Results for 'aHala M. Abdelkarem'

975 found
Order:
  1. The Role of Vitamin D in the Incidence of Metabolic Syndrome in Undergraduate Female Students in Saudi Arabia.aHala M. Abdelkarem, Aishah H. Alamri, bFadia Y. Abdel Megeid, cMervat M. Al-Sayed & Omyma K. Radwan - 2018 - International Journal of Academic Health and Medical Research (IJAHMR) 2 (11):7-12.
    Abstract: Background: Vitamin D insufficiency/deficiency prevalent in all age groups across the world is common in obesity and may play an important role in the risk factors of metabolic syndrome (MS). Objectives: This cross-sectional study is to evaluate the relationship between levels of adiponectin and circulating 25(OH)D, and its effect on metabolic biomarker among overweight/obese female students. Methods: Three hundred female students; with mean age 20.9 ± 3.2 years were attending the Aljouf University, Sakaka, Saudi Arabia. They were randomly selected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Knowledge Based System for Diagnosing Custard Apple Diseases and Treatment.Mustafa M. K. Al-Ghoul, Mohammed H. S. Abueleiwa, Fadi E. S. Harara, Samir Okasha & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (5):41-45.
    There is no doubt that custard apple diseases are among the important reasons that destroy the Custard Apple plant and its agricultural crops. This leads to obvious damage to these plants and they become inedible. Discovering these diseases is a good step to provide the appropriate and correct treatment. Determining the treatment with high accuracy depends on the method used to correctly diagnose the disease, expert systems can greatly help in avoiding damage to these plants. The expert system correctly diagnoses (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  3. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  4. CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):233-246.
    The World Health Organization has declared the outbreak of the novel coronavirus, Covid-19 as pandemic across the world. With its alarming surge of affected cases throughout the world, lockdown, and awareness (social distancing, use of masks etc.) among people are found to be the only means for restricting the community transmission. In a densely populated country like India, it is very difficult to prevent the community transmission even during lockdown without social awareness and precautionary measures taken by the people. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark   116 citations  
  5. AI-Driven Innovations in Agriculture: Transforming Farming Practices and Outcomes.Jehad M. Altayeb, Hassam Eleyan, Nida D. Wishah, Abed Elilah Elmahmoum, Ahmed J. Khalil, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Applied Research (Ijaar) 8 (9):1-6.
    Abstract: Artificial Intelligence (AI) is transforming the agricultural sector, enhancing both productivity and sustainability. This paper delves into the impact of AI technologies on agriculture, emphasizing their application in precision farming, predictive analytics, and automation. AI-driven tools facilitate more efficient crop and resource management, leading to higher yields and a reduced environmental footprint. The paper explores key AI technologies, such as machine learning algorithms for crop monitoring, robotics for automated planting and harvesting, and data analytics for optimizing resource use. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  6. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   126 citations  
  7. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   190 citations  
  8. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  9. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  10. Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Download  
     
    Export citation  
     
    Bookmark   44 citations  
  11. PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark   137 citations  
  12. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  13. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  14. Energy Efficiency Prediction using Artificial Neural Network.Ahmed J. Khalil, Alaa M. Barhoom, Bassem S. Abu-Nasser, Musleh M. Musleh & Samy S. Abu-Naser - 2019 - International Journal of Academic Pedagogical Research (IJAPR) 3 (9):1-7.
    Buildings energy consumption is growing gradually and put away around 40% of total energy use. Predicting heating and cooling loads of a building in the initial phase of the design to find out optimal solutions amongst different designs is very important, as ell as in the operating phase after the building has been finished for efficient energy. In this study, an artificial neural network model was designed and developed for predicting heating and cooling loads of a building based on a (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  15. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  16. Categories and foundational ontology: A medieval tutorial.Luis M. Augusto - 2022 - Journal of Knowledge Structures and Systems 3 (1):1-56.
    Foundational ontologies, central constructs in ontological investigations and engineering alike, are based on ontological categories. Firstly proposed by Aristotle as the very ur- elements from which the whole of reality can be derived, they are not easy to identify, let alone partition and/or hierarchize; in particular, the question of their number poses serious challenges. The late medieval philosopher Dietrich of Freiberg wrote around 1286 a tutorial that can help us today with this exceedingly difficult task. In this paper, I discuss (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  17. Bridging mainstream and formal ontology: A causality-based upper ontology in Dietrich of Freiberg.Luis M. Augusto - 2021 - Journal of Knowledge Structures and Systems 2 (2):35.
