Results for 'support network'

972 found
Order:
  1. Coordination technology for active support networks: context, needfinding, and design.Stanley J. Rosenschein & Todd Davies - 2018 - AI and Society 33 (1):113-123.
    Coordination is a key problem for addressing goal–action gaps in many human endeavors. We define interpersonal coordination as a type of communicative action characterized by low interpersonal belief and goal conflict. Such situations are particularly well described as having collectively “intelligent”, “common good” solutions, viz., ones that almost everyone would agree constitute social improvements. Coordination is useful across the spectrum of interpersonal communication—from isolated individuals to organizational teams. Much attention has been paid to coordination in teams and organizations. In this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Supervision, Mentorship and Peer Networks: How Estonian Early Career Researchers Get (or Fail to Get) Support.Jaana Eigi, Katrin Velbaum, Endla Lõhkivi, Kadri Simm & Kristin Kokkov - 2018 - RT. A Journal on Research Policy and Evaluation 6 (1):01-16.
    The paper analyses issues related to supervision and support of early career researchers in Estonian academia. We use nine focus groups interviews conducted in 2015 with representatives of social sciences in order to identify early career researchers’ needs with respect to support, frustrations they may experience, and resources they may have for addressing them. Our crucial contribution is the identification of wider support networks of peers and colleagues that may compensate, partially or even fully, for failures of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Actor Network, Ontic Structural Realism and the Ontological Status of Actants.Corrado Matta - 2014 - Proceedings of the 9th International Conference on Networked Learning 2014.
    In this paper I discuss the ontological status of actants. Actants are argued as being the basic constituting entities of networks in the framework of Actor Network Theory (Latour, 2007). I introduce two problems concerning actants that have been pointed out by Collin (2010). The first problem concerns the explanatory role of actants. According to Collin, actants cannot play the role of explanans of networks and products of the same newtork at the same time, at pain of circularity. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Revising the UMLS Semantic Network.Steffen Schulze-Kremer, Barry Smith & Anand Kumar - 2004 - In Stefan Schulze-Kremer (ed.), MedInfo. IOS Press.
    The integration of standardized biomedical terminologies into a single, unified knowledge representation system has formed a key area of applied informatics research in recent years. The Unified Medical Language System (UMLS) is the most advanced and most prominent effort in this direction, bringing together within its Metathesaurus a large number of distinct source-terminologies. The UMLS Semantic Network, which is designed to support the integration of these source-terminologies, has proved to be a highly successful combination of formal coherence and (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  5. Decidim, a Technopolitical Network for Participatory Democracy.Xabier E. Barandiaran, Antonio Calleja-López, Arnau Monterde & Carolina Romero - 2024 - Springer.
    This Open Access book explains the philosophy, design principles, and community organization of Decidim and provides essential insights into how the platform works. Decidim is the world leading digital infrastructure for participatory democracy, built entirely and collaboratively as free software, and used by more than 500 institutions with over three million users worldwide. -/- The platform allows any organization (government, association, university, NGO, neighbourhood, or cooperative) to support multitudinous processes of participatory democracy. In a context dominated by corporate-owned digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Scaling‐Up Alternative Food Networks.Mark Navin - 2015 - Journal of Social Philosophy 46 (4):434-448.
    Alternative Food Networks (AFNs), which include local food and Fair Trade, work to mitigate some of the many shortcomings of mainstream food systems. If AFNs have the potential to make the world’s food systems more just and sustainable (and otherwise virtuous) then we may have good reasons to scale them up. Unfortunately, it may not be possible to increase the market share of AFNs while preserving their current forms. Among other reasons, this is because there are limits to both the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Examining Phronesis Models with Evidence from the Neuroscience of Morality Focusing on Brain Networks.Hyemin Han - forthcoming - Topoi:1-13.
