Results for 'technique cinématographique'

974 found
Order:
  1. La technique cinématographique d'Andreï Tarkovsky dans Solaris.Nicolae Sfetcu - manuscript
    Tarkovsky s’est opposé au montage et a considéré que la base de l’art cinématographique (l’art du film) est le rythme interne des images. Il a considèré le cinéma comme une représentation des courants distinctifs ou des ondes de temps, transmis dans le film par son rythme interne. Le rythme est au cœur du « film poétique ». Un rythme comme un mouvement dans le cadre (« la sculpture dans le temps »), pas comme une séquence d'images dans le temps. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Le film Solaris, réalisé par Andrei Tarkovski - Aspects psychologiques et philosophiques.Nicolae Sfetcu - 2020 - Drobeta Turnu Severin: MultiMedia Publishing.
    Les principaux aspects psychologiques et philosophiques détachés du film Solaris réalisé par Andrei Tarkovski, ainsi que les techniques cinématographiques utilisées par le réalisateur pour transmettre ses messages aux spectateurs. Dans « Introduction », je présente brièvement les éléments pertinents de la biographie de Tarkovski et un aperçu du roman Solaris de Stanislav Lem et du film Solaris réalisé par Andrei Tarkovsky. Dans « Technique cinématographique », je parle du rythme spécifique des scènes, du mouvement radical déclenché par Tarkovski (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Techniques et concepts du vivant en biologie synthétique.Alberto Molina-Pérez - 2009 - Ludus Vitalis 17 (31):237-240.
    [ENGLISH] This article discusses the potential of synthetic biology to address fundamental questions in the philosophy of biology regarding the nature of life and biological functions. Synthetic biology aims to reduce living organisms to their simplest forms by identifying the minimal components of a cell and also to create novel life forms through genetic reprogramming, biobrick assembly, or novel proteins. However, the technical success of these endeavors does not guarantee their conceptual success in defining life. There is a lack of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. PARAPHRASING TECHNIQUE TO DEVELOP SKILL FOR ENGLISH WRITING AMONG INDONESIAN COLLEGE STUDENTS OF ENGLISH.Kaharuddin Andi - 2020 - Systematic Reviews in Pharmacy 11 (11):291-297.
    This research aims at examining three important things, i.e. students’ technique in paraphrasing, paraphrasing acceptability and obstacles in paraphrasing. A qualitative approach was used to carry out this study by purposively selecting 26 Indonesian college students of English as respondents. The data were collected by giving a paraphrasing task (consisted of 5 paragraphs) to the students and interviewed them to find out in-depth information on paraphrasing acceptably and obstacles. The research revealed that synonym technique was the most frequent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Political Technique, the Conflict of Umori, and Foucault’s Reading of Machiavelli in Sécurité, Territoire, Population.Sean Erwin - 2015 - Foucault Studies 19:172-190.
    For those familiar with Machiavelli’s texts, Foucault’s interpretation of Macchiavelli in his 1978 lecture series Sécurité, Territoire, Population1 is surprising. Although Machiavelli figures prominently in five of the thirteen lectures,2 Foucault treats Machiavelli as if he were the author of only one book—The Prince—and his reading treats this complex text as if it covered only one topic: how to guarantee the security of the Prince. Clearly Foucault did not intend his interpretation of Machiavelli as a close exegesis. Other discussions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Techniques of Bridging the Gulf: Dialectic and Reductionism in McDowell and Fichte.Jens Lemanski - 2020 - Edukacja Filozoficzna 69 (1):7-36.
    “Dialectic” has been a matter of growing interest in contemporary philosophy. The present article analyzes dialectical methods and positions them by reference to two paradigmatic texts of German idealism and analytic philosophy, i.e. J.G. Fichte’s Science of Knowing (1804) and J. McDowell’s Mind and World. Both dialectical approaches will be interpreted with regard to their contribution in the debate on reductionism and anti-reductionism: both Fichte and McDowell claim that philosophical positions and logical terms stand in a dualistic relationship to one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. (1 other version)Technique Rationality in the Contemporary Neo-Capitalist System.Gilberto Davanço Neto - 2022 - Revista Quaestio Iuris 15 (01):863-888.
    The rationality of the human being applied in science-technique in the contemporary capitalist system is distorted; the purpose, which is the good life for human beings, has become the means to sustain and feedback the technicist system of technological capitalism. Thus, the modus operandi of science, aims only to legitimize technology, apart from the ethics applied in this relationship between technology and human beings, and cut off from critical philosophical thinking. With the result presented, the problem lies in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Legislative technique.Habil Gurbanov - 2022 - Metafizika 5 (4):129-139.
    Legislative technique encompasses a system of methods and means associated with the preparation of draft legal acts in the most perfect form in terms of structure and form. In the legislative technique, not only national, but also the established legal practice of foreign countries for hundreds of years is widely used. The special legal means of legislative technique include the following: 1) legal language; 2) legal structures; 3) the procedure for registering a legislative act, the process of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  76
    OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Internet Techniques for an Untimely Anthropology.Meg Stalcup - 2020 - In Julie Laplante, Willow Scobie & Ari Gandsman (eds.), Searching After Method: Live Anthropology. Berghahn Book. pp. 102-107.
    Making “the familiar strange and the strange familiar” is what anthropology has long claimed as its expertise. The Internet and its broader technological problem space pose methodological challenges, however, for a discipline that has traditionally drawn on the authority of “being there” to ground its claims to knowledge.
    Download  
     
