Results for 'S. Arul Selvan'

966 found
Order:
  1.  44
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  64
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  79
    AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  32
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  65
    Artificial Intelligence in HR: Driving Agility and Data-Informed Decision-Making.Madhavan Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):506-515.
    In today’s rapidly evolving business landscape, organizations must continuously adapt to stay competitive. AI-driven human resource (HR) analytics has emerged as a strategic tool to enhance workforce agility and inform decision-making processes. By leveraging advanced algorithms, machine learning models, and predictive analytics, HR departments can transform vast data sets into actionable insights, driving talent management, employee engagement, and overall organizational efficiency. AI’s ability to analyze patterns, forecast trends, and offer data-driven recommendations empowers HR professionals to make proactive decisions in hiring, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  91
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  55
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  59
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  12.  78
    (1 other version)A PBL REPORT FOR CONTAINMENT ZONE ALERTING APPLICATION.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  46
    3D Convolutional Neural Networks for Accurate Reconstruction of Distorted Faces.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (4):560-570.
    The core objective of this project is to recognize and reconstruct distorted facial images, particularly in the context of accidents. This involves using deep learning techniques to analyze the features of a distorted face and regenerate it into a recognizable form. Deep learning models are wellsuited for this task due to their ability to learn complex patterns and representations from data the input data consists of distorted facial images, typically obtained from MRI scans of accident victims. These images may contain (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  50
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  65
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  65
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  18.  64
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  61
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark  
  23.  50
    Bridging Professional and Personal Lives: The Role of Telemedicine in Doctors' Work-Life Equilibrium.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-535.
    The rapid adoption of telemedicine has transformed healthcare delivery, especially during the COVID-19 pandemic. This digital shift has enabled medical professionals to offer consultations and manage patients remotely, ensuring continuity of care while reducing exposure risks. However, the integration of telemedicine has presented both opportunities and challenges for doctors, particularly in terms of their work-life balance. This paper explores the digital adaptation of doctors in public and private hospitals concerning telemedicine practices and its impact on their work-life harmony. The study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  80
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Collected Papers (on Neutrosophic Theory and Applications), Volume VIII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. National Populist Challenges to Europe’s Center Right: Three Questions for Europe.S. M. Amadae & Henri Aaltonen - 2019 - In Antti Ronkainen & Juri Mykkänen (eds.), Vapiseva Eurooppa. pp. 225-240.
    This paper analyses the National Populist Challenges to Europe’s Center Right. It assesses the cases of the UK, Germany and France. It poses three questions for Europe: How will political integration be achieved and maintained? What policies will foster economic inclusion in the Eurozone? And, third, what are the best means to achieve economic solvency and growth. The paper make a case that neoliberal economic policies over the past decades have undermined some nations' public sector and have also contributed to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Prisoner's Dilemma.S. M. Amadae - 2015 - In Prisoners of Reason: Game Theory and Neoliberal Political Economy. New York: Cambridge University Press. pp. 24-61.
    As these opening quotes acknowledge, the Prisoner’s Dilemma (PD) represents a core puzzle within the formal mathematics of game theory.3 Its rise in conspicuity is evident figure 2.1 above demonstrating a relatively steady rise in incidences of the phrase’s usage between 1960 to 1995, with a stable presence persisting into the twenty first century. This famous two-person “game,” with a stock narrative cast in terms of two prisoners who each independently must choose whether to remain silent or speak, each advancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Capgras Syndrome: A Novel Probe for Understanding the Neural Representation of the Identity and Familiarity of Persons.William Hirstein & V. S. Ramachandran - 1997 - Proceedings of the Royal Society of London B 264:437-444.
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  29. Truths about Simpson's Paradox - Saving the Paradox from Falsity.Don Dcruz, Prasanta S. Bandyopadhyay, Venkata Raghavan & Gordon Brittain Jr - 2015 - In M. Banerjee & S. N. Krishna (eds.), LNCS 8923. pp. 58-75.
