Results for 'Phishing Detection Framework'

996 found
Order:
  1. Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Introspection Is Signal Detection.Jorge Morales - forthcoming - British Journal for the Philosophy of Science.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  4. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. COVID-19 Face Mask Detection Alert System.McDonald Moyo & Cen Yuefeng - 2022 - Computer Engineering and Intelligent Systems 13 (2):1-15.
    Study shows that mask-wearing is a critical factor in stopping the COVID-19 transmission. By the time of this article, most states have mandated face masking in public space. Therefore, real-time face mask detection becomes an essential application to prevent the spread of the pandemic. This study will present a face mask detection system that can detect and monitor mask-wearing from camera feeds and alert when there is a violation. The face mask detection algorithm uses a haar cascade (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Responsible Innovation in Social Epistemic Systems: The P300 Memory Detection Test and the Legal Trial.John Danaher - forthcoming - In Van den Hoven (ed.), Responsible Innovation Volume II: Concepts, Approaches, Applications. Springer.
    Memory Detection Tests (MDTs) are a general class of psychophysiological tests that can be used to determine whether someone remembers a particular fact or datum. The P300 MDT is a type of MDT that relies on a presumed correlation between the presence of a detectable neural signal (the P300 “brainwave”) in a test subject, and the recognition of those facts in the subject’s mind. As such, the P300 MDT belongs to a class of brain-based forensic technologies which have proved (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. A framework for the first‑person internal sensation of visual perception in mammals and a comparable circuitry for olfactory perception in Drosophila.Kunjumon Vadakkan - 2015 - Springerplus 4 (833):1-23.
    Perception is a first-person internal sensation induced within the nervous system at the time of arrival of sensory stimuli from objects in the environment. Lack of access to the first-person properties has limited viewing perception as an emergent property and it is currently being studied using third-person observed findings from various levels. One feasible approach to understand its mechanism is to build a hypothesis for the specific conditions and required circuit features of the nodal points where the mechanistic operation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Saliva Ontology: An ontology-based framework for a Salivaomics Knowledge Base.Jiye Ai, Barry Smith & David Wong - 2010 - BMC Bioinformatics 11 (1):302.
    The Salivaomics Knowledge Base (SKB) is designed to serve as a computational infrastructure that can permit global exploration and utilization of data and information relevant to salivaomics. SKB is created by aligning (1) the saliva biomarker discovery and validation resources at UCLA with (2) the ontology resources developed by the OBO (Open Biomedical Ontologies) Foundry, including a new Saliva Ontology (SALO). We define the Saliva Ontology (SALO; http://www.skb.ucla.edu/SALO/) as a consensus-based controlled vocabulary of terms and relations dedicated to the salivaomics (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  11. The State of the Sharing Economy in Croatia: Legal Framework and Impact on Various Economic Sectors.Kosjenka Dumančić & Anita Čeh Časni - 2021 - In Andrzej Klimczuk, Vida Česnuitytė & Gabriela Avram (eds.), The Collaborative Economy in Action: European Perspectives. Limerick: University of Limerick. pp. 90-99.
    Since the sharing economy is a rather new phenomenon, there is still no official definition of it in the legal framework of Croatia. The continuous development of sharing economy started a few years after the 1998 global and domestic economic crisis stroked Croatia. Namely, a total of eight platforms in the sectors of transportation, accommodation, finance, and online skills could be identified. The total market share of these platforms amounts to estimated market revenue of roughly 106 million EUR. When (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. ARTIFICIAL INTELLIGENT BASED COMPUTATIONAL MODEL FOR DETECTING CHRONIC-KIDNEY DISEASE.K. Jothimani & S. Thangamani - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):15-27.
    Chronic kidney disease (CKD) is a global health problem with high morbidity and mortality rate, and it induces other diseases. There are no obvious incidental effects during the starting periods of CKD, patients routinely disregard to see the sickness. Early disclosure of CKD enables patients to seek helpful treatment to improve the development of this disease. AI models can effectively assist clinical with achieving this objective on account of their fast and exact affirmation execution. In this appraisal, proposed a Logistic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Fantastic Educational Gaps and Where to Find Them: LERB – A Model to Classify Inequity and Inequality.Anh-Duc Hoang - 2019 - Journal of International Education and Practice 2 (4):19-28.
