Results for 'Data Preservation'

967 found
Order:
  1. Research Data Preservation Practices of Library and Information Science Faculties.A. Subaveerapandiyan & Anuradha Maurya - 2022 - Defence Journal of Library and Information Science Technology 42 (4):259-264.
    Digitisation of research data is widely increasing all around the world because it needs more and development of enormous digital technologies. Data curation services are starting to offer many libraries. Research data curation is the collective invaluable and reusable information of the researchers. Collected data preservation is more important. The majority of the higher education institutes preserved the research data for their students and researchers. It is stored for a long time using various formats. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. A Framework Proposal for Developing Historical Video Games Based on Player Review Data Mining to Support Historic Preservation.Sarvin Eshaghi, Sepehr Vaez Afshar & Mahyar Hadighi - 2023 - In Saif Haq, Adil Sharag-Eldin & Sepideh Niknia (eds.), ARCC 2023 CONFERENCE PROCEEDING: The Research Design Interface. Architectural Research Centers Consortium, Inc.. pp. 297-305.
    Historic preservation, which is a vital act for conveying people’s understanding of the past, such as events, ideas, and places to the future, allows people to preserve history for future generations. Additionally, since the historic properties are currently concentrated in urban areas, an urban-oriented approach will contribute to the issue. Hence, public awareness is a key factor that paves the way for this conservation. Public history, a history with a public audience and special methods of representation, can serve society (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Preserving Electronically Encoded Evidence.E. Davis Robert - 2009 - ISACA Journal 1:1-2.
    Seeking to preserve electronically encoded evidence implies that an incident or event has occurred requiring fact extrapolation for presentation, as proof of an irregularity or illegal act. Whether target data are in transit or at rest, it is critical that measures be in place to prevent the sought information from being destroyed, corrupted or becoming unavailable for forensic investigation.
    Download  
     
    Export citation  
     
    Bookmark  
  4. PRESERVING LOCAL WISDOM: CULTURAL STRATEGIES OF BUGINESE-PAGATAN ETHNIC GROUP LIVING IN A 1 3 MULTICULTURAL SOCIETY.Andi Kaharuddin - 2020 - Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17 (6):10038-10053.
    This study aims to describe the cultural strategy of the Buginese people of Pagatan (one of ethnic group in Indonesia) in preserving their local wisdom living in a multicultural society. This research was conducted using qualitative descriptive method through three methods of data collection i.e. in-depth interview, observation and literature involving community leaders and ordinary people as informants. The historical-interpretative method was used to analyze the Data. The findings from this study indicate that the people of Buginese-Pagatan use (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Surviving global risks through the preservation of humanity's data on the Moon.Alexey Turchin & D. Denkenberger - 2018 - Acta Astronautica:in press.
    Many global catastrophic risks are threatening human civilization, and a number of ideas have been suggested for preventing or surviving them. However, if these interventions fail, society could preserve information about the human race and human DNA samples in the hopes that the next civilization on Earth will be able to reconstruct Homo sapiens and our culture. This requires information preservation of an order of magnitude of 100 million years, a little-explored topic thus far. It is important that a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Preserving Absolute Simultaneity with the Lorentz Transformation.Attilio Colombo - manuscript
    In this work it is shown how absolute simultaneity of spatially distinct events can be established by means of a general criterion based on isotropically propagating signals and how it can be consistently preserved also when operating with Lorentz-like coordinate transformations between moving frames. The specific invariance properties of these transformations of coordinates are discussed, leading to a different interpretation of the physical meaning of the transformed variables with respect to their prevailing interpretation when associated with the Lorentz transformation. On (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Integration of Intelligence Data through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith (eds.), Integration of Intelligence Data through Semantic Enhancement. CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum of (...) sources, types, models, and modalities (including text, images, audio, and signals). The result of applying this strategy to a given body of data is an evolving Dataspace that allows the application of a variety of integration and analytic processes to diverse data contents. We conceive semantic enhancement (SE) as a lightweight and flexible process that leverages the richness of the structured contents of the Dataspace without adding storage and processing burdens to what, in the intelligence domain, will be an already storage- and processing-heavy starting point. SE works not by changing the data to which it is applied, but rather by adding an extra semantic layer to this data. We sketch how the semantic enhancement approach can be applied consistently and in cumulative fashion to new data and data-models that enter the Dataspace. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  8.  46
    Preserving our humanity in the growing AI-mediated politics: Unraveling the concepts of Democracy (民主) and People as the Roots of the state (民本).Manh-Tung Ho & My-Van Luong - manuscript
    Artificial intelligence (AI) has transformed the way people engage with politics around the world: how citizens consume news, how they view the institutions and norms, how civic groups mobilize public interests, how data-driven campaigns are shaping elections, and so on (Ho & Vuong, 2024). Placing people at the center of the increasingly AI-mediated political landscape has become an urgent matter that transcends all forms of institutions. In this essay, we argue that, in this era, it is necessary to look (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Chapter 10: Preserving Authenticity in Virtual Heritage, Virtual Heritage: A Guide.Erik M. Champion - 2021 - In Erik Malcolm Champion (ed.), Virtual Heritage: A Guide. London:
    Virtual heritage has been explained as virtual reality applied to cultural heritage, but this definition only scratches the surface of the fascinating applications, tools and challenges of this fast-changing interdisciplinary field. This book provides an accessible but concise edited coverage of the main topics, tools and issues in virtual heritage. -/- Leading international scholars have provided chapters to explain current issues in accuracy and precision; challenges in adopting advanced animation techniques; shows how archaeological learning can be developed in Minecraft; they (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Towards More-than-Human Heritage: Arboreal Habitats as a Challenge for Heritage Preservation.Stanislav Roudavski & Julian Rutten - 2020 - Built Heritage 4 (4):1-17.
    Trees belong to humanity’s heritage, but they are more than that. Their loss, through catastrophic fires or under business-as-usual, is devastating to many forms of life. Moved by this fact, we begin with an assertion that heritage can have an active role in the design of future places. Written from within the field of architecture, this article focuses on structures that house life. Habitat features of trees and artificial replacement habitats for arboreal wildlife serve as concrete examples. Designs of such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  33
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  82
    Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against viable challenges, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  16. Enviromental genotoxicity evaluation: Bayesian approach for a mixture statistical model.Julio Michael Stern, Angela Maria de Souza Bueno, Carlos Alberto de Braganca Pereira & Maria Nazareth Rabello-Gay - 2002 - Stochastic Environmental Research and Risk Assessment 16:267–278.
    The data analyzed in this paper are part of the results described in Bueno et al. (2000). Three cytogenetics endpoints were analyzed in three populations of a species of wild rodent – Akodon montensis – living in an industrial, an agricultural, and a preservation area at the Itajaí Valley, State of Santa Catarina, Brazil. The polychromatic/normochromatic ratio, the mitotic index, and the frequency of micronucleated polychromatic erythrocites were used in an attempt to establish a genotoxic profile of each (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. A Formal Epistemological Defence of Direct Realism: Rebutting the Colour Delusion Argument.Wilfrid Wulf - forthcoming - Oxford Studies in Epistemology.
    I defend J. L. Austin's direct realism against the colour delusion argument by employing epistemic logic to demonstrate that perceiving colours does not necessitate an intermediary such as sense-data, thus preserving the directness of perception.
    Download  
     
