Results for 'Scammers persuasive technique model'

961 found
Order:
  1. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Interprétabilité et explicabilité pour l’apprentissage machine : entre modèles descriptifs, modèles prédictifs et modèles causaux. Une nécessaire clarification épistémologique.Christophe Denis & Franck Varenne - 2019 - Actes de la Conférence Nationale En Intelligence Artificielle - CNIA 2019.
    Le déficit d’explicabilité des techniques d’apprentissage machine (AM) pose des problèmes opérationnels, juridiques et éthiques. Un des principaux objectifs de notre projet est de fournir des explications éthiques des sorties générées par une application fondée sur de l’AM, considérée comme une boîte noire. La première étape de ce projet, présentée dans cet article, consiste à montrer que la validation de ces boîtes noires diffère épistémologiquement de celle mise en place dans le cadre d’une modélisation mathématique et causale d’un phénomène physique. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Interprétabilité et explicabilité de phénomènes prédits par de l’apprentissage machine.Christophe Denis & Franck Varenne - 2022 - Revue Ouverte d'Intelligence Artificielle 3 (3-4):287-310.
    Le déficit d’explicabilité des techniques d’apprentissage machine (AM) pose des problèmes opérationnels, juridiques et éthiques. Un des principaux objectifs de notre projet est de fournir des explications éthiques des sorties générées par une application fondée sur de l’AM, considérée comme une boîte noire. La première étape de ce projet, présentée dans cet article, consiste à montrer que la validation de ces boîtes noires diffère épistémologiquement de celle mise en place dans le cadre d’une modélisation mathéma- tique et causale d’un phénomène (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. On the Impact of Fallacy-based Schemata and Framing Techniques in Persuasive Technologies.Antonio Lieto & Vernero Fabiana - 2020 - Cognititar Workshop @ECAI 2020.
    Persuasive technologies can adopt several strategies to change the attitudes and behaviors of their users. In this work we present some empirical results stemming from the hypothesis - firstly formulated in [3] - that there is a strong connection between some well known cognitive biases reducible to fallacious argumentative schemata and some of the most common persuasion strategies adopted within digital technologies. In particular, we will report how both framing and fallacious-reducible mechanisms are nowadays used to design web and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Fictional Persuasion and the Nature of Belief.Asbjørn Steglich-Petersen - 2017 - In Ema Sullivan-Bissett, Helen Bradley & Paul Noordhof (eds.), Art and Belief. Oxford: Oxford University Press. pp. 174-193.
    Psychological studies on fictional persuasion demonstrate that being engaged with fiction systematically affects our beliefs about the real world, in ways that seem insensitive to the truth. This threatens to undermine the widely accepted view that beliefs are essentially regulated in ways that tend to ensure their truth, and may tempt various non-doxastic interpretations of the belief-seeming attitudes we form as a result of engaging with fiction. I evaluate this threat, and argue that it is benign. Even if the relevant (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. On the Cognitive Parsimony of Paralogical Arguments and their Impact in Automated Persuasion: Findings and Lessons Learned for Building Automatic Counter-Arguers.Antonio Lieto - 2023 - In Online Lectures. pp. 1-14.
    Persuasive technologies can adopt several strategies to change the attitudes and behaviors of their users. In this work I synthesize the lessons learned from three empirical case studies on automated persuasion that have been carried out in the last decade in the contexts of: persuasive news recommendations, social robotics, and e-commerce, respectively. In particular, such studies have assessed, in the technological domain, the effects of nudging techniques relying on well known persuasive argumentation schemas and on framing strategies. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Using models to correct data: paleodiversity and the fossil record.Alisa Bokulich - 2018 - Synthese 198 (Suppl 24):5919-5940.
    Despite an enormous philosophical literature on models in science, surprisingly little has been written about data models and how they are constructed. In this paper, I examine the case of how paleodiversity data models are constructed from the fossil data. In particular, I show how paleontologists are using various model-based techniques to correct the data. Drawing on this research, I argue for the following related theses: first, the ‘purity’ of a data model is not a measure of its (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  8. Model robustness as a confirmatory virtue: The case of climate science.Elisabeth A. Lloyd - 2015 - Studies in History and Philosophy of Science Part A 49:58-68.