    In today’s world, education is less being considered as an outcome, but more as a journey. As the adventurers, our students are facing more and more complex challenges. Previously, the socio-economic status of a student’s family seemed to be one of the biggest factors among inequality causes. Nowadays, the chaotic situation of today's VUCA world (volatility, uncertainty, complexity, and ambiguity) is generating more and more types of inequity and inequality. Thus, the purpose of the study is to develop LERB - (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Neural Substrates of Conscious Perception without Performance Confounds.Jorge Morales, Brian Odegaard & Brian Maniscalco - forthcoming - In Felipe De Brigard & Walter Sinnott-Armstrong (eds.), Anthology of Neuroscience and Philosophy.
    To find the neural substrates of consciousness, researchers compare subjects’ neural activity when they are aware of stimuli against neural activity when they are not aware. Ideally, to guarantee that the neural substrates of consciousness—and nothing but the neural substrates of consciousness—are isolated, the only difference between these two contrast conditions should be conscious awareness. Nevertheless, in practice, it is quite challenging to eliminate confounds and irrelevant differences between conscious and unconscious conditions. In particular, there is an often-neglected confound that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Models of Introspection vs. Introspective Devices Testing the Research Programme for Possible Forms of Introspection.Krzysztof Dołęga - 2023 - Journal of Consciousness Studies 30 (9):86-101.
    The introspective devices framework proposed by Kammerer and Frankish (this issue) offers an attractive conceptual tool for evaluating and developing accounts of introspection. However, the framework assumes that different views about the nature of introspection can be easily evaluated against a set of common criteria. In this paper, I set out to test this assumption by analysing two formal models of introspection using the introspective device framework. The question I aim to answer is not only whether models (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Exploration and exploitation of Victorian science in Darwin’s reading notebooks.Jaimie Murdock, Colin Allen & Simon DeDeo - 2017 - Cognition 159 (C):117-126.
    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized reading journals, we generate topic models to quantify his local (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  19. The outlier paradox: The role of iterative ensemble coding in discounting outliers.Michael Epstein, Jake Quilty-Dunn, Eric Mandelbaum & Tatiana Emmanouil - forthcoming - Journal of Experimental Psychology: Human Perception and Performance 1.
    Ensemble perception—the encoding of objects by their group properties—is known to be resistant to outlier noise. However, this resistance is somewhat paradoxical: how can the visual system determine which stimuli are outliers without already having derived statistical properties of the ensemble? A simple solution would be that ensemble perception is not a simple, one-step process; instead, outliers are detected through iterative computations that identify items with high deviance from the mean and reduce their weight in the representation over time. Here (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Predictive coding and representationalism.Paweł Gładziejewski - 2016 - Synthese 193 (2).
    According to the predictive coding theory of cognition , brains are predictive machines that use perception and action to minimize prediction error, i.e. the discrepancy between bottom–up, externally-generated sensory signals and top–down, internally-generated sensory predictions. Many consider PCT to have an explanatory scope that is unparalleled in contemporary cognitive science and see in it a framework that could potentially provide us with a unified account of cognition. It is also commonly assumed that PCT is a representational theory of sorts, (...)
    Download  
     
    Export citation  
     
    Bookmark   85 citations  
  21. Autism: the micro-movement perspective.Elizabeth B. Torres, Maria Brincker, Robert W. Isenhower, Polina Yanovich, Kimberly Stigler, John I. Nurnberger, Dimitri N. Metaxas & Jorge V. Jose - 2013 - Frontiers Integrated Neuroscience 7 (32).
