Results for 'S. Cutini'

974 found
Order:
  1. What's Wrong with Differential Punishment?Benjamin S. Yost - 2017 - Utilitas 29 (3):257-285.
    Half of the drug offenders incarcerated in the United States are black, even though whites and blacks use and sell drugs at the same rate, and blacks make up only 13 percent of the population. Noncomparativists about retributive justice see nothing wrong with this picture; for them, an offender’s desert is insensitive to facts about other offenders. By contrast, comparativists about retributive justice assert that facts about others can partially determine an offender’s desert. Not surprisingly, comparativists, especially comparative egalitarians, contend (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Darwin’s Unkindly Variable: Fitness and the Tautology Problem.John S. Wilkins - manuscript
    Few problems in the philosophy of evolutionary biology are more widely disseminated and discussed than the charge of Darwinian evolution being a tautology. The history is long and complex, and the issues are many, and despite the problem routinely being dismissed as an introductory-level issue, based on misunderstandings of evolution, it seems that few agree on what exactly these misunderstandings consist of. In this paper, I will try to comprehensively review the history and the issues. Then, I will try to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Understanding Critical Variables for Customer Relationship Management in Higher Education Institution from Employees Perspective.Youssef M. Abu Amuna, Mazen J. Al Shobaki, Samy S. Abu Naser & Jehad J. Badwan - 2017 - International Journal of Information Technology and Electrical Engineering 6 (1):10-16.
    The aim of this paper is to evaluate the critical success factors and investigate the benefits that might be gained once implementing Electronic Customer Relationship Management at HEI from employee perspective. The study conducted at Al Quds Open University in Palestine and data collected from (300) employee through a questionnaire which consist of four variables. A number of statistical tools were intended for hypotheses testing and data analysis, including Spearman correlation coefficient for Validity, reliability correlation using Cronbach’s alpha, and Frequency (...)
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  4. Salomon Maimon's Essay on Transcendental Philosophy.Alistair Welchman, S. Maimon, Merten Reglitz, Henry Somers Hall & Nick Midgley - 2010 - London, UK: Continuum.
    Essay on Transcendental Philosophy presents the first English translation of Salomon Maimon's principal work, originally published in Berlin in 1790. In this book, Maimon seeks to further the revolution in philosophy wrought by Kant's Critique of Pure Reason by establishing a new foundation for transcendental philosophy in the idea of difference. Kant judged Maimon to be his most profound critic, and the Essay went on to have a decisive influence on the course of post-Kantian German Idealism. A more recent admirer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Streamlined Book Rating Prediction with Neural Networks.Lana Aarra, Mohammed S. Abu Nasser, Mohammed A. Hasaballah & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (10):7-13.
    Abstract: Online book review platforms generate vast user data, making accurate rating prediction crucial for personalized recommendations. This research explores neural networks as simple models for predicting book ratings without complex algorithms. Our novel approach uses neural networks to predict ratings solely from user-book interactions, eliminating manual feature engineering. The model processes data, learns patterns, and predicts ratings. We discuss data preprocessing, neural network design, and training techniques. Real-world data experiments show the model's effectiveness, surpassing traditional methods. This research can (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Exit Left: Markets and Mobility in Republican Thought.Robert S. Taylor - 2017 - Oxford, UK: Oxford University Press.
    Contemporary republicanism is characterized by three main ideas: free persons, who are not subject to the arbitrary power of others; free states, which try to protect their citizens from such power without exercising it themselves; and vigilant citizenship, as a means to limit states to their protective role. This book advances an economic model of such republicanism that is ideologically centre-left. It demands an exit-oriented state interventionism, one that would require an activist government to enhance competition and resource exit from (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  7. Classification of Sign-Language Using MobileNet - Deep Learning.Tanseem N. Abu-Jamie & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (7):29-40.
    Abstract: Sign language recognition is one of the most rapidly expanding fields of study today. Many new technologies have been developed in recent years in the fields of artificial intelligence the sign language-based communication is valuable to not only deaf and dumb community, but also beneficial for individuals suffering from Autism, downs Syndrome, Apraxia of Speech for correspondence. The biggest problem faced by people with hearing disabilities is the people's lack of understanding of their requirements. In this paper we try (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Forecasting COVID-19 cases Using ANN.Ibrahim Sufyan Al-Baghdadi & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):22-31.
