Results for 'temporal data mining'

1000+ found
Order:
  1.  89
    Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Retractions Data Mining #1.Quan-Hoang Vuong & Viet-Phuong La - 2019 - Open Science Framework 2019 (2):1-3.
    Motivation: • Breaking barriers in publishing demands a proactive attitude • Open data, open review and open dialogue in making social sciences plausible .
    Download  
     
    Export citation  
     
    Bookmark  
  4. Data Mining the Brain to Decode the Mind.Daniel Weiskopf - forthcoming - In Neural Mechanisms: New Challenges in the Philosophy of Neuroscience.
    In recent years, neuroscience has begun to transform itself into a “big data” enterprise with the importation of computational and statistical techniques from machine learning and informatics. In addition to their translational applications such as brain-computer interfaces and early diagnosis of neuropathology, these tools promise to advance new solutions to longstanding theoretical quandaries. Here I critically assess whether these promises will pay off, focusing on the application of multivariate pattern analysis (MVPA) to the problem of reverse inference. I argue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  72
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  94
    Data Mining & Big Data: Strategic Anticipation & Decision-making support, SciencesPo, 24h, 2018.Marc-Olivier Boisset & Jean Langlois-Berthelot - unknown
    In the end of the course the student will be able to: • Understand the functioning of data mining tools and their contributions to managerial professions • Master the use of dynamic search tools on the open web and on the dark web. • Use the proper tools according to the objectives sought • Master the latest trends and innovations in Business Analytics • Analyze the opportunities offered in terms of data mining by artificial intelligence and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. A Framework Proposal for Developing Historical Video Games Based on Player Review Data Mining to Support Historic Preservation.Sarvin Eshaghi, Sepehr Vaez Afshar & Mahyar Hadighi - 2023 - In Saif Haq, Adil Sharag-Eldin & Sepideh Niknia (eds.), ARCC 2023 CONFERENCE PROCEEDING: The Research Design Interface. Architectural Research Centers Consortium, Inc.. pp. 297-305.
    Historic preservation, which is a vital act for conveying people’s understanding of the past, such as events, ideas, and places to the future, allows people to preserve history for future generations. Additionally, since the historic properties are currently concentrated in urban areas, an urban-oriented approach will contribute to the issue. Hence, public awareness is a key factor that paves the way for this conservation. Public history, a history with a public audience and special methods of representation, can serve society in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. A Comparative Analysis of Data Mining Techniques on Breast Cancer Diagnosis Data using WEKA Toolbox.Majdah Alshammari & Mohammad Mezher - 2020 - (IJACSA) International Journal of Advanced Computer Science and Applications 8:224-229.
    Abstract—Breast cancer is considered the second most common cancer in women compared to all other cancers. It is fatal in less than half of all cases and is the main cause of mortality in women. It accounts for 16% of all cancer mortalities worldwide. Early diagnosis of breast cancer increases the chance of recovery. Data mining techniques can be utilized in the early diagnosis of breast cancer. In this paper, an academic experimental breast cancer dataset is used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  42
    Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Ontology-based knowledge representation of experiment metadata in biological data mining.Scheuermann Richard, Kong Megan, Dahlke Carl, Cai Jennifer, Lee Jamie, Qian Yu, Squires Burke, Dunn Patrick, Wiser Jeff, Hagler Herb, Herb Hagler, Barry Smith & David Karp - 2009 - In Jake Chen & Stefano Lonardi (eds.), Biological Data Mining. Boca Raton: Chapman Hall / Taylor and Francis. pp. 529-559.
    According to the PubMed resource from the U.S. National Library of Medicine, over 750,000 scientific articles have been published in the ~5000 biomedical journals worldwide in the year 2007 alone. The vast majority of these publications include results from hypothesis-driven experimentation in overlapping biomedical research domains. Unfortunately, the sheer volume of information being generated by the biomedical research enterprise has made it virtually impossible for investigators to stay aware of the latest findings in their domain of interest, let alone to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and competence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Identifying Virtues and Values Through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - 2018 - Journal of Value Inquiry 52 (1).