    The current assessment of behaviors in the inventories to diagnose autism spectrum disorders (ASD) focus on observation and discrete categorizations. Behaviors require movements, yet measurements of physical movements are seldom included. Their inclusion however, could provide an objective characterization of behavior to help unveil interactions between the peripheral and the central nervous systems. Such interactions are critical for the development and maintenance of spontaneous autonomy, self-regulation and voluntary control. At present, current approaches cannot deal with the heterogeneous, dynamic and stochastic (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  22. Tools, Objects, and Chimeras: Connes on the Role of Hyperreals in Mathematics.Vladimir Kanovei, Mikhail G. Katz & Thomas Mormann - 2013 - Foundations of Science 18 (2):259-296.
    We examine some of Connes’ criticisms of Robinson’s infinitesimals starting in 1995. Connes sought to exploit the Solovay model S as ammunition against non-standard analysis, but the model tends to boomerang, undercutting Connes’ own earlier work in functional analysis. Connes described the hyperreals as both a “virtual theory” and a “chimera”, yet acknowledged that his argument relies on the transfer principle. We analyze Connes’ “dart-throwing” thought experiment, but reach an opposite conclusion. In S , all definable sets of reals are (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  23. Metaphysics and Conceptual Analysis: Experimental Philosophy's Place under the Sun.Uriah Kriegel - 2017 - In D. Rose (ed.), Experimental Metaphysics. New York: Bloomsbury Academic. pp. 7-46.
    What is the rationale for the methodological innovations of experimental philosophy? This paper starts from the contention that common answers to this question are implausible. It then develops a framework within which experimental philosophy fulfills a specific function in an otherwise traditionalist picture of philosophical inquiry. The framework rests on two principal ideas. The first is Frank Jackson’s claim that conceptual analysis is unavoidable in ‘serious metaphysics’. The second is that the psychological structure of concepts is extremely intricate, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  24. Logocentrism and the Gathering Λόγος: Heidegger, Derrida, and the Contextual Centers of Meaning.Jussi Backman - 2012 - Research in Phenomenology 42 (1):67-91.
    Abstract Derrida's deconstructive strategy of reading texts can be understood as a way of highlighting the irreducible plurality of discursive meaning that undermines the traditional Western “logocentric“ desire for an absolute point of reference. While his notion of logocentrism was modeled on Heidegger's articulation of the traditional ontotheological framework of Aristotelian metaphysics, Derrida detects a logocentric remnant in Heidegger's own interpretation of gathering ( Versammlung ) as the basic movement of λόγος, discursiveness. However, I suggest that Derrida here touches (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Jaké to je, nebo o čem to je? Místo vědomí v materiálním světě.Tomas Hribek - 2017 - Praha, Česko: Filosofia.
    [What It’s Like, or What It’s About? The Place of Consciousness in the Material World] Summary: The book is both a survey of the contemporary debate and a defense of a distinctive position. Most philosophers nowadays assume that the focus of the philosophy of consciousness, its shared explanandum, is a certain property of experience variously called “phenomenal character,” “qualitative character,” “qualia” or “phenomenology,” understood in terms of what it is like to undergo the experience in question. Consciousness as defined in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  26. Scholarship on the relations between Ludwig Wittgenstein and Charles S. Peirce.Jaime Nubiola - 1996 - In Ignacio Angelelli & María Cerezo (eds.), Studies on the History of Logic: Proceedings of the III. Symposium on the History of Logic. Berlin, Germany: Walter de Gruyter.
    Thirty years ago Richard Rorty detected the similarities between Wittgenstein's Philosophical Investigations (1953) and the philosophical framework of Charles S. Peirce (1839-1914), the founder of pragmatism. Rorty tried to show that Peirce envisaged and repudiated in advance logical positivism and developed insights and a philosophical mood very close to the analytical philosophers influenced by the later Wittgenstein (Rorty 1961). In spite of that, the majority of scholars have considered both thinkers as totally alien. Some scholars have attributed the pragmatist (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  27. Fregean de re thoughts.Marco Aurelio Sousa Alves - 2014 - Cognitio-Estudos 11 (1):1-12.
