Results for 'S. Arul Selvan'

987 found
Order:
  1. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  78
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  71
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  95
    Artificial Intelligence in HR: Driving Agility and Data-Informed Decision-Making.Madhavan Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):506-515.
    In today’s rapidly evolving business landscape, organizations must continuously adapt to stay competitive. AI-driven human resource (HR) analytics has emerged as a strategic tool to enhance workforce agility and inform decision-making processes. By leveraging advanced algorithms, machine learning models, and predictive analytics, HR departments can transform vast data sets into actionable insights, driving talent management, employee engagement, and overall organizational efficiency. AI’s ability to analyze patterns, forecast trends, and offer data-driven recommendations empowers HR professionals to make proactive decisions in hiring, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  89
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  93
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  85
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  66
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  86
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  76
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  23.  77
    3D Convolutional Neural Networks for Accurate Reconstruction of Distorted Faces.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (4):560-570.
    The core objective of this project is to recognize and reconstruct distorted facial images, particularly in the context of accidents. This involves using deep learning techniques to analyze the features of a distorted face and regenerate it into a recognizable form. Deep learning models are wellsuited for this task due to their ability to learn complex patterns and representations from data the input data consists of distorted facial images, typically obtained from MRI scans of accident victims. These images may contain (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  78
    Bridging Professional and Personal Lives: The Role of Telemedicine in Doctors' Work-Life Equilibrium.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-535.
    The rapid adoption of telemedicine has transformed healthcare delivery, especially during the COVID-19 pandemic. This digital shift has enabled medical professionals to offer consultations and manage patients remotely, ensuring continuity of care while reducing exposure risks. However, the integration of telemedicine has presented both opportunities and challenges for doctors, particularly in terms of their work-life balance. This paper explores the digital adaptation of doctors in public and private hospitals concerning telemedicine practices and its impact on their work-life harmony. The study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  29
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel capacity of main (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Collected Papers (on Neutrosophic Theory and Applications), Volume VIII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Mechanisms of Techno-Moral Change: A Taxonomy and Overview.John Danaher & Henrik Skaug Sætra - 2023 - Ethical Theory and Moral Practice 26 (5):763-784.
    The idea that technologies can change moral beliefs and practices is an old one. But how, exactly, does this happen? This paper builds on an emerging field of inquiry by developing a synoptic taxonomy of the mechanisms of techno-moral change. It argues that technology affects moral beliefs and practices in three main domains: decisional (how we make morally loaded decisions), relational (how we relate to others) and perceptual (how we perceive situations). It argues that across these three domains there are (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  28. The perception of phantom Limbs: The D. O. Hebb lecture.Vilayanur S. Ramachandran & William Hirstein - 1998 - Brain 121:1603-1630.
    Almost everyone who has a limb amputated will experience a phantom limb--the vivid impression that the limb is not only still present, but in some cases, painful. There is now a wealth of empirical evidence demonstrating changes in cortical topography in primates following deafferentation or amputation, and this review will attempt to relate these in a systematic way to the clinical phenomenology of phantom limbs. With the advent of non-invasive imaging techniques such as MEG (magnetoencephalogram) and functional MRI, topographical reorganization (...)
    Download  
     