    I propose a distinct type of robustness, which I suggest can support a confirmatory role in scientific reasoning, contrary to the usual philosophical claims. In model robustness, repeated production of the empirically successful model prediction or retrodiction against a background of independentlysupported and varying model constructions, within a group of models containing a shared causal factor, may suggest how confident we can be in the causal factor and predictions/retrodictions, especially once supported by a variety of evidence framework. (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  9. A Technique for Determing Closure in Semantic Tableaux.Steven James Bartlett - 1983 - Methodology and Science: Interdisciplinary Journal for the Empirical Study of the Foundations of Science and Their Methodology 16 (1):1-16.
    The author considers the model-theoretic character of proofs and disproofs by means of attempted counterexample constructions, distinguishes this proof format from formal derivations, then contrasts two approaches to semantic tableaux proposed by Beth and Lambert-van Fraassen. It is noted that Beth's original approach has not as yet been provided with a precisely formulated rule of closure for detecting tableau sequences terminating in contradiction. To remedy this deficiency, a technique is proposed to clarify tableau operations.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Cognitive Biases for the Design of Persuasive Technologies: Uses, Abuses and Ethical Concerns.Antonio Lieto - 2021 - ACM Distinguished Speakers - Lecture Series.
    In the last decades Human-Computer Interaction (HCI) has started to focus attention on “persuasive technologies” having the goal of changing users’ behavior and attitudes according to a predefined direction. In this talk we show how some of the techniques employed in such technologies trigger some well known cognitive biases by adopting a strategy relying on logical fallacies (i.e. forms of reasoning which are logically invalid but psychologically persuasive). In particular, we will show how the mechanisms reducible to logical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  31
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. In Pursuit of Unification of Conceptual Models: Sets as Machines.Sabah Al-Fedaghi - manuscript
    Conceptual models as representations of real-world systems are based on diverse techniques in various disciplines but lack a framework that provides multidisciplinary ontological understanding of real-world phenomena. Concurrently, systems’ complexity has intensified, leading to a rise in developing models using different formalisms and diverse representations even within a single domain. Conceptual models have become larger; languages tend to acquire more features, and it is not unusual to use different modeling languages for different components. This diversity has caused problems with consistency (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The didactic, persuasive and scientific uses of illustrations after Descartes.Andrea Strazzoni - 2015 - Noctua 2 (1-2):432-480.
    The aim of this article is to unveil the ways of teaching new philosophical paradigms in Dutch Universities between Seventeenth and Eighteenth Century, by means of an analysis of the uses of illustrations in Cartesian and Newtonian natural-philosophical textbooks. This analysis allows to understand the overall functions of philosophical textbooks, where illustrations act as conceptual means, filling the gap between the premise of a theory and its actual contents; didactic means, aiming to help the reader in understanding scientific models fully (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  30
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  15. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable manner in the current (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. A Comparative Analysis of Data Mining Techniques on Breast Cancer Diagnosis Data using WEKA Toolbox.Majdah Alshammari & Mohammad Mezher - 2020 - (IJACSA) International Journal of Advanced Computer Science and Applications 8:224-229.
    Abstract—Breast cancer is considered the second most common cancer in women compared to all other cancers. It is fatal in less than half of all cases and is the main cause of mortality in women. It accounts for 16% of all cancer mortalities worldwide. Early diagnosis of breast cancer increases the chance of recovery. Data mining techniques can be utilized in the early diagnosis of breast cancer. In this paper, an academic experimental breast cancer dataset is used to perform a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Building Compressed Causal Models of the World.David Kinney & Tania Lombrozo - forthcoming - Cognitive Psychology.
    A given causal system can be represented in a variety of ways. How do agents determine which variables to include in their causal representations, and at what level of granularity? Using techniques from Bayesian networks, information theory, and decision theory, we develop a formal theory according to which causal representations reflect a trade-off between compression and informativeness, where the optimal trade-off depends on the decision-theoretic value of information for a given agent in a given context. This theory predicts that, all (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The interplay between models and observations.Claudio Masolo, Alessander Botti Benevides & Daniele Porello - 2018 - Applied ontology 13 (1):41-71.
