Results for 'adversarial training'

977 found
Order:
  1. Adversarial Sampling for Fairness Testing in Deep Neural Network.Tosin Ige, William Marfo, Justin Tonkinson, Sikiru Adewale & Bolanle Hafiz Matti - 2023 - International Journal of Advanced Computer Science and Applications 14 (2).
    In this research, we focus on the usage of adversarial sampling to test for the fairness in the prediction of deep neural network model across different classes of image in a given dataset. While several framework had been proposed to ensure robustness of machine learning model against adversarial attack, some of which includes adversarial training algorithm. There is still the pitfall that adversarial training algorithm tends to cause disparity in accuracy and robustness among different (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  2.  88
    Comprehensive Review on Advanced Adversarial Attack and Defense Strategies in Deep Neural Network.Anderson Brown - 2023 - International Journal of Research and Innovation in Applied Sciences.
    In adversarial machine learning, attackers add carefully crafted perturbations to input, where the perturbations are almost imperceptible to humans, but can cause models to make wrong predictions. In this paper, we did comprehensive review of some of the most recent research, advancement and discoveries on adversarial attack, adversarial sampling generation, the potency or effectiveness of each of the existing attack methods, we also did comprehensive review on some of the most recent research, advancement and discoveries on (...) defense strategies, the effectiveness of each defense methods, and finally we did comparison on effectiveness and potency of different adversarial attack and defense methods. We came to conclusion that adversarial attack will mainly be blackbox for the foreseeable future since attacker has limited or no knowledge of gradient use for NN model, we also concluded that as dataset becomes more complex, so will be increase in demand for scalable adversarial defense strategy to mitigate or combat attack, and we strongly recommended that any neural network model with or without defense strategy should regularly be revisited, with the source code continuously updated at regular interval to check for any vulnerability against newer attack. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Comprehensive Review on Advanced Adversarial Attack and Defense Strategies in Deep Neural Network (8th edition). [REVIEW]Smith Oliver & Brown Anderson - 2023 - International Journal of Research and Innovation in Applied Science:156-166.
    In adversarial machine learning, attackers add carefully crafted perturbations to input, where the perturbations are almost imperceptible to humans, but can cause models to make wrong predictions. In this paper, we did comprehensive review of some of the most recent research, advancement and discoveries on adversarial attack, adversarial sampling generation, the potency or effectiveness of each of the existing attack methods, we also did comprehensive review on some of the most recent research, advancement and discoveries on (...) defense strategies, the effectiveness of each defense methods, and finally we did comparison on effectiveness and potency of different adversarial attack and defense methods. We came to conclusion that adversarial attack will mainly be blackbox for the foreseeable future since attacker has limited or no knowledge of gradient use for NN model, we also concluded that as dataset becomes more complex, so will be increase in demand for scalable adversarial defense strategy to mitigate or combat attack, and we strongly recommended that any neural network model with or without defense strategy should regularly be revisited, with the source code continuously updated at regular interval to check for any vulnerability against newer attack. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  64
    Impact of Variation in Vector Space on the performance of Machine and Deep Learning Models on an Out-of-Distribution malware attack Detection.Tosin Ige - forthcoming - Ieee Conference Proceeding.
    Several state-of-the-art machine and deep learning models in the mode of adversarial training, input transformation, self adaptive training, adversarial purification, zero-shot, one- shot, and few-shot meta learning had been proposed as a possible solution to an out-of-distribution problems by applying them to wide arrays of benchmark dataset across different research domains with varying degrees of performances, but investigating their performance on previously unseen out-of- distribution malware attack remains elusive. Having evaluated the poor performances of these state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  41
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  38
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  41
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  27
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Machine Advisors: Integrating Large Language Models into Democratic Assemblies.Petr Špecián - forthcoming - Social Epistemology.
    Could the employment of large language models (LLMs) in place of human advisors improve the problem-solving ability of democratic assemblies? LLMs represent the most significant recent incarnation of artificial intelligence and could change the future of democratic governance. This paper assesses their potential to serve as expert advisors to democratic representatives. While LLMs promise enhanced expertise availability and accessibility, they also present specific challenges. These include hallucinations, misalignment and value imposition. After weighing LLMs’ benefits and drawbacks against human advisors, I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  20
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Against Adversarial Discussion.Maarten Steenhagen - 2016 - Collingwood and British Idealism Studies 22 (1):87-112.
    Why did R.G. Collingwood come to reject the adversarial style of philosophical discussion so popular among his Oxford peers? The main aim of this paper is to explain that Collingwood came to reject his colleagues’ specific style of philosophical dialogue on methodological grounds, and to show how the argument against adversarial philosophical discussion is integrated with Collingwood’s overall criticism of realist philosophy. His argument exploits a connection between method and practice that should be taken seriously even today.
    Download  
     