    Abstract: The COVID-19 pandemic has posed unprecedented challenges to global healthcare systems, necessitating accurate and timely forecasting of cases for effective mitigation strategies. In this research paper, we present a novel approach to predict COVID-19 cases using Artificial Neural Networks (ANNs), harnessing the power of machine learning for epidemiological forecasting. Our ANNs-based forecasting model has demonstrated remarkable efficacy, achieving an impressive accuracy rate of 97.87%. This achievement underscores the potential of ANNs in providing precise and data-driven insights into the dynamics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  80
    OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. A Framework for Analyzing Broadly Engaged Philosophy of Science.Kathryn S. Plaisance & Kevin C. Elliott - 2021 - Philosophy of Science 88 (4):594-615.
    Philosophers of science are increasingly interested in engaging with scientific communities, policy makers, and members of the public; however, the nature of this engagement has not been systematically examined. Instead of delineating a specific kind of engaged philosophy of science, as previous accounts have done, this article draws on literature from outside the discipline to develop a framework for analyzing different forms of broadly engaged philosophy of science according to two key dimensions: social interaction and epistemic integration. Clarifying the many (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  11. Market Freedom as Antipower.Robert S. Taylor - 2013 - American Political Science Review 107 (3):593-602.
    Historically, republicans were of different minds about markets: some, such as Rousseau, reviled them, while others, like Adam Smith, praised them. The recent republican resurgence has revived this issue. Classical liberals such as Gerald Gaus contend that neo-republicanism is inherently hostile to markets, while neo-republicans like Richard Dagger and Philip Pettit reject this characterization—though with less enthusiasm than one might expect. I argue here that the right republican attitude toward competitive markets is celebratory rather than acquiescent and that republicanism demands (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  12. Donation without Domination: Private Charity and Republican Liberty.Robert S. Taylor - 2018 - Journal of Political Philosophy 26 (4):441-462.
    Contemporary republicans have adopted a less-than-charitable attitude toward private beneficence, especially when it is directed to the poor, worrying that rich patrons may be in a position to exercise arbitrary power over their impoverished clients. These concerns have led them to support impartial public provision by way of state welfare programs, including an unconditional basic income (UBI). In contrast to this administrative model of public welfare, I will propose a competitive model in which the state regulates and subsidizes a decentralized (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  13. Self-Ownership and the Limits of Libertarianism.Robert S. Taylor - 2005 - Social Theory and Practice 31 (4):465-482.
    In the longstanding debate between liberals and libertarians over the morality of redistributive labor taxation, liberals such as John Rawls and Ronald Dworkin have consistently taken the position that such taxation is perfectly compatible with individual liberty, whereas libertarians such as Robert Nozick and Murray Rothbard have adopted the (very) contrary position that such taxation is tantamount to slavery. In this paper, I argue that the debate over redistributive labor taxation can be usefully reconstituted as a debate over the incidents (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  14. Delaboring Republicanism.Robert S. Taylor - 2019 - Public Affairs Quarterly 33 (4):265-280.
    This article criticizes radical labor republicanism on republican grounds. I show that its demand for universal workplace democracy via workers’ cooperatives conflicts with republican freedom along three different dimensions: first, freedom to choose an occupation…and not to choose one; second, freedom within the very cooperatives that workers are to democratically govern; and third, freedom within the newly proletarian state. In the conclusion, I ask whether these criticisms apply, at least in part, to the more modest, incrementalist strand of labor republicanism. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. The Animals We Eat: Between Attention and Ironic Detachment.S. Caprioglio Panizza - 2022 - Journal of Animal Ethics 12 (1):32-50.
    This article engages with two fundamental attitudes toward animals who are used for human consumption: attention and ironic detachment. Taken as polarities linked with animal consumption and the refusal thereof, I discuss how these two attitudes are shaped and manifested during moments of encounter with the animals in question. Starting from a striking photograph from the Lychee and Dog Meat Festival in China, I explore the embodiment of these attitudes in the “gaze” of human participants during the encounter with animals (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Children as Projects and Persons: A Liberal Antinomy.Robert S. Taylor - 2009 - Social Theory and Practice 35 (4):555-576.