    In this paper, I examined whether evidence from the neuroscience of morality supports the standard models of phronesis, i.e., Jubilee and Aretai Centre Models. The standard models explain phronesis as a multifaceted construct based on interaction and coordination among functional components. I reviewed recent neuroscience studies focusing on brain networks associated with morality and their connectivity to examine the validity of the models. Simultaneously, I discussed whether the evidence helps the models address challenges, particularly those from the phronesis eliminativism. Neuroscientific (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  8. Ethical Issues in Near-Future Socially Supportive Smart Assistants for Older Adults.Alex John London - forthcoming - IEEE Transactions on Technology and Society.
    Abstract:This paper considers novel ethical issues pertaining to near-future artificial intelligence (AI) systems that seek to support, maintain, or enhance the capabilities of older adults as they age and experience cognitive decline. In particular, we focus on smart assistants (SAs) that would seek to provide proactive assistance and mediate social interactions between users and other members of their social or support networks. Such systems would potentially have significant utility for users and their caregivers if they could reduce the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Explaining the behaviour of random ecological networks: the stability of the microbiome as a case of integrative pluralism.Roger Deulofeu, Javier Suárez & Alberto Pérez-Cervera - 2019 - Synthese 198 (3):2003-2025.
    Explaining the behaviour of ecosystems is one of the key challenges for the biological sciences. Since 2000, new-mechanicism has been the main model to account for the nature of scientific explanation in biology. The universality of the new-mechanist view in biology has been however put into question due to the existence of explanations that account for some biological phenomena in terms of their mathematical properties (mathematical explanations). Supporters of mathematical explanation have argued that the explanation of the behaviour of ecosystems (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  10. Supporting the Development of Gerontechnology as Part of Silver Economy Building.Andrzej Klimczuk - 2012 - Ad Alta: Journal of Interdisciplinary Research 2 (2):52--56.
    The concept of the "silver economy" is one of the complex response trials to the challenges of ageing societies. Its key objective is to bring goods and services to meet the needs of older people through gerontechnology. Article approximates relationships between technology and the ageing of the population and the main features of silver economy and gerontechnology. It is supplemented by examples of support efforts to promote gerontechnology including: documents and strategic programs, network organizations and clusters, research and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. life More Photographic; mapping the networked image.Daniel Rubinstein - 2008 - photographies 1 (1):9-28.
    Twenty two years since the arrival of the first consumer digital camera (Tatsuno 36) Western culture is now characterised by ubiquitous photography. The disappearance of the camera inside the mobile phone has ensured that even the most banal moments of the day can become a point of photographic reverie, potentially shared instantly. Supported by the increased affordability of computers, digital storage and access to broadband, consumers are provided with new opportunities for the capture and transmission of images, particularly online where (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  12. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. MVi_Scorecard Guideline for Sub-National Community Network (SCN) on NRM.Narith Por - 2023 - Cambodia: My Village Organization.
    MVi is actively engaged with the Bounorng, Kouy, Stieng, Kreung, Prov, Laak, and Kavet communities in the provinces of Mondulkiri, Stung Treng, and Kratie. Over the years, MVi has implemented three strategic plans since 2006, focusing on supporting indigenous and rural communities in these three provinces. The strategic plan for the period 2023–2027 is designed to enhance the livelihoods and economic conditions of indigenous and vulnerable communities. This plan prioritizes four key areas: climate change, natural resource management, modern agriculture production (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Precarious work and its complicit network.Chuanfei Chin - 2019 - Journal of Contemporary Asia 49.
    How does precarious work entail social vulnerabilities and moral complicities? Theorists of precarity pose two challenges for analysing labour conditions in Asia. Their first challenge is to distinguish the new kinds of social vulnerability which constitute precarious work. The second is to assign moral responsibility in the social network that produces vulnerability in depoliticised and morally detached ways. In this article, the social and normative dimensions of precarious work are connected through a conceptual investigation into how Singapore allocates responsibility (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Consciousness despite network underconnectivity in autism: Another case of consciousness without prefrontal activity?William Hirstein - 2015 - In Rocco J. Gennaro (ed.), Disturbed Consciousness: New Essays on Psychopathology and Theories of Consciousness. MIT Press. pp. 249-263.
