Results for 'malware detection, malware classification, cyberattack, novel malware, out-of-distribution classification'

977 found
Order:
  1.  67
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  66
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  71
    Impact of Variation in Vector Space on the performance of Machine and Deep Learning Models on an Out-of-Distribution malware attack Detection.Tosin Ige - forthcoming - Ieee Conference Proceeding.
    Several state-of-the-art machine and deep learning models in the mode of adversarial training, input transformation, self adaptive training, adversarial purification, zero-shot, one- shot, and few-shot meta learning had been proposed as a possible solution to an out-of-distribution problems by applying them to wide arrays of benchmark dataset across different research domains with varying degrees of performances, but investigating their performance on previously unseen out-of- distribution malware attack remains elusive. Having evaluated the poor performances of these state-of-the-art approaches (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  37
    A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  44
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid (...) datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further improve response times, reducing the risk of potential damage. The study also incorporates visualization tools to provide interpretable insights into model decisions, enhancing transparency for cybersecurity practitioners. Concluding with a discussion on the challenges and future prospects, this research paves the way for scalable, AI-driven solutions to combat evolving cyber threats. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  37
    Enhancing Malware Detection by Fusing Static and Dynamic Features Using Deep Neural Networks.Navas Garcia - manuscript
    Malware detection has been an ongoing challenge for cybersecurity experts due to the evolving nature of malicious software and the ability of malware to disguise itself. Traditional methods that rely solely on static features such as file signatures or dynamic analysis have had limitations in detecting new or obfuscated malware. This paper investigates the enhancement of malware detection by integrating both static and dynamic features and utilizing deep neural networks (DNNs) for more effective classification. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  93
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated by deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  71
    Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the proposed approach (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  59
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  72
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  13.  68
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  32
    Agricultural Innovation: Automated Detection of Plant Diseases through Deep Learning.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):630-640.
    The health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  24
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid (...) datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further improve response times, reducing the risk of potential damage. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  17. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  79
    Detecting Experts Using a MiniRocket: Gaze Direction Time Series Classification of Real-Life Experts Playing the Sustainable Port.Gianluca Guglielmo, Michal Klincewicz, Elisabeth Huis in ’T. Veld & Pieter Spronck - 2025 - Gala 2024. Lecture Notes in Computer Science 15348:177–187.
    This study aimed to identify real-life experts working for a port authority and lay people (students) who played The Sustainable Port, a serious game aiming to simulate the dynamics occurring in a port area. To achieve this goal, we analyzed eye gaze data collected noninvasively using low-grade webcams from 28 participants working for the port authority of the Port of Rotterdam and 66 students. Such data were used for a classification task implemented using a MiniRocket classifier, an algorithm used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  40
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid (...) datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further improve response times, reducing the risk of potential damage. The study also incorporates visualization tools to provide interpretable insights into model decisions, enhancing transparency for cybersecurity practitioners. Concluding with a discussion on the challenges and future prospects, this research paves the way for scalable, AI-driven solutions to combat evolving cyber threats. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Nonlinear effects of spatial connectedness implicate hierarchically structured representations in visual working memory.Błażej Skrzypulec & Adam Chuderski - 2020 - Journal of Memory and Language 113:104124.
    Five experiments investigated the role of spatial connectedness between a pair of objects presented in the change detection task for the actual capacity of visual working memory (VWM) in healthy young adults (total N = 405). Three experiments yielded a surprising nonlinear relationship between the proportion of pair-wise connected objects and capacity, with the highest capacity observed for homogenous displays, when either all objects were connected or disjointed. A drop in capacity, ranging from an average of a quarter of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  45
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid (...) datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further improve response times, reducing the risk of potential damage. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Review of The Inflationary Universe by Alan Guth (1997).Michael Starks - 2016 - In Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 615-618.
    This is one of the best popular cosmology books ever written and Guth is now (2016) a top physics Professor at MIT. He tells the extremely complex story of inflation and related areas of particle physics in such an absorbing style that it reads like a detective novel-in fact, it is a detective novel-how he and others found out how the universe started! The interweaving of his personal story and that of many colleagues along with their photos and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  34
    Automated Plant Disease Detection through Deep Learning for Enhanced Agricultural Productivity.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):640-650.
    he health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  39
    Enhancing Malicious Code Detection With Boosted N-Gram Analysis and Efficient Feature Selection.Nastooh Taheri Javan - 2024 - IEEE Access 12:147400-147421.