    Export citation  
     
    Bookmark  
  12. An Adversarial Ethics of Campaigns and Elections.Samuel Bagg & Isak Tranvik - 2019 - Perspectives on Politics 4 (17):973-987.
    Existing approaches to campaign ethics fail to adequately account for the “arms races” incited by competitive incentives in the absence of effective sanctions for destructive behaviors. By recommending scrupulous devotion to unenforceable norms of honesty, these approaches require ethical candidates either to quit or lose. To better understand the complex dilemmas faced by candidates, therefore, we turn first to the tradition of “adversarial ethics,” which aims to enable ethical participants to compete while preventing the most destructive excesses of competition. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  13. Adversariality and Ideal Argumentation: A Second-Best Perspective.Marc-Kevin Daoust - 2021 - Topoi 40 (5):887-898.
    What is the relevance of ideals for determining virtuous argumentative practices? According to Bailin and Battersby (2016), the telos of argumentation is to improve our cognitive systems, and adversariality plays no role in ideally virtuous argumentation. Stevens and Cohen (2019) grant that ideal argumentation is collaborative, but stress that imperfect agents like us should not aim at approximating the ideal of argumentation. Accordingly, it can be virtuous, for imperfect arguers like us, to act as adversaries. Many questions are left unanswered (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Adversarial Attacks on Image Generation With Made-Up Words.Raphaël Millière - manuscript
    Text-guided image generation models can be prompted to generate images using nonce words adversarially designed to robustly evoke specific visual concepts. Two approaches for such generation are introduced: macaronic prompting, which involves designing cryptic hybrid words by concatenating subword units from different languages; and evocative prompting, which involves designing nonce words whose broad morphological features are similar enough to that of existing words to trigger robust visual associations. The two methods can also be combined to generate images associated with more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. AI training data, model success likelihood, and informational entropy-based value.Quan-Hoang Vuong, Viet-Phuong La & Minh-Hoang Nguyen - manuscript
    Since the release of OpenAI's ChatGPT, the world has entered a race to develop more capable and powerful AI, including artificial general intelligence (AGI). The development is constrained by the dependency of AI on the model, quality, and quantity of training data, making the AI training process highly costly in terms of resources and environmental consequences. Thus, improving the effectiveness and efficiency of the AI training process is essential, especially when the Earth is approaching the climate tipping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Adversarial argumentation and common ground in Aristotle’s Sophistical Refutations.Colin Guthrie King - 2021 - Topoi 40 (5):939-950.
    In this paper I provide support for the view that at least some forms of adversariality in argumentation are legitimate. The support comes from Aristotle’s theory of illegitimate adversarial argumentation in dialectical contexts: his theory of eristic in his work On Sophistical Refutations. Here Aristotle develops non-epistemic standards for evaluating the legitimacy of dialectical procedures, standards which I propose can be understood in terms of the pragmatic notion of context as common ground. Put briefly, Aristotle makes the answerer’s meaning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Adversaries or allies? Occasional thoughts on the Masham-Astell exchange.Jacqueline Broad - 2003 - Eighteenth-Century Thought 1:123-49.
    Against the backdrop of the English reception of Locke’s Essay, stands a little-known philosophical dispute between two seventeenth-century women writers: Mary Astell (1666-1731) and Damaris Cudworth Masham (1659-1708). On the basis of their brief but heated exchange, Astell and Masham are typically regarded as philosophical adversaries: Astell a disciple of the occasionalist John Norris, and Masham a devout Lockean. In this paper, I argue that although there are many respects in which Astell and Masham are radically opposed, the two women (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  18. The Adversary System: Who Needs It?Edmund Byrne - 1986 - In Elliston M. Davis and F. A. (ed.), Ethics and the Legal Profession. Prometheus. pp. 204-215.
    -/- [Posted here is article as originally published (same title) in ALSA Forum VI (1982) pp. 1-17 plus rebuttal by Thomas D. Barton, pp. 18-22].
    Download  
     