    There are three questions associated with Simpson’s paradox (SP): (i) Why is SP paradoxical? (ii) What conditions generate SP? and (iii) How to proceed when confronted with SP? An adequate analysis of the paradox starts by distinguishing these three questions. Then, by developing a formal account of SP, and substantiating it with a counterexample to causal accounts, we argue that there are no causal factors at play in answering questions (i) and (ii). Causality enters only in connection with action.
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Supervenience Solution to the Too-Many-Thinkers Problem.C. S. Sutton - 2014 - Philosophical Quarterly 64 (257):619-639.
    Persons think. Bodies, time-slices of persons, and brains might also think. They have the necessary neural equipment. Thus, there seems to be more than one thinker in your chair. Critics assert that this is too many thinkers and that we should reject ontologies that allow more than one thinker in your chair. I argue that cases of multiple thinkers are innocuous and that there is not too much thinking. Rather, the thinking shared between, for example, persons and their bodies is (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  31. Respect and Care: Toward Moral Integration.Robin S. Dillon - 1992 - Canadian Journal of Philosophy 22 (1):105 - 132.
    In her provocative discussion of the challenge posed to the traditional impartialist, justice-focused conception of morality by the new-wave care perspective in ethics, Annette Baier calls for ‘a “marriage” of the old male and newly articulated female... moral wisdom,’ to produce a new ‘cooperative’ moral theory that ‘harmonize[s] justice and care.’ I want in this paper to play matchmaker, proposing one possible conjugal bonding: a union of two apparently dissimilar modes of what Nel Noddings calls ‘meeting the other morally,’ a (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  32. A critique of pure vision.Patricia S. Churchland, V. S. Ramachandran & Terrence J. Sejnowski - 1994 - In Christof Koch & Joel L. Davis (eds.), Large-Scale Neuronal Theories of the Brain. MIT Press. pp. 23.
    Anydomainofscientificresearchhasitssustainingorthodoxy. Thatis, research on a problem, whether in astronomy, physics, or biology, is con- ducted against a backdrop of broadly shared assumptions. It is these as- sumptionsthatguideinquiryandprovidethecanonofwhatisreasonable-- of what "makes sense." And it is these shared assumptions that constitute a framework for the interpretation of research results. Research on the problem of how we see is likewise sustained by broadly shared assump- tions, where the current orthodoxy embraces the very general idea that the business of the visual system is to (...)
    Download  
     
    Export citation  
     
    Bookmark   117 citations  
  33. Essentialism in Biology.John S. Wilkins - manuscript
    Essentialism in philosophy is the position that things, especially kinds of things, have essences, or sets of properties, that all members of the kind must have, and the combination of which only members of the kind do, in fact, have. It is usually thought to derive from classical Greek philosophy and in particular from Aristotle’s notion of “what it is to be” something. In biology, it has been claimed that pre-evolutionary views of living kinds, or as they are sometimes called, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  34.  58
    Hans Urs von Balthasar's Interpretation of the Philosophy of Thomas Aquinas.Angelo Campodonico’S. - 2001 - Nova et Vetera 8:33-53.
    The article concerns the interpretation of Aquinas' philosophy in the thougt of the swiss theologian Hans Urs Von Balthasar.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Kant's Theory of Motivation: A Hybrid Approach.Benjamin S. Yost - 2017 - Review of Metaphysics 71 (2):293-319.
    To vindicate morality against skeptical doubts, Kant must show that agents can be moved to act independently of their sensible desires. Kant must therefore answer a motivational question: how does an agent get from the cognition that she ought to act morally to acting morally? Affectivist interpretations of Kant hold that agents are moved to act by feelings, while intellectualists appeal to cognition alone. To overcome the significant shortcomings of each view, I develop a hybrid theory of motivation. My central (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Reconstructing Rawls: The Kantian Foundations of Justice as Fairness.Robert S. Taylor - 2011 - Pennsylvania State University Press.