    This papers aims at clarifying some misunderstandings that seem to block an adequate account of de re thoughts within the Fregean framework. It is usually assumed that Fregean senses cannot be de re, or dependent upon objects. Contrary to this assumption, Gareth Evans and John McDowell have claimed that Fregean de re senses are not just possible, but in fact the most promising alternative for accounting for de re thoughts. The reasons blocking this alternative can be traced back to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. La teoría pragmatista de la historia en José Ortega y Gasset.Marnie Binder - 2018 - Valencia, Spain: Nexofía, Libros Electrónicos de la Torre del Virrey.
    Spanish Philosopher José Ortega y Gasset advanced a number of strong criticisms of American pragmatism, yet some pragmatist notions can also be detected in his own philosophy. Within Ortega’s pragmatist perspectivism one can locate the possibility of overcoming one of the principal perceived problems of pragmatism: namely, its tendency toward relativism. This paper focuses on the ways in which Ortega’s discussion of pragmatism pertains to history and historiography. Ortega’s position that history is written from a select number of perspectives is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Religious Cognition as Social Cognition.Hans Van Eyghen - 2015 - Studia Religiologica 48 (4):301-312.
    In this paper, I examine the relationship between social cognition and religious cognition. Many cognitive theories of religion claim that these two forms are somehow related, but the details are usually left unexplored and insights from theories of social cognition are not taken on board. I discuss the three main (groups of) theories of social cognition, namely the theory-theory, the simulation theory and enactivist theories. Secondly, I explore how these theories can help to enrich a number of cognitive theories of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Spencer-Brown vs. Probability and Statistics: Entropy’s Testimony on Subjective and Objective Randomness.Julio Michael Stern - 2011 - Information 2 (2):277-301.
    This article analyzes the role of entropy in Bayesian statistics, focusing on its use as a tool for detection, recognition and validation of eigen-solutions. “Objects as eigen-solutions” is a key metaphor of the cognitive constructivism epistemological framework developed by the philosopher Heinz von Foerster. Special attention is given to some objections to the concepts of probability, statistics and randomization posed by George Spencer-Brown, a figure of great influence in the field of radical constructivism.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Healthcare professionals acting ethically under the risk of stigmatization and violence during COVID-19 from media reports in Turkey.Sukran Sevimli - 2020 - Eubios Journal of Asian and International Bioethics 30 (5):207-211.
    Abstract Aim: The COVID-19 infection is transmitted either by human-to-human contact, social-physical contact, and respiratory droplets or by touching items touched by the infected. This has triggered some conflicted behaviors such as stigma, violence, and opposite behavior applause. The aim of this study is to explore several newspaper articles about stigma, violence, or insensitive behavior against healthcare professionals and to analyze the reason for these behaviors during these COVID-19 pandemics. Method: The website of the Turkish Medical Association "Press Releases News" (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Biomedical ontology alignment: An approach based on representation learning.Prodromos Kolyvakis, Alexandros Kalousis, Barry Smith & Dimitris Kiritsis - 2018 - Journal of Biomedical Semantics 9 (21).
    While representation learning techniques have shown great promise in application to a number of different NLP tasks, they have had little impact on the problem of ontology matching. Unlike past work that has focused on feature engineering, we present a novel representation learning approach that is tailored to the ontology matching task. Our approach is based on embedding ontological terms in a high-dimensional Euclidean space. This embedding is derived on the basis of a novel phrase retrofitting strategy through which semantic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Abort og fosterreduksjon: En etisk sammenligning.Silje Langseth Dahl, Rebekka Hylland Vaksdal, Mathias Barra, Espen Gamlund & Carl Tollef Solberg - 2019 - Etikk I Praksis - Nordic Journal of Applied Ethics 1:89-111.