    We propose a formal framework to examine the relationship between models and observations. To make our analysis precise,models are reduced to first-order theories that represent both terminological knowledge – e.g., the laws that are supposed to regulate the domain under analysis and that allow for explanations, predictions, and simulations – and assertional knowledge – e.g., information about specific entities in the domain of interest. Observations are introduced into the domain of quantification of a distinct first-order theory that describes their nature (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. A Structural Equation Model of Writing Skills: Mixed Method.Merlyn E. Arevalo & Melissa C. Napil - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (4):37-59.
    The study's general objective is to determine the students' stance on the most appropriate model of writing skills, using Structural Equation Modeling (SEM) as a basic design in the relationship of self-regulated learning strategies, communicative learning strategies, learning grammatical strategies, and writing skills. This study used a mixed-method sequential explanatory design, in which quantitative design is more widely used than qualitative Creswell, J., & Creswell, D. (2017). The researcher used the stratified random sampling technique for selecting respondents and, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  33
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. INTERNALISASI NILAI-NILAI PENDIDIKAN KI HADJAR DEWANTARA DALAM MODEL PEMBELAJARAN DI PERGURUAN TINGGI (Studi Eksperimen di Jurusan Tadris Matematika).Widodo Winarso - 2016 - Jurnal Math Educator Nusantara 2 (2):150-175.
    Department of Mathematics education curriculum implementation Based KKNI who have not provided the container development of character education for students. This can be seen from the learning process in college that still relies on aspects of increased knowledge. Achievement of learning on aspects of attitudes / values ​​still are administrative without being pushed on the feasibility of value investment education daily life. Applied learning models are still oriented to conventional learning eg discussions, lectures, discussion and assignment. It is necessary to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Standard State Space Models of Unawareness.Peter Fritz & Harvey Lederman - 2015 - Theoretical Aspects of Rationality and Knowledge 15.
    The impossibility theorem of Dekel, Lipman and Rustichini has been thought to demonstrate that standard state-space models cannot be used to represent unawareness. We first show that Dekel, Lipman and Rustichini do not establish this claim. We then distinguish three notions of awareness, and argue that although one of them may not be adequately modeled using standard state spaces, there is no reason to think that standard state spaces cannot provide models of the other two notions. In fact, standard space (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23. Non-linear Analysis of Models for Biological Pattern Formation: Application to Ocular Dominance Stripes.Michael Lyons & Lionel G. Harrison - 1993 - In Frank Eeckman (ed.), Neural Systems: Analysis and Modeling. Springer. pp. 39-46.
    We present a technique for the analysis of pattern formation by a class of models for the formation of ocular dominance stripes in the striate cortex of some mammals. The method, which employs the adiabatic approximation to derive a set of ordinary differential equations for patterning modes, has been successfully applied to reaction-diffusion models for striped patterns [1]. Models of ocular dominance stripes have been studied [2,3] by computation, or by linearization of the model equations. These techniques do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Static and dynamic vector semantics for lambda calculus models of natural language.Mehrnoosh Sadrzadeh & Reinhard Muskens - 2018 - Journal of Language Modelling 6 (2):319-351.
    Vector models of language are based on the contextual aspects of language, the distributions of words and how they co-occur in text. Truth conditional models focus on the logical aspects of language, compositional properties of words and how they compose to form sentences. In the truth conditional approach, the denotation of a sentence determines its truth conditions, which can be taken to be a truth value, a set of possible worlds, a context change potential, or similar. In the vector models, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Measuring Openness and Evaluating Digital Academic Publishing Models: Not Quite the Same Business.Giovanni De Grandis & Yrsa Neuman - 2014 - The Journal of Electronic Publishing 17 (3).
    In this article we raise a problem, and we offer two practical contributions to its solution. The problem is that academic communities interested in digital publishing do not have adequate tools to help them in choosing a publishing model that suits their needs. We believe that excessive focus on Open Access (OA) has obscured some important issues; moreover exclusive emphasis on increasing openness has contributed to an agenda and to policies that show clear practical shortcomings. We believe that academic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Modelle und Grenzen der Leistungssteigerung im Sport: Enhancement, Doping, Therapie aus philosophischer Sicht.Christoph Asmuth, Benedetta Bisol & Patrick Grüneberg - 2010 - Leipziger Sportwissenschaftliche Beiträge 51 (2):8-43.
