Results for 'Maslov’s canonical operator'

982 found
Order:
  1. New exact quasi-classical asymptotic beyond WKB approximation and beyond Maslov formal expansion.Jaykov Foukzon - 2015 - Journal of Physics: Conference Series 633 (1):`1-5.
    New exact quasi-classical asymptotic of solutions to the.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Elementary canonical formulae: extending Sahlqvist’s theorem.Valentin Goranko & Dimiter Vakarelov - 2006 - Annals of Pure and Applied Logic 141 (1):180-217.
    We generalize and extend the class of Sahlqvist formulae in arbitrary polyadic modal languages, to the class of so called inductive formulae. To introduce them we use a representation of modal polyadic languages in a combinatorial style and thus, in particular, develop what we believe to be a better syntactic approach to elementary canonical formulae altogether. By generalizing the method of minimal valuations à la Sahlqvist–van Benthem and the topological approach of Sambin and Vaccaro we prove that all inductive (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  3. Leibniz’s doctrine of toleration: philosophical, theological and pragmatic reasons.Maria Rosa Antognazza - 2013 - In Jon Parkin & Timothy Stanton, Natural Law and Toleration in the Early Enlightenment. Oxford University Press. pp. 139-164.
    Leibniz is not commonly numbered amongst canonical writers on toleration. One obvious reason is that, unlike Locke, he wrote no treatise specifically devoted to that doctrine. Another is the enormous amount of energy which he famously devoted to ecclesiastical reunification. Promoting the reunification of Christian churches is an objective quite different from promoting the toleration of different religious faiths – so different, in fact, that they are sometimes even construed as mutually exclusive. Ecclesiastical reunification aims to find agreement at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Completeness and Doxastic Plurality for Topological Operators of Knowledge and Belief.Thomas Mormann - 2023 - Erkenntnis: 1 - 34, ONLINE.
    The first aim of this paper is to prove a topological completeness theorem for a weak version of Stalnaker’s logic KB of knowledge and belief. The weak version of KB is characterized by the assumption that the axioms and rules of KB have to be satisfied with the exception of the axiom (NI) of negative introspection. The proof of a topological completeness theorem for weak KB is based on the fact that nuclei (as defined in the framework of point-free topology) (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. Brouwer's Intuition of Twoity and Constructions in Separable Mathematics.Bruno Bentzen - 2023 - History and Philosophy of Logic 45 (3):341-361.
    My first aim in this paper is to use time diagrams in the style of Brentano to analyze constructions in Brouwer's separable mathematics more precisely. I argue that constructions must involve not only pairing and projecting as basic operations guaranteed by the intuition of twoity, as sometimes assumed in the literature, but also a recalling operation. My second aim is to argue that Brouwer's views on the intuition of twoity and arithmetic lead to an ontological explosion. Redeveloping the constructions of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Morgan’s Canon, meet Hume’s Dictum: avoiding anthropofabulation in cross-species comparisons.Cameron Buckner - 2013 - Biology and Philosophy 28 (5):853-871.
    How should we determine the distribution of psychological traits—such as Theory of Mind, episodic memory, and metacognition—throughout the Animal kingdom? Researchers have long worried about the distorting effects of anthropomorphic bias on this comparative project. A purported corrective against this bias was offered as a cornerstone of comparative psychology by C. Lloyd Morgan in his famous “Canon”. Also dangerous, however, is a distinct bias that loads the deck against animal mentality: our tendency to tie the competence criteria for cognitive capacities (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  7. Kant's Canon, Garve's Cicero, and the Stoic Doctrine of the Highest Good.Corey Dyck - forthcoming - In Stefano Bacin & Oliver Sensen, Kant's Moral Philosophy in Context. Cambridge:
    The concept of the highest good is an important but hardly uncontroversial piece of Kant’s moral philosophy. In the considerable literature on the topic, challenges are raised concerning its apparently heteronomous role in moral motivation, whether there is a distinct duty to promote it, and more broadly whether it is ultimately to be construed as a theological or merely secular ideal. Yet comparatively little attention has been paid to the context of a doctrine that had enjoyed a place of prominence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Probability Modals and Infinite Domains.Adam Marushak - 2020 - Journal of Philosophical Logic 49 (5):1041-1055.
