Results for 'Support Vector Machine'

962 found
Order:
  1.  40
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. (1 other version)AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed a chatbot automation (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  3.  42
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  38
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  43
    OPTIMIZED CARDIOVASCULAR DISEASE PREDICTION USING MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  50
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  37
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Medical Image Classification with Machine Learning Classifier.Destiny Agboro - forthcoming - Journal of Computer Science.
    In contemporary healthcare, medical image categorization is essential for illness prediction, diagnosis, and therapy planning. The emergence of digital imaging technology has led to a significant increase in research into the use of machine learning (ML) techniques for the categorization of images in medical data. We provide a thorough summary of recent developments in this area in this review, using knowledge from the most recent research and cutting-edge methods.We begin by discussing the unique challenges and opportunities associated with medical (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  39
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Machine Learning and Job Posting Classification: A Comparative Study.Ibrahim M. Nasser & Amjad H. Alzaanin - 2020 - International Journal of Engineering and Information Systems (IJEAIS) 4 (9):06-14.
    In this paper, we investigated multiple machine learning classifiers which are, Multinomial Naive Bayes, Support Vector Machine, Decision Tree, K Nearest Neighbors, and Random Forest in a text classification problem. The data we used contains real and fake job posts. We cleaned and pre-processed our data, then we applied TF-IDF for feature extraction. After we implemented the classifiers, we trained and evaluated them. Evaluation metrics used are precision, recall, f-measure, and accuracy. For each classifier, results were (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Exploring Machine Learning Techniques for Coronary Heart Disease Prediction.Hisham Khdair - 2021 - International Journal of Advanced Computer Science and Applications 12 (5):28-36.
    Coronary Heart Disease (CHD) is one of the leading causes of death nowadays. Prediction of the disease at an early stage is crucial for many health care providers to protect their patients and save lives and costly hospitalization resources. The use of machine learning in the prediction of serious disease events using routine medical records has been successful in recent years. In this paper, a comparative analysis of different machine learning techniques that can accurately predict the occurrence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  43
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  50
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Using Neutrosophic Trait Measures to Analyze Impostor Syndrome in College Students after COVID-19 Pandemic with Machine Learning.Riya Eliza Shaju, Meghana Dirisala, Muhammad Ali Najjar, Ilanthenral Kandasamy, Vasantha Kandasamy & Florentin Smarandache - 2023 - Neutrosophic Sets and Systems 60:317-334.
    Impostor syndrome or Impostor phenomenon is a belief that a person thinks their success is due to luck or external factors, not their abilities. This psychological trait is present in certain groups like women. In this paper, we propose a neutrosophic trait measure to represent the psychological concept of the trait-anti trait using refined neutrosophic sets. This study analysed a group of 200 undergraduate students for impostor syndrome, perfectionism, introversion and self-esteem: after the COVID pandemic break in 2021. Data labelling (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  43
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  39
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Predicting the Number of Calories in a Dish Using Just Neural Network.Sulafa Yhaya Abu Qamar, Shahed Nahed Alajjouri, Shurooq Hesham Abu Okal & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):1-9.
    Abstract: Heart attacks, or myocardial infarctions, are a leading cause of mortality worldwide. Early prediction and accurate analysis of potential risk factors play a crucial role in preventing heart attacks and improving patient outcomes. In this study, we conduct a comprehensive review of datasets related to heart attack analysis and prediction. We begin by examining the various types of datasets available for heart attack research, encompassing clinical, demographic, and physiological data. These datasets originate from diverse sources, including hospitals, research institutions, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Comparative Analysis of Deep Learning and Naïve Bayes for Language Processing Task.Olalere Abiodun - forthcoming - International Journal of Research and Innovation in Applied Sciences.
    Text classification is one of the most important task in natural language processing, In this research, we carried out several experimental research on three (3) of the most popular Text classification NLP classifier in Convolutional Neural Network (CNN), Multinomial Naive Bayes (MNB), and Support Vector Machine (SVN). In the presence of enough training data, Deep Learning CNN work best in all parameters for evaluation with 77% accuracy, followed by SVM with accuracy of 76%, and multinomial Bayes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  83
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Implementation and Comparison of Deep Learning with Naïve Bayes for Language Processing (4th edition).Abiodun Olalere - 2024 - Internation Journal of Research and Innovation in Appliad Science:1-6.
