Results for 'Search Optimization'

961 found
Order:
  1. Global Optimization Studies on the 1-D Phase Problem.Jim Marsh, Martin Zwick & Byrne Lovell - 1996 - Int. J. Of General Systems 25 (1):47-59.
    The Genetic Algorithm (GA) and Simulated Annealing (SA), two techniques for global optimization, were applied to a reduced (simplified) form of the phase problem (RPP) in computational crystallography. Results were compared with those of "enhanced pair flipping" (EPF), a more elaborate problem-specific algorithm incorporating local and global searches. Not surprisingly, EPF did better than the GA or SA approaches, but the existence of GA and SA techniques more advanced than those used in this study suggest that these techniques still (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  36
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
  3.  41
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  67
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  57
    Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  38
    Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  24
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  28
    Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  22
    Efficient Cloud-Enabled Cardiovascular Disease Risk Prediction and Management through Optimized Machine Learning.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-475.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  25
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  25
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  22
    Scalable Cloud Solutions for Cardiovascular Disease Risk Management with Optimized Machine Learning Techniques.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-470.
    The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC). Our findings show that improved machine learning models perform better than conventional methods, offering trustworthy forecasts that can help medical practitioners with early diagnosis and individualized treatment planning. In order to achieve even higher predicted accuracy, the study's conclusion discusses the significance of its findings for clinical practice as well as future improvements that might be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  49
    OPTIMIZED CARDIOVASCULAR DISEASE PREDICTION USING MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  41
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  42
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  94
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated by deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  53
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  31
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  21
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  21
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Content marketing model for leading web content management.Igor Britchenko, Iryna Diachuk & Maksym Bezpartochnyi - 2019 - Atlantis Press 318:119-126.
    This paper is envisaged to provide the Ukrainian businesses with suggestions for a content marketing model for the effective management of website content in order to ensure its leading position on the European and world markets. Our study employed qualitative data collection with semi-structured interviews, survey, observation methods, quantitative and qualitative methods of content analysis of regional B2B companies, as well as the comparative analysis. The following essential stages of the content marketing process as preliminary search and analysis, website (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  33
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Psychological Resilience and Fragility: Existential-Analytical View.Iaryna Kaplunenko - 2018 - Psychology and Psychosocial Interventions 1:41-45.
    Summarizing the historical background and characteristics of the present, it should be noted that they are significantly different from the characteristics of the world where past generations lived, which undoubtedly poses new challenges for the human ability to withstand the growing pressure of stress factors. The article considers the problems of psychological resilience and fragility in terms of Existential-analytical psychotherapy of V. Frankl and A. Langle, analyzes the historical context of the present-day Ukraine, external and internal characteristics of the modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Lexicographic multi-objective linear programming using grossone methodology: Theory and algorithm.Marco Cococcioni, Massimo Pappalardo & Yaroslav Sergeyev - 2018 - Applied Mathematics and Computation 318:298-311.
    Numerous problems arising in engineering applications can have several objectives to be satisfied. An important class of problems of this kind is lexicographic multi-objective problems where the first objective is incomparably more important than the second one which, in its turn, is incomparably more important than the third one, etc. In this paper, Lexicographic Multi-Objective Linear Programming (LMOLP) problems are considered. To tackle them, traditional approaches either require solution of a series of linear programming problems or apply a scalarization of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Optimisation of mixed proportion for cement brick containing plastic waste using response surface methodology (RSM).Chuck Chuan Ng - 2022 - Innovative Infrastructure Solutions 7.
    Plastic waste is a significant environmental problem for almost all countries; therefore, protecting the environment from the problem is crucial. The most sensible solution to these problems is substituting the natural aggregates with substantial plastic waste in various building materials. This study aimed to optimise the mixed design ratio of cement brick containing plastic waste as aggregate replacement. Plastic cement brick mixtures were prepared by the incorporation of four different types of plastic waste such as polyethylene terephthalate (PET), high-density polyethylene, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Referent tracking for treatment optimisation in schizophrenic patients.Werner Ceusters & Barry Smith - 2006 - Journal of Web Semantics 4 (3):229-236.
    The IPAP Schizophrenia Algorithm was originally designed in the form of a flow chart to help physicians optimise the treatment of schizophrenic patients. We examined the current version from the perspective of recent work on terminologies and ontologies thereby drawing on the resources of Basic Formal Ontology, and this with the objective to make the algorithm appropriate for Semantic Web applications. We found that Basic Formal Ontology is a rich enough theory to represent all the entities involved and that applying (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. Does optimization imply rationality?Philippe Mongin - 2000 - Synthese 124 (1-2):73 - 111.