    Recent years have witnessed a proliferation of attempts to apply the mathematical theory of probability to the semantics of natural language probability talk. These sorts of “probabilistic” semantics are often motivated by their ability to explain intuitions about inferences involving “likely” and “probably”—intuitions that Angelika Kratzer’s canonical semantics fails to accommodate through a semantics based solely on an ordering of worlds and a qualitative ranking of propositions. However, recent work by Wesley Holliday and Thomas Icard has been widely thought (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. JTB Epistemology and the Gettier problem in the framework of topological epistemic logic.Thomas Mormann - 2023 - Review of Analytic Philosophy 3 (1):1 - 41.
    Abstract. Traditional epistemology of knowledge and belief can be succinctly characterized as JTB-epistemology, i.e., it is characterized by the thesis that knowledge is justified true belief. Since Gettier’s trail-blazing paper of 1963 this account has become under heavy attack. The aim of is paper is to study the Gettier problem and related issues in the framework of topological epistemic logic. It is shown that in the framework of topological epistemic logic Gettier situations necessarily occur for most topological models of knowledge (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Building a Science of Animal Minds: Lloyd Morgan, Experimentation, and Morgan’s Canon.Grant Goodrich & Simon Fitzpatrick - 2017 - Journal of the History of Biology 50 (3):525-569.
    Conwy Lloyd Morgan (1852–1936) is widely regarded as the father of modern comparative psychology. Yet, Morgan initially had significant doubts about whether a genuine science of comparative psychology was even possible, only later becoming more optimistic about our ability to make reliable inferences about the mental capacities of non-human animals. There has been a fair amount of disagreement amongst scholars of Morgan’s work about the nature, timing, and causes of this shift in Morgan’s thinking. We argue that Morgan underwent two (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  11. Against Morgan's Canon.Simon Fitzpatrick - 2017 - In Kristin Andrews & Jacob Beck, The Routledge Handbook of Philosophy of Animal Minds. Routledge.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12.  97
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms can significantly enhance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Strategic and Operational Planning As Approach for Crises Management Field Study on UNRWA.Mazen J. Al Shobaki, Youssef M. Abu Amuna & Samy S. Abu Naser - 2017 - International Journal of Information Technology and Electrical Engineering 5 (6):43-47.
    The research aims to study the role of strategic and operational planning as approach for crises management in UNRWA - Gaza Strip field- Palestine. Several descriptive analytical methods were used for this purpose and a survey as a tool for data collection. Community size was (881), and the study sample was stratified random (268). The overall findings of the current study show that strategic and operational planning is performed in UNRWA. The results of static analysis show that there are a (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  14. The Impact of Management Requirements and Operations of Computerized MIS to Improve Performance.Samy S. Abu Naser & Mazen J. Al Shobaki - 2016 - Al-Azhar University of Gaza, Palestine 1:1-28.
    The research aims to identify the impact of the management requirements on operating of computerized management information systems to improve performance, and discuss the perceptions of respondents to develop the performance of employees in the Gaza Electricity Distribution Company, the researchers used the stratified sample method, (360) questionnaires were distributed on the study sample, (306) questionnaires were recovered with a percentage of (85%). The most important findings of the study: computerized MI have a positive impact on the development of performance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Beyond cognitive myopia: a patchwork approach to the concept of neural function.Philipp Haueis - 2018 - Synthese 195 (12):5373-5402.