    Recent evidence points to widespread underconnectivity in autistic brains owing to deviant white matter, the fibers that make long connections between areas of the cortex. Subjects with autism show measurably fewer long-range connections between the parietal and prefrontal cortices. These findings may help shed light on the current debate in the consciousness literature about whether conscious states require both prefrontal and parietal/temporal components. If it can be shown that people with autism have conscious states despite such underconnectivity, this would constitute (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Possibility of a Uniform Legal Language at the Interplay of Legal Discourse, Semiotics and Blockchain Networks.Pierangelo Blandino - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 1 (7):2083-2111.
    This paper explores the possibility of a standard legal language (e.g. English) for a principled evolution of law in line with technological development. In doing so, reference is made to blockchain networks and smart contracts to emphasise the discontinuity with the liberal legal tradition when it comes to decentralisation and binary code language. Methodologically, the argument is built on the underlying relation between law, semiotics and new forms of media adding to natural language; namely: code and symbols. In what follows, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Az elektronikus prevenció lehetőségei az új (szintetikus) drogok használatának megelőzésében: a Rekreációs Drogok Európai Hálózatának (Recreational Drugs European Network ….Zsolt Demetrovics, Barbara Mervo, Ornella Corazza, Zoe Davey, Paolo Deluca, Colin Drummond, A. Enea, Jacek Moskalewicz, G. Di Melchiorre, L. Di Furia, Magí Farré, Liv Flesland, Luciano Floridi, Fruzsina Iszáj, N. Scherbaum, Holger Siemann, Arvid Skutle, Marta Torrens, M. Pasinetti, Cinzia Pezzolesi, Agnieszka Pisarska, Harry Shapiro, Elias Sferrazza, Peer Van der Kreeft & F. Schifano - 2010 - Addictologia Hungarica 1:289–297.
    Recreational Drugs European Network (ReDNet) project aims to use the Psychonaut Web Mapping Project database (Psychonaut Web Mapping Group, 2009) containing novel psychoactive compounds usually not mentioned in the scientific literature and thus unknown to clinicians as a unique source of information. The database will be used to develop an integrated ICT prevention approach targeted at vulnerable individuals and focused on novel synthetic and herbal compounds and combinations. Particular care will be taken in keeping the health professionals working directly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  70
    Pre-Determinant Cognition in Neural Networks.Marcus Verhaegh - 2009 - Communication and Cognition. Monographies 42 (3-4):133-153.
    Using Kantian starting points, we develop a notion of ‘pre-determinant intentionality,’ which refers to the intentionality of judgments that support objective truth-claims. We show how the weight-selections of neural networks can be taken to involve this form of intentionality. We argue that viewing weight selection or ‘internodal and meta-internodal selection’ as involving pre-determinant intentionality allows us to better conceptualize the coordination of computational systems. In particular, it allows us to better conceptualize the coordination of computational activity concerned with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Predicting the Number of Calories in a Dish Using Just Neural Network.Sulafa Yhaya Abu Qamar, Shahed Nahed Alajjouri, Shurooq Hesham Abu Okal & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):1-9.
    Abstract: Heart attacks, or myocardial infarctions, are a leading cause of mortality worldwide. Early prediction and accurate analysis of potential risk factors play a crucial role in preventing heart attacks and improving patient outcomes. In this study, we conduct a comprehensive review of datasets related to heart attack analysis and prediction. We begin by examining the various types of datasets available for heart attack research, encompassing clinical, demographic, and physiological data. These datasets originate from diverse sources, including hospitals, research institutions, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  17
    LBAODV: a new load balancing multipath routing algorithm for mobile ad hoc networks.Nastooh Taheri Javan - 2008 - 2008 6Th National Conference on Telecommunication Technologies 1 (1):344-349.
    An ad hoc network is comprised of mobile hosts without any wired infrastructure support. Multipath routing allows the establishment of multiple paths between a source and a destination. It distributes traffic among multiple paths instead of routing all the traffics along a single path. In this paper, we propose a new multipath routing protocol that uses all discovered paths simultaneously for transmitting data, by using this approach data packets are balanced over discovered paths and energy consumption is distributed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Uncovering the antecedents of trust in social commerce: an application of the non-linear artificial neural network approach.Hussam Al Halbusi - 2022 - Competitiveness Review 4.