    With the publication of A Theory of Justice in 1971, John Rawls not only rejuvenated contemporary political philosophy but also defended a Kantian form of Enlightenment liberalism called “justice as fairness.” Enlightenment liberalism stresses the development and exercise of our capacity for autonomy, while Reformation liberalism emphasizes diversity and the toleration that encourages it. These two strands of liberalism are often mutually supporting, but they conflict in a surprising number of cases, whether over the accommodation of group difference, the design (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  37. Robert Nozick on Prisoner's Dilemma.S. S. - manuscript
    Robert Nozick, in chapter two of the nature of rationality, proposes two famous problems in decision theory (i.e., Newcomb's problem and Prisoner Dilemma) and two main strategies toward these problems i.e. dominant strategy and dominated or cooperative one. He will try to give a formal principles to calculate the decision values in these situations. In this calculation he goes beyond the standard principle of maximizing expected utility and would try to put forth less ideal and more realistic principles that fit (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Patient Autonomy, Clinical Decision Making, and the Phenomenological Reduction.Jonathan Lewis & Søren Holm - 2022 - Medicine, Health Care and Philosophy 25 (4):615-627.
    Phenomenology gives rise to certain ontological considerations that have far-reaching implications for standard conceptions of patient autonomy in medical ethics, and, as a result, the obligations of and to patients in clinical decision-making contexts. One such consideration is the phenomenological reduction in classical phenomenology, a core feature of which is the characterisation of our primary experiences as immediately and inherently meaningful. This paper builds on and extends the analyses of the phenomenological reduction in the works of Husserl, Heidegger, and Merleau-Ponty (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  39. "R. Ḥayyim Hirschensohn’s Beliefs about Death and Immortality as Tested by his Halakhic Decision Making” [in Hebrew].Nadav Berman, S. - 2017 - Daat 83 (2017):337-359.
    This paper traces two contradicting beliefs about death and immortality in the writings of Rabbi Hayyim Hirschensohn, and examines these opposing beliefs in his Halakhic ruling, in the case of Autopsies. The paper opens by conceptualizing two possible attitudes regarding the relation between this-world and the ʽother-world’, and by analyzing two main beliefs regarding death and immortality in their relation to the body-spirit distinction (the naturalistic and the spiritualistic approach). It demonstrates how Hirschensohn was holding these two different views. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Between Reason and Coercion: Ethically Permissible Influence in Health Care and Health Policy Contexts.J. S. Blumenthal-Barby - 2012 - Kennedy Institute of Ethics Journal 22 (4):345-366.
    In bioethics, the predominant categorization of various types of influence has been a tripartite classification of rational persuasion (meaning influence by reason and argument), coercion (meaning influence by irresistible threats—or on a few accounts, offers), and manipulation (meaning everything in between). The standard ethical analysis in bioethics has been that rational persuasion is always permissible, and coercion is almost always impermissible save a few cases such as imminent threat to self or others. However, many forms of influence fall into the (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  41. Are Scientific Models of life Testable? A lesson from Simpson's Paradox.Prasanta S. Bandyopadhyay, Don Dcruz, Nolan Grunska & Mark Greenwood - 2020 - Sci 1 (3).
    We address the need for a model by considering two competing theories regarding the origin of life: (i) the Metabolism First theory, and (ii) the RNA World theory. We discuss two interrelated points, namely: (i) Models are valuable tools for understanding both the processes and intricacies of origin-of-life issues, and (ii) Insights from models also help us to evaluate the core objection to origin-of-life theories, called “the inefficiency objection”, which is commonly raised by proponents of both the Metabolism First theory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Biological essentialism and the tidal change of natural kinds.John S. Wilkins - 2013 - Science & Education 22 (2):221-240.
    The vision of natural kinds that is most common in the modern philosophy of biology, particularly with respect to the question whether species and other taxa are natural kinds, is based on a revision of the notion by Mill in A System of Logic. However, there was another conception that Whewell had previously captured well, which taxonomists have always employed, of kinds as being types that need not have necessary and sufficient characters and properties, or essences. These competing views employ (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  43. Doing the Best One Can.Holly S. Goldman - 1978 - In A. I. Goldman & I. Kim (eds.), Values and Morals. Boston: D. Reidel. pp. 185--214.