    Export citation  
     
    Bookmark  
  19. Training For the Performance of the Medical Staff and Its Role in Developing the Quality of Health Care in Palestine.Esraa A. I. Abushammala, Mazen J. Al Shobaki, Suliman A. El Talla & Muhammad K. Hamdan - 2023 - International Journal of Academic Management Science Research (IJAMSR) 7 (2):1-12.
    The study aimed to identify training for the performance of the medical staff and its role in developing the quality of health care in Al-Shifa Medical Complex in the southern Palestinian governorates. , and technicians) of 2150 employees, a stratified random sample of 330 employees was selected, the questionnaire was distributed to them, and 302 questionnaires were retrieved, with a rate of 91.5%. One of the most important results of the study was the existence of a statistically significant effect (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Training For the Performance of the Medical Staff and Its Role in Developing the Quality of Health Care in Palestine.Israa Abu Sahmmla, Mazen J. Al Shobaki, Suliman A. El Talla & Muhammad K. Hamdan - 2023 - International Journal of Academic Management Science Research (IJAMSR) 7 (2):1-12.
    The study aimed to identify training for the performance of the medical staff and its role in developing the quality of health care in Al-Shifa Medical Complex in the southern Palestinian governorates. , and technicians) of 2150 employees, a stratified random sample of 330 employees was selected, the questionnaire was distributed to them, and 302 questionnaires were retrieved, with a rate of 91.5%. One of the most important results of the study was the existence of a statistically significant effect (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Self-Adversarial Surveillance for Superalignment.R. Ishizaki & Mahito Sugiyama - manuscript
    In this paper, first we discuss the conditions under which a Large Language Model (LLM) can emulate a superior LLM and potentially trigger an intelligence explosion, along with the characteristics and dangers of the resulting superintelligence. We also explore ``superalignment,'' the process of safely keeping an intelligence explosion under human control. We discuss the goals that should be set for the initial LLM that might trigger the intelligence explosion and the Self-Adversarial Surveillance (SAS) system, which involves having the LLM (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Pro-Generative Adversarial Network and V-stack Perceptron, Diamond Holographic Principle, and Pro-Temporal Emergence.Shanna Dobson - manuscript
    We recently presented our Efimov K-theory of Diamonds, proposing a pro-diamond, a large stable (∞,1)-category of diamonds (D^{diamond}), and a localization sequence for diamond spectra. Commensurate with the localization sequence, we now detail four potential applications of the Efimov K-theory of D^{diamond}: emergent time as a pro-emergence (v-stack time) in a diamond holographic principle using Scholze’s six operations in the ’etale cohomology of diamonds; a pro-Generative Adversarial Network and v-stack perceptron; D^{diamond}cryptography; and diamond nonlocality in perfectoid quantum physics.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. In defence of adversarial philosophy?Terence Rajivan Edward - manuscript
    Adversarial philosophy is under attack (!), but I speculate that it is useful for working out the level of a philosopher and sometimes for increasing the respect awarded to some individuals and groups. There may be no alternative to it when you have an excess of philosophers of around the same level.
    Download  
     