    Text classification is one of the most important task in natural language processing, In this research, we carried out several experimental research on three (3) of the most popular Text classification NLP classifier in Convolutional Neural Network (CNN), Multinomial Naive Bayes (MNB), and Support Vector Machine (SVN). In the presence of enough training data, Deep Learning CNN work best in all parameters for evaluation with 77% accuracy, followed by SVM with accuracy of 76%, and multinomial Bayes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  50
    Arterial spin labeling as a promising alternative to FDG-PET for clinical diagnosis of patients with disorders of consciousness.Timothy Joseph Lane - manuscript
    Objective: To evaluate the potential of arterial spin labeling (ASL) as an alternative to FDG-PET in the diagnosis of disorders of consciousness (DOC), we conducted a comparative study of the two modalities. Methods: A total of 36 DOC patients (11 female; mean age = 49.67 ± 14.54 years) and 17 healthy control (HC) participants (9 female; mean age = 31.9 ± 9.6 years) underwent both FDG-PET scans that measure metabolism via glucose uptake and ASL scans that measure cerebral blood flow (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Advances and Applications of DSmT for Information Fusion. Collected Works, Volume 5.Florentin Smarandache - 2023 - Edited by Smarandache Florentin, Dezert Jean & Tchamova Albena.
    This fifth volume on Advances and Applications of DSmT for Information Fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics, and is available in open-access. The collected contributions of this volume have either been published or presented after disseminating the fourth volume in 2015 in international conferences, seminars, workshops and journals, or they are new. The contributions of each part of this volume are chronologically ordered. First Part of this book presents some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Application of Naive Bayes Model, SVM and Deep Learning Predicting.Martono Aris, Padeli Padeli & Sudaryono Sudaryono - 2023 - Cices (Cyberpreneurship Innovative and Creative Exact and Social Science) 9 (1):93-101.
    The college hopes that every semester students are able to pay tuition properly and smoothly. The hope is that the institution will be able to maintain monthly cash flow so that its operational and maintenance costs can be met. Therefore, this study was conducted to predict and fulfill the institution's cash-in from the method of paying tuition fees either by cash, installments, or sometimes late payments every semester. In predicting the method of paying tuition fees, using student profile data (name, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. ARTIFICIAL INTELLIGENT BASED COMPUTATIONAL MODEL FOR DETECTING CHRONIC-KIDNEY DISEASE.K. Jothimani & S. Thangamani - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):15-27.
    Chronic kidney disease (CKD) is a global health problem with high morbidity and mortality rate, and it induces other diseases. There are no obvious incidental effects during the starting periods of CKD, patients routinely disregard to see the sickness. Early disclosure of CKD enables patients to seek helpful treatment to improve the development of this disease. AI models can effectively assist clinical with achieving this objective on account of their fast and exact affirmation execution. In this appraisal, proposed a Logistic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. (1 other version)Word vector embeddings hold social ontological relations capable of reflecting meaningful fairness assessments.Ahmed Izzidien - 2021 - AI and Society (March 2021):1-20.
    Programming artificial intelligence to make fairness assessments of texts through top-down rules, bottom-up training, or hybrid approaches, has presented the challenge of defining cross-cultural fairness. In this paper a simple method is presented which uses vectors to discover if a verb is unfair or fair. It uses already existing relational social ontologies inherent in Word Embeddings and thus requires no training. The plausibility of the approach rests on two premises. That individuals consider fair acts those that they would be willing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Understanding from Machine Learning Models.Emily Sullivan - 2022 - British Journal for the Philosophy of Science 73 (1):109-133.
    Simple idealized models seem to provide more understanding than opaque, complex, and hyper-realistic models. However, an increasing number of scientists are going in the opposite direction by utilizing opaque machine learning models to make predictions and draw inferences, suggesting that scientists are opting for models that have less potential for understanding. Are scientists trading understanding for some other epistemic or pragmatic good when they choose a machine learning model? Or are the assumptions behind why minimal models provide understanding (...)
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  28. Supporting human autonomy in AI systems.Rafael Calvo, Dorian Peters, Karina Vold & Richard M. Ryan - 2020 - In Christopher Burr & Luciano Floridi (eds.), Ethics of digital well-being: a multidisciplinary approach. Springer.