    In recent years, multifetal pregnancy reduction (MFPR) has increasingly been the subject of debate in Norway, and the intensity reached a tentative maximum when Legislation Department delivered the interpretative statement § 2 - Interpretation of the Abortion Act in 2016 in response to the Ministry of Health (2014) requesting the Legislation Department to consider whether the Law on abortion allows for MFPR of healthy fetuses in multiple pregnancies. The Legislation Department concluded that current abortion laws allow MFPR within the (...) the law otherwise stipulates. The debate has not subsided, and during autumn 2018, it was further intensified in connection with the Christian Democrat "crossroads" and signals from the Conservatives to consider removing §2.3c and to forbid MFPR. -/- Many of the arguments in the MFPR debate appear seemingly similar to arguments pending in the general abortion debate, and an analysis of what sets MFPR apart from other abortions is wanting. The aim of this article is, therefore, to examine whether there is a moral distinction between abortion and MFPR of healthy fetuses. We will cover the typical arguments of the Norwegian debate, and highlight them with scholarly articles from the literature. The most important arguments against MFPR that we have identified we have dubbed the harm argument, slippery-slope argument, intent argument, grief argument, psychological long-term effects for the woman and sorting argument. We conclude that counter-arguments do not measure up in terms of detecting a morally relevant difference between MFPR of healthy fetuses and abortions. Our conclusion is therefore that—despite what several debaters seem to think—there is no morally relevant difference between the two. Therefore, when we allow abortion, we should also allow MFPR. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. A "purist" feminist epistemology?Emily Tilton - 2023 - Dissertation, University of British Columbia
    An intuitive conception of objectivity involves an ideal of neutrality—if we’re to engage in objective inquiry, we must try to sideline our prejudices, values, and politics, lest these factors taint inquiry and unduly influence our results. This intuition underlies various “purist” epistemological frameworks, which grant epistemic significance only to “epistemic factors” like evidence or the truth of a belief. Feminist epistemologists typically condemn purist frameworks as inimical to feminist aims. They argue that purist epistemology is divorced from the ineliminably social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Pandemic solutionism: the power of big tech during the COVID-19 crisis.Anna-Verena Nosthoff & Felix Maschewski - 2023 - Digital Culture and Society 8 (1):43-65.
    In this article, we investigate how Big Tech companies have used the novel coronavirus disease (COVID-19) pandemic to increase their social, political, infrastructural, and epistemic power. We focus on four companies that were outspoken in their efforts to combat the virus: Alphabet (also known as Google), Apple, Facebook, and Amazon (GAFA). During the crisis, these companies evolved as adaptive entities that responded to the state of emergency by promptly rolling out various technological solutions, exemplifying what we call ‘pandemic solutionism’, that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Smart Walking System based on Artificial Intelligence.Vanita Babanne, Simranjeet Kaur, Tejal Mehta, Divya Mulay & Rachana Nagarkar - 2018 - International Journal of Research in Engineering, Science and Management 1 (12).
    This paper shows the smart walking stick based on ultrasonic sensors and Arduino for outwardly debilitated individuals. There are roughly 37 million individuals over the globe who are visually impaired as indicated by the World Health Organization. Individuals with visual inabilities are regularly subjected to outer help which can be given by people, trained dogs, or electronic gadgets as supportive networks for basic assistance. Thus, this played as the motivation to develop a smart cane white stick to survive these restrictions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Gadamer – Cheng: Conversations in Hermeneutics.Andrew Fuyarchuk - 2021 - Journal of Chinese Philosophy 48 (3):245-249.
    1 Introduction1 In the 1980s, hermeneutics was often incorporated into deconstructionism and literary theory. Rather than focus on authorial intentions, the nature of writing itself including codes used to construct meaning, socio-economic contexts and inequalities of power,2 Gadamer introduced a different perspective; the interplay between effects of history on a reader’s understanding and the tradition(s) handed down in writing. This interplay in which a reader’s prejudices are called into question and modified by the text in a fusion of understanding and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Density Based Traffic Control Signaling Using IR sensors.Tenepalli Kalyan Sai Manikanta Chari & SaiTeja Tutika - 2019 - IJEAIS 3 (3):51-60.
    Abstract—Traffic clog is a serious issue in the majority of the urban areas over the world and it has turned into a bad dream for the residents. It is brought about by postponement in flag, improper planning of traffic flagging and so on. The postponement of traffic light is hard coded and it doesn't depend on traffic. In this manner for streamlining traffic control, there is an expanding request in precise snappy programmed framework. This paper is intended to build (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. The Phenomenal Representation of Size.Jonathan Brink Morgan - 2021 - Australasian Journal of Philosophy 99 (4):716-729.
