Results for 'Zero'

330 found
Order:
  1.  63
    Zero Trust Architecture: A Key Component of Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-208.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  2. Zero Point.Tine Wilde - 2024 - Amsterdam: Wilde Oceans Publications.
    Publication Zero Point shows the results of a four-years inquiry into the concept of 'measurability'. The book encompasses thirty-eight pictureworks and a philosophical thought experiment. It invites the reader to contemplate and compile their personal 'zero point' as a portrait of God. -/- Measurability appears to be a problematic concept. The boundaries between fixed and fluid; between sharp and vague; between coloured and non-coloured; between love and hate. When does one state of affairs turn into the other? When (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  44
    Zero-Day Vulnerabilities.Vaka Pavan Reddy - 2012 - International Journal of Innovative Research in Science, Engineering and Technology 1 (2):318-322.
    Zero-day vulnerabilities are critical security risks that exploit previously unknown flaws in software systems, making them difficult to detect and defend against. As such vulnerabilities are discovered by attackers before the software vendor is aware of them, they provide a significant advantage to malicious entities. The exploitation of zero-day vulnerabilities is a major concern for both individuals and organizations, as it can lead to unauthorized data access, loss of information, and compromised systems. This paper aims to explore the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Zero Trust Architecture for Business Data Security: Principles, Implementation, and Best Practices.Saurabh Jadhav Vaibhav Dond, Omkar Gawali, Mangesh Bhise - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1659-1667.
    n the face of evolving cybersecurity threats, businesses must adopt more robust security frameworks to protect sensitive data. Traditional perimeter-based security models are no longer sufficient, especially with the rise of remote work, cloud computing, and mobile devices. Zero Trust Architecture (ZTA) is a modern security model that assumes no trust by default, whether inside or outside the corporate network. This paper explores the core principles of Zero Trust, how businesses can implement this model effectively, and the key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  15
    Zero Trust in Cloud Environments: Enhancing Security in the Modern Era.Saddikuti Ajay Kumar Reddy Jampana Manoj Kumar Reddy, Mallisetty Sharavan Santosh - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (2):861-863.
    Zero Trust (ZT) is a security model that assumes no entity, whether inside or outside the network, is trusted by default. As organizations increasingly migrate their infrastructure to the cloud, traditional perimeter-based security models prove ineffective in protecting against advanced threats. This paper explores the implementation of Zero Trust in cloud environments and its impact on enhancing security in the modern era. By focusing on identity management, network segmentation, and continuous verification, the study highlights the key principles of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Intolerance and the Zero Tolerance Fallacy.Sheldon Wein - 2013 - In Gabrijela Kišiček & Igor Ž Žagar, What Do We Know About The World? Rhetorical and Argumentative Perspectives. Scholarship at Uwindsor. pp. 132-144.
    When an activity is unwanted, administrators often adopt a zero tolerance policy towards that activity. The background assumption is that, by adopting a zero tolerance policy, one is doing everything that one can to reduce or eliminate the activity in question. Yet which policy best serves to reduce an unwanted behavior is always an empirical question. Thus, those who adopt a zero tolerance policy towards some behavior without first investigating and finding that they are in a set (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. The Ideal of a Zero-Waste Humanity: Philosophical Reflections on the Demand for a Bio-Based Economy.Jochem Zwier, Vincent Blok, Pieter Lemmens & Robert-Jan Geerts - 2015 - Journal of Agricultural and Environmental Ethics 28 (2):353-374.
    In this paper we inquire into the fundamental assumptions that underpin the ideal of the Bio-Based Economy as it is currently developed . By interpreting the BBE from the philosophical perspective on economy developed by Georges Bataille, we demonstrate how the BBE is fully premised on a thinking of scarcity. As a result, the BBE exclusively frames economic problems in terms of efficient production, endeavoring to exclude a thinking of abundance and wastefulness. Our hypothesis is that this not only entails (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  8. Bullying the Bully: Why zero-tolerance policies get a failing grade.H. Theixos & Kristin Borgwald - 2013 - Journal of Social Influence 8 (2-3):149-160.
    Recent studies show that the current punitive approach to bullying, in the form of zero-tolerance policies, is ineffective in reducing bullying and school violence. Despite this significant finding, anti-bullying legislation is increasing. The authors argue that these policies are not only ineffective but that they are also unjust, harmful, and stigmatizing. They advocate a broader integrative approach to bullying programs that includes both victims and bullies.
    Download  
     