    Purpose – The internet creates ample opportunities to start a mobile social commerce business. The literature confirms the issue of customer trust for social commerce businesses is a challenge that must be addressed. Hence, this study aims to examine the antecedents of trust in mobile social commerce by applying linear and non-linear relationships based on partial least squares structural equation modeling and an artificial neural network model. -/- Design/methodology/approach – This study applied a non-linear artificial neural network approach (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. THE SPECTACLE OF REFLECTION: ON DREAMS, NEURAL NETWORKS AND THE VISUAL NATURE OF THOUGHT.Magdalena Szalewicz - manuscript
    The article considers the problem of images and the role they play in our reflection turning to evidence provided by two seemingly very distant theories of mind together with two sorts of corresponding visions: dreams as analyzed by Freud who claimed that they are pictures of our thoughts, and their mechanical counterparts produced by neural networks designed for object recognition and classification. Freud’s theory of dreams has largely been ignored by philosophers interested in cognition, most of whom focused solely on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. An Examination of the Psychopathic Personality Inventory’s Nomological Network: A Meta-Analytic Review.Joshua D. Miller & Donald R. Lynam - 2012 - Personality Disorders: Theory, Research, and Treatment 3 (3):305–326.
    Since its publication, the Psychopathic Personality Inventory and its revision (Lilien- feld & Andrews, 1996; Lilienfeld & Widows, 2005) have become increasingly popular such that it is now among the most frequently used self-report inventories for the assessment of psychopathy. The current meta-analysis examined the relations between the two PPI factors (factor 1: Fearless Dominance; factor 2: Self-Centered Impulsivity), as well as their relations with other validated measures of psychopathy, internalizing and externalizing forms of psychopathology, general personality traits, and antisocial (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  24. Domain-general and Domain-specific Patterns of Activity Support Metacognition in Human Prefrontal Cortex.Jorge Morales, Hakwan Lau & Stephen M. Fleming - 2018 - The Journal of Neuroscience 38 (14):3534-3546.
    Metacognition is the capacity to evaluate the success of one's own cognitive processes in various domains; for example, memory and perception. It remains controversial whether metacognition relies on a domain-general resource that is applied to different tasks or if self-evaluative processes are domain specific. Here, we investigated this issue directly by examining the neural substrates engaged when metacognitive judgments were made by human participants of both sexes during perceptual and memory tasks matched for stimulus and performance characteristics. By comparing patterns (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  25. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both individuals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  87
    Experiences of Program Heads in Supervising Teachers: A Phenomenological Study.Elton John Embodo - 2024 - International Journal for Multidisciplinary Research 6 (5):1-28.
    The supervision of teachers is essential for ensuring effective teaching methods, ongoing professional growth, and student success. This study explored the experiences of program heads in supervising teachers. It was conducted in a local college in Tangub City, Misamis Occidental. The phenomenological design was used in the study. Eleven program heads served as the participants selected through the purposive sampling technique. The Interview Guide was used as the research instrument. Moustakas' transcendental phenomenology of data analysis was utilized to analyze the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Tour d’horizon des principaux programmes et dispositifs de soutien à l’insertion professionnelle en enseignement.Stéphane Martineau & Joséphine Mukamurera - 2012 - Revue Phronesis 1 (2):45-62.
    This text provides a brief portrait of teacher induction programs in place in the school boards in Quebec and an analysis of three major support systems used. The analysis is based on both the descriptive documents integration programs posted on the website of the Carrefour national de l’insertion professionnelle en enseignement (CNIPE) as well as a review of research. Ce texte présente un bref portrait des programmes d’insertion professionnelle mis en place dans les commissions scolaires québécoises ainsi qu’une analyse (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. PINK DOESN’T MEAN WEAK: UNVEILING THE TRIUMPHS AND CHALLENGES OF WOMEN ENTREPRENEURS IN BALAYAN, BATANGAS.Jessrell Elaine B. Cerrado, Jhian Carl Q. Arquileta, John Mark B. Barsaga, Mirko G. Dastas, Frank D. Mendoza, Sean Jacob B. Relacion, Princess Joy M. Banaag, Faith Cedwin Louis E. Belarmino, Stephanie M. Concepcion, Irish Kate C. De Castro, Jerseys Eanne C. Javier, Princess Erica O. Quizzagan, Lyra Gynera L. Villanobo & Jowenie A. Mangarin - 2024 - Get International Research Journal 2 (2):126-148.