    In this paper, I argue that looking at the concept of neural function through the lens of cognition alone risks cognitive myopia: it leads neuroscientists to focus only on mechanisms with cognitive functions that process behaviorally relevant information when conceptualizing “neural function”. Cognitive myopia tempts researchers to neglect neural mechanisms with noncognitive functions which do not process behaviorally relevant information but maintain and repair neural and other systems of the body. Cognitive myopia similarly affects philosophy of neuroscience because scholars overlook (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  16. Secunda Operatio Respicit Ipsum Esse Rei: An Evaluation of Jacques Maritain, Étienne Gilson, and Ralph McInerny on the Relation of Esse to the Intellect’s Two Operations.Elliot Polsky - 2021 - Nova et Vetera 19 (2):895–932.
    In a few texts, Thomas Aquinas says that the first operation of the intellect pertains to (respicit) “the quiddity of a thing” whereas the second operation pertains to “the to be itself of a thing” (esse). But Aquinas also says that quiddities are to the intellect as color is to the power of sight. Statements such as these seem to have led Jacques Maritain and Étienne Gilson to see esse as the proper object of the intellect’s second operation. Against this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Arrow’s impossibility theorem and the national security state.S. M. Amadae - 2005 - Studies in History and Philosophy of Science Part A 36 (4):734-743.
    This paper critically engages Philip Mirowki's essay, "The scientific dimensions of social knowledge and their distant echoes in 20th-century American philosophy of science." It argues that although the cold war context of anti-democratic elitism best suited for making decisions about engaging in nuclear war may seem to be politically and ideologically motivated, in fact we need to carefully consider the arguments underlying the new rational choice based political philosophies of the post-WWII era typified by Arrow's impossibility theorem. A distrust of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The “ethnophilosophy” problem: How the idea of “social imaginaries” may remedy it.Donald Mark C. Ude - 2024 - Philosophical Forum 55 (1):71-86.
    The work argues that engaging Africa's cultural and epistemic resources as social imaginaries, and not as metaphysical or ontological “essences,” could help practitioners of African philosophy overcome the cluster of shortcomings and undesirable features associated with “ethnophilosophy.” A number of points are outlined to buttress this claim. First, the framework of social imaginaries does not operate with the false assumption that Africa's cultural forms and epistemic resources are static and immutable. Second, this framework does not lend itself to sweeping generalizations (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. The Impact of Management Requirements and Operations of Computerized Management Information Systems to Improve Performance (Practical Study on the employees of the company of Gaza Electricity Distribution).Samy S. Abu Naser & Mazen J. Al Shobaki - 2016 - Al-Azhar University, Gaza 1 (1):1-28.
    The research aims to identify the impact of the management requirements on operating of computerized management information systems to improve performance, and discuss the perceptions of respondents to develop the performance of employees in the Gaza Electricity Distribution Company, the researchers used the stratified sample method, (360) questionnaires were distributed on the study sample, (306) questionnaires were recoved with a percentage of (85%). The most important findings of the study: computerized MI have a positive impact on the development of performance (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. (4 other versions)The Fixation of Belief.C. S. Peirce - 1877 - Popular Science Monthly 12 (1):1-15.
    “Probably Peirce’s best-known works are the first two articles in a series of six that originally were collectively entitled Illustrations of the Logic of Science and published in Popular Science Monthly from November 1877 through August 1878. The first is entitled ‘The Fixation of Belief’ and the second is entitled ‘How to Make Our Ideas Clear.’ In the first of these papers Peirce defended, in a manner consistent with not accepting naive realism, the superiority of the scientific method over other (...)
    Download  
     
    Export citation  
     
    Bookmark   301 citations  
  21.  58
    Optimizing Inventory Management with Advanced Robotic Pick and Place Technology.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):690-700.
    The results show significant improvements in operational efficiency compared to traditional stock management approaches. This integration paves the way for future advancements in fully automated warehouses, reducing the need for human labor and increasing reliability. Finally, we discuss potential enhancements, including AI-based decision-making algorithms, multi-robot collaboration, and integration with Internet of Things (IoT) for real-time data analysis and continuous system improvement. Key words: Robotic aut.