    Export citation  
     
    Bookmark  
  9. Exploring the virtues of zero tolerance arguments.Sheldon Wein - unknown
    The zero tolerance fallacy occurs when someone advocates or adopts a zero tolerance policy towards some activity or behaviour without seeing if there is evidence to support the view that such a policy is the best or most cost-effective way of preventing or reducing the unwanted behaviour. This paper explores the idea that, instead of thinking about what the zero tolerance fallacy is, argumentation theorists should try to characterize what features good arguments for zero tolerance policies (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Vegan parents and children: zero parental compromise.Carlo Alvaro - 2020 - Ethics and Education 15 (4):476-498.
    Marcus William Hunt argues that when co-parents disagree over whether to raise their child (or children) as a vegan, they should reach a compromise as a gift given by one parent to the other out of respect for his or her authority. Josh Millburn contends that Hunt’s proposal of parental compromise over veganism is unacceptable on the ground that it overlooks respect for animal rights, which bars compromising. However, he contemplates the possibility of parental compromise over ‘unusual eating,’ of animal-based (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  11. Ground zero for a post-moral ethics in J. M. Coetzee’s Disgrace and Julia Kristeva’s melancholic.Cynthia Willett - 2011 - Continental Philosophy Review 45 (1):1-22.
    Perhaps no other novel has received as much attention from moral philosophers as South African writer J. M. Coetzee’s Disgrace . The novel is ethically compelling and yet no moral theory explains its force. Despite clear Kantian moments, neither rationalism nor self-respect can account for the strange ethical task that the protagonist sets for himself. Calling himself the dog man, like the ancient Cynics, this shamelessly cynical protagonist takes his cues for ethics not from humans but from animals. He does (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  30
    The Role of Zero Trust Architecture in Mitigating Emerging Cybersecurity Threats.Alugoju Narasimha Rao - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20200-20208.
    The rapid growth of cloud computing has revolutionized data management, providing organizations with unmatched scalability and flexibility [1]. However, this digital transformation has also exposed critical vulnerabilities, especially in the face of increasingly sophisticated cyber threats [3]. As organizations migrate to cloud-based infrastructures, traditional security models are proving ineffective in safeguarding sensitive data. Zero Trust Architecture (ZTA) emerges as a proactive and robust security framework designed to address these challenges by enforcing strict access controls and verifying every request for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  55
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. The Nuances of Deprogramming Zeros.Parker Emmerson - 2024 - Journal of Liberated Mathematics.
    Description In this paper, we propose an advanced mathematical framework centered around the Energy Number Field (E), which fundamentally avoids the conventional concept of zero by introducing a neutral ele- ment, νE. Through this approach, we redefine core mathematical constructs, including limits, continuity, differentiation, integration, and series summation, ensuring they operate seamlessly within a zero-less paradigm. We address and redefine matrix operations, topology, metric spaces, and complex analysis, aligning them with the principles of E. Additionally, we explore non-mappable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  79
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Zero to Hero” in Mindspongeland.Ni Putu Wulan Purnama Sari - 2024 - Sm3D Portal.
    Are you an Early Career Researcher (ECR) striving for success in academia? If so, I invite you to explore my unconventional path. My journey to success is wandering in mindspongeland with the BMF analytics workhorse [1]. Sounds weird? It is. Sounds unfamiliar? It is. Sounds good? In a strange manner. But unbelievable? Definitely not. I am living proof.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Absence perception and the philosophy of zero.Neil Barton - 2020 - Synthese 197 (9):3823-3850.
    Zero provides a challenge for philosophers of mathematics with realist inclinations. On the one hand it is a bona fide cardinal number, yet on the other it is linked to ideas of nothingness and non-being. This paper provides an analysis of the epistemology and metaphysics of zero. We develop several constraints and then argue that a satisfactory account of zero can be obtained by integrating an account of numbers as properties of collections, work on the philosophy of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  22
