Results for 'Scammers persuasive technique model'

969 found
Order:
  1. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Interprétabilité et explicabilité pour l’apprentissage machine : entre modèles descriptifs, modèles prédictifs et modèles causaux. Une nécessaire clarification épistémologique.Christophe Denis & Franck Varenne - 2019 - Actes de la Conférence Nationale En Intelligence Artificielle - CNIA 2019.
    Le déficit d’explicabilité des techniques d’apprentissage machine (AM) pose des problèmes opérationnels, juridiques et éthiques. Un des principaux objectifs de notre projet est de fournir des explications éthiques des sorties générées par une application fondée sur de l’AM, considérée comme une boîte noire. La première étape de ce projet, présentée dans cet article, consiste à montrer que la validation de ces boîtes noires diffère épistémologiquement de celle mise en place dans le cadre d’une modélisation mathématique et causale d’un phénomène physique. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Interprétabilité et explicabilité de phénomènes prédits par de l’apprentissage machine.Christophe Denis & Franck Varenne - 2022 - Revue Ouverte d'Intelligence Artificielle 3 (3-4):287-310.
    Le déficit d’explicabilité des techniques d’apprentissage machine (AM) pose des problèmes opérationnels, juridiques et éthiques. Un des principaux objectifs de notre projet est de fournir des explications éthiques des sorties générées par une application fondée sur de l’AM, considérée comme une boîte noire. La première étape de ce projet, présentée dans cet article, consiste à montrer que la validation de ces boîtes noires diffère épistémologiquement de celle mise en place dans le cadre d’une modélisation mathéma- tique et causale d’un phénomène (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. On the Impact of Fallacy-based Schemata and Framing Techniques in Persuasive Technologies.Antonio Lieto & Vernero Fabiana - 2020 - Cognititar Workshop @ECAI 2020.
    Persuasive technologies can adopt several strategies to change the attitudes and behaviors of their users. In this work we present some empirical results stemming from the hypothesis - firstly formulated in [3] - that there is a strong connection between some well known cognitive biases reducible to fallacious argumentative schemata and some of the most common persuasion strategies adopted within digital technologies. In particular, we will report how both framing and fallacious-reducible mechanisms are nowadays used to design web and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Fictional Persuasion and the Nature of Belief.Asbjørn Steglich-Petersen - 2017 - In Ema Sullivan-Bissett, Helen Bradley & Paul Noordhof (eds.), Art and Belief. Oxford: Oxford University Press. pp. 174-193.
    Psychological studies on fictional persuasion demonstrate that being engaged with fiction systematically affects our beliefs about the real world, in ways that seem insensitive to the truth. This threatens to undermine the widely accepted view that beliefs are essentially regulated in ways that tend to ensure their truth, and may tempt various non-doxastic interpretations of the belief-seeming attitudes we form as a result of engaging with fiction. I evaluate this threat, and argue that it is benign. Even if the relevant (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. On the Cognitive Parsimony of Paralogical Arguments and their Impact in Automated Persuasion: Findings and Lessons Learned for Building Automatic Counter-Arguers.Antonio Lieto - 2023 - In Online Lectures. pp. 1-14.
    Persuasive technologies can adopt several strategies to change the attitudes and behaviors of their users. In this work I synthesize the lessons learned from three empirical case studies on automated persuasion that have been carried out in the last decade in the contexts of: persuasive news recommendations, social robotics, and e-commerce, respectively. In particular, such studies have assessed, in the technological domain, the effects of nudging techniques relying on well known persuasive argumentation schemas and on framing strategies. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Using models to correct data: paleodiversity and the fossil record.Alisa Bokulich - 2018 - Synthese 198 (Suppl 24):5919-5940.
    Despite an enormous philosophical literature on models in science, surprisingly little has been written about data models and how they are constructed. In this paper, I examine the case of how paleodiversity data models are constructed from the fossil data. In particular, I show how paleontologists are using various model-based techniques to correct the data. Drawing on this research, I argue for the following related theses: first, the ‘purity’ of a data model is not a measure of its (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  8. Model robustness as a confirmatory virtue: The case of climate science.Elisabeth A. Lloyd - 2015 - Studies in History and Philosophy of Science Part A 49:58-68.