    Enhancement is a basic principle of modern sport. Their increase of achievement is usually attributed to the sportsmen’s natural assessment, their health, their training methods and their employment. In contrast, increase in output by pharmacological means is outlawed. The modern medical techniques created a whole range, by which sportsmen are supported. Consequently, sometimes difficult decisions with concrete medications develop. It is not always clearly to be differentiated whether something is a pharmacological interference, which serves the therapy or leads however to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Conference Proceeding: A New Service-Quality Model to enhance Customer Retention In the Hong Kong Fast-Food Restaurant Industry.Kenneth Lui-Ming Ngie, Philip J. Rosenberger lll & Allen George - 2014 - In Proceeding Of: The 47th Academy of Marketing Conference, At Bournemouth, England.
    Poster Presentation accepted for the July 2014 conference in Bournemouth, England. -/- Abstract: Current service-quality models in the Hong Kong fast-food restaurant (HK FFR) industry are primarily designed on the basis of fast service and standardised fast-food service process that are expected to enhance customer retention. This study explores the feasibility of a new service-quality (SQ) model that could offer enhanced customer satisfaction and retention in the competitive Hong Kong FFR context. A qualitative, phenomenological-interview approach incorporating the critical incident (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can optimize (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. A structural equation model of principals’ communication patterns, funds management and school-community relationship.Valentine Joseph Owan, John Asuquo Ekpenyong & Michael Ekpenyong Asuquo - 2021 - Journal of Pedagogical Sociology and Psychology 3 (1):1-18.
    Recent studies tend to explain the importance of communication in the organisation as well as prescribing the most commonly practised techniques adopted by school managers. Studies on financial management are quite limited with the available ones suggesting that poor financial management is a source of conflict between school leaders and host communities. Little seems to be known on the connection between principals’ communication patterns and funds’ management as predictors of school-community relationship. This study builds on existing studies and appears to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  31.  22
    Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. (1 other version)Book review of: R. Marlin, Propaganda and the Ethics of Persuasion. [REVIEW]Gary James Jason - 2016 - Dialogue 55 (3):545-547.
    This essay is my review of Randal Marlin’s fine book, Propaganda and the Ethics of Persuasion (2nd Ed.). Marlin’s book examines the concept of propaganda, rightly noting that the term has a neutral meaning of just promulgating a point of view and a pejorative meaning of using deceit to push a point of view. Marlin gives a concise history of propaganda techniques, and propaganda theory—from ancient Greece through WWII—and has a good discussion of the ethical issues involved in propaganda.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Content marketing model for leading web content management.Igor Britchenko, Iryna Diachuk & Maksym Bezpartochnyi - 2019 - Atlantis Press 318:119-126.
    This paper is envisaged to provide the Ukrainian businesses with suggestions for a content marketing model for the effective management of website content in order to ensure its leading position on the European and world markets. Our study employed qualitative data collection with semi-structured interviews, survey, observation methods, quantitative and qualitative methods of content analysis of regional B2B companies, as well as the comparative analysis. The following essential stages of the content marketing process as preliminary search and analysis, website (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  27
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Dynamic Change of Awareness during Meditation Techniques: Neural and Physiological Correlates.Jerath Ravinder, Vernon A. Barnes, David Dillard-Wright, Shivani Jerath & Brittany Hamilton - 2012 - Frontiers in Human Neuroscience 6:1-5.
    Recent fndings illustrate how changes in consciousness accommodated by neural correlates and plasticity of the brain advance a model of perceptual change as a function of meditative practice. During the mindbody response neural correlates of changing awareness illustrate how the autonomic nervous system shifts from a sympathetic dominant to a parasympathetic dominant state. Expansion of awareness during the practice of meditation techniques can be linked to the Default Mode Network (DMN), a network of brain regions that is active when (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  36. Detection and Mathematical Modeling of Anxiety Disorder Based on Socioeconomic Factors Using Machine Learning Techniques.Razan Ibrahim Alsuwailem & Surbhi Bhatia - 2022 - Human-Centric Computing and Information Sciences 12:52.
