Results for 'S. Arul Selvan'

963 found
Order:
  1. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  41
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  67
    AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  54
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  52
    Artificial Intelligence in HR: Driving Agility and Data-Informed Decision-Making.Madhavan Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):506-515.
    In today’s rapidly evolving business landscape, organizations must continuously adapt to stay competitive. AI-driven human resource (HR) analytics has emerged as a strategic tool to enhance workforce agility and inform decision-making processes. By leveraging advanced algorithms, machine learning models, and predictive analytics, HR departments can transform vast data sets into actionable insights, driving talent management, employee engagement, and overall organizational efficiency. AI’s ability to analyze patterns, forecast trends, and offer data-driven recommendations empowers HR professionals to make proactive decisions in hiring, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  47
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  73
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  26
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  42
    Bridging Professional and Personal Lives: The Role of Telemedicine in Doctors' Work-Life Equilibrium.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-535.
    The rapid adoption of telemedicine has transformed healthcare delivery, especially during the COVID-19 pandemic. This digital shift has enabled medical professionals to offer consultations and manage patients remotely, ensuring continuity of care while reducing exposure risks. However, the integration of telemedicine has presented both opportunities and challenges for doctors, particularly in terms of their work-life balance. This paper explores the digital adaptation of doctors in public and private hospitals concerning telemedicine practices and its impact on their work-life harmony. The study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  57
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  55
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  53
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  15.  51
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  18. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  20.  56
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  43
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  56
    (1 other version)A PBL REPORT FOR CONTAINMENT ZONE ALERTING APPLICATION.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  64
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Collected Papers (on Neutrosophic Theory and Applications), Volume VIII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. "R. Ḥayyim Hirschensohn’s Beliefs about Death and Immortality as Tested by his Halakhic Decision Making” [in Hebrew].Nadav Berman, S. - 2017 - Daat 83 (2017):337-359.
    This paper traces two contradicting beliefs about death and immortality in the writings of Rabbi Hayyim Hirschensohn, and examines these opposing beliefs in his Halakhic ruling, in the case of Autopsies. The paper opens by conceptualizing two possible attitudes regarding the relation between this-world and the ʽother-world’, and by analyzing two main beliefs regarding death and immortality in their relation to the body-spirit distinction (the naturalistic and the spiritualistic approach). It demonstrates how Hirschensohn was holding these two different views. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Interpreting Hobbes’s Moral Theory: Rightness, Goodness, Virtue, and Responsibility.S. A. Lloyd - 2021 - Journal of Ethical Reflections 1 (4):69-90.
    The paper argues that the moral philosophy of Thomas Hobbes is unified by a complex conception of reason that imposes consistency norms of both rationality and reasonableness. Hobbes’s conceptions of rightness as reciprocity, and moral goodness as sociability belong to an original and attractive moral theory that is neither teleological nor classically deontological, nor as interpreters have variously argued, subjectivist, contractarian, egoist, or dependent on divine command.
    Download  
     
    Export citation  
     
    Bookmark  
  27. A critique of pure vision.Patricia S. Churchland, V. S. Ramachandran & Terrence J. Sejnowski - 1994 - In Christof Koch & Joel L. Davis (eds.), Large-Scale Neuronal Theories of the Brain. MIT Press. pp. 23.
    Anydomainofscientificresearchhasitssustainingorthodoxy. Thatis, research on a problem, whether in astronomy, physics, or biology, is con- ducted against a backdrop of broadly shared assumptions. It is these as- sumptionsthatguideinquiryandprovidethecanonofwhatisreasonable-- of what "makes sense." And it is these shared assumptions that constitute a framework for the interpretation of research results. Research on the problem of how we see is likewise sustained by broadly shared assump- tions, where the current orthodoxy embraces the very general idea that the business of the visual system is to (...)
    Download  
     
    Export citation  
     
    Bookmark   115 citations  
  28. ITSB: An Intelligent Tutoring System Authoring Tool.Samy S. Abu Naser - 2016 - Journal of Scientific and Engineering Research 3 (5):63-71.