    A fundamental challenge in virology research lies in effectively detecting malicious code. N-gram analysis has become a cornerstone technique, but selecting the most informative features, especially for longer n-grams, remains crucial for efficient detection. This paper addresses this challenge by introducing a novel feature extraction method that leverages both adjacent and non-adjacent bi-grams, providing a richer set of information for malicious code identification. Additionally, we propose a computationally efficient feature selection approach that utilizes a genetic algorithm combined with Boosting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Rising Tide of Artificial Intelligence in Scientific Journals: A Profound Shift in Research Landscape.Ricardo Grillo - 2023 - European Journal of Therapeutics 29 (3):686-688.
    Dear Editors, -/- I found the content of your editorials to be highly intriguing [1,2]. Scientific journals are witnessing a growing prevalence of publications related to artificial intelligence (AI). Three letters to the editor were recently published in your journal [3-5]. The renowned journal Nature has dedicated approximately 25 publications solely to the subject of ChatGPT. Moreover, a quick search on Pubmed using the term "ChatGPT" yields around 900 articles, with the vast majority originating in 2023. These statistics underscore the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The cognitive integration of scientific instruments: Information, situated cognition, and scientific practice.Richard Heersmink - 2016 - Phenomenology and the Cognitive Sciences 15 (4):1-21.
    Researchers in the biological and biomedical sciences, particularly those working in laboratories, use a variety of artifacts to help them perform their cognitive tasks. This paper analyses the relationship between researchers and cognitive artifacts in terms of integration. It first distinguishes different categories of cognitive artifacts used in biological practice on the basis of their informational properties. This results in a novel classification of scientific instruments, conducive to an analysis of the cognitive interactions between researchers and artifacts. It (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  27.  32
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Disadvantage, Autonomy, and the Continuity Test.Ben Colburn - 2014 - Journal of Applied Philosophy 31 (3):254-270.
    The Continuity Test is the principle that a proposed distribution of resources is wrong if it treats someone as disadvantaged when they don't see it that way themselves, for example by offering compensation for features that they do not themselves regard as handicaps. This principle — which is most prominently developed in Ronald Dworkin's defence of his theory of distributive justice — is an attractive one for a liberal to endorse as part of her theory of distributive justice and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Out of School Children in Vietnam: How Structural Adjustment Programs Have Reduced Capabilities for Vietnam’s Most Vulnerable.Aneesa Kara - 2023 - Medium.
    A pressing issue in Vietnam which is attracting attention from INGOs and the Vietnamese government is out-of-school-children (OOSC). Comparatively with other developing and middle-income countries, Vietnam hosts some of the most impressive educational attainment rates, on par with developed countries, comprising of almost equal gender parity rates, and ‘achieving’ Millennium Development Goal 4 (MDG), universal primary education, ahead of schedule. There are a wide range of historical, social, structural, cultural and economic factors outside the formal education setting which contribute to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Chemical Action: What is it and Why Does it Really Matter?W. John Koolage & W. John Koolage & Ralph Hall - 2011 - Journal of Nanoparticle Research 13 (13):1401-1427.
    Nanotechnology, as with many technologies before it, places a strain on existing legislation and poses a challenge to all administrative agencies tasked with regulating technology-based products. It is easy to see how statutory schemes become outdated, as our ability to understand and affect the world progresses. In this article, we address the regulatory problems that nanotechnology posses for the Food and Drug Administration’s (FDA) classification structure for ‘‘drugs’’ and ‘‘devices.’’ The last major modification to these terms was in 1976, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Caponapoli.Asma Mehan - 2023 - In Michael G. Kelly, Jorge Mejía Hernández, Sonja Novak & Giuseppe Resta (eds.), OTHER DESTINATIONS: Translating the Mid-sized European City. Osijek: Faculty of Humanities and Social Sciences, Josip Juraj Strossmayer University of Osijek. pp. 46-62.
    Nowadays there is a general acknowledgment of the importance of place in Italian crime novels. In Caponapoli, Massimo Siviero articulates a narrative way in which he approaches the structures, city, and the built environment to reflect the society, cultural relations, transformations and dysfunctions of contemporary Naples. Joe Pazienza, the private detective, has been seen by him recently before he was a reporter. When hired by his first client, Nada Mormile, someone with all the requirements of the dark lady in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. On the very idea of a short story that got out of control and became a novel?Terence Rajivan Edward - manuscript
    Shashi Tharoor criticizes R.K. Narayan in the following way: “Narayan’s prose was like a bullock-cart: a vehicle that can move only in one gear, is unable to turn, accelerate or reverse, and remains yoked to traditional creatures who have long since been overtaken.” I think there is a quick defence, which is that it is very unlikely that one can write the different kinds of works he did without being able to significantly change pace; but there is an objection from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Revamping the Metaphysics of Ethnobiological Classification.David Ludwig - 2018 - Current Anthropology 59 (4):415-438.