    Ontologies are some of the most central constructs in today's large plethora of knowledge technologies, namely in the context of the semantic web. As their coinage indicates, they are direct heirs to the ontological investigations in the long Western philosophical tradition, but it is not easy to make bridges between them. Contemporary ontological commitments often take causality as a central aspect for the ur-segregation of entities, especially in scientific upper ontologies; theories of causality and philosophical ontological investigations often go hand-in-hand, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  18. Much Ado About Nothing: Unmotivating "Gender Identity".E. M. Hernandez & Rowan Bell - forthcoming - Ergo: An Open Access Journal of Philosophy.
    Recently, the concept of "gender identity" has enjoyed a great deal of attention in gender metaphysics. This seems to be motivated by the goal of creating trans-inclusive theory, by explaining trans people's genders. In this paper, we aim to unmotivate this project. Notions of "gender identity" serve important pragmatic purposes for trans people, such as satisfying the curiosity of non-trans people, and, relatedly, securing our access to important goods like legal rights and medical care. However, we argue that this does (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  19.  12
    Person-affecting utilitarianism.Ralf M. Bader - 2022 - In Gustaf Arrhenius, Krister Bykvist, Tim Campbell & Elizabeth Finneron-Burns, The Oxford Handbook of Population Ethics. Oxford University Press. pp. 251-270.
    This paper argues that impersonal versions of utilitarianism involve an objectionable axiology that does not take personal good seriously. Rather than attributing ethical significance to personal good, they only consider it to be ethically relevant. As a result, they end up sub-ordinating and sacrificing personal good for the sake of impersonal good and thereby treat persons as mere containers of impersonal good. This gives rise to particularly troubling implications in variable-population cases. The paper then evaluates the prospects for person-affecting versions (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  20. Why Composition Matters.Andrew M. Bailey & Andrew Brenner - 2020 - Canadian Journal of Philosophy 50 (8):934-949.
    Many say that ontological disputes are defective because they are unimportant or without substance. In this paper, we defend ontological disputes from the charge, with a special focus on disputes over the existence of composite objects. Disputes over the existence of composite objects, we argue, have a number of substantive implications across a variety of topics in metaphysics, science, philosophical theology, philosophy of mind, and ethics. Since the disputes over the existence of composite objects have these substantive implications, they are (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  21. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset size, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  22. Deductive Computing over Knowledge Bases: Prolog and Datalog.Luis M. Augusto - 2024 - Journal of Knowledge Structures and Systems 5 (1):1-62.
    Knowledge representation (KR) is actually more than representation: It involves also inference, namely inference of “new” knowledge, i.e. new facts. Logic programming is a suitable KR medium, but more often than not discussions on this programming paradigm focus on aspects other than KR. In this paper, I elaborate on the general theory of logic programming and give the essentials of two of its main implementations, to wit, Prolog and Datalog, from the viewpoint of deductive computing over knowledge bases, which includes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Toward a general theory of knowledge.Luis M. Augusto - 2020 - Journal of Knowledge Structures and Systems 1 (1):63-97.
    For millennia, knowledge has eluded a precise definition. The industrialization of knowledge (IoK) and the associated proliferation of the so-called knowledge communities in the last few decades caused this state of affairs to deteriorate, namely by creating a trio composed of data, knowledge, and information (DIK) that is not unlike the aporia of the trinity in philosophy. This calls for a general theory of knowledge (ToK) that can work as a foundation for a science of knowledge (SoK) and additionally distinguishes (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  24. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  25. From symbols to knowledge systems: A. Newell and H. A. Simon's contribution to symbolic AI.Luis M. Augusto - 2021 - Journal of Knowledge Structures and Systems 2 (1):29 - 62.
    A. Newell and H. A. Simon were two of the most influential scientists in the emerging field of artificial intelligence (AI) in the late 1950s through to the early 1990s. This paper reviews their crucial contribution to this field, namely to symbolic AI. This contribution was constituted mostly by their quest for the implementation of general intelligence and (commonsense) knowledge in artificial thinking or reasoning artifacts, a project they shared with many other scientists but that in their case was theoretically (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  26. Multidimensional Concepts and Disparate Scale Types.Brian Hedden & Jacob M. Nebel - 2024 - Philosophical Review 133 (3):265-308.