    Export citation  
     
    Bookmark  
  24. The effectiveness of a training program in increasing crowd funding awareness.Suliman A. El Talla, Mazen J. Al Shobaki, Samy S. Abu Naser & Youssef M. Abu Amuna - 2017 - International Journal of Advanced Educational Research 2 (1):31-37.
    The current study tries to verify the effectiveness of a training program in increasing Crowdfunding awareness. The sample was (50) students in CIS, who were purposively selected and distributed equally into a treatment and control group. The researchers designed the study tools (a training program to increase Crowdfunding awareness). The study findings revealed the existence of statistically significant differences between the treatment and control groups in favor of the former. Furthermore, there were statistically significant differences between the pre (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  25. Training in compensatory strategies enhances rapport in interactions involving people with Möebius Syndrome.John Michael, Kathleen Bogart, Kristian Tylen, Joel Krueger, Morten Bech, John R. Ostergaard & Riccardo Fusaroli - 2015 - Frontiers in Neurology 6 (213):1-11.
    In the exploratory study reported here, we tested the efficacy of an intervention designed to train teenagers with Möbius syndrome (MS) to increase the use of alternative communication strategies (e.g., gestures) to compensate for their lack of facial expressivity. Specifically, we expected the intervention to increase the level of rapport experienced in social interactions by our participants. In addition, we aimed to identify the mechanisms responsible for any such increase in rapport. In the study, five teenagers with MS interacted with (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  26. Resistance Training.Alex Madva - 2020 - The Philosophers' Magazine 91:40-45.
    The summer of 2020 witnessed perhaps the largest protests in American history in response to police and vigilante brutality against the black community. New protests are still erupting every time another suppressed video, such as of Daniel Prude, surfaces, or another killing, such as Breonna Taylor’s, goes unpunished. As communities demand meaningful reform, the point – or pointlessness – of “implicit bias training” takes on renewed urgency. Implicit bias trainings aim to raise awareness about the unwitting or unwilling prejudices (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  27. (1 other version)Introspective training apprehensively defended: Reflections on Titchener's lab manual.Eric Schwitzgebel - 2004 - Journal of Consciousness Studies 11 (7-8):11--7.
    To study conscious experience we must, to some extent, trust introspective reports; yet introspective reports often do not merit our trust. A century ago, E.B. Titchener advocated extensive introspective training as a means of resolving this difficulty. He describes many of his training techniques in his four-volume laboratory manual of 1901- 1905. This paper explores Titchener's laboratory manual with an eye to general questions about the prospects of introspective training for contemporary consciousness studies, with a focus on (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  28. REALIZING ORGANIZATIONAL POTENTIAL: CUSTOMIZED TRAINING PROGRAMS FOR IMPROVED WORKPLACE BEHAVIOR.Jiomarie Jesus - 2024 - Psychology and Education: A Multidisciplinary Journal 21 (6): 629-634.
    This research examines how it is to have tailored training programs to improve behavior at work. It focuses on aspects including interpersonal skills, communication, adaptability, and work ethics. Acknowledging the paucity of empirical research on particular training requirements for these characteristics, the study uses a descriptive-correlational methodology to examine information from ninety production employees at Fine Interiors Trading and Manufacturing Incorporated. To guarantee participation from a range of employment roles, participants were chosen using purposive sampling. Utilizing an extensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Self-Knowledge from Resistance Training.Giovanni Rolla - forthcoming - Phenomenology and the Cognitive Sciences:1-18.
    The problem of self-knowledge has been thoroughly discussed in the context of traditional epistemology. In parallel to the traditional approach to epistemology, Radically Embodied Cognitive Science (RECS) has emerged in the last 30 years as a genuine contender in its field. According to RECS, the unity of analysis of cognitive processes is the dynamics between brain, body and environment. In this paper, I advance a RECS approach to self-knowledge, which immediately suggests that knowing oneself is a matter of knowing what (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Training Children Environmentalists in Africa: The Learning by Drama Method.Edward Ugbada Adie - 2019 - International Journal of Environmental Pollution and Environmental Modelling 2 (3):122-128.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Brains, trains, and ethical claims: Reassessing the normative implications of moral dilemma research.Michael T. Dale & Bertram Gawronski - 2023 - Philosophical Psychology 36 (1):109-133.
    Joshua Greene has argued that the empirical findings of cognitive science have implications for ethics. In particular, he has argued (1) that people’s deontological judgments in response to trolley problems are strongly influenced by at least one morally irrelevant factor, personal force, and are therefore at least somewhat unreliable, and (2) that we ought to trust our consequentialist judgments more than our deontological judgments when making decisions about unfamiliar moral problems. While many cognitive scientists have rejected Greene’s dual-process theory of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  32. Vocational training duration and university graduates’ job performance in Cross River State, Nigeria.Valentine Joseph Owan, Francisca N. Odigwe & Odim Otu Offem - 2018 - International Journal of Current Research 10 (7):72024-72028.
    This study focused specifically on determining the extent to which duration of vocational training influence university respectively. In achieving this, two research questions were raised and two research hypotheses were formulated to guide the study. The study adopted a descriptive survey design. The pop study include a total of 123 baking business and 208 computer business centres in the Area. Out of this population, a proportionate stratified sampling technique was used to select 10% resulting in the selection of 12 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Can We Train Basic Empathy? A Phenomenological Proposal.Anthony Vincent Fernandez & Dan Zahavi - 2021 - Nurse Education Today 98.
    Is it possible to train empathy? We suggest a new way, based on insights from phenomenology.
    Download  
     