    Because obituaries are succinct and explicitly intended to summarize their subjects’ lives, they may be expected to include only the features that the author finds most salient but also to signal to others in the community the socially-recognized aspects of the deceased’s character. We begin by reviewing studies 1 and 2, in which obituaries were carefully read and labeled. We then report study 3, which further develops these results with a semi-automated, large-scale semantic analysis of several thousand obituaries. Geography, gender, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  15. Ontology-assisted database integration to support natural language processing and biomedical data-mining.Jean-Luc Verschelde, Marianna C. Santos, Tom Deray, Barry Smith & Werner Ceusters - 2004 - Journal of Integrative Bioinformatics. Repr. In: Yearbook of Bioinformatics , 39–48 1:1-10.
    Successful biomedical data mining and information extraction require a complete picture of biological phenomena such as genes, biological processes, and diseases; as these exist on different levels of granularity. To realize this goal, several freely available heterogeneous databases as well as proprietary structured datasets have to be integrated into a single global customizable scheme. We will present a tool to integrate different biological data sources by mapping them to a proprietary biomedical ontology that has been developed for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. What an Entangled Web We Weave: An Information-centric Approach to Time-evolving Socio-technical Systems.Markus Luczak-Roesch, Kieron O’Hara, Jesse David Dinneen & Ramine Tinati - 2018 - Minds and Machines 28 (4):709-733.
    A new layer of complexity, constituted of networks of information token recurrence, has been identified in socio-technical systems such as the Wikipedia online community and the Zooniverse citizen science platform. The identification of this complexity reveals that our current understanding of the actual structure of those systems, and consequently the structure of the entire World Wide Web, is incomplete, which raises novel questions for data science research but also from the perspective of social epistemology. Here we establish the principled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Ethical issues of 'morality mining': When the moral identity of individuals becomes a focus of data-mining.Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley - 2013 - In Hakikur Rahman & Isabel Ramos (eds.), Ethical Data Mining Applications for Socio-Economic Development. IGI Global. pp. 1-21.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  18. Mapping Human Values: Enhancing Social Marketing through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - forthcoming - In Eda Gurel-Atay & Lynn Kahle (eds.), Social and Cultural Values in a Global and Digital Age. Routledge.
    Obituaries are an especially rich resource for identifying people’s values. Because obituaries are succinct and explicitly intended to summarize their subjects’ lives, they may be expected to include only the features that the author(s) find most salient, not only for themselves as relatives or friends of the deceased, but also to signal to others in the community the socially-recognized aspects of the deceased’s character. We report three approaches to the scientific study of virtue and value through obituaries. We begin by (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Neutrosophic Association Rule Mining Algorithm for Big Data Analysis.Mohamed Abdel-Basset, Mai Mohamed, Florentin Smarandache & Victor Chang - 2018 - Symmetry 10 (4):1-19.
    Big Data is a large-sized and complex dataset, which cannot be managed using traditional data processing tools. Mining process of big data is the ability to extract valuable information from these large datasets. Association rule mining is a type of data mining process, which is indented to determine interesting associations between items and to establish a set of association rules whose support is greater than a specific threshold. The classical association rules can only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Experiences in Mining Educational Data to Analyze Teacher's Performance: A Case Study with High Educational Teachers.Abdelbaset Almasri - 2017 - International Journal of Hybrid Information Technology 10 (12):1-12.
    Educational Data Mining (EDM) is a new paradigm aiming to mine and extract knowledge necessary to optimize the effectiveness of teaching process. With normal educational system work it’s often unlikely to accomplish fine system optimizing due to large amount of data being collected and tangled throughout the system. EDM resolves this problem by its capability to mine and explore these raw data and as a consequence of extracting knowledge. This paper describes several experiments on real educational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Mineness without Minimal Selves.M. V. P. Slors & F. Jongepier - 2014 - Journal of Consciousness Studies 21 (7-8):193-219.