    Multidimensional concepts are everywhere, and they are important. Examples include moral value, welfare, scientific confirmation, democracy, and biodiversity. How, if at all, can we aggregate the underlying dimensions of a multidimensional concept F to yield verdicts about which things are Fer than which overall? Social choice theory can be used to model and investigate this aggregation problem. Here, we focus on a particularly thorny problem made salient by this social choice-theoretic framework: the underlying dimensions of a given concept might be (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. Grape Leaf Species Classification Using CNN.Mohammed M. Almassri & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):66-72.
    Abstract: Context: grapevine leaves are an important agricultural product that is used in many Middle Eastern dishes. The species from which the grapevine leaf originates can differ in terms of both taste and price. Method: In this study, we build a deep learning model to tackle the problem of grape leaf classification. 500 images were used (100 for each species) that were then increased to 10,000 using data augmentation methods. Convolutional Neural Network (CNN) algorithms were applied to build this model (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. Papaya Maturity Classifications using Deep Convolutional Neural Networks.Marah M. Al-Masawabe, Lamis F. Samhan, Amjad H. AlFarra, Yasmeen E. Aslem & Samy S. Abu-Naser - 2021 - International Journal of Engineering and Information Systems (IJEAIS) 5 (12):60-67.
    Papaya is a tropical fruit with a green cover, yellow pulp, and a taste between mango and cantaloupe, having commercial importance because of its high nutritive and medicinal value. The process of sorting papaya fruit based on maturely is one of the processes that greatly determine the mature of papaya fruit that will be sold to consumers. The manual grading of papaya fruit based on human visual perception is time-consuming and destructive. The objective of this paper is to the status (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  29. Totalism without Repugnance.Jacob M. Nebel - 2022 - In Jeff McMahan, Timothy Campbell, Ketan Ramakrishnan & Jimmy Goodrich, Ethics and Existence: The Legacy of Derek Parfit. New York, NY: Oxford University Press. pp. 200-231.
    Totalism is the view that one distribution of well-being is better than another just in case the one contains a greater sum of well-being than the other. Many philosophers, following Parfit, reject totalism on the grounds that it entails the repugnant conclusion: that, for any number of excellent lives, there is some number of lives that are barely worth living whose existence would be better. This paper develops a theory of welfare aggregation—the lexical-threshold view—that allows totalism to avoid the repugnant (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  30. Causal inference in biomedical research.Tudor M. Baetu - 2020 - Biology and Philosophy 35 (4):1-19.
    Current debates surrounding the virtues and shortcomings of randomization are symptomatic of a lack of appreciation of the fact that causation can be inferred by two distinct inference methods, each requiring its own, specific experimental design. There is a non-statistical type of inference associated with controlled experiments in basic biomedical research; and a statistical variety associated with randomized controlled trials in clinical research. I argue that the main difference between the two hinges on the satisfaction of the comparability requirement, which (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  31. Why Mary left her room.Michaela M. McSweeney - 2023 - Philosophy and Phenomenological Research 109 (1):261-287.
    I argue for an account of grasping, or understanding that, on which we grasp via a higher‐order mental act of Husserlian fulfillment. Fulfillment is the act of matching up the objects of our phenomenally presentational experiences with those of our phenomenally representational thought. Grasping‐by‐fulfilling is importantly different from standard epistemic aims, in part because it is phenomenal rather than inferential. (I endorse Bourget's (2017) arguments to that effect.) I show that grasping‐by‐fulfilling cannot be a species of propositional knowledge or belief, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32. An Intrapersonal Addition Paradox.Jacob M. Nebel - 2018 - Ethics 129 (2):309-343.
    I present a new argument for the repugnant conclusion. The core of the argument is a risky, intrapersonal analogue of the mere addition paradox. The argument is important for three reasons. First, some solutions to Parfit’s original puzzle do not obviously generalize to the intrapersonal puzzle in a plausible way. Second, it raises independently important questions about how to make decisions under uncertainty for the sake of people whose existence might depend on what we do. And, third, it suggests various (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  33. 3D Convolutional Neural Networks for Accurate Reconstruction of Distorted Faces.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (4):560-570.