    The world of entrepreneurship has historically been linked with taking risks and the potential for significant rewards. However, there persists a notable gender imbalance in the entrepreneurial landscape, wherein women entrepreneurs remain a minority. Women navigating the entrepreneurial path encounter distinct challenges, setting their experiences apart from their male counterparts. In Balayan, Batangas, despite strides towards gender equality, women entrepreneurs continue to face challenges in the entrepreneurial landscape. This qualitative study delves into the experiences of 10 successful female entrepreneurs who (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Effects of Publishing Processes on Scientific Thought. Typography and Typology in Prehistoric Archaeology (1950s–1990s).Sébastien Plutniak - 2020 - Science in Context 33 (3):273-297.
    In the last decades, many changes have occurred in scientific publishing, including online publication, data repositories, file formats and standards. The role played by computers in this process rekindled the argument on forms of technical determinism. This paper addresses this old debate by exploring the case of publishing processes in prehistoric archaeology during the second part of the twentieth century, prior to the wide-scale adoption of computers. It investigates the case of a collective and international attempt to standardize the typological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Smart Walking System based on Artificial Intelligence.Vanita Babanne, Simranjeet Kaur, Tejal Mehta, Divya Mulay & Rachana Nagarkar - 2018 - International Journal of Research in Engineering, Science and Management 1 (12).
    This paper shows the smart walking stick based on ultrasonic sensors and Arduino for outwardly debilitated individuals. There are roughly 37 million individuals over the globe who are visually impaired as indicated by the World Health Organization. Individuals with visual inabilities are regularly subjected to outer help which can be given by people, trained dogs, or electronic gadgets as supportive networks for basic assistance. Thus, this played as the motivation to develop a smart cane white stick to survive these restrictions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. BORDERS: The attitudes of students at the University of Split on immigration, immigrants, and refugees.Marita Brčić Kuljiš, Toni Popović, Renata Relja & Anita Lunic - 2021 - Split: Sveučilište u Splitu, Filozofski fakultet.
    Migration has, in recent years, been one of the most current topics both in Croatia and worldwide. We have witnessed increased emigration (i.e. out-migration) of Croatian citizens, as well as attempts to cross the Croatian state border by citizens of other countries. This book focuses on migration in the context of the so-called migrant and refugee crisis, which is considered from a philosophical and sociological perspective. Any gender-specific terms, irrespective of the gender in which they are used here, refer equally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  74
    Exploring Career-related Strategies for Strengthening Poverty Reduction Programmes in Nigerian Communities: A Qualitative Study.Mkpoikanke Sunday Otu - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):186-201.
    This study was designed to explore career-related strategies for strengthening poverty reduction programmes in Nigerian communities. Using a phenomenological framework and interpretive paradigm, the study used a qualitative research design. The participants of this study consisted of five key officers working in the Federal Ministry of Humanitarian Affairs and Poverty Alleviation (FMHAPA) in Nigeria and five counsellors working in Nigerian secondary schools. The participants were selected through a purposeful sampling process. Data collection measures include interviews, focus group discussion, and document (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Family and community inputs as predictors of students’ overall, cognitive, affective and psychomotor learning outcomes in secondary schools.John Asuquo Ekpenyong, Valentine Joseph Owan, Usen Friday Mbon & Stephen Bepeh Undie - 2023 - Journal of Pedagogical Research 7 (1):103-127.