    Never Trust, Always Verify: Zero Trust Security Testing Framework.Pareek Chandra Shekhar - 2022 - Journal of Artificial Intelligence and Cloud Computing 1 (1):1-5.
    The Zero Trust paradigm is redefining the cybersecurity landscape by mandating a fundamental shift from traditional perimeter-based defenses to the "never trust, always verify" doctrine, where no entity - whether inside or outside the network—is inherently trusted. This model requires a granular approach to authentication, authorization, and resource access, continuously verifying every interaction in real-time. Zero Trust Testing (ZTT) emerges as a sophisticated, purpose-built methodology designed to meticulously validate the seamless implementation and operational integrity of these principles across (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Analyzing the Zeros of the Riemann Zeta Function Using Set-Theoretic and Sweeping Net Methods.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1:15.
    The Riemann zeta function ζ(s) is a central object in number theory and complex analysis, defined for complex variables and intimately connected to the distribution of prime numbers through its zeros. The famous Riemann Hypothesis conjectures that all non-trivial zeros of the zeta function lie on the critical line Re(s) = 1 2 . In this paper, we explore the Riemann zeta function through the lens of set-theoretic and sweeping net methods, leveraging creative comparisons of specific sets to gain deeper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Toward Incarceration Zero.Marcia Ricci Pinheiro - 2020 - IOSR Journal Of Humanities And Social Science (IOSR-JHSS) 25 (7):10-17.
    Incarceration is a hurdle for The State, the perpetrator‘s family, society in general, the victim, and the perpetrator themselves. Laws, regulations, and rules are as relative, and fragile as their associated human group intended them to be, and it is frequently the case that they change so completely from one location to another that one can be regarded as a hero in one place, and most unacceptable perpetrator in another for practicing the same acts. It is time for a change: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. ‘Pure’ Time Preferences Are Irrelevant to the Debate over Time Bias: A Plea for Zero Time Discounting as the Normative Standard.Preston Greene - 2021 - Australasian Philosophical Review 5 (3):254-265.
    I find much to like in Craig Callender's [2022] arguments for the rational permissibility of non-exponential time discounting when these arguments are viewed in a conditional form: viz., if one thinks that time discounting is rationally permissible, as the social scientist does, then one should think that non-exponential time discounting is too. However, time neutralists believe that time discounting is rationally impermissible, and thus they take zero time discounting to be the normative standard. The time neutralist rejects time discounting (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22. Puzzles for ZFEL, McShea and Brandon’s zero force evolutionary law.Martin Barrett, Hayley Clatterbuck, Michael Goldsby, Casey Helgeson, Brian McLoone, Trevor Pearce, Elliott Sober, Reuben Stern & Naftali Weinberger - 2012 - Biology and Philosophy 27 (5):723-735.
    In their 2010 book, Biology’s First Law, D. McShea and R. Brandon present a principle that they call ‘‘ZFEL,’’ the zero force evolutionary law. ZFEL says (roughly) that when there are no evolutionary forces acting on a population, the population’s complexity (i.e., how diverse its member organisms are) will increase. Here we develop criticisms of ZFEL and describe a different law of evolution; it says that diversity and complexity do not change when there are no evolutionary causes.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  23. Arguing about Infinity: The meaning (and use) of infinity and zero.Paul Mayer - manuscript
    This work deals with problems involving infinities and infinitesimals. It explores the ideas behind zero, its relationship to ontological nothingness, finititude (such as finite numbers and quantities), and the infinite. The idea of infinity and zero are closely related, despite what many perceive as an intuitive inverse relationship. The symbol 0 generally refers to nothingness, whereas the symbol infinity refers to ``so much'' that it cannot be quantified or captured. The notion of finititude rests somewhere between complete nothingness (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Origin and Significance of Zero: An Interdisciplinary Perspective.Peter Gobets & Robert Lawrence Kuhn (eds.) - 2024 - Leiden: Brill.