    Autonomy has been central to moral and political philosophy for millenia, and has been positioned as a critical aspect of both justice and wellbeing. Research in psychology supports this position, providing empirical evidence that autonomy is critical to motivation, personal growth and psychological wellness. Responsible AI will require an understanding of, and ability to effectively design for, human autonomy (rather than just machine autonomy) if it is to genuinely benefit humanity. Yet the effects on human autonomy of digital experiences (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  29. Why Machines Will Never Rule the World: Artificial Intelligence without Fear.Jobst Landgrebe & Barry Smith - 2022 - Abingdon, England: Routledge.
    The book’s core argument is that an artificial intelligence that could equal or exceed human intelligence—sometimes called artificial general intelligence (AGI)—is for mathematical reasons impossible. It offers two specific reasons for this claim: Human intelligence is a capability of a complex dynamic system—the human brain and central nervous system. Systems of this sort cannot be modelled mathematically in a way that allows them to operate inside a computer. In supporting their claim, the authors, Jobst Landgrebe and Barry Smith, marshal evidence (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  30. Artificial Qualia, Intentional Systems and Machine Consciousness.Robert James M. Boyles - 2012 - In Proceedings of the Research@DLSU Congress 2012: Science and Technology Conference. pp. 110a–110c.
    In the field of machine consciousness, it has been argued that in order to build human-like conscious machines, we must first have a computational model of qualia. To this end, some have proposed a framework that supports qualia in machines by implementing a model with three computational areas (i.e., the subconceptual, conceptual, and linguistic areas). These abstract mechanisms purportedly enable the assessment of artificial qualia. However, several critics of the machine consciousness project dispute this possibility. For instance, Searle, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. The Explanatory Role of Machine Learning in Molecular Biology.Fridolin Gross - forthcoming - Erkenntnis:1-21.
    The philosophical debate around the impact of machine learning in science is often framed in terms of a choice between AI and classical methods as mutually exclusive alternatives involving difficult epistemological trade-offs. A common worry regarding machine learning methods specifically is that they lead to opaque models that make predictions but do not lead to explanation or understanding. Focusing on the field of molecular biology, I argue that in practice machine learning is often used with explanatory aims. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Follow the Math!: The Mathematics of Quantum Mechanics as the Mathematics of Set Partitions Linearized to (Hilbert) Vector Spaces.David Ellerman - 2022 - Foundations of Physics 52 (5):1-40.
    The purpose of this paper is to show that the mathematics of quantum mechanics is the mathematics of set partitions linearized to vector spaces, particularly in Hilbert spaces. That is, the math of QM is the Hilbert space version of the math to describe objective indefiniteness that at the set level is the math of partitions. The key analytical concepts are definiteness versus indefiniteness, distinctions versus indistinctions, and distinguishability versus indistinguishability. The key machinery to go from indefinite to more (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. The Boundaries of Meaning: A Case Study in Neural Machine Translation.Yuri Balashov - 2022 - Inquiry: An Interdisciplinary Journal of Philosophy 66.
    The success of deep learning in natural language processing raises intriguing questions about the nature of linguistic meaning and ways in which it can be processed by natural and artificial systems. One such question has to do with subword segmentation algorithms widely employed in language modeling, machine translation, and other tasks since 2016. These algorithms often cut words into semantically opaque pieces, such as ‘period’, ‘on’, ‘t’, and ‘ist’ in ‘period|on|t|ist’. The system then represents the resulting segments in a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Political Footprints: Political Discourse Analysis using Pre-Trained Word Vectors.Christophe Bruchansky - manuscript
    How political opinions are spread on social media has been the subject of many academic researches recently, and rightly so. Social platforms give researchers a unique opportunity to understand how public discourses are perceived, owned and instrumentalized by the general public. This paper is instead focussing on the political discourses themselves, and how a specific machine learning technique - vector space models (VSMs) -, can be used to make systematic and more objective discourse analysis. Political footprints are (...)-based representation of a political discourse in which each vector represents a word, they are produced thanks to the training of the English lexicon on large corpora of text. This paper describes a simple implementation of political footprints, some heuristics on how to use them, and their application to four cases: the U.N. Kyoto Protocol and Paris Agreement, the 2008 and 2016 U.S. presidential elections. The reader will be given some reasons to believe that political footprints produce meaningful results, suggestions on how to improve them and validate the results. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Intuitive Biases in Judgements about Thought Experiments: The Experience Machine Revisited.Dan Weijers - 2013 - Philosophical Writings 41 (1):17-31.