    In this paper we focus on what is referred to as the ‘mineness’ of experience, that is, the intimate familiarity we have with our own thoughts, perceptions, and emotions. Most accounts characterize mineness in terms of an experiential dimension, the first-person givenness of experience, that is subsumed under the notion of minimal self-consciousness or a ‘minimal self’. We argue that this account faces problems and develop an alternative account of mineness in terms of the coherence of experiences with what we (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  23. NEUTROSOPHIC THEORY AND SENTIMENT ANALYSIS TECHNIQUE FOR MINING AND RANKING BIG DATA FROM ONLINE EVALUATION.C. Manju Priya - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):124-142.
    A huge amount of data is being generated everyday through different transactions in industries, social networking, communication systems etc. Big data is a term that represents vast volumes of high speed, complex and variable data that require advanced procedures and technologies to enable the capture, storage, management, and analysis of the data. Big data analysis is the capacity of representing useful information from these large datasets. Due to characteristics like volume, veracity, and velocity, big (...) analysis is becoming one of the most challenging research problems. Semantic analysis is method to better understand the implied or practical meaning of the input dataset. It is mostly applied with ontology to analyze content mainly in web resources. This field of research combines text analysis and Semantic Web technologies. The use semantic knowledge is to aid sentiment analysis of queries like emotion mining, popularity analysis, recommendation systems, user profiling, etc. A new method has been proposed to extract semantic relationships between different data attributes of big data which can be applied to a decision system. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Ethical Issues in Text Mining for Mental Health.Joshua Skorburg & Phoebe Friesen - forthcoming - In M. Dehghani & R. Boyd (ed.), The Atlas of Language Analysis in Psychology.
    A recent systematic review of Machine Learning (ML) approaches to health data, containing over 100 studies, found that the most investigated problem was mental health (Yin et al., 2019). Relatedly, recent estimates suggest that between 165,000 and 325,000 health and wellness apps are now commercially available, with over 10,000 of those designed specifically for mental health (Carlo et al., 2019). In light of these trends, the present chapter has three aims: (1) provide an informative overview of some of the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Transdiagnostic assessment of temporal experience (TATE) a tool for assessing abnormal time experiences.Giovanni Stanghellini, Milena Mancini, Anthony Vincent Fernandez, Marcin Moskalewicz, Maurizio Pompili & Massimo Ballerini - 2022 - Phenomenology and the Cognitive Sciences 21 (1):73-95.
    Currently, anomalous lived temporality is not included in the main diagnostic criteria or standard symptom checklists. In this article, we present the Transdiagnostic Assessment of Temporal Experience, a structured interview that can be used by researchers and clinicians without a comprehensive phenomenological background to explore abnormal time experiences in persons with abnormal mental conditions regardless of their diagnosis. When extensive data gathered by this scale are available, it will be possible to delineate well-defined anomalous lived temporality profiles for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Small-scale mining in South Africa: an assessment of the success factors and support structures for entrepreneurs.Zandisile Mkubukeli & Robertson K. Tengeh - 2015 - Environmental Economics 6 (4):15-24.
    One of the negative legacies of the apartheid era is a markedly skewed mining sector that favours the established companies, and almost completely neglects small-scale mining enterprises. Though a major source of revenue for South Africa(SA), the current state of the mining sector does not directly benefit the previously disadvantaged who dominate small-scale mining. The aim of this study is to explore the support structures and success factors relevant to small scale mining entrepreneurs in South (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Algorithmic paranoia: the temporal governmentality of predictive policing.Bonnie Sheehey - 2019 - Ethics and Information Technology 21 (1):49-58.
    In light of the recent emergence of predictive techniques in law enforcement to forecast crimes before they occur, this paper examines the temporal operation of power exercised by predictive policing algorithms. I argue that predictive policing exercises power through a paranoid style that constitutes a form of temporal governmentality. Temporality is especially pertinent to understanding what is ethically at stake in predictive policing as it is continuous with a historical racialized practice of organizing, managing, controlling, and stealing time. (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  29. A Survey on Idea Mining: Techniques and Application.Nicholaus J. Gati & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):1-4.