    Zero has been axial in human development, but the origin and discovery of zero has never been satisfactorily addressed by a comprehensive, systematic and above all interdisciplinary research program. In this volume, over 40 international scholars explore zero under four broad themes: history; religion, philosophy & linguistics; arts; and mathematics & the sciences. Some propose that the invention/discovery of zero may have been facilitated by the prior evolution of a sophisticated concept of Nothingness or Emptiness (as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Equity and Social Justice considerations in road safety work: The case of Vision Zero in New York City.Henok Girma Abebe, Matts-Åke Belin & Karin Edvardsson Björnberg - 2024 - Transport Policy 149 (2024):11-20.
    This paper analyses how Vision Zero (VZ) efforts in New York City (NYC) account for equity and social justice implications of road safety work. VZ policy documents, research literature, popular science and opinion articles on road safety work in the city were studied with a prime focus on equity and social justice. Twelve semi-structured interviews with stakeholders involved in road safety and transport planning in the city and at national level were conducted to gain an in-depth understanding of policy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. A Policy of No Interest? The Permanent Zero Interest Rate, and the Evils of Capitalism.Alexander Douglas - manuscript
    In 1937 Joan Robinson proposed that “when capitalism is rightly understood, the rate of interest will be set at zero and the major evils of capitalism will disappear”. A permanent zero rate would abolish capitalist profit except in limited cases, leaving nearly all output to be claimed by labour as wages. It would allow capital to be allocated on the basis of prospective social benefit rather than short-term profitability and a collateral basis that favours the wealthy. It would (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Energy analysis for construction of a zero-energy residential building using thermal simulation in Iran.Nima Amani, Abdulamir Rezasoroush, Mostafa Moghadas Mashhad & Keyvan Safarzadeh - 2021 - International Journal of Energy Sector Management (Ijesm) 15 (5):895-913.
    Purpose: The purpose of this paper is to examine the feasibility and design of zero-energy buildings (ZEBs) in cold and semi-arid climates. In this study, to maximize the use of renewable energy, energy consumption is diminished using passive solar architecture systems and techniques. -/- Design/methodology/approach: The case study is a residential building with a floor area of 100 m2 and four inhabitants in the cold and semi-arid climate, northeast of Iran. For thermal simulation, the climate data such as air (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  30
    AI-Powered Cloud Migration: Automating the Transition from On-Premises to Cloud Environments with Zero Downtime.M. Vaidhegi G. Glory - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):747-752.
    : As organizations continue to embrace cloud computing, the migration of workloads, applications, and data from on-premises environments to the cloud remains one of the most critical tasks. However, migrating to the cloud is often seen as a daunting task due to the complexity, the risk of downtime, and the potential for service disruptions. Artificial Intelligence (AI) and automation have emerged as transformative technologies for cloud migration, providing solutions that enable a seamless, efficient, and zero-downtime transition. This paper explores (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  30
    Carbon Footprint of Digital Infrastructure: Data Centers, Cloud Computing, and the Path to Net Zero.Vora Hitesh - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (4):5401-5413.
    The exponential growth of digital services—ranging from streaming platforms to business applications— has intensified the energy demand of data centers and cloud computing infrastructures. As governments and private entities commit to net-zero carbon goals, understanding the carbon footprint of digital infrastructure becomes critical. This paper examines the key drivers of energy consumption in data centers, explores current best practices for reducing emissions, and evaluates emerging technological and policy solutions. We conclude that a holistic approach— encompassing energy-efficient hardware, advanced cooling (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Theater of Knowledge at the Zero-Point as a Colonial Enterprise: Santiago Castro-Gomez’s Engagement with Kant.Paula Landerreche Cardillo - 2023 - Apa Studies in Hispanic/Latino Issues in Philosophy 22 (2):2-5.
    Download  
     