    The relations between rationality and optimization have been widely discussed in the wake of Herbert Simon's work, with the common conclusion that the rationality concept does not imply the optimization principle. The paper is partly concerned with adding evidence for this view, but its main, more challenging objective is to question the converse implication from optimization to rationality, which is accepted even by bounded rationality theorists. We discuss three topics in succession: (1) rationally defensible cyclical choices, (2) (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  29.  32
    Optimization Algorithms for Load Balancing in Data-Intensive Systems with Multipath Routing.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    : In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Economic rationality and the optimization trap.Nikil Mukerji & Julian Nida-Rümelin - 2015 - St. Gallen Business Review 2015 (1):12-17.
    The theme of this issue of the St. Gallen Business Review is "Harmony". For this reason, we would like to discuss whether two aspects of our life- world are in harmony, namely economic optimization and morality. What is the relation between them? According to a widely shared view, which is one aspect of the doctrine of "mainstream economics", the functioning of an economic system does not require moral behaviour on the part of the individual economic agent. In what follows, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Optimization Models for Reaction Networks: Information Divergence, Quadratic Programming and Kirchhoff’s Laws.Julio Michael Stern - 2014 - Axioms 109:109-118.
    This article presents a simple derivation of optimization models for reaction networks leading to a generalized form of the mass-action law, and compares the formal structure of Minimum Information Divergence, Quadratic Programming and Kirchhoff type network models. These optimization models are used in related articles to develop and illustrate the operation of ontology alignment algorithms and to discuss closely connected issues concerning the epistemological and statistical significance of sharp or precise hypotheses in empirical science.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32.  53
    OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Search for Invertebrate Consciousness.Jonathan Birch - 2020 - Noûs 56 (1):133-153.
    There is no agreement on whether any invertebrates are conscious and no agreement on a methodology that could settle the issue. How can the debate move forward? I distinguish three broad types of approach: theory-heavy, theory-neutral and theory-light. Theory-heavy and theory-neutral approaches face serious problems, motivating a middle path: the theory-light approach. At the core of the theory-light approach is a minimal commitment about the relation between phenomenal consciousness and cognition that is compatible with many specific theories of consciousness: the (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  34. Web search engines and distributed assessment systems.Christophe Heintz - 2006 - Pragmatics and Cognition 14 (2):387-409.
    I analyse the impact of search engines on our cognitive and epistemic practices. For that purpose, I describe the processes of assessment of documents on the Web as relying on distributed cognition. Search engines together with Web users, are distributed assessment systems whose task is to enable efficient allocation of cognitive resources of those who use search engines. Specifying the cognitive function of search engines within these distributed assessment systems allows interpreting anew the changes that have (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  35.  67
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Structural Optimization with Reliability Constraints.John Dalsgaard Sørensen & Palle Thoft-Christensen - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  37. Searching for Epistemic Norms that Matter.Dan Baras - forthcoming - Analysis.
    Epistemologists are engaged, among other things, in the business of formulating epistemic norms. That is, they formulate principles that tell us what we should believe and to what degree of confidence, or how to evaluate such epistemic states. In The End of Epistemology As We Know It, Brian Talbot argues that thus far, most of the theories resulting from these efforts are flawed. In this critical notice I examine three of his arguments.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Optimization and Beyond.Akshath Jitendranath - 2024 - Journal of Philosophy 121 (3):121-146.
    This paper will be concerned with hard choices—that is, choice situations where an agent cannot make a rationally justified choice. Specifically, this paper asks: if an agent cannot optimize in a given situation, are they facing a hard choice? A pair of claims are defended in light of this question. First, situations where an agent cannot optimize because of incompleteness of the binary preference or value relation constitute a hard choice. Second, situations where agents cannot optimize because the binary preference (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Search Engines, Free Speech Coverage, and the Limits of Analogical Reasoning.Heather Whitney & Robert Mark Simpson - 2018 - In Susan J. Brison & Katharine Gelber (eds.), Free Speech in the Digital Age. Oup Usa. pp. 33-41.
    This paper investigates whether search engines and other new modes of online communication should be covered by free speech principles. It criticizes the analogical reason-ing that contemporary American courts and scholars have used to liken search engines to newspapers, and to extend free speech coverage to them based on that likeness. There are dissimilarities between search engines and newspapers that undermine the key analogy, and also rival analogies that can be drawn which don’t recommend free speech protection (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. The search query filter bubble: effect of user ideology on political leaning of search results through query selection (2nd edition).A. G. Ekström, Guy Madison, Erik J. Olsson & Melina Tsapos - 2023 - Information, Communication and Society 1:1-17.