    Export citation  
     
    Bookmark  
  34. Mindfulness Training: Can It Create Superheroes?Patrick Jones - 2019 - Frontiers in Psychology 10:422359.
    With the emergence of the science of heroism there now exists both theoretical and empirical literature on the characteristics of our everyday hero. We seek to expand this inquiry and ask what could be the causes and conditions of a superhero. To address this we investigate the origins of mindfulness, Buddhist psychology and the assertion that its practitioners who have attained expertise in mindfulness practices can develop supernormal capabilities. Examining first their foundational eight “jhana” states (levels of attention) and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The State of Teacher Training in Philosophy.David W. Concepción, Melinda Messineo, Sarah Wieten & Catherine Homan - 2016 - Teaching Philosophy 39 (1):1-24.
    This paper explores the state of teacher training in philosophy graduate programs in the English-speaking world. Do philosophy graduate programs offer training regarding teaching? If so, what is the nature of the training that is offered? Who offers it? How valuable is it? We conclude that philosophers want more and better teaching training, and that collectively we know how to deliver and support it.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. TRANSLATOR-TRAINING IN SOME NIGERIAN UNIVERSITIES: CHALLENGES AND RECOMMENDATIONS.Mombe Michael Ngongeh - 2018 - International Journal of Humanitatis Theoreticus 4 (2).
    This paper focuses on the Nigerian Translator-training programmes and its challenges. It is a descriptive research premised on a problem raised by Akakuru that most translation graduates from Nigerian universities can neither translate nor talk about translation. This paper sets out to investigate the validity of the statement and to point out where the problems lie as well as propose some solutions to them. Data for this work were collected from websites of some Nigerian universities that train translators up (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Curricular Aspects of the Fogarty Bioethics International Training Programs.Sam Garner, Amal Matar, J. Millum, B. Sina & H. Silverman - 2014 - Journal of Empirical Research on Human Research Ethics: An International Journal 9 (2):12-23.
    The curriculum design, faculty characteristics, and experience of implementing masters' level international research ethics training programs supported by the Fogarty International Center was investigated. Multiple pedagogical approaches were employed to adapt to the learning needs of the trainees. While no generally agreed set of core competencies exists for advanced research ethics training, more than 75% of the curricula examined included international issues in research ethics, responsible conduct of research, human rights, philosophical foundations of research ethics, and research regulation (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. Training Torturers: A Critique of the "Ticking Bomb" Argument.Jessica Wolfendale - 2006 - Social Theory & Practice 32 (2):269-288.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  39. Reimagining mathematics education: Identifying training needs and challenges among public elementary school teacher’s post-pandemic.Lislee Valle - 2024 - International Journal of Education and Practice 12 (3):527-539.
    The sudden shift in the education system during the pandemic and its subsequent evolution during the post-pandemic era have been pivotal in fostering significant educational development and growth. However, this paradigm shift has not been without challenges. This paper aims to investigate the challenges faced by 68 mathematics teachers in four public elementary schools in the Philippines. The respondents were purposively selected to answer the study’s instrument. Using a descriptive survey research methodology, this study explored the five domains in teaching (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Smart-entrepreneurship education in training of the hotel business specialists.Sergii Sardak & Y. Naboka S. R. Koev, L. Chepurda, S. Sardak, L. Zhylinska - 2019 - Journal of Entrepreneurship Education 22 (4):1-5.
    The article is devoted to the problems of introducing the SMART-education technology in the training and development of personnel of hotel complexes and business activities in the field of hotel business. The methodological and organizational bases for the application of SMART-education in staff training were identified; the leading qualitative features and development trends of this type of entrepreneurial educational activity were outlined. The principles of SMART-education of staff in the field of hotel business and its applied features in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Meditation Awareness Training (MAT) for improved psychological wellbeing: A qualitative examination of participant experiences.Edo Shonin, William Van Gordon & Mark D. Griffiths - 2013 - Journal of Religion and Health 53:849-863.
    Mindfulness-based interventions are reported as being efficacious treatments for a variety of psychological and somatic conditions. However, concerns have arisen relating to how mindfulness is operationalized in mindfulness-based interventions and whether its ‘spiritual essence’ and full potential treatment efficacy have remained intact. This qualitative study used interpretative phenomenological analysis to examine participant experiences regarding the acceptability and effectiveness of a newly designed secularized intervention called meditation awareness training (MAT) that follows a more traditional Buddhist approach to meditation. Participants (with (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Training of Traditional Birth Attendants and Prevention of Mother-To-Child Transmission of Human Immunodeficiency Virus in Enugu State.C. Udenta Nkiruka - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (10):8-15.
    Abstract: As much as 60% children born in Nigeria are delivered by unskilled traditional birth attendants (TBAs). Therefore, there is no denying their relevance. Be that as it may these traditional birth attendants are by modern/current standards considered incompetent as regards appropriate skills in regard to the contemporary challenges to safe and effective child-bearing. It is, therefore, imperative for TBAs and other similar cadre of healthcare providers in resource-limited settings to be knowledgeable and have the ability to deploy evidence-based practices (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Einstein's Train in Fragmentalist Presentism.Paul Merriam - manuscript
    It is often thought the relativity of simultaneity is inconsistent with presentism. This would be troubling as it conflicts with common sense and—arguably—the empirical data. This note gives a novel fragmentalist-presentist theory that allows for the (non-trivial) relativity of simultaneity. A detailed account of the canonical moving train argument is considered. Alice, standing at the train station, forms her own ontological fragment, in which Bob’s frame of reference, given by the moving train, is modified by the Lorentz transformations. On the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. ITS for Enhancing Training Methodology for Students Majoring in Electricity.Mohammed S. Nassr & Samy S. Abu-Naser - 2019 - International Journal of Academic Pedagogical Research (IJAPR) 3 (3):16-30.
    This thesis focuses on the use of intelligent tutoring system for education and training of students specialized in electricity in the field of technical and vocational education. The use of modern systems in training and education will have a great positive impact in improving the level of students receiving training and education; this will improve the level of the local economy by producing students of professionals who are able to engage in society efficiently, especially for those who (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Sleep Training, Day Care, and Swim Lessons: Skeptical Theism and the Parent Child Analogy.Dolores G. Morris - 2023 - Faith and Philosophy 40 (1):24-42.
    Erik Wielenberg recently invoked the parent-child analogy in an argument against Christian theism. The argument relies on the claim that a loving parent would never allow her child to feel abandoned in the midst of what feels like gratuitous suffering. In this paper, I offer three clear counterexamples to Wielenberg’s central premise. At the same time, a successful counterexample does not a robust theology of suffering make. To that end, and with a careful eye towards anti-theodical concerns, I defend the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Training the Pupilary Vision: Didactic Image, Slides, and Film in the Context of Media of the Late 19th Century.Lucie Česálková - 2011 - Teorie Vědy / Theory of Science 33 (2):251-269.
    The study examines the modes of representation and communication of information through illustrative teaching aids in the 19th century. It focuses primarily on the didactic wall paintings and the tradition of lectures with slides and notes, how could the experience of these types of collectively observed images influence impressions and expectations of early film audiences. Didactic images are here analyzed primarily in terms of their compositional features, but in an effort to explain how processuality penetrated into the didactic image of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. (1 other version)The train paradox.Jeremy Gwiazda - 2006 - Philosophia 34 (4):437-438.
    When two omnipotent beings are randomly and sequentially selecting positive integers, the being who selects second is almost certain to select a larger number. I then use the relativity of simultaneity to create a paradox by having omnipotent beings select positive integers in different orders for different observers.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Training good professionals.Nafsika Athanassoulis - 2007 - In Richard E. Ashcroft (ed.), Principles of health care ethics. Hoboken, NJ: Wiley.
    Download  
     