    Export citation  
     
    Bookmark  
  11. A Technique for Determining Closure in Semantic Tableaux.Steven James Bartlett - 1983 - Methodology and Science: Interdisciplinary Journal for the Empirical Study of the Foundations of Science and Their Methodology 16 (1):1-16.
    The author considers the model-theoretic character of proofs and disproofs by means of attempted counterexample constructions, distinguishes this proof format from formal derivations, then contrasts two approaches to semantic tableaux proposed by Beth and Lambert-van Fraassen. It is noted that Beth's original approach has not as yet been provided with a precisely formulated rule of closure for detecting tableau sequences terminating in contradiction. To remedy this deficiency, a technique is proposed to clarify tableau operations.
    Download  
     
    Export citation  
     
    Bookmark  
  12.  70
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Mexico and mitochondrial replacement techniques: what a mess.César Palacios-González - 2018 - British Medical Bulletin 128.
    Abstract Background The first live birth following the use of a new reproductive technique, maternal spindle transfer (MST), which is a mitochondrial replacement technique (MRT), was accomplished by dividing the execution of the MST procedure between two countries, the USA and Mexico. This was done in order to avoid US legal restrictions on this technique. -/- Sources of data Academic articles, news articles, documents obtained through freedom of information requests, laws, regulations and national reports. -/- Areas of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. University Lecturing as a Technique of Collective Imagination.Lavinia Marin - 2020 - In Naomi Hodgson, Joris Vlieghe & Piotr Zamojski (eds.), Post-critical Perspectives on Higher Education. Springer. pp. 73-82.
    Lecturing is the only educational form inherited from the universities of the middle ages that is still in use today. However, it seems that lecturing is under threat, as recent calls to do away with lecturing in favour of more dynamic settings, such as the flipped classroom or pre-recorded talks, have found many adherents. In line with the post-critical approach of this book, this chapter argues that there is something in the university lecture that needs to be affirmed: at its (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Translation Techniques.Marcia Ricci Pinheiro - 2015 - Communication and Language at Work 3 (4):121-144.
    In this paper, we discuss three translation techniques: literal, cultural, and artistic. Literal translation is a well-known technique, which means that it is quite easy to find sources on the topic. Cultural and artistic translation may be new terms. Whilst cultural translation focuses on matching contexts, artistic translation focuses on matching reactions. Because literal translation matches only words, it is not hard to find situations in which we should not use this technique. Because artistic translation focuses on reactions, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Mitochondrial Replacement Techniques and Mexico’s Rule of Law: On the Legality of the First Maternal Spindle Transfer Case.César Palacios-González - 2017 - Journal of Law and the Biosciences 4 (1):50–69.
    News about the first baby born after a mitochondrial replacement technique (MRT; specifically maternal spindle transfer) broke on September 27, 2016 and, in a matter of hours, went global. Of special interest was the fact that the mitochondrial replacement procedure happened in Mexico. One of the scientists behind this world first was quoted as having said that he and his team went to Mexico to carry out the procedure because, in Mexico, there are no rules. In this paper, we (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  17. The Effect of Pomodoro Technique on Student Mendelian Genetics Concept Mastery during Synchronous Remote Learning.Melanie Gurat & Christian Santiago - 2023 - International Research Journal of Management, It and Social Sciences 10 (4):233-243.