    Download  
     
    Export citation  
     
    Bookmark  
  22.  99
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Kant on Non-Veridical Experience.Andrew Stephenson - 2011 - Kant Yearbook 3 (1):1-22.
    In this paper I offer an interpretation of Kant’s theory of perceptual error based on his remarks in the Anthropology. Both hallucination and illusion, I argue, are for Kant species of experience and therefore require the standard co-operation of sensibility and understanding. I develop my account in a conceptualist framework according to which the two canonical classes of non-veridical experience involve error in the basic sense that how they represent the world as being is not how the world is. (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  24. How to Spot a Usurper: Clinical Ethics Consultation and (True) Moral Authority.Kelly Kate Evans & Nicholas Colgrove - 2022 - Christian Bioethics 28 (2):143-156.
    Clinical ethics consultants (CECs) are not moral authorities. Standardization of CECs’ professional role does not confer upon them moral authority. Certification of particular CECs does not confer upon them moral authority (nor does it reflect such authority). Or, so we will argue. This article offers a distinctly Orthodox Christian response to those who claim that CECs—or any other academically trained bioethicist—retain moral authority (i.e., an authority to know and recommend the right course of action). This article proceeds in three parts. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Classification of Alzheimer's Disease Using Convolutional Neural Networks.Lamis F. Samhan, Amjad H. Alfarra & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):18-23.
    Brain-related diseases are among the most difficult diseases due to their sensitivity, the difficulty of performing operations, and their high costs. In contrast, the operation is not necessary to succeed, as the results of the operation may be unsuccessful. One of the most common diseases that affect the brain is Alzheimer’s disease, which affects adults, a disease that leads to memory loss and forgetting information in varying degrees. According to the condition of each patient. For these reasons, it is important (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  26.  91
    Modern Abstract Sacrifice in Robespierre's Terror and Hitler's Holocaust.Cara S. Greene - 2025 - Chiasma: A Site for Thought 9 (1):23-42.
    In “Modern Abstract Sacrifice in Robespierre’s Terror and Hitler’s Holocaust,” I use Hegel’s analysis of Robespierre’s Terror in the Phenomenology and Adorno and Horkheimer’s analysis of the Nazi Holocaust in the Dialectic of Enlightenment to identify what I term “modern abstract sacrifice” as the dominant kind of instrumental destruction that took place during these nation-building mass-sacrifices. As I show, these events relied upon a justificatory instrumental logic—a sacrificial story—even if that sacrificial story broke down or was abandoned in practice, in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Enhancing the use of Decision Support Systems for Re-engineering of Operations and Business- Applied Study on the Palestinian Universities.Samy S. Abu Naser & Mazen J. Al Shobaki - 2016 - Journal of Multidisciplinary Engineering Science Studies 2 (5):505--512.
    This research aims to identify the use of decision support systems as an entry point for operations of re-engineering in the Palestinian universities in Gaza Strip. The researchers used the method of questionnaire to collect data, and the researchers used a sample stratified random way, were (350) questionnaire distributed on the research sample and (312) questionnaire were collected back (89.1%). The study results showed that the most important ones are: there exists statistically significant impact at the level of significance (α (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  28. Intermediate Role of Operations Standard in the Relationship between the Focus on Benefiting Students and Students Satisfaction in Palestinian Universities.Suliman A. El Talla, Mazen J. Al Shobaki, Samy S. Abu-Naser & Ahmed M. A. FarajAllah - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (5):86-100.
    The study aimed to identify the intermediate role of the standard of operations in the relationship between the focus on students and beneficiaries in achieving satisfaction of students in Palestinian universities. The study used the analytical descriptive method. The study was conducted on university leadership in Al-Azhar, Islamic and Al-Aqsa Universities. The study sample consisted of (200) individuals, 182 of whom responded, and the questionnaire was used in collecting the data. The results of the study were as follows: - There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Quantum linguistics and Searle's Chinese room argument.J. M. Bishop, S. J. Nasuto & B. Coecke - 2013 - In Vincent Müller, Philosophy and Theory of Artificial Intelligence. Springer. pp. 17-29.