    The core objective of this project is to recognize and reconstruct distorted facial images, particularly in the context of accidents. This involves using deep learning techniques to analyze the features of a distorted face and regenerate it into a recognizable form. Deep learning models are wellsuited for this task due to their ability to learn complex patterns and representations from data the input data consists of distorted facial images, typically obtained from MRI scans of accident victims. These images may contain (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  34. Two-level grammars: Some interesting properties of van Wijngaarden grammars.Luis M. Augusto - 2023 - Omega - Journal of Formal Languages 1:3-34.
    The van Wijngaarden grammars are two-level grammars that present many interesting properties. In the present article I elaborate on six of these properties, to wit, (i) their being constituted by two grammars, (ii) their ability to generate (possibly infinitely many) strict languages and their own metalanguage, (iii) their context-sensitivity, (iv) their high descriptive power, (v) their productivity, or the ability to generate an infinite number of production rules, and (vi) their equivalence with the unrestricted, or Type-0, Chomsky grammars.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  36. Clinical applications of machine learning algorithms: beyond the black box.David S. Watson, Jenny Krutzinna, Ian N. Bruce, Christopher E. M. Griffiths, Iain B. McInnes, Michael R. Barnes & Luciano Floridi - 2019 - British Medical Journal 364:I886.
    Machine learning algorithms may radically improve our ability to diagnose and treat disease. For moral, legal, and scientific reasons, it is essential that doctors and patients be able to understand and explain the predictions of these models. Scalable, customisable, and ethical solutions can be achieved by working together with relevant stakeholders, including patients, data scientists, and policy makers.
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  37. Pain in psychology, biology and medicine: Some implications for pain eliminativism.Tudor M. Baetu - 2020 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 82:101292.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  38. The van Wijngaarden grammars: A syntax primer with decidable restrictions.Luis M. Augusto - 2023 - Journal of Knowledge Structures and Systems 4 (2):1-39.
    Expressiveness and decidability are two core aspects of programming languages that should be thoroughly known by those who use them; this includes knowledge of their metalanguages a.k.a. formal grammars. The van Wijngaarden grammars (WGs) are capable of generating all the languages in the Chomsky hierarchy and beyond; this makes them a relevant tool in the design of (more) expressive programming languages. But this expressiveness comes at a very high cost: The syntax of WGs is extremely complex and the decision problem (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Utils and Shmutils.Jacob M. Nebel - 2021 - Ethics 131 (3):571-599.
    Matthew Adler's Measuring Social Welfare is an introduction to the social welfare function (SWF) methodology. This essay questions some ideas at the core of the SWF methodology having to do with the relation between the SWF and the measure of well-being. The facts about individual well-being do not single out a particular scale on which well-being must be measured. As with physical quantities, there are multiple scales that can be used to represent the same information about well-being; no one scale (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  40. A Hybrid View of Commitment.Facundo M. Alonso - forthcoming - In David W. Shoemaker, Oxford Studies in Agency and Responsibility, Volume 9. Oxford: Oxford University Press. pp. 28-50.
    We often appeal to the notion of an agent’s commitment to action to characterize, e.g., an agent’s faithfulness to a promise she has given to another, her robust disposition to pursue a goal she values or cares about, and her determination to stick to that goal. In the philosophy of action, that notion is often associated with the idea of an agent’s intention to act. In ethics, it is associated primarily with the idea of an agent’s commitment to, or endorsement (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Rank-Weighted Utilitarianism and the Veil of Ignorance.Jacob M. Nebel - 2020 - Ethics 131 (1):87-106.
    Lara Buchak argues for a version of rank-weighted utilitarianism that assigns greater weight to the interests of the worse off. She argues that our distributive principles should be derived from the preferences of rational individuals behind a veil of ignorance, who ought to be risk averse. I argue that Buchak’s appeal to the veil of ignorance leads to a particular way of extending rank-weighted utilitarianism to the evaluation of uncertain prospects. This method recommends choices that violate the unanimous preferences of (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  42. Supporting human autonomy in AI systems.Rafael Calvo, Dorian Peters, Karina Vold & Richard M. Ryan - 2020 - In Christopher Burr & Luciano Floridi, Ethics of digital well-being: a multidisciplinary approach. Springer.