    Abstract. Intelligent Tutoring System Builder (ITSB) is an authoring tool designed and developed to aid teachers in constructing intelligent tutoring systems in a multidisciplinary fields. The teacher is needed to create a set of pedagogical fundamentals, which, in line, are inured to automatically build up a broad tutor framework and construct an intelligent tutoring system. In this paper an explanation of the theory and the architecture of the tool is outlined. A presentation of several system components, the requirements of the (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  29. Mechanisms of Techno-Moral Change: A Taxonomy and Overview.John Danaher & Henrik Skaug Sætra - 2023 - Ethical Theory and Moral Practice 26 (5):763-784.
    The idea that technologies can change moral beliefs and practices is an old one. But how, exactly, does this happen? This paper builds on an emerging field of inquiry by developing a synoptic taxonomy of the mechanisms of techno-moral change. It argues that technology affects moral beliefs and practices in three main domains: decisional (how we make morally loaded decisions), relational (how we relate to others) and perceptual (how we perceive situations). It argues that across these three domains there are (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  30. “The Rejection of Radical-Foundationalism and -Skepticism: Pragmatic Belief in God in Eliezer Berkovits’s Thought” [in Hebrew].Nadav Berman, S. - 2019 - Journal of the Goldstein-Goren International Center for Jewish Thought 1:201-246.
    Faith has many aspects. One of them is whether absolute logical proof for God’s existence is a prerequisite for the proper establishment and individual acceptance of a religious system. The treatment of this question, examined here in the Jewish context of Rabbi Prof. Eliezer Berkovits, has been strongly influenced in the modern era by the radical foundationalism and radical skepticism of Descartes, who rooted in the Western mind the notion that religion and religious issues are “all or nothing” questions. Cartesianism, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. No Coincidence?Matthew S. Bedke - 2014 - Oxford Studies in Metaethics 9:102-125.
    This paper critically examines coincidence arguments and evolutionary debunking arguments against non-naturalist realism in metaethics. It advances a version of these arguments that goes roughly like this: Given a non-naturalist, realist metaethic, it would be cosmically coincidental if our first order normative beliefs were true. This coincidence undermines any prima facie justification enjoyed by those beliefs.
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  32. Between Reason and Coercion: Ethically Permissible Influence in Health Care and Health Policy Contexts.J. S. Blumenthal-Barby - 2012 - Kennedy Institute of Ethics Journal 22 (4):345-366.
    In bioethics, the predominant categorization of various types of influence has been a tripartite classification of rational persuasion (meaning influence by reason and argument), coercion (meaning influence by irresistible threats—or on a few accounts, offers), and manipulation (meaning everything in between). The standard ethical analysis in bioethics has been that rational persuasion is always permissible, and coercion is almost always impermissible save a few cases such as imminent threat to self or others. However, many forms of influence fall into the (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  33. Amidst the ASF Outbreak: The Job Burnout and Employee Performance in the Feed Industry.Nicole P. Francisco, Waren G. Mendoza, Christine Mae S. Boquiren, Michelle Anne Vivien De Jesus, Samantha Nicole N. Dilag, Mary Angeli Z. Menor, Zyresse Katrine P. Jose & Jhoselle Tus - 2023 - Psychology and Education: A Multidisciplinary Journal 9 (1):595-602.
    This study aims to investigate the relationship between job burnout and employee performance in the feed industry during the ASF outbreak. Further, the researchers employed a descriptive-correlational research design in order to analyze the acquired data and produce pertinent findings. Thus, the researchers gathered data from one hundred two (102) feed industry employees. The Maslach Burnout Inventory (MBI) and Individual Work Performance Questionnaire (IWPQ) were employed to ascertain the extent of job burnout experienced by the respondents and evaluate employee performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. To Test the Boundaries of Consciousness, Study Animals.Simon Brown, Elizabeth S. Paul & Jonathan Birch - forthcoming - Trends in Cognitive Sciences.
    A letter replying to Bayne et al. "Tests for consciousness in humans and beyond", 2024, arguing that the search for consciousness "beyond" healthy adult humans should begin with other animals.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Deidealization: No Easy Reversals.Tarja Knuuttila & Mary S. Morgan - 2019 - Philosophy of Science 86 (4):641-661.