    It is commonly assumed that personalization technologies used by Google for the purpose of tailoring search results for individual users create filter bubbles, which reinforce users’ political views. Surprisingly, empirical evidence for a personalization-induced filter bubble has not been forthcoming. Here, we investigate whether filter bubbles may result instead from a searcher’s choice of search queries. In the first experiment, participants rated the left-right leaning of 48 queries (search strings), 6 for each of 8 topics (abortion, benefits, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Visual search for change: A probe into the nature of attentional processing.Ronald A. Rensink - 2000 - Visual Cognition 7:345-376.
    A set of visual search experiments tested the proposal that focused attention is needed to detect change. Displays were arrays of rectangles, with the target being the item that continually changed its orientation or contrast polarity. Five aspects of performance were examined: linearity of response, processing time, capacity, selectivity, and memory trace. Detection of change was found to be a self-terminating process requiring a time that increased linearly with the number of items in the display. Capacity for orientation was (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  42. In search of value: The intricate impacts of benefit perception, knowledge, and emotion about climate change on marine protection support.Minh-Hoang Nguyen, Minh-Phuong Thi Duong, Quang-Loc Nguyen, Viet-Phuong La & Quan-Hoang Vuong - manuscript
    Marine and coastal ecosystems are crucial in maintaining human livelihood, facilitating social development, and reducing climate change impacts. Studies have examined how the benefit perception of aquatic ecosystems, knowledge, and emotion about climate change affect peoples’ support for marine protection. However, their interaction effects remain understudied. The current study explores the intricate interaction effect of the benefit perception of aquatic ecosystems, knowledge, and worry about climate change on marine protection support. Bayesian Mindsponge Framework (BMF) analytics was employed on a dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  23
    Latency-Aware Packet Transmission Optimization in Duty-Cycled WSNs.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-459.
    Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission. This paper presents an optimized approach to aggregated packet transmission in duty-cycled WSNs, utilizing advanced optimization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The search for neural correlates of consciousness.Jakob Hohwy - 2007 - Philosophy Compass 2 (3):461–474.
    Most consciousness researchers, almost no matter what their views of the metaphysics of consciousness, can agree that the first step in a science of consciousness is the search for the neural correlate of consciousness (the NCC). The reason for this agreement is that the notion of ‘correlation’ doesn’t by itself commit one to any particular metaphysical view about the relation between (neural) matter and consciousness. For example, some might treat the correlates as causally related, while others might view the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  45. The search of “canonical” explanations for the cerebral cortex.Alessio Plebe - 2018 - History and Philosophy of the Life Sciences 40 (3):40.
    This paper addresses a fundamental line of research in neuroscience: the identification of a putative neural processing core of the cerebral cortex, often claimed to be “canonical”. This “canonical” core would be shared by the entire cortex, and would explain why it is so powerful and diversified in tasks and functions, yet so uniform in architecture. The purpose of this paper is to analyze the search for canonical explanations over the past 40 years, discussing the theoretical frameworks informing this (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  51
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. A search for new physics in high-mass ditau events in the ATLAS detector.Ryan Reece - 2013 - Dissertation, University of Pennsylvania
    This thesis is a work of experimental physics, a search for new physics with the ATLAS experiment. I post this thesis on the PhilArchive because it includes a pedagogical summary of quantum mechanics and the standard model of particle physics in the combination of chapters 1-2 and appendix A. This was my attempt at the end of my PhD of giving a bird's eye view of the standard model, with a thorough bibliography of the publication trail that lead to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Searching for Logic.Adam Morton - manuscript
    An introductory logic textbook where the central concept is not deduction but search and logical form. (Deduction - logical consequence - drops out as a special case. TIt is meant for a class-based rather than a lecture-based course, and for students with general interests.
    Download  
     
    Export citation  
     
    Bookmark  
  49. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Optimization of commodity stocks enterprise by means of HML-FRM clustering.Igor Britchenko & Maksym Bezpartochnyi - 2020 - Financial and Credit Activity: Problems of Theory and Practice 3 (34(2020)):259-269.
    The article examines the process of formation inventory of the enterprise and determines the optimal volume of commodity resources for sale. A generalization of author’s approaches to the formation and evaluation of inventories of the enterprise is carried out. The marketing-logistic approach was applied for the purpose of distribution groups of commodity resources due to the risk of non-fulfillment the order for the supply of goods of the enterprise. In order to ensure an effective process of commodity provision of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 961