    This paper is a warning that objections based on thought experiments can be misleading because they may elicit judgments that, unbeknownst to the judger, have been seriously skewed by psychological biases. The fact that most people choose not to plug in to the Experience Machine in Nozick’s (1974) famous thought experiment has long been used as a knock-down objection to hedonism because it is widely thought to show that real experiences are more important to us than pleasurable experiences. This (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  36. Philosophy and Science, the Darwinian-Evolved Computational Brain, a Non-Recursive Super-Turing Machine & Our Inner-World-Producing Organ.Hermann G. W. Burchard - 2016 - Open Journal of Philosophy 6 (1):13-28.
    Recent advances in neuroscience lead to a wider realm for philosophy to include the science of the Darwinian-evolved computational brain, our inner world producing organ, a non-recursive super- Turing machine combining 100B synapsing-neuron DNA-computers based on the genetic code. The whole system is a logos machine offering a world map for global context, essential for our intentional grasp of opportunities. We start from the observable contrast between the chaotic universe vs. our orderly inner world, the noumenal cosmos. So (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  37. On Reason and Spectral Machines: Robert Brandom and Bounded Posthumanism.David Roden - 2017 - In Rosi Braidotti & Rick Dolphijn (eds.), Philosophy After Nature. Lanham: Rowman & Littlefield International. pp. 99-119.
    I distinguish two theses regarding technological successors to current humans (posthumans): an anthropologically bounded posthumanism (ABP) and an anthropologically unbounded posthumanism (AUP). ABP proposes transcendental conditions on agency that can be held to constrain the scope for “weirdness” in the space of possible posthumans a priori. AUP, by contrast, leaves the nature of posthuman agency to be settled empirically (or technologically). Given AUP there are no “future proof” constraints on the strangeness of posthuman agents. -/- In Posthuman Life I defended (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Why and how to construct an epistemic justification of machine learning?Petr Spelda & Vit Stritecky - 2024 - Synthese 204 (2):1-24.
    Consider a set of shuffled observations drawn from a fixed probability distribution over some instance domain. What enables learning of inductive generalizations which proceed from such a set of observations? The scenario is worthwhile because it epistemically characterizes most of machine learning. This kind of learning from observations is also inverse and ill-posed. What reduces the non-uniqueness of its result and, thus, its problematic epistemic justification, which stems from a one-to-many relation between the observations and many learnable generalizations? The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Agency and Embodiment: Groups, Human–Machine Interactions, and Virtual Realities.Johannes Himmelreich - 2018 - Ratio 31 (2):197-213.
    This paper develops a taxonomy of kinds of actions that can be seen in group agency, human–machine interactions, and virtual realities. These kinds of actions are special in that they are not embodied in the ordinary sense. I begin by analysing the notion of embodiment into three separate assumptions that together comprise what I call the Embodiment View. Although this view may find support in paradigmatic cases of agency, I suggest that each of its assumptions can be relaxed. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  66
    Are clinicians ethically obligated to disclose their use of medical machine learning systems to patients?Joshua Hatherley - forthcoming - Journal of Medical Ethics.
    It is commonly accepted that clinicians are ethically obligated to disclose their use of medical machine learning systems to patients, and that failure to do so would amount to a moral fault for which clinicians ought to be held accountable. Call this ‘the disclosure thesis.’ Four main arguments have been, or could be, given to support the disclosure thesis in the ethics literature: the risk-based argument, the rights-based argument, the materiality argument and the autonomy argument. In this article, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Blurring the Line Between Human and Machine Minds: Is U.S. Law Ready for Artificial Intelligence?Kipp Coddington & Saman Aryana - manuscript
    This Essay discusses whether U.S. law is ready for artificial intelligence (“AI”) which is headed down the road of blurring the line between human and machine minds. Perhaps the most high-profile and recent examples of AI are Large Language Models (“LLMs”) such as ChatGPT and Google Gemini that can generate written text, reason and analyze in a manner that seems to mimic human capabilities. U.S. law is based on English common law, which in turn incorporates Christian principles that assume (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Disoriented and alone in the “experience machine” - On Netflix, shared world deceptions and the consequences of deepening algorithmic personalization.Maria Brincker - 2021 - SATS 22 (1):75-96.
    Most online platforms are becoming increasingly algorithmically personalized. The question is if these practices are simply satisfying users preferences or if something is lost in this process. This article focuses on how to reconcile the personalization with the importance of being able to share cultural objects - including fiction – with others. In analyzing two concrete personalization examples from the streaming giant Netflix, several tendencies are observed. One is to isolate users and sometimes entirely eliminate shared world aspects. Another tendency (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Prognostic System for Heart Disease using Machine Learning: A Review.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):33-38.