    Export citation  
     
    Bookmark  
  49. Exodus of clergy: A practical theological grounded theory exploration of Hatfield Training Centre trained pastors.Shaun Joynt & Yolanda Dreyer - 2013 - HTS Theological Studies 69 (1):01-13.
    There is a shortage of clergy, at least in the Roman Catholic Church. Protestant churches in general are experiencing more of a distribution or placement challenge than a shortage. The two greatest hindrances to addressing the Protestant clergy distribution challenge are a lack of adequate compensation for clergy and the undesirable geographical location of a number of churches, as perceived by clergy. Influences such as secularisation, duality of vocation, time management, change in type of ministry, family issues, congregational and denominational (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Effects of Moderate Exercise Training On ApoE And ApoCIII In Metabolic Syndrome.Kutluhan Ertekin, Metin Baştuğ & Asena Gökçay Canpolat - 2023 - European Journal of Therapeutics 29 (1):65-73.
    Introduction: Metabolic syndrome (MetS) is an endocrinopathy with a combination of cardiovascular and metabolic compounds. In our study, it is expected to obtain results showing that mortality rate, loss of workforce, and treatment costs due to disorders caused by MetS can be reduced by physical exercise. The study analyses the effect of moderate exercise training on this Apolipoprotein E (ApoE), Apolipoprotein CIII (ApoCIII), adiponectin, resistin, interleukin-6 (IL-6), and tumor necrosis factor-alpha (TNF-α) which are thought to have a role in (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 977