    I propose a distinct type of robustness, which I suggest can support a confirmatory role in scientific reasoning, contrary to the usual philosophical claims. In model robustness, repeated production of the empirically successful model prediction or retrodiction against a background of independentlysupported and varying model constructions, within a group of models containing a shared causal factor, may suggest how confident we can be in the causal factor and predictions/retrodictions, especially once supported by a variety of evidence framework. (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  9. A Technique for Determining Closure in Semantic Tableaux.Steven James Bartlett - 1983 - Methodology and Science: Interdisciplinary Journal for the Empirical Study of the Foundations of Science and Their Methodology 16 (1):1-16.
    The author considers the model-theoretic character of proofs and disproofs by means of attempted counterexample constructions, distinguishes this proof format from formal derivations, then contrasts two approaches to semantic tableaux proposed by Beth and Lambert-van Fraassen. It is noted that Beth's original approach has not as yet been provided with a precisely formulated rule of closure for detecting tableau sequences terminating in contradiction. To remedy this deficiency, a technique is proposed to clarify tableau operations.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Cognitive Biases for the Design of Persuasive Technologies: Uses, Abuses and Ethical Concerns.Antonio Lieto - 2021 - ACM Distinguished Speakers - Lecture Series.
    In the last decades Human-Computer Interaction (HCI) has started to focus attention on “persuasive technologies” having the goal of changing users’ behavior and attitudes according to a predefined direction. In this talk we show how some of the techniques employed in such technologies trigger some well known cognitive biases by adopting a strategy relying on logical fallacies (i.e. forms of reasoning which are logically invalid but psychologically persuasive). In particular, we will show how the mechanisms reducible to logical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  67
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Non-linear Analysis of Models for Biological Pattern Formation: Application to Ocular Dominance Stripes.Michael Lyons & Lionel G. Harrison - 1992 - In Frank Eeckman (ed.), Neural Systems: Analysis and Modeling. Springer. pp. 39-46.
    We present a technique for the analysis of pattern formation by a class of models for the formation of ocular dominance stripes in the striate cortex of some mammals. The method, which employs the adiabatic approximation to derive a set of ordinary differential equations for patterning modes, has been successfully applied to reaction-diffusion models for striped patterns [1]. Models of ocular dominance stripes have been studied [2,3] by computation, or by linearization of the model equations. These techniques do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  65
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. The interplay between models and observations.Claudio Masolo, Alessander Botti Benevides & Daniele Porello - 2018 - Applied ontology 13 (1):41-71.
    We propose a formal framework to examine the relationship between models and observations. To make our analysis precise,models are reduced to first-order theories that represent both terminological knowledge – e.g., the laws that are supposed to regulate the domain under analysis and that allow for explanations, predictions, and simulations – and assertional knowledge – e.g., information about specific entities in the domain of interest. Observations are introduced into the domain of quantification of a distinct first-order theory that describes their nature (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. The didactic, persuasive and scientific uses of illustrations after Descartes.Andrea Strazzoni - 2015 - Noctua 2 (1-2):432-480.
    The aim of this article is to unveil the ways of teaching new philosophical paradigms in Dutch Universities between Seventeenth and Eighteenth Century, by means of an analysis of the uses of illustrations in Cartesian and Newtonian natural-philosophical textbooks. This analysis allows to understand the overall functions of philosophical textbooks, where illustrations act as conceptual means, filling the gap between the premise of a theory and its actual contents; didactic means, aiming to help the reader in understanding scientific models fully (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Standard State Space Models of Unawareness.Peter Fritz & Harvey Lederman - 2015 - Theoretical Aspects of Rationality and Knowledge 15.
    The impossibility theorem of Dekel, Lipman and Rustichini has been thought to demonstrate that standard state-space models cannot be used to represent unawareness. We first show that Dekel, Lipman and Rustichini do not establish this claim. We then distinguish three notions of awareness, and argue that although one of them may not be adequately modeled using standard state spaces, there is no reason to think that standard state spaces cannot provide models of the other two notions. In fact, standard space (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  58
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  18.  60
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable manner in the current (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  75
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Building Compressed Causal Models of the World.David Kinney & Tania Lombrozo - forthcoming - Cognitive Psychology.