    Export citation  
     
    Bookmark  
  31.  23
    A origem da energia do ponto zero.Matheus P. Lobo - 2025 - Open Journal of Mathematics and Physics 7:298.
    Neste artigo, apresentamos uma interpretação da origem da energia do ponto zero E = hv.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Gaps Between Zeros of GL(2) L-functions.Patrick J. Ryan, Owen Barrett, Brian McDonald, Steven J. Miller, Caroline L. Turnage-Butterbaugh & Karl Winsor - 2015 - Journal of Mathematical Analysis and Applications 429 (1):204-232.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Road Safety Policy in Addis Ababa: A Vision Zero Perspective.Henok Girma Abebe - 2022 - Sustainability 14 (9).
    In this article, the Addis Ababa city road safety policies are examined and analysed based on the Vision Zero approach to road safety work. Three major policy documents are explored and assessed in terms of how they compare with Vision Zero policy in Sweden, concerning how road safety problems are conceptualised, the responsibility ascriptions promoted, the nature of goal setting concerning road safety objectives, and the specific road safety interventions promoted. It is concluded that there is a big (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. On the Reconciliation Between Infinity and Zero - Another 'Theory of Everything' Based on Nothing? - Thanksgiving 2024 Update (19th edition).Louis Taylor - manuscript
    Is there room enough in all creation for another 'Empty Universe Theory'? How should we view the realm in which we exist? Are the natures of matter and energy, their compositions and relationships with each other the fundamental key to the understanding of everything or is it something else? As a researcher I decided to conduct an independent investigation and audit of Creation and this can be thought of as my report. Some thoughts on the true nature of the realm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. A Feasibility Study of A Zero Energy Building in Egypt.Nehad Khattab - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):36-43.
    Abstract— According to studies, buildings use around 40% of the total energy consumption in the world. Most of this consumed energy comes from fossil fuel, one of the sources of environmental pollution. The Net Zero Energy Building (NZEB) is an alternative to this alarming pollution. With its reduced energy needs and renewable energy systems, a ZEB can return as much energy as it takes from the utility on an annual basis. Thus the main objective of this study is to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  13
    Tương lai Net-Zero của Trung Quốc và Điện than: Một chuyển đổi chiến lược.Bồ Nông - 2025 - Xóm Chim.
    Trung Quốc, quốc gia sản xuất điện than lớn nhất thế giới, đang đối mặt với thách thức đáng kể trong quá trình chuyển đổi sang một ngành điện phát thải ròng bằng không, đồng thời duy trì an ninh năng lượng và ổn định kinh tế. Với các nhà máy điện đốt than chiếm một tỷ trọng đáng kể trong cơ cấu năng lượng của Trung Quốc, việc loại bỏ hoàn toàn không phải là điều có thể thực hiện (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  33
    Coal Power in China’s Net-Zero Future: A Strategic Transition.Bồ nông - 2025 - The Bird Village.
    China, the world’s largest coal power producer, faces the significant challenge of transitioning to a net-zero emissions power sector while maintaining energy security and economic stability. With coal-fired power plants accounting for a significant share of China’s energy mix, a complete phase-out is neither immediate nor straightforward. Instead, repositioning coal power as a flexible resource rather than a baseload provider offers a pragmatic approach to decarbonization.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Problem 11589: Where are the zeros?Catalin Barboianu - 2011 - The American Mathematical Monthly 117 (7):653.
    Download  
     
    Export citation  
     
    Bookmark  
  39. An Extension of Heron’s Formula to Tetrahedra, and the Projective Nature of Its Zeros.Havel Timothy - manuscript
    A natural extension of Heron's 2000 year old formula for the area of a triangle to the volume of a tetrahedron is presented. This gives the fourth power of the volume as a polynomial in six simple rational functions of the areas of its four faces and three medial parallelograms, which will be referred to herein as "interior faces." Geometrically, these rational functions are the areas of the triangles into which the exterior faces are divided by the points at which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Our Universe’s Fingerprint: Why Zero Point Radiation Occurs and Are Quantum Fluctuations Truly Random?David Angell - manuscript
    Absolute nothing is the absence of our universe and its laws. Without these rules, nothingness has infinite potential. This implies that within the infinite probability of nothing, infinity can emerge. This would be expressed through infinite universes like our own. Infinite of these universes will differ by several particles, appearing and disappearing for no reason other than fulfilling every possibility. This universe is the product of a greater realisation of infinity and we can test this theory via the measurement of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Sensation-growth equations for non-zero threshold sensation, evaluated using non-traditional, bounded Fechnerian integration, for Fechner’s Law and for Ekman’s Law, using 12 different Weber Fractions.Lance Nizami - 2020 - In InterNoise 2020. Seoul, South Korea: pp. 1-16.
    An ongoing mystery in sensory science is how sensation magnitude F(I), such as loudness, increases with increasing stimulus intensity I. No credible, direct experimental measures exist. Nonetheless, F(I) can be inferred algebraically. Differences in sensation have empirical (but non-quantifiable) minimum sizes called just-noticeable sensation differences, ∆F, which correspond to empirically-measurable just-noticeable intensity differences, ∆I. The ∆Is presumably cumulate from an empirical stimulus-detection threshold I_th up to the intensity of interest, I. Likewise, corresponding ∆Fs cumulate from the sensation at the stimulus-detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Going Nowhere and Back: Is Trivialization the Same as Zero Execution?Ivo Pezlar - 2022 - In Pavel Materna & Bjørn Jespersen, Logically Speaking. A Festschrift for Marie Duží. College Publications. pp. 187-202.
    In this paper I will explore the question whether the Trivialization construction of transparent intensional logic (TIL) can be understood in terms of the Execution construction, specifically, in terms of its degenerate case known as the 0-Execution. My answer will be positive and the apparent contrast between the intuitive understanding of Trivialization and 0-Execution will be explained as a matter of distinct yet related informal perspectives, not as a matter of technical or conceptual differences.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Optimized Fog Computing and IoT Integrated Environment for Healthcare Monitoring and Diagnosis using Extended Li Zeroing Neural Network.S. M. Padmavathi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):501-516.
    The EdTech revolution in India has emerged as a transformative force, particularly during and after the COVID-19 pandemic, when traditional education systems faced unprecedented disruptions. While digital technologies have unlocked new opportunities for teaching and learning, they have also exposed systemic inequities and deepened the existing digital divide. This paper examines how EdTech is reshaping India's education landscape by addressing these challenges, with a focus on both the opportunities it presents and the barriers it creates.
    Download  
     