    Abstract: Idea mining is an interesting field in the area of information retrieval and it is increasingly becoming important asset for decision makers. Huge volumes of high quality data from various sources such as scanners, mobile phones, loyalty cards, the web, and social media platforms presents enormous opportunity for organization to achieve success in their businesses. It is possible to achieve this by properly analysing data to reveal feature patterns; hence decision makers can capitalize upon the resulting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Phenomenology of REM-sleep Dreaming: The Contributions of Personal and Perspectival Ownership, Subjective Temporality and Episodic Memory.Stan Klein - 2018 - Psychology of Consciousness: Theory, Research, and Practice 6:55-66.
    Although the dream narrative, of (bio)logical necessity, originates with the dreamer, s/he typically does not know this. For the dreamer, the dream world is the real world. In this article I argue that this nightly misattribution is best explained in terms of the concept of mental ownership (e.g., Albahari, 2006; Klein, 2015a; Lane, 2012). Specifically, the exogenous nature of the dream narrative is the result of an individual assuming perspectival, but not personal, ownership of content s/he authored (i.e., “The content (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. The temporal foundation of the principle of maximal entropy.Vasil Penchev - 2020 - Logic and Philosophy of Mathematics eJournal 12 (11):1-3.
    The principle of maximal entropy (further abbreviated as “MaxEnt”) can be founded on the formal mechanism, in which future transforms into past by the mediation of present. This allows of MaxEnt to be investigated by the theory of quantum information. MaxEnt can be considered as an inductive analog or generalization of “Occam’s razor”. It depends crucially on choice and thus on information just as all inductive methods of reasoning. The essence shared by Occam’s razor and MaxEnt is for the relevant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Depths of Temporal Desynchronization in Grief.Emily Hughes - 2022 - Psychopathology 55.
    Introduction: The experience of disconnection is common in first-person accounts of grief. One way in which this feeling of estrangement can manifest is through the splintering apart of the time of the mourner and the time of the world. Supplementing and extending Thomas Fuchs' influential idea of temporal desynchronization, my aim in this article is to give an account of the heterogeneous ways in which grief can disturb time. -/- Method: I organize these manifold experiences of temporal disruption (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Temporal activity patterns and foraging behavior by social wasps (Hymenoptera, Polistinae) on fruits of Mangifera indica L.(Anacardiaceae).Bruno Corrêa Barbosa, Mariana Frias Paschoalini & Fábio Prezoto - 2014 - Sociobiology 61 (2):239-242.
    This research was done in Juiz de Fora, Minas Gerais, Brazil on february 2012, with objective was to determine which species of social wasps visiting mango fruits, their behaviors displayed by them while foraging and verify which the species of wasps visitors offer risk of accidents to farmers. The studied area was monitored during February 2012, from 8:00 to 17:00. in a 144 hour effort, and the data collected included the time of activity, diversity, aggressiveness and the general behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34. Free Will, Temporal Asymmetry, and Computational Undecidability.Stuart T. Doyle - 2022 - Journal of Mind and Behavior 43 (4):305-321.
    One of the central criteria for free will is “Could I have done otherwise?” But because of a temporal asymmetry in human choice, the question makes no sense. The question is backward-looking, while human choices are forward-looking. At the time when any choice is actually made, there is as of yet no action to do otherwise. Expectation is the only thing to contradict (do other than). So the ability to do something not expected by the ultimate expecter, Laplace’s demon, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Contents, vehicles, and complex data analysis in neuroscience.Daniel C. Burnston - 2020 - Synthese 199 (1-2):1617-1639.
    The notion of representation in neuroscience has largely been predicated on localizing the components of computational processes that explain cognitive function. On this view, which I call “algorithmic homuncularism,” individual, spatially and temporally distinct parts of the brain serve as vehicles for distinct contents, and the causal relationships between them implement the transformations specified by an algorithm. This view has a widespread influence in philosophy and cognitive neuroscience, and has recently been ably articulated and defended by Shea. Still, I am (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Prospects and Challenges for Small-Scale Mining Entrepreneurs in South Africa.Zandisile Mkubukeli & Robertson K. Tengeh - 2016 - Journal of Entrepreneurship and Organization Management 5 (4):2-10.