    There are contradictory results regarding how students' learning outcomes can be predicted by various family and community inputs among previous studies, creating an evidence gap. Furthermore, previous studies have mostly concentrated on the cognitive aspect of students' learning outcomes, ignoring the affective and psychomotor dimensions, creating key knowledge gaps. Bridging these gaps, this predictive correlational study was conducted to understand how cultural capital, parental involvement (family inputs), support for schools, security network and school reforms (community inputs) jointly and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Imagination, Creativity, and Aphantasia.Andrea Blomkvist - forthcoming - In Amy Kind & Julia Langkau (eds.), Oxford Handbook of Philosophy of Imagination and Creativity. Oxford University Press.
    This chapter focuses on the role of the imagination in creativity, using aphantasia as a case study. It first distinguishes between imagination and mental imagery, before giving an overview of what we know about aphantasia to date, focusing in particular on findings pertaining to creativity, imagination, and memory. It then turns to the role of the imagination in creativity, agreeing with philosophers that the imagination plays an essential role in creativity, which allows individuals to imagine a multitude of possibilities. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The minimal self hypothesis.Timothy Lane - 2020 - Consciousness and Cognition 85:103029.
    For millennia self has been conjectured to be necessary for consciousness. But scant empirical evidence has been adduced to support this hypothesis. Inconsistent explications of “self” and failure to design apt experiments have impeded progress. Advocates of phenomenological psychiatry, however, have helped explicate “self,” and employed it to explain some psychopathological symptoms. In those studies, “self” is understood in a minimalist sense, sheer “for-me-ness.” Unfortunately, explication of the “minimal self” (MS) has relied on conceptual analysis, and applications to psychopathology (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Why do We Need to Employ Exemplars in Moral Education? Insights from Recent Advances in Research on Artificial Intelligence.Hyemin Han - forthcoming - Ethics and Behavior.
    In this paper, I examine why moral exemplars are useful and even necessary in moral education despite several critiques from researchers and educators. To support my point, I review recent AI research demonstrating that exemplar-based learning is superior to rule-based learning in model performance in training neural networks, such as large language models. I particularly focus on why education aiming at promoting the development of multifaceted moral functioning can be done effectively by using exemplars, which is similar to exemplar-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Latent Structural Analysis for Measures of Character Strengths: Achieving Adequate Fit.Hyemin Han & Robert E. McGrath - forthcoming - Current Psychology.
    The VIA Classification of Strengths and Virtues is the most commonly used model of positive personality. In this study, we used two methods of model modification to develop models for two measures of the character strengths, the VIA Inventory of Strengths-Revised and the Global Assessment of Character Strengths. The first method consisted of freeing residual covariances based on modification indices until good fit was achieved. The second was residual network modeling (RNM), which frees residual partial correlations while minimizing a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. The Problem of Induction and the Problem of Free Will.Avijit Lahiri - manuscript
    This essay presents a point of view for looking at `free will', with the purpose of interpreting where exactly the freedom lies. For, freedom is what we mean by it. It compares the exercise of free will with the making of inferences, which usually is predominantly inductive in nature. The making of inference and the exercise of free will, both draw upon psychological resources that define our ‘selves’. I examine the constitution of the self of an individual, especially the involvement (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Features of franchising expansion into the Ukrainian tourist market.Victoriia Redko & Yurii V. Semych - 2020 - European Journal of Management Issues 28 (3):101-109.
    Purpose – to differency in the franchise model implementation by tour operators in the European and Ukrainian markets. Design/Method/Approach. A theoretical approach is based on generalization, system and comparative analysis, content analysis, statistical, and graphical and tabular methods. Findings. The research characterized business franchising models of the largest multidisciplinary tour operators of mass tourism in Ukraine. The general conditions of performing tourist activity on the principles of business franchising for travel agencies are determined. The authors clarified the differences between business (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Contrafactives and Learnability.Simon Wimmer & David Strohmaier - 2022 - In Marco Degano, Tom Roberts, Giorgio Sbardolini & Marieke Schouwstra (eds.), Proceedings of the 23rd Amsterdam Colloquium. pp. 298-305.