    Export citation  
     
    Bookmark  
  44. Indonesia chuyển động mạnh mẽ về hướng Net Zero.Observateur Concerné - 2023 - Ocghg.
    Trong khu vực Đông Nam Á, Indonesia là nền kinh tế lớn và cũng là quốc gia phát thải khí nhà kính lớn nhất. Tuy nhiên, Indonesia cũng cam kết mạnh mẽ với mục tiêu giảm mạnh ảnh hưởng phát thải của khu vực sản xuất điện năng của mình, hiện nay đang chủ yếu vận hành các nhà máy nhiệt điện đốt than.
    Download  
     
    Export citation  
     
    Bookmark  
  45. Consciousness Makes Things Matter.Andrew Y. Lee - forthcoming - Philosophers' Imprint.
    This paper argues that phenomenal consciousness is what makes an entity a welfare subject. I develop a variety of motivations for this view, and then defend it from objections concerning death, non-conscious entities that have interests (such as plants), and conscious entities that necessarily have welfare level zero. I also explain how my theory of welfare subjects relates to experientialist and anti-experientialist theories of welfare goods.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  46. A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Conservation of the Circle: Core Dynamic in Nature.Ilexa Yardley - 2017 - Https://Medium.Com/the-Circular-Theory/.
    Zero and one is circumference and diameter. Literally. And, figuratively.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Leave only Footprints? Reframing Climate Change, Environmental Stewardship, and Human Impact.Monica Aufrecht - 2017 - Ethics, Policy and Environment 20 (1):84-102.
    Cheryl Hall has argued that framing of climate change must acknowledge the sacrifices needed to reach a sustainable future. This paper builds on that argument. Although it is important to acknowledge the value of what must be sacrificed, this paper argues that current frames about the environment falsely portray humans and the environment as in a zero-sum game, and in doing so ask people to give up the wrong things. This could undermine the public’s trust in environmentalism, and might (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Grounding nonexistence.Daniel Muñoz - 2020 - Inquiry: An Interdisciplinary Journal of Philosophy 63 (2):209-229.
    Contingent negative existentials give rise to a notorious paradox. I formulate a version in terms of metaphysical grounding: nonexistence can't be fundamental, but nothing can ground it. I then argue for a new kind of solution, expanding on work by Kit Fine. The key idea is that negative existentials are contingently zero-grounded – that is to say, they are grounded, but not by anything, and only in the right conditions. If this is correct, it follows that grounding cannot be (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  50. Pascalian Expectations and Explorations.Alan Hajek & Elizabeth Jackson - forthcoming - In Roger Ariew & Yuval Avnur, The Blackwell Companion to Pascal. Wiley-Blackwell.
    Pascal’s Wager involves expected utilities. In this chapter, we examine the Wager in light of two main features of expected utility theory: utilities and probabilities. We discuss infinite and finite utilities, and zero, infinitesimal, extremely low, imprecise, and undefined probabilities. These have all come up in recent literature regarding Pascal’s Wager. We consider the problems each creates and suggest prospects for the Wager in light of these problems.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 330