    A liberal antinomy of parenting exists: strong liberal intuitions militate in favor of both denying special resources to parenting projects (on grounds of project-neutrality) and granting them (on grounds of respect for personhood). I show that we can reconcile these two claims by rejecting a premise common to both--viz. that liberalism is necessarily committed to extensive procreative liberties--and limiting procreation and subsequent parenting to adults who meet certain psychological and especially financial criteria. I also defend this argument, which provides a (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  17.  75
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Breast Cancer Knowledge Based System.Mohammed H. Aldeeb & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems 7 (6):46-51.
    Abstract: The Knowledge-Based System for Diagnosing Breast Cancer aims to support medical students in enhancing their education regarding diagnosis and counseling. The system facilitates the analysis of biopsy images under a microscope, determination of tumor type, selection of appropriate treatment methods, and identification of disease-related questions. According to the Ministry of Health's annual report in Gaza, there were 7,069 cases of breast cancer between 2009 and 2014, with 1,502 cases reported in 2014. In an era dominated by visual information, where (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. (1 other version)Development and Evaluation of an Expert System for Diagnosing Kidney Diseases.Shahd J. Albadrasawi, Mohammed M. Almzainy, Jehad M. Altayeb, Hassam Eleyan & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (6):16-22.
    This research paper presents the development and evaluation of an expert system for diagnosing kidney diseases. The expert system utilizes a decision-making tree approach and is implemented using the CLIPS and Delphi frameworks. The system's accuracy in diagnosing kidney diseases and user satisfaction were evaluated. The results demonstrate the effectiveness of the expert system in providing accurate diagnoses and high user satisfaction.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. A Proposed Expert System for Vertigo Diseases Diagnosis.Dina F. Al-Borno & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (6):1-9.
    Vertigo is a common symptom that can result from various underlying diseases and conditions, ranging from benign to severe. Accurate and timely diagnosis of the cause of vertigo is crucial for appropriate management and treatment. In this research, we propose the development of an expert system for vertigo diseases diagnosis, utilizing artificial intelligence (AI) and the proposed Expert System which was produced to help assist healthcare professionals in diagnosing the cause of vertigo based on a patient's symptoms, medical history, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Colon Cancer Knowledge-Based System.Rawan N. A. Albanna, Dina F. Alborno, Raja E. Altarazi, Malak S. Hamad & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems 7 (6):27-36.
    Abstract: Colon cancer is a prevalent and life-threatening disease, necessitating accurate and timely diagnosis for effective treatment and improved patient outcomes. This research paper presents the development of a knowledge-based system for diagnosing colon cancer using the CLIPS language. Knowledge-based systems offer the potential to assist healthcare professionals in making informed diagnoses by leveraging expert knowledge and reasoning mechanisms. The methodology involves acquiring and structuring medical knowledge specific to colon cancer, followed by the implementation of a knowledge- based system using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The Priority of Liberty.Robert S. Taylor - 2013 - In Jon Mandle & David A. Reidy (eds.), A Companion to Rawls. Hoboken: Wiley-Blackwell. pp. 147-163.
    Rawls offers three arguments for the priority of liberty in Theory, two of which share a common error: the belief that once we have shown the instrumental value of the basic liberties for some essential purpose (e.g., securing self-respect), we have automatically shown the reason for their lexical priority. The third argument, however, does not share this error and can be reconstructed along Kantian lines: beginning with the Kantian conception of autonomy endorsed by Rawls in section 40 of Theory, we (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  58
    OPTIMIZED AGGREGATED PACKET TRANSMISSION IN DUTY-CYCLED WIRELESS SENSOR NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-458.
    t: Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission.
    Download  
     
    Export citation  
     
    Bookmark  
  24.  53
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Zen Buddhism and the Phenomenology of Mysticism.Dylan S. Bailey - 2021 - Journal for Continental Philosophy of Religion 3 (2):123-143.
    In this paper, I use a comparative analysis of mysticism in Zen and the Abrahamic faiths to formulate a phenomenological account of mysticism “as such.” I argue that, while Zen Buddhism is distinct from other forms of mystical experience in important ways, it can still be fit into a general phenomenological category of mystical experience. First, I explicate the phenomenological accounts of mysticism provided by Anthony Steinbock and Angela Bello. Second, I offer an account of Zen mysticism which both coheres (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Selection without replicators: the origin of genes, and the replicator/interactor distinction in etiobiology.John S. Wilkins, Ian Musgrave & Clem Stanyon - 2012 - Biology and Philosophy 27 (2):215-239.