    Richard Holton has drawn attention to a new semantic universal, according to which (almost) no natural language has contrafactive attitude verbs. This semantic universal is part of an asymmetry between factive and contrafactive attitude verbs. Whilst factives are abundant, contrafactives are scarce. We propose that this asymmetry is partly due to a difference in learnability. The meaning of contrafactives is significantly harder to learn than that of factives. We tested our hypothesis by conducting a computational experiment using an artificial neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. (1 other version)Area Agencies on Aging.Fatima Perkins & Andrzej Klimczuk - 2020 - In Danan Gu & Matthew E. Dupre (eds.), Encyclopedia of Gerontology and Population Aging. Springer Verlag. pp. 1--5.
    An area agency on aging is a public or private nonprofit organization designated by the state to address the needs and concerns of all older persons at the regional and local levels in the United States 2019). AAAs have a successful history of developing, coordinating, and implementing comprehensive networks of services and programs that enrich communities and the lives of older adults. AAAs were established through a provision of the Older Americans Act, which was signed into law by President Lyndon (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. An Epistemological Analysis of the Use of Reputation as Evidence.Andrés Páez - 2021 - International Journal of Evidence and Proof 25 (3):200-216.
    Rules 405(a) and 608(a) of the Federal Rules of Evidence allow the use of testimony about a witness’s reputation to support or undermine his or her credibility in trial. This paper analyzes the evidential weight of such testimony from the point of view of social epistemology and the theory of social networks. Together they provide the necessary elements to analyze how reputation is understood in this case, and to assess the epistemic foundation of a reputational attribution. The result of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Cerebellum and Emotion in Morality.Hyemin Han - forthcoming - In Michael Adamaszek, Mario Manto & Denis Schutter (eds.), Cerebellum and Emotion.
    In the current chapter, I examined the relationship between the cerebellum, emotion, and morality with evidence from large-scale neuroimaging data analysis. Although the aforementioned relationship has not been well studied in neuroscience, recent studies have shown that the cerebellum is closely associated with emotional and social processes at the neural level. Also, debates in the field of moral philosophy, psychology, and neuroscience have supported the importance of emotion in moral functioning. Thus, I explored the potentially important but less-studies topic with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Folk Psychology, Eliminativism, and the Present State of Connectionism.Vanja Subotić - 2021 - Theoria: Beograd 1 (64):173-196.
    Three decades ago, William Ramsey, Steven Stich & Joseph Garon put forward an argument in favor of the following conditional: if connectionist models that implement parallelly distributed processing represent faithfully human cognitive processing, eliminativism about propositional attitudes is true. The corollary of their argument (if it proves to be sound) is that there is no place for folk psychology in contemporary cognitive science. This understanding of connectionism as a hypothesis about cognitive architecture compatible with eliminativism is also endorsed by Paul (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. FOMO as a mediator between the number of SNS accounts used and Subjective Wellbeing.Shehla V. T., Shreya Kulshreshtha, Siddharth Garg, Syyeda Wahidi & Warda Raees - manuscript
    Social Networking Sites (SNS) are the bread and butter of our digital lives, but research has shown SNS usage to lead to higher levels of Fear of Missing Out (FOMO) and lower levels of subjective wellbeing (Przybilski, Murayama, Dehaan, & Gladwell, 2013). Existing psychological theories explain this causal relationship as an outcome of either an innate need for relatedness (Self Determination Theory) or behavioral addiction (SNS Addiction). Theoretically, these theories also posit that individuals with a greater number of SNS accounts (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Intrinsic brain activity of subcortical-cortical sensorimotor system and psychomotor alterations in schizophrenia and bipolar disorder.Timothy Joseph Lane - 2020 - Schizophrenia Research 215.
    Objective: Alterations in psychomotor dimension cut across different psychiatric disorders, such as schizophrenia (SCZ) and bipolar disorder (BD). This preliminary study aimed to investigate the organization of intrinsic brain activity in the subcortical-cortical sensorimotor system in SCZ (and BD) as characterized according to psychomotor dimension. -/- Method: In this resting-state functional magnetic resonance imaging (fMRI) study, functional connectivity (FC) between thalamus and sensorimotor network (SMN), along with FC from substantia nigra (SN) and raphe nuclei (RN) to basal ganglia (BG) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  12
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  14
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural Networks (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 972