compensated by the measuring apparatus or environment. We show that this is not true; the change in the energy of a state after measurement can be arbitrarily large, independent of the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22. Intellectual Humility.Ian M. Church & Justin Barrett - 2016 - In Everett L. Worthington Jr, Don E. Davis & Joshua N. Hook (eds.), Routledge Handbook of Humility. Springer.
    We critique two popular philosophical definitions of intellectual humility: the “low concern for status” and the “limitations-owning.” accounts. Based upon our analysis, we offer an alternative working definition of intellectual humility: the virtue of accurately tracking what one could non-culpably take to be the positive epistemic status of one’s own beliefs. We regard this view of intellectual humility both as a virtuous mean between intellectual arrogance and diffidence and as having advantages over other recent conceptions of intellectual humility. After defending (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  23.  81
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. On Robust Discursive Equality.Thomas M. Besch - 2019 - Dialogue 58 (3):1-26.
    This paper explores the idea of robust discursive equality on which respect-based conceptions of justificatory reciprocity often draw. I distinguish between formal and substantive discursive equality and argue that if justificatory reciprocity requires that people be accorded formally equal discursive standing, robust discursive equality should not be construed as requiring standing that is equal substantively, or in terms of its discursive purchase. Still, robust discursive equality is purchase sensitive: it does not obtain when discursive standing is impermissibly unequal in purchase. (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  25.  80
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Evil-God Challenge: Extended and Defended.John M. Collins - 2019 - Religious Studies 55 (1):85-109.
    Stephen Law developed a challenge to theism, known as the evil-god challenge (Law (2010) ). The evil-god challenge to theism is to explain why the theist’s responses to the problem of evil are any better than the diabolist’s – who believes in a supremely evil god – rejoinders to the problem of good, when all the theist’s ploys (theodicy, sceptical theism, etc.) can be parodied by the diabolist. In the first part of this article, I extend the evil-god challenge by (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  71
    Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Experimental Philosophy and the Problem of Evil.Ian M. Church, Blake McAllister & James Spiegel - forthcoming - Religious Studies.
    The problem of evil is an ideal topic for experimental philosophy. Suffering--which is at the heart of most prominent formulations of the problem of evil--is a universal human experience and has been the topic of careful reflection for millennia. However, interpretations of suffering and how it bears on the existence of God are tremendously diverse and nuanced. We might immediately find ourselves wondering why (and how!) something so universal might be understood in so many different ways. Why does suffering push (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. ‘Wholly Present’ Defined.Thomas M. Crisp & Donald P. Smith - 2005 - Philosophy and Phenomenological Research 71 (2):318–344.
    Three-dimensionalists , sometimes referred to as endurantists, think that objects persist through time by being “wholly present” at every time they exist. But what is it for something to be wholly present at a time? It is surprisingly difficult to say. The threedimensionalist is free, of course, to take ‘is wholly present at’ as one of her theory’s primitives, but this is problematic for at least one reason: some philosophers claim not to understand her primitive. Clearly the three-dimensionalist would be (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  30. (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  44
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  42
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  41
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  39
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The physiological and morphological benefits of shadowboxing.Adam M. Croom - 2023 - International Journal of Physical Education, Fitness and Sports 12 (2):8-29.
    Is shadowboxing an effective form of functional exercise? What physiological and morphological changes result from an exercise program based exclusively on shadowboxing for 3 weeks? To date, no empirical research has focused specifically on addressing these questions. Since mixed martial arts (MMA) is the fastest growing sport in the world, and since boxing and kickboxing fitness classes are among the most popular in gyms and fitness clubs worldwide, the lack of research on shadowboxing and martial arts-based fitness programs in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Thick concepts, non-cognitivism, and Wittgenstein’s rule-following considerations.Adam M. Croom - 2010 - South African Journal of Philosophy 29 (3):286-309.
    Non-cognitivists claim that thick concepts can be disentangled into distinct descriptive and evaluative components and that since thick concepts have descriptive shape they can be mastered independently of evaluation. In Non-Cognitivism and Rule-Following, John McDowell uses Wittgenstein’s rule-following considerations to show that such a non-cognitivist view is untenable. In this paper I do several things. I describe the non-cognitivist position in its various forms and explain its driving motivations. I then explain McDowell’s argument against non-cognitivism and the Wittgensteinian considerations upon (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  37. On Political Legitimacy, Reasonableness, and Perfectionism.Thomas M. Besch - 2013 - Public Reason 5 (1):58-74.
    The paper advances a non-orthodox reading of political liberalism’s view of political legitimacy, the view of public political justification that comes with it, and the idea of the reasonable at the heart of these views. Political liberalism entails that full discursive standing should be accorded only to people who are reasonable in a substantive sense. As the paper argues, this renders political liberalism dogmatic and exclusivist at the level of arguments for or against normative theories of justice. Against that background, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  38.  75
    Mary Wollstonecraft and Richard Price: The Theological and Philosophical Foundations of Freedom as Independence.Alan M. S. J. Coffee - 2024 - Women's Writing 31 (3):392–405.
    In Wollstonecraft’s early writings, she articulates the foundational theological and philosophical principles that would underpin her work throughout her career. One difference between her early and later work lies in the way that the values to which she refers are combined. Whereas Wollstonecraft at first appeals to the separate ideals of independence, equality, and virtue, from the 1790s onwards she integrates these into a characteristic republican framework that was in common use amongst dissenting theorists at the time. The set of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. (1 other version)Money Without State.Andrew M. Bailey, Bradley Rettler & Craig Warmke - 2021 - Philosophy Compass 16 (11):1-15.