    The mental risk poses a high threat to the individuals, especially overseas demographic, including expatriates in comparison to the general Arab demographic. Since Arab countries are renowned for their multicultural environment with half of the population of students and faculties being international, this paper focuses on a comprehensive analysis of mental health problems such as depression, stress, anxiety, isolation, and other unfortunate conditions. The dataset is developed from a web-based survey. The detailed exploratory data analysis is conducted on the dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Philosophy as Therapy - A Review of Konrad Banicki's Conceptual Model.Bruno Contestabile & Michael Hampe - manuscript
    In his article Banicki proposes a universal model for all forms of philosophical therapy. He is guided by works of Martha Nussbaum, who in turn makes recourse to Aristotle. As compared to Nussbaum’s approach, Banicki’s model is more medical and less based on ethical argument. He mentions Foucault’s vision to apply the same theoretical analysis for the ailments of the body and the soul and to use the same kind of approach in treating and curing them. In his (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Full Bayesian Significance Test for Mixture Models: Results in Gene Expression Clustering.Julio Michael Stern, Marcelo de Souza Lauretto & Carlos Alberto de Braganca Pereira - 2008 - Genetics and Molecular Research 7 (3):883-897.
    Gene clustering is a useful exploratory technique to group together genes with similar expression levels under distinct cell cycle phases or distinct conditions. It helps the biologist to identify potentially meaningful relationships between genes. In this study, we propose a clustering method based on multivariate normal mixture models, where the number of clusters is predicted via sequential hypothesis tests: at each step, the method considers a mixture model of m components (m = 2 in the first step) and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. For a Pluralism of Climate Modelling Strategies.Baldissera Pacchetti Marina, Julie Jebeile & Erica Thompson - 2024 - Bulletin of the American Meteorological Society.
    The continued development of General Circulation Models (GCMs) towards increasing resolution and complexity is a predominantly chosen strategy to advance climate science, resulting in channelling of research and funding to meet this aspiration. Yet many other modelling strategies have also been developed and can be used to understand past and present climates, to project future climates and ultimately to support decision-making. We argue that a plurality of climate modelling strategies and an equitable distribution of funding among them would be an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Digital-Based Roundtable Cooperative Learning Model on Narrative Text Teaching Materials.Ari Palupi, Miftakhul Huda & Dini Pratiwi - 2023 - In Ari Palupi, Miftakhul Huda & Dini Pratiwi (eds.), Proceedings of the International Conference on Learning and Advanced Education (ICOLAE 2022). pp. 259-279.
    This study aims to (1) describe the application of the roundtable cooperative model on narrative text teaching materials, (2) describe students’ responses to the application of the roundtable cooperative model on narrative text teaching materials, (3) describe the increase in students’ knowledge of narrative text teaching materials. The type of research used was classroom action research. Data collection techniques were observation, interviews, questionnaires, tests, and documentation. The data in this study were in the form of application, response, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  37
    ADVANCED EMOTION RECOGNITION AND REGULATION UTILIZING DEEP LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-388.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Evaluation of the alternatives of introducing electric vehicles in developing countries using Type-2 neutrosophic numbers based RAFSI model.Ilgin Gokasar, Muhammet Deveci, Mehtap Isik, Tugrul Daim & Florentin Smarandache - unknown
    This study focuses on implementing electric vehicles (EVs) in developing countries where energy production is mainly based on fossil fuels. Although for these countries the environmental short-run benefits of the EVs cannot offset the short-run costs, it may still be the best option to implement the EVs as soon as possible. Hence, it is necessary to evaluate the alternatives to introducing EVs to the market due to the environmental concerns that created an opportunity for some developing countries to catch up (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Reading Motivation, Language Learning Self-efficacy and Test-taking Strategy: A Structural Equation Model on Academic Performance of Students.Johnryll C. Ancheta & Melissa C. Napil - 2022 - Asian Journal of Education and Social Studies 34 (4):1-9.