    In today’s world it became difficult for daily routine check-up. The Heart disease system is an end user support and online consultation project. Here the motto behind it is to make a person to know about their heart related problem and according to it formulate them how much vital the disease is. It will be easy to access and keep track of their respective health. Thus, it’s important to predict the disease as earliest. Attributes such as Bp, Cholesterol, Diabetes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Experimental research to Optimize Process Parameters in Machining of Non Conducting Material with hybrid non conconventional machining.Vikrant Sharma & Sunil Kumar - 2017 - International Journal of Trend in Scientific Research and Development 1 (4):107-116.
    Among all non conventional micro machining, electrochemical discharge machining ECDM is having high quality of material removal rate with zero residual stress. This machining has been accepted as a highly modern technology in micromachining. In this paper an effort has been done on micro drilling of glass using electrochemical discharge machining ECDM . A fixed tool and a step down transformer have been used to support the steady machining to increase the accuracy of work piece. The input parameters used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Boundary between Mind and Machine.Dingzhou Fei - 2018 - Journal of Human Cognition 2 (1):5-15.
    The mind-body problem is one of the important topics in philosophy of mind and cognitive science. Following the analytical tradition of linguistic and logical analysis, we focus on two aspects of the mind- body problem: one is around Gödel's incompleteness theorem, and the other is on cognitive logic, especially on the question of whether Epistemological Arithmetic and machines are private. In the former case, in response to the popular view that the Gödel Incompleteness Theorem supports dualism in the mind-body problem, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Towards Pedagogy supporting Ethics in Analysis.Marie Oldfield - 2022 - Journal of Humanistic Mathematics 12 (2).
    Over the past few years we have seen an increasing number of legal proceedings related to inappropriately implemented technology. At the same time career paths have diverged from the foundation of statistics out to Data Scientist, Machine Learning and AI. All of these new branches being fundamentally branches of statistics and mathematics. This has meant that formal training has struggled to keep up with what is required in the plethora of new roles. Mathematics as a taught subject is still (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The metaphysics of the Time-Machine.Alexandros Schismenos - 2019 - SOCRATES 6 (3 & 4):37-53.
    The concept of time-travel is a modern idea which combines the imaginary signification of rational domination, the imaginary signification of technological omnipotence, the imaginary concept of eternity and the imaginary desire for immortality. It is a synthesis of central conceptual schemata of techno-science, such as the linearity and homogeneity of time, the radical separation of subjectivity from the world, the radical separation of the individual from his/her social-historical environment. The emergence of this idea, its spread during the 20th century as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The social in the platform trap: Why a microscopic system focus limits the prospect of social machines.Markus Luczak-Roesch & Ramine Tinati - 2017 - Discover Society 40.
    “Filter bubble”, “echo chambers”, “information diet” – the metaphors to describe today’s information dynamics on social media platforms are fairly diverse. People use them to describe the impact of the viral spread of fake, biased or purposeless content online, as witnessed during the recent race for the US presidency or the latest outbreak of the Ebola virus (in the latter case a tasteless racist meme was drowning out any meaningful content). This unravels the potential envisioned to arise from emergent activities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Information of the chassis and information of the program in synthetic cells.Antoine Danchin - 2009 - Systems and Synthetic Biology 3:125-134.
    Synthetic biology aims at reconstructing life to put to the test the limits of our understanding. It is based on premises similar to those which permitted invention of computers, where a machine, which reproduces over time, runs a program, which replicates. The underlying heuristics explored here is that an authentic category of reality, information, must be coupled with the standard categories, matter, energy, space and time to account for what life is. The use of this still elusive category permits (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  50. Persons or datapoints?: Ethics, artificial intelligence, and the participatory turn in mental health research.Joshua August Skorburg, Kieran O'Doherty & Phoebe Friesen - 2024 - American Psychologist 79 (1):137-149.
    This article identifies and examines a tension in mental health researchers’ growing enthusiasm for the use of computational tools powered by advances in artificial intelligence and machine learning (AI/ML). Although there is increasing recognition of the value of participatory methods in science generally and in mental health research specifically, many AI/ML approaches, fueled by an ever-growing number of sensors collecting multimodal data, risk further distancing participants from research processes and rendering them as mere vectors or collections of data points. (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 962