    Suppose that, while you are dreamlessly asleep, the sizes of and distances between all objects in the world are uniformly multiplied. Would you be able to detect this global inflation? Intuitively, no. But would your experience of size remain accurate? Intuitively, yes. On these grounds, some have concluded that our experiences do not represent size and instead represent modes of presentation of size. We are, in this sense, ‘cut off’ from the sizes of things in the external world. Here, I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The Phenomenal Representation of Size.Jonathan Brink Morgan - 2021 - Australasian Journal of Philosophy 99 (4):716-729.
    Suppose that, while you are dreamlessly asleep, the sizes of and distances between all objects in the world are uniformly multiplied. Would you be able to detect this global inflation? Intuitively, no. But would your experience of size remain accurate? Intuitively, yes. On these grounds, some have concluded that our experiences do not represent size and instead represent modes of presentation of size. We are, in this sense, ‘cut off’ from the sizes of things in the external world. Here, I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Handles for Pentesting Modern Secure Coding: bypassing mobile security.Mourad M. H. Henchiri - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):8-15.
    Abstract— Malware behavior was and still is a key solution, for top security appliances, to monitor algorithmic approaches when performing regular security tasks; scan, detection, cleaning and removal. And even for early actions; when building a security framework and securing all possible access points to all data sources. The first suspect in such scenario is the inner residents; appliances and system functions. Numerous are available at each operating system, and thus, the security is raised and set up frequently (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Review of The Inflationary Universe by Alan Guth (1997).Michael Starks - 2016 - In Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Michael Starks. pp. 615-618.
    This is one of the best popular cosmology books ever written and Guth is now (2016) a top physics Professor at MIT. He tells the extremely complex story of inflation and related areas of particle physics in such an absorbing style that it reads like a detective novel-in fact, it is a detective novel-how he and others found out how the universe started! The interweaving of his personal story and that of many colleagues along with their photos and many wonderfully (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  44. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  45. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Download  
     
    Export citation  
     
    Bookmark   91 citations  
  46. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  48. Carnapian Frameworks Revisited.Matti Eklund - 2023 - In Panu Raatikainen (ed.), _Essays in the Philosophy of Language._ Acta Philosophica Fennica Vol. 100. Helsinki: Societas Philosophica Fennica. pp. 91–113.
    In his recent article "Carnapian Frameworks" (Synthese, 2021), Gabriel Broughton criticizes my discussions of Carnap on ontology and puts forward his own interpretation of what Carnap’s external/internal distinction amounts to. I here first argue that Broughton’s main claims about me are based on a misinterpretation. Then I turn to some issues of broader interest. I argue that Broughton’s own, potentially interesting interpretation of Carnap’s external/internal distinction does not work. And in light of Broughton’s discussion I present a sharpened version of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. A new framework for host-pathogen interaction research.Hong Yu, Li Li, Anthony Huffman, John Beverley, Junguk Hur, Eric Merrell, Hsin-hui Huang, Yang Wang, Yingtong Liu, Edison Ong, Liang Cheng, Tao Zeng, Jingsong Zhang, Pengpai Li, Zhiping Liu, Zhigang Wang, Xiangyan Zhang, Xianwei Ye, Samuel K. Handelman, Jonathan Sexton, Kathryn Eaton, Gerry Higgins, Gilbert S. Omenn, Brian Athey, Barry Smith, Luonan Chen & Yongqun He - 2022 - Frontiers in Immunology 13.
    COVID-19 often manifests with different outcomes in different patients, highlighting the complexity of the host-pathogen interactions involved in manifestations of the disease at the molecular and cellular levels. In this paper, we propose a set of postulates and a framework for systematically understanding complex molecular host-pathogen interaction networks. Specifically, we first propose four host-pathogen interaction (HPI) postulates as the basis for understanding molecular and cellular host-pathogen interactions and their relations to disease outcomes. These four postulates cover the evolutionary dispositions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game addictions (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 996