    Reading tough books to achieve excellent marks, perform well in class, and gain attention from teachers and parents is less likely to drive students. Students used to evaluate their language learning requirements, define the abilities they wished to develop, pick effective study techniques, and set aside gadgets when studying. They also used to read the question before looking for hints in the relevant content, extract the essential lines that convey the major ideas, concentrate on titles, names, numbers, quotations, or instances, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Predicting Students' end-of-term Performances using ML Techniques and Environmental Data.Ahmed Mohammed Husien, Osama Hussam Eljamala, Waleed Bahgat Alwadia & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):19-25.
    Abstract: This study introduces a machine learning-based model for predicting student performance using a comprehensive dataset derived from educational sources, encompassing 15 key features and comprising 62,631 student samples. Our five-layer neural network demonstrated remarkable performance, achieving an accuracy of 89.14% and an average error of 0.000715, underscoring its effectiveness in predicting student outcomes. Crucially, this research identifies pivotal determinants of student success, including factors such as socio-economic background, prior academic history, study habits, and attendance patterns, shedding light on (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. General Morphological Analysis as a Basic Scientific Modelling Method.Tom Ritchey - 2018 - Journal of Technological Forecasting and Social Change 126:81-91.
    General Morphological Analysis (GMA) is a method for structuring a conceptual problem space – called a morphospace – and, through a process of existential combinatorics, synthesizing a solution space. As such, it is a basic modelling method, on a par with other scientific modelling methods including System Dynamics Modelling, Bayesian Networks and various types graph-based “influence diagrams”. The purpose of this article is 1) to present the theoretical and methodological basics of morphological modelling; 2) to situate GMA within a broader (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Epigenetic Information-Body Interaction and Information-Assisted Evolution from the Perspective of the Informational Model of Consciousness.Florin Gaiseanu - 2019 - Archives in Biomedical Engineering and Biotechnology 2 (2):1-6.
    Introduction: the objective of this investigation is to analyses the advances of understanding in the epigenetic processes and to extract conclusions concerning the information-based evolution from the perspective of the Informational Model of Consciousness (IMC). Analysis of epigenetic mechanisms: it is shown that the study of the epigenetic mechanisms are of increasing interest not only to discover the responsible mechanisms of some diseases, but also to observe the acquisition and transmission mechanisms of some traits to the next generation/ transgenerations, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  48. Quality assurance practices and students’ performance evaluation in universities of South-South Nigeria: A structural equation modelling approach.Bassey Asuquo Bassey, Valentine Joseph Owan & Judith Nonye Agunwa - 2019 - British Journal of Psychology Research 7 (3):1-13.
    This study assessed quality assurance practices and students’ performance evaluation in universities of South-South Nigeria using an SEM approach. Three null hypotheses guided the study. Based on factorial research design, and using a stratified random sampling technique, a sample of 878 academic staff were drawn from a sampling frame of 15 universities in South-South Nigeria. Quality Assurance Practices Students’ Performance Evaluation Scale (QAPSPES) with split-half reliability estimates ranging from .86–.92, was used as the instruments for data collection. Multiple regression (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  49. (1 other version)Comparison of a Triple Inverted Pendulum Stabilization using Optimal Control Technique.Mustefa Jibril, Messay Tadese & Eliyas Alemayehu - 2020 - Report and Opinion Journal 12 (10):62-70.
    In this paper, modelling design and analysis of a triple inverted pendulum have been done using Matlab/Script toolbox. Since a triple inverted pendulum is highly nonlinear, strongly unstable without using feedback control system. In this paper an optimal control method means a linear quadratic regulator and pole placement controllers are used to stabilize the triple inverted pendulum upside. The impulse response simulation of the open loop system shows us that the pendulum is unstable. The comparison of the closed loop impulse (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. On the relationship between cognitive models and spiritual maps. Evidence from Hebrew language mysticism.Brian L. Lancaster - 2000 - Journal of Consciousness Studies 7 (11-12):11-12.
    It is suggested that the impetus to generate models is probably the most fundamental point of connection between mysticism and psychology. In their concern with the relation between ‘unseen’ realms and the ‘seen’, mystical maps parallel cognitive models of the relation between ‘unconscious’ and ‘conscious’ processes. The map or model constitutes an explanation employing terms current within the respective canon. The case of language mysticism is examined to illustrate the premise that cognitive models may benefit from an understanding of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 961