    Deidealization as a topic in its own right has attracted remarkably little philosophical interest despite the extensive literature on idealization. One reason for this is the often implicit assumption that idealization and deidealization are, potentially at least, reversible processes. We question this assumption by analyzing the challenges of deidealization within a menu of four broad categories: deidealizing as recomposing, deidealizing as reformulating, deidealizing as concretizing, and deidealizing as situating. On closer inspection, models turn out much more inflexible than the reversal (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  36. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems and attain (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  37. Rule Based System for Diagnosing Bean Diseases and Treatment.Mohammed H. S. Abueleiwa, Fadi E. S. Harara, Mustafa M. K. Al-Ghoul, Sami M. Okasha & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (5):67-74.
    Background: A bean is the seed of one of several genera of the flowering plant family Fabaceae, which are used as vegetables for human or animal food. They can be cooked in many different ways, including boiling, frying, and baking, and are used in many traditional dishes throughout the world. Beans are one of the longest-cultivated plants. Broad beans, also called fava beans, in their wild state the size of a small fingernail, were gathered in Afghanistan and the Himalayan foothills. (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  38. An Expert System for Diagnosing Whooping Cough Using CLIPS.Abedeleilah S. Mahmum, Nidaa Wishah, Waleed Murad, Dina F. Al-Borno & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (6):1-8.
    This abstract is a synopsis of the paper "An Expert System for Diagnosing Whooping Cough Using CLIPS." The bacterium Bordetella pertussis causes whooping cough, a highly infectious respiratory ailment with several phases of symptoms. An accurate and timely diagnosis is critical for effective treatment and the avoidance of future transmission. The construction of an expert system for detecting whooping cough using the CLIPS (C Language Integrated Production System) architecture is highlighted in this abstract. The expert system provides standardized and systematic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Hobbes’s third jurisprudence: legal pragmatism and the dualist menace.Benjamin L. S. Nelson - 2020 - Canadian Journal of Law and Jurisprudence 33 (1).
    This paper explores the possibility that Hobbesian jurisprudence is best understood as a ‘third way’ in legal theory, irreducible to classical natural law or legal positivism. I sketch two potential ‘third theories’ of law -- legal pragmatism and legal dualism -- and argue that, when considered in its broadest sense, Leviathan is best viewed as an example of legal pragmatism. I consider whether this legal pragmatist interpretation can be sustained in the examination of Leviathan’s treatment of civil law, and argue (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Uncomplicating the Idea of Wilderness.Joshua S. Duclos - 2020 - Environmental Values 29 (1):89-107.
    In this paper I identify and respond to four persistent objections to the idea of wilderness: empirical, cultural, philosophical and environmental. Despite having dogged the wilderness debate for decades, none of these objections withstands scrutiny; rather they are misplaced criticisms that hinder fruitful discussion of the philosophical ramifications of wilderness by needlessly complicating the idea itself. While there may be other justifiable concerns about the idea of wilderness, it is time to move beyond the four discussed in this paper.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  41. Predicting COVID-19 Using JNN.Mohammad S. Mattar & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):52-61.
    Abstract: In, this research embodies the spirit of interdisciplinary collaboration, bringing together data science, healthcare, and public health to address one of the most significant global health challenges in recent history. The achievements of this study underscore the potential of advanced machine learning techniques to enhance our understanding of the pandemic and guide effective decision-making. As we navigate the ongoing battle against COVID-19 and prepare for future health emergencies, the lessons learned from this research serve as a testament to the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Issues in the theoretical foundations of climate science.Joel Katzav & Wendy S. Parker - 2018 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 63:141-149.
    The theoretical foundations of climate science have received little attention from philosophers thus far, despite a number of outstanding issues. We provide a brief, non-technical overview of several of these issues – related to theorizing about climates, climate change, internal variability and more – and attempt to make preliminary progress in addressing some of them. In doing so, we hope to open a new thread of discussion in the emerging area of philosophy of climate science, focused on theoretical foundations.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  43. Parkinson’s Disease Prediction Using Artificial Neural Network.Ramzi M. Sadek, Salah A. Mohammed, Abdul Rahman K. Abunbehan, Abdul Karim H. Abdul Ghattas, Majed R. Badawi, Mohamed N. Mortaja, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2019 - International Journal of Academic Health and Medical Research (IJAHMR) 3 (1):1-8.