    A given causal system can be represented in a variety of ways. How do agents determine which variables to include in their causal representations, and at what level of granularity? Using techniques from Bayesian networks, information theory, and decision theory, we develop a formal theory according to which causal representations reflect a trade-off between compression and informativeness, where the optimal trade-off depends on the decision-theoretic value of information for a given agent in a given context. This theory predicts that, all (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  53
    Scalable Cloud Solutions for Cardiovascular Disease Risk Management with Optimized Machine Learning Techniques.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-470.
    The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC). Our findings show that improved machine learning models perform better than conventional methods, offering trustworthy forecasts that can help medical practitioners with early diagnosis and individualized treatment planning. In order to achieve even higher predicted accuracy, the study's conclusion discusses the significance of its findings for clinical practice as well as future improvements that might (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The Full Bayesian Significance Test for Mixture Models: Results in Gene Expression Clustering.Julio Michael Stern, Marcelo de Souza Lauretto & Carlos Alberto de Braganca Pereira - 2008 - Genetics and Molecular Research 7 (3):883-897.
    Gene clustering is a useful exploratory technique to group together genes with similar expression levels under distinct cell cycle phases or distinct conditions. It helps the biologist to identify potentially meaningful relationships between genes. In this study, we propose a clustering method based on multivariate normal mixture models, where the number of clusters is predicted via sequential hypothesis tests: at each step, the method considers a mixture model of m components (m = 2 in the first step) and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. For a Pluralism of Climate Modelling Strategies.Baldissera Pacchetti Marina, Julie Jebeile & Erica Thompson - 2024 - Bulletin of the American Meteorological Society.
    The continued development of General Circulation Models (GCMs) towards increasing resolution and complexity is a predominantly chosen strategy to advance climate science, resulting in channelling of research and funding to meet this aspiration. Yet many other modelling strategies have also been developed and can be used to understand past and present climates, to project future climates and ultimately to support decision-making. We argue that a plurality of climate modelling strategies and an equitable distribution of funding among them would be an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. A Structural Equation Model of Writing Skills: Mixed Method.Merlyn E. Arevalo & Melissa C. Napil - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (4):37-59.
    The study's general objective is to determine the students' stance on the most appropriate model of writing skills, using Structural Equation Modeling (SEM) as a basic design in the relationship of self-regulated learning strategies, communicative learning strategies, learning grammatical strategies, and writing skills. This study used a mixed-method sequential explanatory design, in which quantitative design is more widely used than qualitative Creswell, J., & Creswell, D. (2017). The researcher used the stratified random sampling technique for selecting respondents and, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Static and dynamic vector semantics for lambda calculus models of natural language.Mehrnoosh Sadrzadeh & Reinhard Muskens - 2018 - Journal of Language Modelling 6 (2):319-351.
    Vector models of language are based on the contextual aspects of language, the distributions of words and how they co-occur in text. Truth conditional models focus on the logical aspects of language, compositional properties of words and how they compose to form sentences. In the truth conditional approach, the denotation of a sentence determines its truth conditions, which can be taken to be a truth value, a set of possible worlds, a context change potential, or similar. In the vector models, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. In Pursuit of Unification of Conceptual Models: Sets as Machines.Sabah Al-Fedaghi - manuscript
    Conceptual models as representations of real-world systems are based on diverse techniques in various disciplines but lack a framework that provides multidisciplinary ontological understanding of real-world phenomena. Concurrently, systems’ complexity has intensified, leading to a rise in developing models using different formalisms and diverse representations even within a single domain. Conceptual models have become larger; languages tend to acquire more features, and it is not unusual to use different modeling languages for different components. This diversity has caused problems with consistency (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Modelle und Grenzen der Leistungssteigerung im Sport: Enhancement, Doping, Therapie aus philosophischer Sicht.Christoph Asmuth, Benedetta Bisol & Patrick Grüneberg - 2010 - Leipziger Sportwissenschaftliche Beiträge 51 (2):8-43.