    Viewed in the light of the remarkable performance of ‘Watson’ - IBMs proprietary artificial intelligence computer system capable of answering questions posed in natural language - on the US general knowledge quiz show ‘Jeopardy’, we review two experiments on formal systems - one in the domain of quantum physics, the other involving a pictographic languaging game - whereby behaviour seemingly characteristic of domain understanding is generated by the mere mechanical application of simple rules. By re-examining both experiments in the context (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Quantum linguistics and Searle's Chinese room argument.J. M. Bishop, S. J. Nasuto & B. Coecke - 2013 - In Vincent Müller, Philosophy and Theory of Artificial Intelligence. Springer. pp. 17-29.
    Viewed in the light of the remarkable performance of ‘Watson’ - IBMs proprietary artificial intelligence computer system capable of answering questions posed in natural language - on the US general knowledge quiz show ‘Jeopardy’, we review two experiments on formal systems - one in the domain of quantum physics, the other involving a pictographic languaging game - whereby behaviour seemingly characteristic of domain understanding is generated by the mere mechanical application of simple rules. By re-examining both experiments in the context (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Without a Voice of One's Own: Aphonia as an Obstacle to Political Freedom.Joonas S. Martikainen - 2021 - Acta Philosophica Fennica 97:105–128.
    In this article I use Maurice Merleau-Ponty’s existential phenomenology as a method for presenting a disclosing critique of aphonia as the loss of a political voice of one’s own. I claim that aphonia is a phenomenon that is qualitatively different from a lack of opportunities for democratic participation and a lack of the communicative capabilities required for effective political participation. I give examples from sociological literature on social exclusion and political apathy, and then diagnose them using Merleau-Ponty’s concepts of operative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. On Operator N and Wittgenstein’s Logical Philosophy.James R. Connelly - 2017 - Journal for the History of Analytical Philosophy 5 (4).
    In this paper, I provide a new reading of Wittgenstein’s N operator, and of its significance within his early logical philosophy. I thereby aim to resolve a longstanding scholarly controversy concerning the expressive completeness of N. Within the debate between Fogelin and Geach in particular, an apparent dilemma emerged to the effect that we must either concede Fogelin’s claim that N is expressively incomplete, or reject certain fundamental tenets within Wittgenstein’s logical philosophy. Despite their various points of disagreement, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. From “Whither” to “Whence”: A Decolonial Reading of Malabou.Rachel Cicoria - 2023 - Philosophies 8 (5):93-111.
    A turn from the “whither” to the “whence” of anarchism is at stake in Catherine Malabou’s interpretation of Latin American decolonial theory. This is a turn from a materialist philosophy that seeks to open the space of anarchism within the modern state toward one that discerns anarchism as already operative in the modern state given the social implications of colonial legacies. In tracing this turn, I propose a development of Malabou’s work insofar as I put her in dialogue with María (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Uniform Single Valued Neutrosophic Graphs.S. Broumi, A. Dey, A. Bakali, M. Talea, F. Smarandache, L. H. Son & D. Koley - 2017 - Neutrosophic Sets and Systems 17:42-49.
    In this paper, we propose a new concept named the uniform single valued neutrosophic graph. An illustrative example and some properties are examined. Next, we develop an algorithmic approach for computing the complement of the single valued neutrosophic graph. A numerical example is demonstrated for computing the complement of single valued neutrosophic graphs and uniform single valued neutrosophic graph.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Interlacing of theory, experiment and instrument in accelerator-based experiments: the “theoretical-operational” model.A. I. Lipkin & V. S. Pronskikh - 2009 - Investigated in Russia:511.