    The Pomodoro technique is a timed-based strategy used in fighting procrastination and found to increase academic performance. However, its effect on academic learning in a synchronous remote learning modality has yet to be investigated. The study used a mixed triangulation semiexperimental design using a whole sample (N=46), following all ethical equivalence procedures. The genetics concept mastery of the students was tested using a researcher-made test. ANCOVA results revealed that students taught using Pomodoro yielded significantly better concept mastery in genetics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. What is a subliminal technique? An ethical perspective on AI-driven influence.Juan Pablo Bermúdez, Rune Nyrup, Sebastian Deterding, Celine Mougenot, Laura Moradbakhti, Fangzhou You & Rafael A. Calvo - 2023 - Ieee Ethics-2023 Conference Proceedings.
    Concerns about threats to human autonomy feature prominently in the field of AI ethics. One aspect of this concern relates to the use of AI systems for problematically manipulative influence. In response to this, the European Union’s draft AI Act (AIA) includes a prohibition on AI systems deploying subliminal techniques that alter people’s behavior in ways that are reasonably likely to cause harm (Article 5(1)(a)). Critics have argued that the term ‘subliminal techniques’ is too narrow to capture the target cases (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Principals’ supervisory techniques for combating corruption and the attainment of quality school governance in public secondary schools in Aba Education Zone of Abia State, Nigeria.Esther Chijioke Madukwe, Blessing Iheoma Nwannunu & Valentine Joseph Owan - 2019 - International Journal of Educational Benchmark 13 (2):113-123.
    The study investigated principals’ supervisory techniques for combating corruption and the attainment of quality school governance. Two null hypotheses were formulated. The ex-post facto research design was adopted for the study. Census technique was used to draw the entire population of 81 principals from all the public secondary schools in Aba Education Zone of Abia State. Data collection was carried out with the use of a research instrument titled: “Principals’ Supervisory Techniques for Combating Corruption and Attainment of Quality School (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Active Techniques Implemented in an Introductory Signal Processing Course to Help Students Achieve Higher Levels of Learning.Saharnaz Baghdadchi, Rebecca Hardesty, Paul Andreas Hadjipieris & Jace Hargis - 2018 - Papers on Engineering Education Repository.
    Holding students to high standards and assessing, measuring and evaluating their learning with challenging, authentic problems in the midterm and final exams is the goal of the professors who teach core signal processing concepts. However, the heavy reliance of these subjects on mathematics makes it difficult for students to genuinely grasp the concepts and relate to a conceptual framework. Specifically, analyzing the signals and the functionality of systems in Fourier domain; separating the system level analysis from signal level analysis; and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Applying CLIL Techniques to Teach Analytic Philosophy in English.Oleksandr Kulyk - 2017 - In Kulyk Oleksandr (ed.), Education and Science in the Context of Global Transformations. Ohotnik. pp. 182-183.
    I have been lecturing Analytic Philosophy course in English at Oles Honchar Dnipro National University, Ukraine, for three years. Teaching using CLIL (Content and Language Integrated Learning) techniques enables me to do it effectively. All three groups of my master’s-degree students who had learned analytic philosophy by CLIL techniques demonstrated good results of their learning. They not only achieved strong knowledge of analytic philosophy but also sufficiently improved their skills in English writing, speaking, reading, and listening.
    Download  
     