    Genes are thought to have evolved from long-lived and multiply-interactive molecules in the early stages of the origins of life. However, at that stage there were no replicators, and the distinction between interactors and replicators did not yet apply. Nevertheless, the process of evolution that proceeded from initial autocatalytic hypercycles to full organisms was a Darwinian process of selection of favourable variants. We distinguish therefore between Neo-Darwinian evolution and the related Weismannian and Central Dogma divisions, on the one hand, and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. Racial Responsibility Revisited.Robert S. Taylor - 2021 - Public Affairs Quarterly 35 (3):161-177.
    A common claim in the philosophy-of-race literature is that the unearned benefits of whiteness can by themselves burden their recipients with special antiracist obligations, i.e., that these benefits can impose duties unilaterally, without the mediation of their recipients’ wills, and that these duties go beyond our general antiracist duties, which derive from our common liberal-democratic citizenship and shared humanity. I will argue against this claim, though I acknowledge that there may be duties that follow from these benefits when they are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. What We Have Reason to Value: Human Capabilities and Public Reason.Nancy S. Jecker - 2021 - In Hon-Lam Li & Michael Campbell (eds.), Public Reason and Bioethics: Three Perspectives. London, UK: Palgrave Macmillan. pp. 337-357.
    This chapter sets forth an interpretation of public reason that appeals to our central capabilities as human beings. I argue that appealing to central human capabilities and to the related idea of respect for threshold capabilities is the best way to understand public reason. My defense of this position advances stepwise: first, I consider a central alternative to a capability account, which regards public reason as a matter of contracting; next, I describe central concerns with contract views and show how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Possibility of Emotional Appropriateness for Groups Identified with a Temperament.Emily S. Lee - 2021 - In Jérôme Melançon (ed.), Transforming Politics with Merleau-Ponty: Thinking beyond the State. Lanham: Rowman & Littlefield Publishers. pp. 13-32.
    Recent work in the philosophy of emotion focuses on challenging dualistic conceptualizations. Three of the most obvious dualisms are the following: 1. emotion opposes reason; 2. emotion is subjective, while reason is objective; 3. emotion lies internal to the subject, while reason is external. With challenges to these dualisms, one of the more interesting questions that has surfaced is the idea of emotional appropriateness in a particular context. Here, consider a widely held belief in the United States associates racialized groups (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Self-Ownership and Transplantable Human Organs.Robert S. Taylor - 2007 - Public Affairs Quarterly 21 (1):89-107.
    Philosophers have given sustained attention to the controversial possibility of (legal) markets in transplantable human organs. Most of this discussion has focused on whether such markets would enhance or diminish autonomy, understood in either the personal sense or the Kantian moral sense. What this discussion has lacked is any consideration of the relationship between self-ownership and such markets. This paper examines the implications of the most prominent and defensible conception of self-ownership--control self-ownership (CSO)--for both market and nonmarket organ-allocation mechanisms. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  40
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  96
    Exploring Women Consumers' Satisfaction in the Two-Wheeler Industry: A Focus on Preferences and Buying Patterns.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (4):514-524.
    The producers of Automobile products innovated a new thought of designing the two- wheelers in such a way to attract the women. Today most of the women prefer to travel through two-wheelers. A wide variety of two-wheelers of all category light- weighted, medium – weighted and heavy weighted vehicles have been introduced in the market. The objective of the study is to know the preference and satisfaction of women consumers over two-wheelers and the various aspects, which determines the purchase or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS not only accelerates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. OPTIMIZING CONSUMER BEHAVIOUR ANALYTICS THROUGH ADVANCED MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    Consumer behavior analytics has become a pivotal aspect for businesses to understand and predict customer preferences and actions. The advent of machine learning (ML) algorithms has revolutionized this field by providing sophisticated tools for data analysis, enabling businesses to make data-driven decisions. However, the effectiveness of these ML algorithms significantly hinges on the optimization techniques employed, which can enhance model accuracy and efficiency. This paper explores the application of various optimization techniques in consumer behaviour analytics using machine learning algorithms. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Lowering the Boom: A Brief for Penal Leniency.Benjamin S. Yost - 2023 - Criminal Law and Philosophy 17 (2):251-270.