    Enhancement is a basic principle of modern sport. Their increase of achievement is usually attributed to the sportsmen’s natural assessment, their health, their training methods and their employment. In contrast, increase in output by pharmacological means is outlawed. The modern medical techniques created a whole range, by which sportsmen are supported. Consequently, sometimes difficult decisions with concrete medications develop. It is not always clearly to be differentiated whether something is a pharmacological interference, which serves the therapy or leads however to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Conference Proceeding: A New Service-Quality Model to enhance Customer Retention In the Hong Kong Fast-Food Restaurant Industry.Kenneth Lui-Ming Ngie, Philip J. Rosenberger lll & Allen George - 2014 - In Proceeding Of: The 47th Academy of Marketing Conference, At Bournemouth, England.
    Poster Presentation accepted for the July 2014 conference in Bournemouth, England. -/- Abstract: Current service-quality models in the Hong Kong fast-food restaurant (HK FFR) industry are primarily designed on the basis of fast service and standardised fast-food service process that are expected to enhance customer retention. This study explores the feasibility of a new service-quality (SQ) model that could offer enhanced customer satisfaction and retention in the competitive Hong Kong FFR context. A qualitative, phenomenological-interview approach incorporating the critical incident (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Dynamic Change of Awareness during Meditation Techniques: Neural and Physiological Correlates.Jerath Ravinder, Vernon A. Barnes, David Dillard-Wright, Shivani Jerath & Brittany Hamilton - 2012 - Frontiers in Human Neuroscience 6:1-5.
    Recent fndings illustrate how changes in consciousness accommodated by neural correlates and plasticity of the brain advance a model of perceptual change as a function of meditative practice. During the mindbody response neural correlates of changing awareness illustrate how the autonomic nervous system shifts from a sympathetic dominant to a parasympathetic dominant state. Expansion of awareness during the practice of meditation techniques can be linked to the Default Mode Network (DMN), a network of brain regions that is active when (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  32.  49
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can optimize (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. (1 other version)Book review of: R. Marlin, Propaganda and the Ethics of Persuasion. [REVIEW]Gary James Jason - 2016 - Dialogue 55 (3):545-547.
    This essay is my review of Randal Marlin’s fine book, Propaganda and the Ethics of Persuasion (2nd Ed.). Marlin’s book examines the concept of propaganda, rightly noting that the term has a neutral meaning of just promulgating a point of view and a pejorative meaning of using deceit to push a point of view. Marlin gives a concise history of propaganda techniques, and propaganda theory—from ancient Greece through WWII—and has a good discussion of the ethical issues involved in propaganda.
    Download  
     
    Export citation  
     
    Bookmark  
  36. A structural equation model of principals’ communication patterns, funds management and school-community relationship.Valentine Joseph Owan, John Asuquo Ekpenyong & Michael Ekpenyong Asuquo - 2021 - Journal of Pedagogical Sociology and Psychology 3 (1):1-18.
    Recent studies tend to explain the importance of communication in the organisation as well as prescribing the most commonly practised techniques adopted by school managers. Studies on financial management are quite limited with the available ones suggesting that poor financial management is a source of conflict between school leaders and host communities. Little seems to be known on the connection between principals’ communication patterns and funds’ management as predictors of school-community relationship. This study builds on existing studies and appears to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. INTERNALISASI NILAI-NILAI PENDIDIKAN KI HADJAR DEWANTARA DALAM MODEL PEMBELAJARAN DI PERGURUAN TINGGI (Studi Eksperimen di Jurusan Tadris Matematika).Widodo Winarso - 2016 - Jurnal Math Educator Nusantara 2 (2):150-175.
    Department of Mathematics education curriculum implementation Based KKNI who have not provided the container development of character education for students. This can be seen from the learning process in college that still relies on aspects of increased knowledge. Achievement of learning on aspects of attitudes / values ​​still are administrative without being pushed on the feasibility of value investment education daily life. Applied learning models are still oriented to conventional learning eg discussions, lectures, discussion and assignment. It is necessary to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. A Comparative Analysis of Data Mining Techniques on Breast Cancer Diagnosis Data using WEKA Toolbox.Majdah Alshammari & Mohammad Mezher - 2020 - (IJACSA) International Journal of Advanced Computer Science and Applications 8:224-229.