    In this article, we describe what cryptocurrency is, how it works, and how it relates to familiar conceptions of and questions about money. We then show how normative questions about monetary policy find new expression in Bitcoin and other cryptocurrencies. These questions can play a role in addressing not just what money is, but what it should be. A guiding theme in our discussion is that progress here requires a mixed approach that integrates philosophical tools with the purely technical results (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. The Idea of Will.M. M. Dorenbosch - 2015 - Journal of Consciousness Exploration and Research 6 (7):449-472.
    This article presents a new conceptual view on the conscious will. This new concept approaches our will from the perspective of the requirements of our neural-muscular system and not from our anthropocentric perspective. This approach not only repositions the will at the core of behavior control, it also integrates the studies of Libet and Wegner, which seem to support the opposite. The will does not return as an instrument we use to steer, but rather as part of the way we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Hume, Distinctions of Reason, and Differential Resemblance.Donald L. M. Baxter - 2010 - Philosophy and Phenomenological Research 82 (1):156-182.
    Hume discusses the distinction of reason to explain how we distinguish things inseparable, and so identical, e.g., the color and figure of a white globe. He says we note the respect in which the globe is similar to a white cube and dissimilar to a black sphere, and the respect in which it is dissimilar to the first and similar to the second. Unfortunately, Hume takes these differing respects of resemblance to be identical with the white globe itself. Contradiction results, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  42. The Long View: Essays on Policy, Philanthropy, and the Long-term Future.Natalie Cargill & Tyler M. John (eds.) - 2021 - London: FIRST.
    Enclosed is a guidebook for philanthropists, advocates, and policymakers who want to do the most good possible. This book introduces the philosophy of “longtermism,” the idea that it is particularly important that we act now to safeguard future generations. -/- The future is vast in scale: depending on our choices in the coming centuries, the future could stretch for eons or it could dwindle into oblivion, and be inordinately good or inordinately bad. And yet future generations are utterly disenfranchised in (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  43. (1 other version)Introduction to Cultural domination: philosophical perspectives.Thomas M. Besch, Raphael Van Riel, Harold Kincaid & Tarun Menon - forthcoming - In Thomas M. Besch, Raphael Van Riel, Harold Kincaid & Tarun Menon (eds.), Cultural domination: philosophical perspectives. Routledge (expected 2024).
    Download  
     
    Export citation  
     
    Bookmark  
  44. Was Leibniz Confused about Confusion?Stephen M. Puryear - 2005 - The Leibniz Review 15:95-124.
    Leibniz’s mechanistic reduction of colors and other sensible qualities commits him to two theses about our knowledge of those qualities: first, that we can acquire ideas of sensible qualities apart from any direct acquaintance with the qualities themselves; second, that we can acquire distinct (i.e., non-confused) ideas of such qualities through the development of physical-theoretical accounts. According to some commentators, however, Leibniz frequently denies both claims. His views on the subject are muddled and incoherent, they say, both because he is (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  45. Presentism, eternalism and relativity physics.Thomas M. Crisp - 2004 - In William Lane Craig & Quentin Smith (eds.), Einstein, Relativity and Absolute Simultaneity. Routledge. pp. 262-278.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  46.  67
    Sharing LiSQuP's leap: Lessons and experiences within an online advancement program in the Philippines.Jose Norman Bernardo Bajar, Henry Buemio & Reynald M. Cacho - 2023 - Open Praxis 16 (2):208-224.
    This paper examines the experiences of a group of values education teachers who are studying in a customized scholarship and online graduate program under the Linking Standards and Quality Practice (LiSQuP) project in the Philippines. It aimed to explore the attitudes, benefits, and challenges encountered by the values education teachers by participating in the LiSQuP program. Embedded single case study research design was used, and qualitative content analysis was utilized for analyzing and interpreting the data. Recorded focus group interview, online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Mechanism schemas and the relationship between biological theories.Tudor M. Baetu - 2011 - In Phyllis McKay Illari Federica Russo (ed.), Causality in the Sciences. Oxford University Press.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  48. On Actualist and Fundamental Public Justification in Political Liberalism.Thomas M. Besch - 2020 - Philosophia 48 (5):1777-1799.
    Public justification in political liberalism is often conceptualized in light of Rawls’s view of its role in a hypothetical well-ordered society as an ideal or idealizing form of justification that applies a putatively reasonable conception of political justice to political matters. But Rawls implicates a different idea of public justification in his doctrine of general reflective equilibrium. The paper engages this second, more fundamental idea. Public justification in this second sense is actualist and fundamental. It is actualist in that it (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. The non-transitivity of the contingent and occasional identity relations.Ralf M. Bader - 2012 - Philosophical Studies 157 (1):141-152.
    This paper establishes that the occasional identity relation and the contingent identity relation are both non-transitive and as such are not properly classified as identity relations. This is achieved by appealing to cases where multiple fissions and fusions occur simultaneously. These cases show that the contingent and occasional identity relations do not even satisfy the time-indexed and world-indexed versions of the transitivity requirement and hence are non-transitive relations.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. Factualism, Normativism and the Bounds of Normativity.Thomas M. Besch - 2011 - Dialogue 50 (2):347-365.
    The paper argues that applications of the principle that “ought” implies “can” (OIC) depend on normative considerations even if the link between “ought” and “can” is logical in nature. Thus, we should reject a common, “factualist” conception of OIC and endorse weak “normativism”. Even if we use OIC as the rule ““cannot” therefore “not ought””, applying OIC is not a mere matter of facts and logic, as factualists claim, but often draws on “proto-ideals” of moral agency.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
1 — 50 / 955