    Export citation  
     
    Bookmark   107 citations  
  29. Cognitive Penetration, Perceptual Learning and Neural Plasticity.Ariel S. Cecchi - 2014 - Dialectica 68 (1):63-95.
    Cognitive penetration of perception, broadly understood, is the influence that the cognitive system has on a perceptual system. The paper shows a form of cognitive penetration in the visual system which I call ‘architectural’. Architectural cognitive penetration is the process whereby the behaviour or the structure of the perceptual system is influenced by the cognitive system, which consequently may have an impact on the content of the perceptual experience. I scrutinize a study in perceptual learning that provides empirical evidence that (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  30. Updating Data Semantics.Anthony S. Gillies - 2020 - Mind 129 (513):1-41.
    This paper has three main goals. First, to motivate a puzzle about how ignorance-expressing terms like maybe and if interact: they iterate, and when they do they exhibit scopelessness. Second, to argue that there is an ambiguity in our theoretical toolbox, and that exposing that opens the door to a solution to the puzzle. And third, to explore the reach of that solution. Along the way, the paper highlights a number of pleasing properties of two elegant semantic theories, explores some (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  31. Misunderstanding Metaethics: Difficulties Measuring Folk Objectivism and Relativism.Lance S. Bush & David Moss - 2020 - Diametros 17 (64):6-21.
    Recent research on the metaethical beliefs of ordinary people appears to show that they are metaethical pluralists that adopt different metaethical standards for different moral judgments. Yet the methods used to evaluate folk metaethical belief rely on the assumption that participants interpret what they are asked in metaethical terms. We argue that most participants do not interpret questions designed to elicit metaethical beliefs in metaethical terms, or at least not in the way researchers intend. As a result, existing methods are (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  32. Perceptual variation in object perception: A defence of perceptual pluralism.Berit Brogaard & Thomas Alrik Sørensen - 2023 - In Aleksandra Mroczko-Wrasowicz & Rick Grush (eds.), Sensory Individuals: Unimodal and Multimodal Perspectives. Oxford, UK: Oxford University Press. pp. 113–129.
    The basis of perception is the processing and categorization of perceptual stimuli from the environment. Much progress has been made in the science of perceptual categorization. Yet there is still no consensus on how the brain generates sensory individuals, from sensory input and perceptual categories in memory. This chapter argues that perceptual categorization is highly variable across perceivers due to their use of different perceptual strategies for solving perceptual problems they encounter, and that the perceptual system structurally adjusts to the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Toward a Value-Sensitive Absorptive Capacity Framework: Navigating Intervalue and Intravalue Conflicts to Answer the Societal Call for Health.Onno S. W. F. Omta, Léon Jansen, Oana Branzei, Vincent Blok & Jilde Garst - 2021 - Business and Society 60 (6):1349-1386.
    The majority of studies on absorptive capacity (AC) underscore the importance of absorbing technological knowledge from other firms to create economic value. However, to preserve moral legitimacy and create social value, firms must also discern and adapt to (shifts in) societal values. A comparative case study of eight firms in the food industry reveals how organizations prioritize and operationalize the societal value health in product innovation while navigating inter- and intravalue conflicts. The value-sensitive framework induced in this article extends AC (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34. Impartiality, compassion, and modal imagination.Adrian M. S. Piper - 1991 - Ethics 101 (4):726-757.
    We need modal imagination in order to extend our conception of reality - and, in particular, of human beings - beyond our immediate experience in the indexical present; and we need to do this in order to preserve the significance of human interaction. To make this leap of imagination successfully is to achieve not only insight but also an impartial perspective on our own and others' inner states. This perspective is a necessary condition of experiencing compassion for others. This is (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  35. Should We Blow Up a Pipeline?Alexander S. Arridge - 2023 - Environmental Ethics 45 (4):403-425.
    Ecotage, or the destruction of property for the sake of promoting environmental ends, is beginning to (re)establish itself both as a topic of public discussion and as a radical activist tactic. In response to these developments, a small but growing academic literature questions whether, and if so under what conditions, ecotage can be morally justified. This paper contributes to the literature by arguing that instances of ecotage are pro tanto justified insofar as they are instances of effective and proportionate self- (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Defining Digital Authoritarianism.James S. Pearson - 2024 - Philosophy and Technology 37 (2):1-19.