    Small-scale mining entrepreneurs are confronted with a variety of challenges during both the start-up and growth phase of their businesses not only in South Africa, but all over the world. Therefore, losing prospects available to them. The aim of this paper was to explore prospects and challenges faced by small scale mining entrepreneurs in South Africa (SA). To attain this end, a qualitative research paradigm was instituted for both data collection and analysis. The findings of this study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Running into injury time: distance running and temporality.Jacquelyn Allen-Collinson - 2003 - Sociology of Sport Journal 20 (4):331-350.
    Despite a growing body of research on the sociology of time and, analogously, on the sociology of sport, to date there has been relatively little sports literature that takes time as the focus of the analysis. Given the centrality of time as a feature of most sports, this would seem a curious lacuna. The primary aims of this article are to contribute new perspectives on the subjective experience of sporting injury and to analyze some of the temporal dimensions of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. How Archaeological Evidence Bites Back: Strategies for Putting Old Data to Work in New Ways.Alison Wylie - 2017 - Science, Technology, and Human Values 42 (2):203-225.
    Archaeological data are shadowy in a number of senses. Not only are they notoriously fragmentary but the conceptual and technical scaffolding on which archaeologists rely to constitute these data as evidence can be as constraining as it is enabling. A recurrent theme in internal archaeological debate is that reliance on sedimented layers of interpretative scaffolding carries the risk that “preunderstandings” configure what archaeologists recognize and record as primary data, and how they interpret it as evidence. The selective (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  39. Contextualism, Subject‐Sensitive Invariantism, and the Interaction of ‘Knowledge’‐Ascriptions with Modal and Temporal Operators.Michael Blome-Tillmann - 2009 - Philosophy and Phenomenological Research 79 (2):315-331.
    Jason Stanley has argued recently that Epistemic Contextualism (EC) and Subject‐Sensitive Invariantism (SSI) are explanatorily on a par with regard to certain data arising from modal and temporal embeddings of ‘knowledge’‐ascriptions. This paper argues against Stanley that EC has a clear advantage over SSI in the discussed field and introduces a new type of linguistic datum strongly suggesting the falsity of SSI.
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  40. An event-without-witness: a Nietzschean theory of the digital will to power as the will to temporalize.Talha Can Issevenler - 2022 - The Agonist : A Nietzsche Circle Journal 16 (2):83-93.
    This article offers a Nietzschean theory of digital will to power to conceptualize the temporality of social media feeds run by algorithms. Stylistic and methodological temporalities of Nietzsche are discussed as well as their influence in subsequent social theory of political technologies. The paradox of heavy investment in both subjective expression and nonhuman temporalization in social media milieus is addressed with the concept of an event-without-witness drawn from Nietzsche’s account of himself as the solitary thinker of catastrophe of nihilism and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Violence in the prehistoric period of Japan: the spatio-temporal pattern of skeletal evidence for violence in the Jomon period.Hisashi Nakao, Kohei Tamura, Yui Arimatsu, Tomomi Nakagawa, Naoko Matsumoto & Takehiko Matsugi - 2016 - Biology Letters 1 (12):20160028.
    Whether man is predisposed to lethal violence, ranging from homicide to warfare, and how that may have impacted human evolution, are among the most controversial topics of debate on human evolution. Although recent studies on the evolution of warfare have been based on various archaeological and ethnographic data, they have reported mixed results: it is unclear whether or not warfare among prehistoric hunter – gatherers was common enough to be a component of human nature and a selective pressure for (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. On the application of formal principles to life science data: A case study in the Gene Ontology.Jacob Köhler, Anand Kumar & Barry Smith - 2004 - In Köhler Jacob, Kumar Anand & Smith Barry (eds.), Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics 2994). Springer. pp. 79-94.
    Formal principles governing best practices in classification and definition have for too long been neglected in the construction of biomedical ontologies, in ways which have important negative consequences for data integration and ontology alignment. We argue that the use of such principles in ontology construction can serve as a valuable tool in error-detection and also in supporting reliable manual curation. We argue also that such principles are a prerequisite for the successful application of advanced data integration techniques such (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  44. Beyond categorical definitions of life: a data-driven approach to assessing lifeness.Christophe Malaterre & Jean-François Chartier - 2019 - Synthese 198 (5):4543-4572.