    Export citation  
     
    Bookmark  
  23. The Technique of Theory Construction. By J. H. Woodger. (International Encyclopedia of Unified Science, Vol. II, No. 5.) (University of Chicago Press; London, Cambridge University Press. 1939. Pp. vii + 81. Price 6s.). [REVIEW]R. B. Braithwaite - 1941 - Philosophy 16 (64):419-.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Mitochondrial Replacement Techniques: Genetic Relatedness, Gender Implications, and Justice.César Palacios-González & Tetsuya Ishii - 2017 - Gender and the Genome 1 (4):1-6.
    In 2015 the United Kingdom (UK) became the first nation to legalize egg and zygotic nuclear transfer procedures using mitochondrial replacement techniques (MRTs) to prevent the maternal transmission of serious mitochondrial DNA diseases to offspring. These techniques are a form of human germline genetic modification and can happen intentionally if female embryos are selected during the MRT clinical process, either through sperm selection or preimplantation genetic diagnosis (PGD). In the same year, an MRT was performed by a United States (U.S.)-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Introduction to image processing via neutrosophic techniques.A. A. Salama & Florentin Smarandache - 2014 - Neutrosophic Sets and Systems 5:59-63.
    This paper is an attempt of proposing the processing approach of neutrosophic technique in image processing.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Freehand Cutting Technique in Dressmaking as an Entrepreneurial Skill among Secondary School Students in Port Harcourt Metropolis.Peace Jack - 2023 - International Journal of Home Economics, Hospitality and Allied Research 2 (2):229-237.
    The present study investigated freehand cutting technique in dressmaking as an entrepreneurial skill among secondary school students for sustainable development in Port Harcourt Metropolis. The researcher employed a descriptive survey research design. The study was conducted in Port Harcourt, Rivers State. The population for the study included all students in eight government secondary schools in Rivers State. A sample of 25 students was randomly selected from each of the schools, resulting in a total of 200 respondents. The researcher created (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  68
    Parallel Processing Techniques for Optimizing Data-Intensive Applications on Accelerated Computing Platforms.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-550.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  61
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Editors' introduction to tasks, tools, and techniques.Wayne D. Gray, François Osiurak & Richard Heersmink - 2021 - Topics in Cognitive Science 13 (4):1-8.
    Tasks, tools, and techniques that we perform, use, and acquire, define the elements of expertise which we value as the hallmarks of goal-driven behavior. Somehow, the creation of tools enables us to define new tasks, or is it that the envisioning of new tasks drives us to invent new tools? Or maybe it is that new tools engender new techniques which then result in new tasks? This jumble of issues will be explored and discussed in this diverse collection of papers. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  69
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Managing Informal Mathematical Knowledge: Techniques from Informal Logic.Andrew Aberdein - 2006 - Lecture Notes in Artificial Intelligence 4108:208--221.
    Much work in MKM depends on the application of formal logic to mathematics. However, much mathematical knowledge is informal. Luckily, formal logic only represents one tradition in logic, specifically the modeling of inference in terms of logical form. Many inferences cannot be captured in this manner. The study of such inferences is still within the domain of logic, and is sometimes called informal logic. This paper explores some of the benefits informal logic may have for the management of informal mathematical (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  32. Exploring the rhetorical semiotic brand image structure of ad films with multivariate mapping techniques.George Rossolatos - 2014 - Semiotica 2014 (200):335-358.
    The aim of this paper is to demonstrate the applicability of multivariate mapping techniques to the exploration of the rhetorical semiotic brand image structure of ad films. By drawing on correspondence analysis and multidimensional scaling, two techniques that are amply used in corpus linguistics and in marketing research, but also on the data reduction technique of factor analysis, it will be displayed how a set of nuclear semes and classemes or an intended semic structure that underlies ad filmic discursive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  66
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Exploring Machine Learning Techniques for Coronary Heart Disease Prediction.Hisham Khdair - 2021 - International Journal of Advanced Computer Science and Applications 12 (5):28-36.
    Coronary Heart Disease (CHD) is one of the leading causes of death nowadays. Prediction of the disease at an early stage is crucial for many health care providers to protect their patients and save lives and costly hospitalization resources. The use of machine learning in the prediction of serious disease events using routine medical records has been successful in recent years. In this paper, a comparative analysis of different machine learning techniques that can accurately predict the occurrence of CHD events (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  53
    Scalable Cloud Solutions for Cardiovascular Disease Risk Management with Optimized Machine Learning Techniques.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-470.
    The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC). Our findings show that improved machine learning models perform better than conventional methods, offering trustworthy forecasts that can help medical practitioners with early diagnosis and individualized treatment planning. In order to achieve even higher predicted accuracy, the study's conclusion discusses the significance of its findings for clinical practice as well as future improvements that might be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Cooperative Learning, Critical Thinking and Character. Techniques to Cultivate Ethical Deliberation.Nancy Matchett - 2009 - Public Integrity 12 (1).
    Effective ethics teaching and training must cultivate both the critical thinking skills and the character traits needed to deliberate effectively about ethical issues in personal and professional life. After highlighting some cognitive and motivational obstacles that stand in the way of this task, the article draws on educational research and the author's experience to demonstrate how cooperative learning techniques can be used to overcome them.
    Download  
     