    In accordance with the ideas of I.Hacking and P.Galison, and the “theoretical-operational” structure of experiment of Fock-Lipkin, a symbolic language is developed for the description of structure of a contemporary complex experiment. With its help a particle accelerator-based experiment is analysed as an example of this kind of experiments, where explication and analysis of the following essential features is performed: the roles of instrument, background, data analysis, and their theoretical components. An attempt is made to clarify the concepts of “instrument” (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various devices c,onnected over a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  65
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional Neural Networks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Note introductive à un document d’archive de Louis Althusser, 'Lettre au Comité central du PCF, 18 mars 1966' .William S. Lewis - 2020 - Décalages 3 (2):133-52.
    Cette note devait introduire à un public anglophone la traduction de la « Lettre de Louis Althusser datée du 18 mars 1966 et adressée au Comité central du PCF », elle est ici enrichie dans une version livrée au public français. Elle apporte le contexte historique et théorique nécessaire à la compréhension des interventions « anti-humanistes » de Louis Althusser qui questionne les choix politiques opérés par le PCF au cours des années 1960. Nulle part ailleurs, dans les écrits publiés (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Artificial Intelligence in Healthcare: Transforming Patient Care and Medical Practices.Jawad Y. I. Alzamily, Hani Bakeer, Husam Almadhoun, Basem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (8):1-9.
    Abstract: Artificial Intelligence (AI) is rapidly becoming a cornerstone of modern healthcare, offering unprecedented capabilities in diagnostics, treatment planning, patient care, and healthcare management. This paper explores the transformative impact of AI on the healthcare sector, examining how it enhances patient outcomes, improves the efficiency of medical practices, and introduces new ethical and operational challenges. By analyzing current applications such as AI-driven diagnostic tools, personalized medicine, and hospital management systems, this paper highlights the significant advancements AI has brought to the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  41. Co-operative solutions to the prisoner's dilemma.Duncan Macintosh - 1991 - Philosophical Studies 64 (3):309 - 321.
    For the tradition, an action is rational if maximizing; for Gauthier, if expressive of a disposition it maximized to adopt; for me, if maximizing on rational preferences, ones whose possession maximizes given one's prior preferences. Decision and Game Theory and their recommendations for choice need revamping to reflect this new standard for the rationality of preferences and choices. It would not be rational when facing a Prisoner's Dilemma to adopt or co-operate from Amartya Sen's "Assurance Game" or "Other Regarding" preferences. (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  42. "Jewish Law, Techno-Ethics, and Autonomous Weapon Systems: Ethical-Halakhic Perspectives".Nadav S. Berman - 2020 - Jewish Law Association Studies 29:91-124.
    Techno-ethics is the area in the philosophy of technology which deals with emerging robotic and digital AI technologies. In the last decade, a new techno-ethical challenge has emerged: Autonomous Weapon Systems (AWS), defensive and offensive (the article deals only with the latter). Such AI-operated lethal machines of various forms (aerial, marine, continental) raise substantial ethical concerns. Interestingly, the topic of AWS was almost not treated in Jewish law and its research. This article thus proposes an introductory ethical-halakhic perspective on AWS, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Feminist Research and Field work Methodology.Maya S. - 2022 - International Journal of Sociology and Humanities 4 (1).
    The topic of the present paper is conducting feminist research in South Asia and the way politics works in this process. It is specifically based on the experiences of empirical work done in Kerala, the southernmost state in India, which is unique in being one of the only two states with a strong communist movement. In addition, the numerous religions, castes, and communities of the Kerala region can be profitably analyzed in connection with the policies of the Left, emerging feminist (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  50
    A Metaethical Analysis of Ethics via Synthetic/Analytic Distinction: Do ethics have any ‘real’ significance?S. Negash - manuscript
    Using synthetic analytic distinction to examine the importance of ethical discourse. How do we go about determining whether ethics have any significance at all? This essay examines the operation of ethical language and argues that emotivism is the most comprehensive metaethical stance.