    Parkinson's Disease (PD) is a long-term degenerative disorder of the central nervous system that mainly affects the motor system. The symptoms generally come on slowly over time. Early in the disease, the most obvious are shaking, rigidity, slowness of movement, and difficulty with walking. Doctors do not know what causes it and finds difficulty in early diagnosing the presence of Parkinson’s disease. An artificial neural network system with back propagation algorithm is presented in this paper for helping doctors in identifying (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Trends of Palestinian Higher Educational Institutions in Gaza Strip as Learning Organizations.Samy S. Abu Naser, Mazen J. Al Shobaki, Youssef M. Abu Amuna & Amal A. Al Hila - 2017 - International Journal of Digital Publication Technology 1 (1):1-42.
    The research aims to identify the trends of Palestinian higher educational institutions in Gaza Strip as learning organizations from the perspective of senior management in the Palestinian universities in Gaza Strip. The researchers used descriptive analytical approach and used the questionnaire as a tool for information gathering. The questionnaires were distributed to senior management in the Palestinian universities. The study population reached (344) employees in senior management is dispersed over (3) Palestinian universities. A stratified random sample of (182) employees from (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  45. Emptiness, negation, and skepticism in Nāgārjuna and Sengzhao.Eric S. Nelson - 2023 - Asian Philosophy 33 (2):125-144.
    This paper excavates the practice-oriented background and therapeutic significance of emptiness in the Madhyamaka philosophy attributed to Nāgārjuna and Sengzhao. Buddhist emptiness unravels experiential and linguistic reification through meditation and argumentation. The historical contexts and uses of the word indicate that it is primarily a practical diagnostic and therapeutic concept. Emptiness does not lead to further views or truths but, akin to yet distinct from Ajñāna and Pyrrhonian skepticism, the suspension of assertion. This sense of emptiness as a practice can (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Democratic Values: A Better Foundation for Public Trust in Science.S. Andrew Schroeder - 2021 - British Journal for the Philosophy of Science 72 (2):545-562.
    There is a growing consensus among philosophers of science that core parts of the scientific process involve non-epistemic values. This undermines the traditional foundation for public trust in science. In this article I consider two proposals for justifying public trust in value-laden science. According to the first, scientists can promote trust by being transparent about their value choices. On the second, trust requires that the values of a scientist align with the values of an individual member of the public. I (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  47. The Time in Thermal Time.Eugene Y. S. Chua - 2024 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie.
    Preparing general relativity for quantization in the Hamiltonian approach leads to the `problem of time,' rendering the world fundamentally timeless. One proposed solution is the `thermal time hypothesis,' which defines time in terms of states representing systems in thermal equilibrium. On this view, time is supposed to emerge thermodynamically even in a fundamentally timeless context. Here, I develop the worry that the thermal time hypothesis requires dynamics -- and hence time -- to get off the ground, thereby running into worries (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Choice Architecture: Improving Choice While Preserving Liberty?J. S. Blumenthal-Barby - 2013 - In Christian Coons & Michael Weber (eds.), Paternalism: Theory and Practice. Cambridge: Cambridge University Press.
    The past four decades of research in the social sciences have shed light on two important phenomena. One is that human decision-making is full of predicable errors and biases that often lead individuals to make choices that defeat their own ends (i.e., the bad choice phenomenon), and the other is that individuals’ decisions and behaviors are powerfully shaped by their environment (i.e., the influence phenomenon). Some have argued that it is ethically defensible that the influence phenomenon be utilized to address (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  49. On Nudging and Informed Consent—Four Key Undefended Premises.J. S. Swindell Blumenthal-Barby - 2013 - American Journal of Bioethics 13 (6):31 - 33.
    In his article “Nudging and Informed Consent,” Shlomo Cohen (2013) argues, among other things, that 1) “to the extent that the nudge-influenced decision making is rational—in whatever sense,” there...
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  50.  83
    Justifying a Capability Approach to Brain Computer Interface.Andrew Ko & Nancy S. Jecker - 2023 - Philosophy and Technology 36 (1):1-6.
    Previously, we introduced a capability approach to assess the responsible use of brain-computer interface. In this commentary, we say more about the ethical basis of our capability view and respond to three objections. The first objection holds that by stressing that capability lists are provisional and subject to change, we threaten the persistence of human dignity, which is tied to capabilities. The second objection states that we conflate capabilities and abilities. The third objection claims that the goal of using neuroenhancements (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 963