    Ethnobiology has a long tradition of metaphysical debates about the “naturalness,” “objectivity”, “reality”, and “universality” of classifications. Especially the work of Brent Berlin has been influential in developing a “convergence metaphysics” that explains cross-cultural similarities of knowledge systems through shared recognition of objective discontinuities in nature. Despite its influence on the development of the field, convergence metaphysics has largely fallen out of favor as contemporary ethnobiologists tend to emphasize the locality and diversity of classificatory practices. The aim of this article (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  36. Multi-level computational methods for interdisciplinary research in the HathiTrust Digital Library.Jaimie Murdock, Colin Allen, Katy Börner, Robert Light, Simon McAlister, Andrew Ravenscroft, Robert Rose, Doori Rose, Jun Otsuka, David Bourget, John Lawrence & Chris Reed - 2017 - PLoS ONE 12 (9).
    We show how faceted search using a combination of traditional classification systems and mixed-membership topic models can go beyond keyword search to inform resource discovery, hypothesis formulation, and argument extraction for interdisciplinary research. Our test domain is the history and philosophy of scientific work on animal mind and cognition. The methods can be generalized to other research areas and ultimately support a system for semi-automatic identification of argument structures. We provide a case study for the application of the methods (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  24
    Does the Gateway Process Allow Time Travel?Alexander Ohnemus - forthcoming - Elk Grove, California: Self-published.
    Neuralink could distribute artificial superintelligence to humans, thus allowing the homosapiens to synchronize the hemispheres of their brains, thereby transcending space-time, and potentially time traveling. While backwards time travel cannot change the past, due to paradoxes, the time traveler would probably share a soul with the alternate timeline self, thus providing closure for regrets, errors, injustice, etc. Plus, if one time travels with AI superintelligence, the time traveler may mend errors with greater ease. -/- Although other potential time travel methods (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Exploration and exploitation of Victorian science in Darwin’s reading notebooks.Jaimie Murdock, Colin Allen & Simon DeDeo - 2017 - Cognition 159 (C):117-126.
    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized reading journals, we generate topic models to quantify his (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  39. Calibration dilemmas in the ethics of distribution.Jacob M. Nebel & H. Orri Stefánsson - 2023 - Economics and Philosophy 39 (1):67-98.
    This paper presents a new kind of problem in the ethics of distribution. The problem takes the form of several “calibration dilemmas,” in which intuitively reasonable aversion to small-stakes inequalities requires leading theories of distribution to recommend intuitively unreasonable aversion to large-stakes inequalities. We first lay out a series of such dilemmas for prioritarian theories. We then consider a widely endorsed family of egalitarian views and show that they are subject to even more forceful calibration dilemmas than prioritarian (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  40. Classification and Ambiguity: the Role of Definition in a Conceptual System.Douglas Walton & Fabrizio Macagno - 2009 - Studies in Logic, Grammar and Rhetoric 16 (29).
    With the advent of the semantic web, the problem of ambiguity is becoming more and more urging. Semantic analysis is necessary for explaining and resolving some sorts of ambiguity by inquiring into the relation between possibilities of predication and definition of a concept in order to solve problems such as interpretation and ambiguity. If computing is now approaching such problems of linguistic analysis, what is worth inquiring into is how the development of linguistic studies can be useful for developing the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Pandemic solutionism: the power of big tech during the COVID-19 crisis.Anna-Verena Nosthoff & Felix Maschewski - 2023 - Digital Culture and Society 8 (1):43-65.
    In this article, we investigate how Big Tech companies have used the novel coronavirus disease (COVID-19) pandemic to increase their social, political, infrastructural, and epistemic power. We focus on four companies that were outspoken in their efforts to combat the virus: Alphabet (also known as Google), Apple, Facebook, and Amazon (GAFA). During the crisis, these companies evolved as adaptive entities that responded to the state of emergency by promptly rolling out various technological solutions, exemplifying what we call ‘pandemic solutionism’, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. The logic of distributive bilattices.Félix Bou & Umberto Rivieccio - 2011 - Logic Journal of the IGPL 19 (1):183-216.
    Bilattices, introduced by Ginsberg as a uniform framework for inference in artificial intelligence, are algebraic structures that proved useful in many fields. In recent years, Arieli and Avron developed a logical system based on a class of bilattice-based matrices, called logical bilattices, and provided a Gentzen-style calculus for it. This logic is essentially an expansion of the well-known Belnap–Dunn four-valued logic to the standard language of bilattices. Our aim is to study Arieli and Avron’s logic from the perspective of abstract (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  43. Classification by decomposition: a novel approach to classification of symmetric $$2\times 2$$ games.Mikael Böörs, Tobias Wängberg, Tom Everitt & Marcus Hutter - 2022 - Theory and Decision 93 (3):463-508.