    This paper advocates for a general policy of penal leniency: judges should often sentence offenders to a punishment less severe than initially preferred. The argument’s keystone is the relatively uncontroversial Minimal Invasion Principle (MIP). MIP says that when more than one course of action satisfies a state’s legitimate aim, only the least invasive is permissibly pursued. I contend that MIP applies in two common sentencing situations. In the first, all sentences within a statutorily specified range are equally proportionate. Here MIP (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  95
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  94
    OPTIMIZED CARDIOVASCULAR DISEASE PREDICTION USING MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  93
    AUGMENTED REALITY AND IOT-INTEGRATED SMART HOMES: ENHANCING USER EXPERIENCE AND AUTOMATION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The integration of Augmented Reality (AR) and the Internet of Things (IoT) within smart homes represents a significant leap forward in home automation and user experience. This paper explores a comprehensive framework that combines these technologies to create an immersive, efficient, and user-friendly smart home environment. By utilizing AR, users can interact with and control IoT-enabled devices in real time through visual and intuitive interfaces. This integration not only simplifies the management of home systems but also enhances the overall user (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  90
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  69
    Advanced Phishing Content Identification Using Dynamic Weighting Integrated with Genetic Algorithm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):500-520.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time. The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced false (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Capital Punishment.Benjamin S. Yost - 2017 - In Mortimer Sellers & Stephan Kirste (eds.), Encyclopedia of the Philosophy of Law and Social Philosophy. Springer. pp. 1-9.
    Capital punishment—the legally authorized killing of a criminal offender by an agent of the state for the commission of a crime—stands in special need of moral justification. This is because execution is a particularly severe punishment. Execution is different in kind from monetary and custodial penalties in an obvious way: execution causes the death of an offender. While fines and incarceration set back some of one’s interests, death eliminates the possibility of setting and pursuing ends. While fines and incarceration narrow (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Could God create Darwinian accidents?John S. Wilkins - 2012 - Zygon 47 (1):30-42.
    Abstract Charles Darwin, in his discussions with Asa Gray and in his published works, doubted whether God could so arrange it that exactly the desired contingent events would occur to cause particular outcomes by natural selection. In this paper, I argue that even a limited or neo-Leibnizian deity could have chosen a world that satisfied some arbitrary set of goals or functions in its outcomes and thus answer Darwin's conundrum. In more general terms, this supports the consistency of natural selection (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  78
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Children's influence on consumption-related decisions in single-mother families: A review and research agenda.S. R. Chaudhury & M. R. Hyman - forthcoming - Philosophical Explorations.
    Although social scientists have identified diverse behavioral patterns among children from dissimilarly structured families, marketing scholars have progressed little in relating family structure to consumption-related decisions. In particular, the roles played by members of single-mother families—which may include live-in grandparents, mother’s unmarried partner, and step-father with or without step-sibling(s)—may affect children’s influence on consumption-related decisions. For example, to offset a parental authority dynamic introduced by a new stepfather, the work-related constraints imposed on a breadwinning mother, or the imposition of adult-level (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  78
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Why the FIFA Men's World Cup in Qatar Should not be Boycotted by Rich Countries from the Global North.Jørn Sønderholm - 2023 - Public Affairs Quarterly 37 (1):20-46.
    This article defends the conclusion that the soccer World Cup in Qatar should not be boycotted by rich countries from the Global North. This conclusion is underpinned by considerations about the economic background conditions in guest workers’ home countries. Three arguments are considered for the view that the World Cup should be boycotted. It is argued that each of these arguments is unsound. Section 7 contains a discussion of an argument for a boycott that centers on the process through which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  74
    ADVANCED EMOTION RECOGNITION AND REGULATION UTILIZING DEEP LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-388.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  56
    DISTORTED FACE RECONSTRUCTION USING 3D CNN.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):567-574.
    This comparison helps in identifying which model performs better in the task of facial reconstruction from distorted images. Visualizing the results in the form of a graph provides a clear and concise way to understand the comparative performance of the algorithms. The ultimate goal of this project is to develop a system that can accurately reconstruct distorted faces, which can be invaluable in identifying accident victims or assisting in medical treatments. By providing a reliable method for facial reconstruction, this technology (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  62
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms can significantly enhance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  56
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 974