    Download  
     
    Export citation  
     
    Bookmark   48 citations  
  44. A modest defense of manifestationalism.Jamin Asay & S. Seth Bordner - 2015 - Synthese 192 (1):147-161.
    As the debate between realists and empiricists in the philosophy of science drags on, one point of consensus has emerged: no one wants to be a manifestationalist. The manifestationalist is a kind of radical empiricist who argues that science provides theories that aim neither at a true picture of the entire world, nor even an empirically adequate picture that captures the world in all its observable respects. For manifestationalists, science aims only at providing theories that are true to the observed (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45. The Unique and Practical Advantages of Applying A Capability Approach to Brain Computer Interface.Andrew Ko & Nancy S. Jecker - 2022 - Philosophy and Technology 35 (4):1-22.
    Intelligent neurotechnology is an emerging field that combines neurotechnologies like brain-computer interface (BCI) with artificial intelligence. This paper introduces a capability framework to assess the responsible use of intelligent BCI systems and provide practical ethical guidance. It proposes two tests, the threshold and flourishing tests, that BCI applications must meet, and illustrates them in a series of cases. After a brief introduction (Section 1), Section 2 sets forth the capability view and the two tests. It illustrates the threshold test using (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. Toward a Value-Sensitive Absorptive Capacity Framework: Navigating Intervalue and Intravalue Conflicts to Answer the Societal Call for Health.Onno S. W. F. Omta, Léon Jansen, Oana Branzei, Vincent Blok & Jilde Garst - 2021 - Business and Society 60 (6):1349-1386.
    The majority of studies on absorptive capacity (AC) underscore the importance of absorbing technological knowledge from other firms to create economic value. However, to preserve moral legitimacy and create social value, firms must also discern and adapt to (shifts in) societal values. A comparative case study of eight firms in the food industry reveals how organizations prioritize and operationalize the societal value health in product innovation while navigating inter- and intravalue conflicts. The value-sensitive framework induced in this article extends AC (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  47. A Framework for Analyzing Broadly Engaged Philosophy of Science.Kathryn S. Plaisance & Kevin C. Elliott - 2021 - Philosophy of Science 88 (4):594-615.
    Philosophers of science are increasingly interested in engaging with scientific communities, policy makers, and members of the public; however, the nature of this engagement has not been systematically examined. Instead of delineating a specific kind of engaged philosophy of science, as previous accounts have done, this article draws on literature from outside the discipline to develop a framework for analyzing different forms of broadly engaged philosophy of science according to two key dimensions: social interaction and epistemic integration. Clarifying the many (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  48. (1 other version)Is Diversity Necessary for Educational Justice?William S. New & Michael S. Merry - 2014 - Educational Theory 64 (3):205-225.
    In this article we challenge the notion that diversity serves as a good proxy for educational justice. First, we maintain that the story about how diversity might be accomplished and what it might do for students and society is internally inconsistent. Second, we argue that a disproportionate share of the benefits that might result from greater diversity often accrues to those already advantaged. Finally, we propose that many of the most promising and pragmatic remedies for educational injustice are often rejected (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  49. Selection without replicators: the origin of genes, and the replicator/interactor distinction in etiobiology.John S. Wilkins, Ian Musgrave & Clem Stanyon - 2012 - Biology and Philosophy 27 (2):215-239.
    Genes are thought to have evolved from long-lived and multiply-interactive molecules in the early stages of the origins of life. However, at that stage there were no replicators, and the distinction between interactors and replicators did not yet apply. Nevertheless, the process of evolution that proceeded from initial autocatalytic hypercycles to full organisms was a Darwinian process of selection of favourable variants. We distinguish therefore between Neo-Darwinian evolution and the related Weismannian and Central Dogma divisions, on the one hand, and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  50. The Well-Being of Children, the Limits of Paternalism, and the State: Can disparate interests be reconciled?Michael S. Merry - 2007 - Ethics and Education 2 (1):39-59.
    For many, it is far from clear where the prerogatives of parents to educate as they deem appropriate end and the interests of their children, immediate or future, begin. In this article I consider the educational interests of children and argue that children have an interest in their own well-being. Following this, I will examine the interests of parents and consider where the limits of paternalism lie. Finally, I will consider the state's interest in the education of children and discuss (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
1 — 50 / 966