    Autonomy has been central to moral and political philosophy for millenia, and has been positioned as a critical aspect of both justice and wellbeing. Research in psychology supports this position, providing empirical evidence that autonomy is critical to motivation, personal growth and psychological wellness. Responsible AI will require an understanding of, and ability to effectively design for, human autonomy (rather than just machine autonomy) if it is to genuinely benefit humanity. Yet the effects on human autonomy of digital experiences are (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  43. The Moral Landscape of Monetary Design.Andrew M. Bailey, Bradley Rettler & Craig Warmke - 2021 - Philosophy Compass 16 (11):1-15.
    In this article, we identify three key design dimensions along which cryptocurrencies differ -- privacy, censorship-resistance, and consensus procedure. Each raises important normative issues. Our discussion uncovers new ways to approach the question of whether Bitcoin or other cryptocurrencies should be used as money, and new avenues for developing a positive answer to that question. A guiding theme is that progress here requires a mixed approach that integrates philosophical tools with the purely technical results of disciplines like computer science and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Extensive Measurement in Social Choice.Jacob M. Nebel - 2024 - Theoretical Economics 19 (4):1581-1618.
    Extensive measurement is the standard measurement-theoretic approach for constructing a ratio scale. It involves the comparison of objects that can be concatenated in an additively representable way. This paper studies the implications of extensively measurable welfare for social choice theory. We do this in two frameworks: an Arrovian framework with a fixed population and no interpersonal comparisons, and a generalized framework with variable populations and full interpersonal comparability. In each framework we use extensive measurement to introduce novel domain restrictions, independence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Opinion leaders, independence, and Condorcet's Jury Theorem.David M. Estlund - 1994 - Theory and Decision 36 (2):131-162.
    Download  
     
    Export citation  
     
    Bookmark   76 citations  
  46. The Sum of Well-Being.Jacob M. Nebel - 2023 - Mind 132 (528):1074–1104.
    Is well-being the kind of thing that can be summed across individuals? This paper takes a measurement-theoretic approach to answering this question. To make sense of adding well-being, we would need to identify some natural "concatenation" operation on the bearers of well-being that satisfies the axioms of extensive measurement and can therefore be represented by the arithmetic operation of addition. I explore various proposals along these lines, involving the concatenation of segments within lives over time, of entire lives led alongside (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. Computable Rationality, NUTS, and the Nuclear Leviathan.S. M. Amadae - 2018 - In Daniel Bessner & Nicolas Guilhot, The Decisionist Imagination: Democracy, Sovereignty and Social Science in the 20th Century.
    This paper explores how the Leviathan that projects power through nuclear arms exercises a unique nuclearized sovereignty. In the case of nuclear superpowers, this sovereignty extends to wielding the power to destroy human civilization as we know it across the globe. Nuclearized sovereignty depends on a hybrid form of power encompassing human decision-makers in a hierarchical chain of command, and all of the technical and computerized functions necessary to maintain command and control at every moment of the sovereign's existence: this (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Gigerenzer's normative critique of Kahneman and Tversky.Peter B. M. Vranas - 2000 - Cognition 76 (3):179-193.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  49. Mango Pests Identification Expert System.Jehad M. Altayeb, Samy S. Abu-Naser, Shahd J. Albadrasawi & Mohammed M. Almzainy - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (6):19-26.
    Mango is an economically significant fruit crop cultivated in various tropical and subtropical regions around the world. However, the productivity and quality of mangoes can be severely impacted by a range of pests. This research paper introduces an innovative approach to identify mango pests using an expert system. The expert system integrates knowledge from entomology and plants to provide accurate identification of common mango pests. The paper outlines the development and implementation of the expert system using Clips shell, which utilizes (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  50. Calibration dilemmas in the ethics of distribution.Jacob M. Nebel & H. Orri Stefánsson - 2023 - Economics and Philosophy 39 (1):67-98.
    This paper presents a new kind of problem in the ethics of distribution. The problem takes the form of several “calibration dilemmas,” in which intuitively reasonable aversion to small-stakes inequalities requires leading theories of distribution to recommend intuitively unreasonable aversion to large-stakes inequalities. We first lay out a series of such dilemmas for prioritarian theories. We then consider a widely endorsed family of egalitarian views and show that they are subject to even more forceful calibration dilemmas than prioritarian theories. Finally, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 975