    The concept of “life” certainly is of some use to distinguish birds and beavers from water and stones. This pragmatic usefulness has led to its construal as a categorical predicate that can sift out living entities from non-living ones depending on their possessing specific properties—reproduction, metabolism, evolvability etc. In this paper, we argue against this binary construal of life. Using text-mining methods across over 30,000 scientific articles, we defend instead a degrees-of-life view and show how these methods can contribute (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  45. A Sustainability Improvement Strategy of Interconnected Data Centers Based on Dispatching Potential of Electric Vehicle Charging Stations.Xihao Wang, Xiaojun Wang, Yuqing Liu, Chun Xiao, Rongsheng Zhao, Ye Yang & Zhao Liu - 2022 - Sustainability 14 (11):6814.
    With the rapid development of information technology, the electricity consumption of Internet Data Centers (IDCs) increases drastically, resulting in considerable carbon emissions that need to be reduced urgently. In addition to the introduction of Renewable Energy Sources (RES), the joint use of the spatial migration capacity of IDC workload and the temporal flexibility of the demand of Electric Vehicle Charging Stations (EVCSs) provides an important means to change the carbon footprint of the IDC. In this paper, a sustainability (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. PREDICTION OF EDUCATIONAL DATA USING DEEP CONVOLUTIONAL NEURAL NETWORK.K. Vijayalakshmi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):93-111.
    : One of the most active study fields in natural language processing, web mining, and text mining is sentiment analysis. Big data is an important research component in education that is used to advance the value of education by watching students' performance and understanding their learning habits. Real-time student feedback will enable teachers and students to understand teaching and learning challenges in the most user-friendly manner for students. By linking learning analytics to grounded theory, the proposed Deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  91
    Changes in Mental Health of Members of the Chinese Army (1990~2007): A Cross-Temporal Meta-Analysis.Xinfa Yi & Shushan Cai - 2017 - Journal of Human Cognition 1 (1):73-96.
    This study, by using 142 groups of data from 1990 to 2007 and the method of cross-temporal meta-analysis, researched the changing trend of status of mental health of 108736 members of the Chinese Army along with the change of years. All the data came from 94 related research reports, and all the research reports used SCL-90 (the Symptom Checklist 90) as the testing tool of mental health. The study found that: (1) mental health of members of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. A Review Paper on Scope of Big Data Analysis in Heath Informatics.Kazi Md Shahiduzzaman, Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (5):1-8.
    Abstract— The term Health Informatics represent a huge volume of data that is collected from different source of health sector. Because of its’ diversity in nature, quite a big number of attributes, numerous amount data, health informatics can be considered as Big Data. Therefore, different techniques used for analyzing Big Data will also fit for Health Informatics. In recent years, implementation of Data Mining on Health Informatics brings a lot of fruitful outcomes that improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Correction to: ‘Violence in the prehistoric period of Japan: the spatio-temporal pattern of skeletal evidence for violence in the Jomon period’.Nakao Hisashi, Kohei Tamura, Yui Arimatsu, Tomomi Nakagawa, Naoko Matsumoto & Takehiko Matsugi - 2016 - Biology Letters 2016:20160847.
    Whether man is predisposed to lethal violence, ranging from homicide to warfare, and how that may have impacted human evolution, are among the most controversial topics of debate on human evolution. Although recent studies on the evolution of warfare have been based on various archaeological and ethnographic data, they have reported mixed results: it is unclear whether or notwarfare among prehistoric hunter–gathererswas common enough to be a component of human nature and a selective pressure for the evolution of human (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  52
    Questões Epistemológicas em Mineração de Dados Educacionais.Esdras L. Bispo Jr - 2019 - Brazilian Symposium on Computers in Education.
    Educational Data Mining (EDM) shows interesting scientific results lately. However, little has been discussed about philosophical questions regarding the type of knowledge produced in this area. This paper aims to present two epistemological issues in EDM: (i) a question of ontological nature about the content of the knowledge obtained; and (ii) a question of deontological nature, about the guidelines and principles adopted by the researcher in education, to the detriment of the results of his own research. In the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000