    Export citation  
     
    Bookmark  
  37. Technique as a Resouce for the Non-Bourgois Philosopher.Victor Adelino Ausina Mota - manuscript
    Desire for status, for power, here it is the realm of capitalism, since Marcuse, after Freud, everyone produces his own theory about the world, his own world..
    Download  
     
    Export citation  
     
    Bookmark  
  38. Producing a robust body of data with a single technique.Gregory Stephen Gandenberger - 2010 - Philosophy of Science 77 (3):381-399.
    When a technique purports to provide information that is not available to the unaided senses, it is natural to think that the only way to validate that technique is by appealing to a theory of the processes that lead from the object of study to the raw data. In fact, scientists have a variety of strategies for validating their techniques. Those strategies can yield multiple independent arguments that support the validity of the technique. Thus, it is possible (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39.  27
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The Use of Artificial Intelligence Techniques and Their Impact on Improving the Higher Education Outcomes of Business Administrative Colleges in Palestinian Universities.Khalid Abdel Fattah Tawfiq Atieh, Ghadir Mohammad Said Ali Ahmad, Mays Ala'din Qasem Awwad & Mazen J. Al Shobaki - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (1):83-92.
    The study aims to identify the impact of the use of artificial intelligence techniques in improving the outputs of higher education in Business Administrative Colleges in the universities under study that formed the research community. As for the sample, it consisted of (130) academic respondents in these universities under study. The research concluded that there is a statistically significant effect of using artificial intelligence techniques (expert systems, neural networks) in improving the outputs of higher education in Business Administrative Colleges under (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. The ethical challenges of the clinical introduction of mitochondrial replacement techniques.John B. Appleby - 2015 - Medicine, Health Care and Philosophy 18 (4):501-514.
    Mitochondrial DNA (mtDNA) diseases are a group of neuromuscular diseases that often cause suffering and premature death. New mitochondrial replacement techniques (MRTs) may offer women with mtDNA diseases the opportunity to have healthy offspring to whom they are genetically related. MRTs will likely be ready to license for clinical use in the near future and a discussion of the ethics of the clinical introduction ofMRTs is needed. This paper begins by evaluating three concerns about the safety of MRTs for clinical (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  42. A Fuzzy Application of Techniques from Topological Supersymmetric Quantum Mechanics to Social Choice Theory: A New Insight on Flaws of Democracy.Wilfrid Wulf - forthcoming - Journal of Social Sciences and Humanities.
    We introduce a new theorem in social choice theory built on a path integral approach which will show that, under some reasonable conditions, there is a unique way to aggregate individual preferences based on fuzzy sets into a social preference based on probabilities, and that this way is invariant under any permutation of alternatives. We then apply this theorem to the case of democratic decision making with data of the behaviour and voting preferences of voting agents and show that there (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Seeing the Void: Experiencing Emptiness and Awareness with the Headless Way Technique.Brentyn J. Ramm, Anna-Lena Lumma, Terje Sparby & Ulrich Weger - 2024 - Mindfulness 15:958–976.