    Abstract—Breast cancer is considered the second most common cancer in women compared to all other cancers. It is fatal in less than half of all cases and is the main cause of mortality in women. It accounts for 16% of all cancer mortalities worldwide. Early diagnosis of breast cancer increases the chance of recovery. Data mining techniques can be utilized in the early diagnosis of breast cancer. In this paper, an academic experimental breast cancer dataset is used to perform a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Content marketing model for leading web content management.Igor Britchenko, Iryna Diachuk & Maksym Bezpartochnyi - 2019 - Atlantis Press 318:119-126.
    This paper is envisaged to provide the Ukrainian businesses with suggestions for a content marketing model for the effective management of website content in order to ensure its leading position on the European and world markets. Our study employed qualitative data collection with semi-structured interviews, survey, observation methods, quantitative and qualitative methods of content analysis of regional B2B companies, as well as the comparative analysis. The following essential stages of the content marketing process as preliminary search and analysis, website (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  64
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  84
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Measuring Openness and Evaluating Digital Academic Publishing Models: Not Quite the Same Business.Giovanni De Grandis & Yrsa Neuman - 2014 - The Journal of Electronic Publishing 17 (3).
    In this article we raise a problem, and we offer two practical contributions to its solution. The problem is that academic communities interested in digital publishing do not have adequate tools to help them in choosing a publishing model that suits their needs. We believe that excessive focus on Open Access (OA) has obscured some important issues; moreover exclusive emphasis on increasing openness has contributed to an agenda and to policies that show clear practical shortcomings. We believe that academic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  58
    ADVANCED EMOTION RECOGNITION AND REGULATION UTILIZING DEEP LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-388.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  52
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Exploratory Status of Postconnectionist Models.Miljana Milojevic & Vanja Subotić - 2020 - Theoria: Beograd 2 (63):135-164.
    This paper aims to offer a new view of the role of connectionist models in the study of human cognition through the conceptualization of the history of connectionism – from the simplest perceptrons to convolutional neural nets based on deep learning techniques, as well as through the interpretation of criticism coming from symbolic cognitive science. Namely, the connectionist approach in cognitive science was the target of sharp criticism from the symbolists, which on several occasions caused its marginalization and almost complete (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. On the relationship between cognitive models and spiritual maps. Evidence from Hebrew language mysticism.Brian L. Lancaster - 2000 - Journal of Consciousness Studies 7 (11-12):11-12.
    It is suggested that the impetus to generate models is probably the most fundamental point of connection between mysticism and psychology. In their concern with the relation between ‘unseen’ realms and the ‘seen’, mystical maps parallel cognitive models of the relation between ‘unconscious’ and ‘conscious’ processes. The map or model constitutes an explanation employing terms current within the respective canon. The case of language mysticism is examined to illustrate the premise that cognitive models may benefit from an understanding of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Digital-Based Roundtable Cooperative Learning Model on Narrative Text Teaching Materials.Ari Palupi, Miftakhul Huda & Dini Pratiwi - 2023 - In Ari Palupi, Miftakhul Huda & Dini Pratiwi (eds.), Proceedings of the International Conference on Learning and Advanced Education (ICOLAE 2022). pp. 259-279.
    This study aims to (1) describe the application of the roundtable cooperative model on narrative text teaching materials, (2) describe students’ responses to the application of the roundtable cooperative model on narrative text teaching materials, (3) describe the increase in students’ knowledge of narrative text teaching materials. The type of research used was classroom action research. Data collection techniques were observation, interviews, questionnaires, tests, and documentation. The data in this study were in the form of application, response, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Philosophy as Therapy - A Review of Konrad Banicki's Conceptual Model.Bruno Contestabile & Michael Hampe - manuscript
    In his article Banicki proposes a universal model for all forms of philosophical therapy. He is guided by works of Martha Nussbaum, who in turn makes recourse to Aristotle. As compared to Nussbaum’s approach, Banicki’s model is more medical and less based on ethical argument. He mentions Foucault’s vision to apply the same theoretical analysis for the ailments of the body and the soul and to use the same kind of approach in treating and curing them. In his (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 969