    It is becoming increasingly common for authoritarian regimes to leverage digital technologies to surveil, repress and manipulate their citizens. Experts typically refer to this practice as digital authoritarianism (DA). Existing definitions of DA consistently presuppose a politically repressive agent intentionally exploiting digital technologies to pursue authoritarian ends. I refer to this as the intention-based definition. This paper argues that this definition is untenable as a general description of DA. I begin by illustrating the current predominance of the intention-based definition (Section (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Transforming Human Resource Management: The Impact of Artificial Intelligence on Recruitment and Beyond.Hazem A. S. Alrakhawi, Randa Elqassas, Mohammed M. Elsobeihi, Basel Habil, Basem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (8):1-5.
    Abstract: The integration of Artificial Intelligence (AI) into Human Resource Management (HRM) is fundamentally transforming how organizations approach recruitment, performance management, and employee engagement. This paper explores the multifaceted impact of AI on HR practices, highlighting its role in enhancing efficiency, reducing bias, and driving strategic decision-making. Through an in-depth analysis of AI-driven recruitment tools, performance management systems, and personalized employee engagement strategies, this study examines both the opportunities and challenges associated with AI in HRM. Ethical considerations, including data privacy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Time in Thermal Time.Eugene Y. S. Chua - 2024 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie.
    Preparing general relativity for quantization in the Hamiltonian approach leads to the `problem of time,' rendering the world fundamentally timeless. One proposed solution is the `thermal time hypothesis,' which defines time in terms of states representing systems in thermal equilibrium. On this view, time is supposed to emerge thermodynamically even in a fundamentally timeless context. Here, I develop the worry that the thermal time hypothesis requires dynamics -- and hence time -- to get off the ground, thereby running into worries (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Naïve Realism and Sensorimotor Theory.Daniel S. H. Kim - 2024 - Synthese 204 (105):1-22.
    How can we have a sense of the presence of ordinary three-dimensional objects (e.g., an apple on my desk, a partially occluded cat behind a picket fence) when we are only presented with some parts of objects perceived from a particular egocentric viewpoint (e.g., the facing side of the apple, the unoccluded parts of the cat)? This paper presents and defends a novel answer to this question by incorporating insights from two prominent contemporary theories of perception, naïve realism and sensorimotor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The Evidential Problem of Evil and the Aesthetics of Surprise.James S. Spiegel - forthcoming - Faith and Philosophy.
    Paul Draper argues that given theism we should not expect the amount of pain and suffering we observe in the world. And since the prevalence of such evils is not surprising from a non-theistic perspective, we should reject the theistic hypothesis. But not all surprising observations are necessarily a demerit when it comes to the assessment of a given theoretical perspective. I propose that on Christian theism the prevalence of evil is a surprising feature that contributes to the overall aesthetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. A modest defense of manifestationalism.Jamin Asay & S. Seth Bordner - 2015 - Synthese 192 (1):147-161.
    As the debate between realists and empiricists in the philosophy of science drags on, one point of consensus has emerged: no one wants to be a manifestationalist. The manifestationalist is a kind of radical empiricist who argues that science provides theories that aim neither at a true picture of the entire world, nor even an empirically adequate picture that captures the world in all its observable respects. For manifestationalists, science aims only at providing theories that are true to the observed (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Democratic Alarmism: Coherent Notion or Contradiction in Terms?James S. Pearson - forthcoming - Constellations.
    Political leaders engage in alarmism when they inflate threats to the commonweal in order to influence citizens' behavior. A range of democratic theorists argue that alarmism is necessary to maintain political order, with some even contending that alarmism is particularly necessary in democratic polities. Yet there appear to be strong grounds for thinking that alarmism is incompatible with the democratic ethos, namely insofar as it contravenes the principle of collective self-determination. Prima facie, alarmism seems to violate this principle because it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Artificial Intelligence in Digital Media: Opportunities, Challenges, and Future Directions.Basma S. Abu Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic and Applied Research (IJAAR) 8 (6):1-10.
    Abstract: This research paper explores the transformative impact of artificial intelligence (AI) on digital media, examining both the opportunities it presents and the challenges it poses. The integration of AI into digital media has revolutionized content creation, distribution, and analytics, offering unprecedented levels of personalization, efficiency, and insight. Automated journalism, AI- driven recommendation systems, and advanced audience analytics are among the key areas where AI is making significant contributions. However, the adoption of AI also brings ethical considerations, including concerns about (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. WILHELM DILTHEY, JOHN STUART MILL, AND THE LOGIC OF THE HUMAN SCIENCES.Eric S. Nelson - 2024 - Rev. Roum. Philosophie 68 (1):103-123.
    Download  
     