    Objectives Practitioners in contemplative traditions commonly report experiencing an awareness that is distinct from sensory objects, thoughts, and emotions (“awareness itself”). They also report experiences of a void or underlying silence that is closely associated with this awareness. Subjects who carry out the Headless Way exercises frequently report an experience of emptiness or void at the same time as other contents (void-like experiences). The goals of this study were to (1) assess the reliability of these methods in eliciting the recognition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can optimize the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Socratic Note Taking Technique.Mark Walker, David Trafimow & Jamie Bronstein - 2017 - Teaching Philosophy.
    The notion of Socratic Note Taking is introduced to enhance students’ learning from assigned readings. SNT features students asking questions and answering their own questions while doing the readings. To test the effectiveness of SNT, half the students from two sections of a philosophy course were assigned SNT on alternating weeks. Quizzes each week alternated between the two classes as either high or low stakes in a counterbalanced format. The design was a 2 x 2 x 2 within-participants factorial. On (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  67
    The (Un)available. From Heideggerian technique to the contradiction of Modernity in Hartmut Rosa.Patrizia Pedraza - 2024 - Differenz. Revista Internacional de Estudios Heideggerianos y Sus Derivas Contemporaneas 10:67-77.
    Since the second half of the last century, intellectual productions in relation to the question of modern technification have been increasing; technique and the forms of social alienation have been the object of study of thinkers from the most diverse disciplines. One of the first figures to undertake this enterprise was Martin Heidegger, from hermeneutic phenomenology, while one of the most recent theorizations in this regard comes from the phenomenological critical sociology of Hartmut Rosa. In this paper, we will (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. A psychologically based taxonomy of magicians’ forcing techniques: How magicians influence our choices, and how to use this to study psychological mechanisms.Alice Pailhès, Ronald A. Rensink & Gustav Kuhn - 2020 - Consciousness and Cognition 86 (C):103038.
    “Pick a card, any card. This has to be a completely free choice.” the magician tells you. But is it really? Although we like to think that we are using our free will to make our decisions, research in psychology has shown that many of our behaviours are automatic and unconsciously influenced by external stimuli (Ariely, 2008; Bargh & Chartrand, 1999; Newell & Shanks, 2014; Nisbett & Wilson, 1977), and that we are often oblivious to the cognitive mechanisms that underpin (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Evolution and Technique of Human Thinking.Guenther Witzany - 2015 - Biosemiotics 8 (3):503-508.
    IntroductionBy ‘philosophy of consciousness’ we mean an assembly of different approaches such as philosophy of mind , perception, rational conclusions, information processing and contradictory conceptions such as holistic ‘all is mind’ perspectives and their atomistic counterparts.Since ancient Greeks philosophy has provided widespread debates on pneuma, nous, psyche, spiritus, mind, and Geist. In more recent times the philosophy of consciousness has become part of psychology, sociology, neuroscience, cognitive science, linguistics, communication science, information theory, cybernetic systems theory, synthetic biology, biolinguistics, bioinformatics and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 974