    In this paper, we provide a detailed review of previous classifications of 2 × 2 games and suggest a mathematically simple way to classify the symmetric 2 × 2 games based on a decomposition of the payoff matrix into a cooperative and a zero-sum part. We argue that differences in the interaction between the parts is what makes games interesting in different ways. Our claim is supported by evolutionary computer experiments and findings in previous literature. In addition, we provide a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Review of Distributed Like Bread – Jonathan M. Ciraulo. [REVIEW]Steven Umbrello - 2024 - Homiletic and Pastoral Review.
    In Distributed Like Bread: Hans Urs von Balthasar Speaks to Seminarians, Jonathan Ciraulo engages with the theological insights of Hans Urs von Balthasar, especially as they pertain to the priesthood and seminary formation. This work not only introduces readers to Balthasar's complex and nuanced understanding of the priestly vocation but also serves as a guide for those discerning or living out this calling. Through a detailed examination of Balthasar’s life and writings, Ciraulo uncovers the profound notion that the priesthood is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Systemising Triage: COVID-19 Guidelines and Their Underlying Theories of Distributive Justice.Lukas J. Meier - 2022 - Medicine, Health Care and Philosophy 25 (4):703-714.
    The COVID-19 pandemic has been overwhelming public health-care systems around the world. With demand exceeding the availability of medical resources in several regions, hospitals have been forced to invoke triage. To ensure that this difficult task proceeds in a fair and organised manner, governments scrambled experts to draft triage guidelines under enormous time pressure. Although there are similarities between the documents, they vary considerably in how much weight their respective authors place on the different criteria that they propose. Since most (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  26
    Entropy in Physics using my Universal Formula.Angelito Malicse - manuscript
    -/- 1. Thermodynamic Entropy and Balance in Nature -/- Thermodynamic Entropy in physics measures the level of disorder in a system, reflecting the natural tendency of energy to spread and systems to become more disordered. -/- Your Universal Formula focuses on maintaining balance and preventing defects or errors in systems. -/- Integration: -/- Increasing thermodynamic entropy (e.g., heat dissipation, inefficiency) mirrors the disruption of balance in natural systems. -/- Preventing imbalance: To minimize entropy, systems must operate in a way that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Aristotle's Theory of Predication.Mohammad Ghomi - manuscript
    Predication is a lingual relation. We have this relation when a term is said (λέγεται) of another term. This simple definition, however, is not Aristotle’s own definition. In fact, he does not define predication but attaches his almost in a new field used word κατηγορεῖσθαι to λέγεται. In a predication, something is said of another thing, or, more simply, we have ‘something of something’ (ἓν καθ᾿ ἑνὸς). (PsA. , A, 22, 83b17-18) Therefore, a relation in which two terms are posited (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. On not getting out of bed.Samuel Asarnow - 2019 - Philosophical Studies 176 (6):1639-1666.
    This morning I intended to get out of bed when my alarm went off. Hearing my alarm, I formed the intention to get up now. Yet, for a time, I remained in bed, irrationally lazy. It seems I irrationally failed to execute my intention. Such cases of execution failure pose a challenge for Mentalists about rationality, who believe that facts about rationality supervene on facts about the mind. For, this morning, my mind was in order; it was my action that (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  49. From the pragmatics of classification systems to the metaphysics of concepts". [REVIEW]Stella Vosniadou, Costas Pagondiotis & Maria Deliyianni - 2005 - Journal of the Learning Sciences 14 (1):115-125.
    Review of the books: Jerry A. Fodor. Concepts: Where Cognitive Science went wrong. Oxford, UK: Oxford University Press, 1998, 174 pp., ISBN 0-19-823636-0. Geoffrey C. Bowker and Susan Leigh Star. Sorting things out: Classification and its consequences. Cambridge, MA: The MIT Press, 1999, 377 pp., ISBN 0-262-02461-6.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Out of the Cemetery of the Earth, a Resurrective Commons: Nikolai Fedorov's Common Task against the Biopolitics of Modernity.Kirill Chepurin & Alex Dubilet - 2023 - CR: The New Centennial Review 23 (2):259-293.
    Nikolai Fedorov (1829–1903), the progenitor of so-called Russian Cosmism, is an eccentric figure without parallel in the domain of modern thought. His intellectual vision, elaborated across a number of essays and the sprawling unpublished magnum opus written from the 1870s to the 1890s, The Question of Fraternity, attempted a novel theorization of the trajectory, meaning, and telos of the human species through the fulcrum of resurrection. The speculative dimension of Fedorov's cosmist project has garnered the most sustained theoretical interest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 977