    Export citation  
     
    Bookmark  
  45. Religious Schools.Michael S. Merry - 2024 - In Ritzer George (ed.), Wiley-Blackwell Encyclopedia of Sociology. Wiley-Blackwell.
    Over the past 45 years there has been increasing vocal opposition to religious schools, particularly in Western Europe. Only some of this opposition is related to the perception that some religious schools might be excluding the less fortunate. Much of the opposition rests on the conviction that it is no longer tenable to fund and support so many religious schools when the number of persons professing religious belief has sharply declined. This argument, buttressed by the belief that Europe has undergone (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Classifying and characterizing active materials.Julia R. S. Bursten - 2020 - Synthese 199 (1):2007-2026.
    This article examines the distinction between active matter and active materials, and it offers foundational remarks toward a system of classification for active materials. Active matter is typically identified as matter that exhibits two characteristic features: self-propelling parts, and coherent dynamical activity among the parts. These features are exhibited across a wide range of organic and inorganic materials, and they are jointly sufficient for classifying matter as active. Recently, the term “active materials” has entered scientific use as a complement, supplement, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Using a two-dimensional model from social ontology to explain the puzzling metaphysical features of words.Jared S. Oliphint - 2022 - Synthese 200 (3):1-10.
    I argue that a two-dimensional model of social objects is uniquely positioned to deliver explanations for some of the puzzling metaphysical features of words. I consider how a type-token model offers explanations for the metaphysical features of words, but I give reasons to find the model wanting. In its place, I employ an alternative model from social ontology to explain the puzzling data and questions that are generated from the metaphysical features of words. In the end I chart a new (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Mocht Plato zien wat er van de universiteit geworden is, dan zou hij stomverbaasd en bezorgd zijn.Michael S. Merry & Bart Van Leeuwen - 2024 - Https://Www.Knack.Be/Nieuws/Belgie/Onderwijs/Mocht-Plato-Zien-Wat-Er-van-de-Universiteit-Geworden-is -Dan-Zou-Hij-Stomverbaasd-En-Bezorgd-Zijn/.
    Als Plato de hedendaagse academie zou aanschouwen, zou hij niet alleen stomverbaasd zijn over de massificatie en de byzantijnse bureaucratie, maar gezien het ethische doel van de universiteit zou hij ook reden hebben om bezorgd te zijn.
    Download  
     
    Export citation  
     
    Bookmark  
  49. Jongeren kunnen nog niet stemmen, maar volwassenen ook niet.Daphne Brandenburg & Michael S. Merry - 2024 - Bij Nader Inzien 1.
    Voor het eerst hebben jongeren onder de achttien in Duitsland en België deze maand gestemd, bij de Europese verkiezingen. Nederlandse leeftijdsgenoten hebben dit recht (nog) niet. Te beïnvloedbaar, ze kunnen nog niet verantwoord stemmen, klinkt het. Deze tegenwerpingen zijn oneerlijk. Ze gelden ook voor miljoenen anderen die al wel stemrecht hebben.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Al-Kindi and Nietzsche on the Stoic Art of Banishing Sorrow.Peter S. Groff - 2004 - Journal of Nietzsche Studies 28 (1):139-173.
    This comparative examination of Nietzsche and the Islamic philosopher al-Kindi emphasizes their mutual commitment to the recovery of classical Greek and Hellenistic thought and the idea of philosophy as a way of life. Affiliating both thinkers with the Stoic lineage in particular, I examine the ways in which they appropriate common themes such as fatalism, self-cultivation via spiritual exercises, and the banishing of sorrow. Focusing primarily on their respective conceptions of self and nature, I argue that the antipodal worldviews of (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
1 — 50 / 987