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Role of AI in Enhancing Business Decision-Making: Innovations and Implications.Faten Y. A. Abu Samara, Aya Helmi Abu Taha, Nawal Maher Massa, Tanseen N. Abu Jamie, Fadi E. S. Harara, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Pedagogical Research (IJAPR) 8 (9):8-15.
    Abstract: Artificial Intelligence (AI) has rapidly advanced, offering significant potential to transform business decision-making. This paper delves into how AI can be harnessed to enhance strategic decision-making within business contexts. It investigates the integration of AI-driven analytics, predictive modeling, and automation, emphasizing their role in improving decision accuracy and operational efficiency. By examining current applications and case studies, the paper underscores the opportunities AI offers, including improved data insights, risk management, and personalized customer experiences. It also addresses the challenges businesses (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Rationality and the Structure of the Self Volume II: A Kantian Conception.Adrian M. S. Piper - 2013 - APRA Foundation.
    Adrian Piper argues that the Humean conception can be made to work only if it is placed in the context of a wider and genuinely universal conception of the self, whose origins are to be found in Kant’s Critique of Pure Reason. This conception comprises the basic canons of classical logic, which provide both a model of motivation and a model of rationality. These supply necessary conditions both for the coherence and integrity of the self and also for unified agency. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. Two Types of Autonomy.J. S. Swindell Blumenthal-Barby - 2008 - American Journal of Bioethics-Neuroscience 9 (1):52-53.
    Although I agree with Sabine Muller’s conclusion that we should first seek to find alternatives to amputation for patients suffering from Body Integrity Identity Disorder (BIID), I disagree with one of the major premises that she uses to argue for her claim. Muller argues that patients with BIID are likely not autonomous when they request that the limb be amputated. Muller’s argument that BIID suffers are not autonomous is flawed because she conflates philosophical conceptions of autonomy with the conception of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  48. Complex Emergent Model of Language Acquisition (CEMLA).Mir H. S. Quadri - 2024 - The Lumeni Notebook Research.
    The Complex Emergent Model of Language Acquisition (CEMLA) offers a new perspective on how humans acquire language, drawing on principles from complexity theory to explain this dynamic, adaptive process. Moving beyond linear and reductionist models, CEMLA views language acquisition as a system of interconnected nodes, feedback loops, and emergent patterns, operating at the edge of chaos. This framework captures the fluidity and adaptivity of language learning, highlighting how understanding and fluency arise through self-organisation, phase transitions, and interaction with diverse linguistic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Role of the Practice of Excellence Strategies in Education to Achieve Sustainable Competitive Advantage to Institutions of Higher Education-Faculty of Engineering and Information Technology at Al-Azhar University in Gaza a Model.Mazen J. Al Shobaki & Samy S. Abu Naser - 2017 - International Journal of Digital Publication Technology 1 (2):135-157.
    This study aims to look at the role of the practice of excellence strategies in education in achieving sustainable competitive advantage for the Higher educational institutions of the faculty of Engineering and Information Technology at Al-Azhar University in Gaza, a model, and the study considered the competitive advantage of educational institutions stems from the impact on the level of each student, employee, and the institution. The study was based on the premise that the development of strategies for excellence in education, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. New Intervention Meditation Combining Heritage and Psychology.G. S. Ramesh Kumar - 2022 - Journal of Emerging Technologies and Innovative Research 9 (4):72 - 79.
    In this paper, a new Intervention Meditation approach is outlined by the current author. To overcome lack of clarity in defining meditation, a new universal Operational definition of meditation is proposed with elaborative explanation. The new meditation approach has multitude of deeper concepts from Bhagavad Gita and modern psychology and the expert / Guru of the proposed method must be a qualified and experienced before getting trained on this approach specifically. This paper elevates meditation from a casual approach level to (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 982