    Export citation  
     
    Bookmark  
  18.  50
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for predictive search (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  47
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. An empirically feasible approach to the epistemology of arithmetic.Markus Pantsar - 2014 - Synthese 191 (17):4201-4229.
    Recent years have seen an explosion of empirical data concerning arithmetical cognition. In this paper that data is taken to be philosophically important and an outline for an empirically feasible epistemological theory of arithmetic is presented. The epistemological theory is based on the empirically well-supported hypothesis that our arithmetical ability is built on a protoarithmetical ability to categorize observations in terms of quantities that we have already as infants and share with many nonhuman animals. It is argued here (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  22. The Delude.Yoji K. Gondor (ed.) - 2013 - Sintesi Point Publishing.
    The amount of data to which a human is exposed has increased over time. The Delude is defined here as an individual that is overwhelmed by various incoherent and false assertions that data contains. This writing is a philosophical study that reflects on the epistemic conditions in which knowledge is accumulated. It is obvious that large amounts of falsehood, when regarded as truth, can induce heavy damage to anyone's intellect. -/- Frequently, a faulty mental state is induced by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Semantics in Support of Biodiversity: An Introduction to the Biological Collections Ontology and Related Ontologies.Ramona L. Walls, John Deck, Robert Guralnik, Steve Baskauf, Reed Beaman, Stanley Blum, Shawn Bowers, Pier Luigi Buttigieg, Neil Davies, Dag Endresen, Maria Alejandra Gandolfo, Robert Hanner, Alyssa Janning, Barry Smith & Others - 2014 - PLoS ONE 9 (3):1-13.
    The study of biodiversity spans many disciplines and includes data pertaining to species distributions and abundances, genetic sequences, trait measurements, and ecological niches, complemented by information on collection and measurement protocols. A review of the current landscape of metadata standards and ontologies in biodiversity science suggests that existing standards such as the Darwin Core terminology are inadequate for describing biodiversity data in a semantically meaningful and computationally useful way. Existing ontologies, such as the Gene Ontology and others in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  24. One's Modus Ponens: Modality, Coherence and Logic.Una Stojnić - 2017 - Philosophy and Phenomenological Research 95 (1):167-214.
    Recently, there has been a shift away from traditional truth-conditional accounts of meaning towards non-truth-conditional ones, e.g., expressivism, relativism and certain forms of dynamic semantics. Fueling this trend is some puzzling behavior of modal discourse. One particularly surprising manifestation of such behavior is the alleged failure of some of the most entrenched classical rules of inference; viz., modus ponens and modus tollens. These revisionary, non-truth-conditional accounts tout these failures, and the alleged tension between the behavior of modal vocabulary and classical (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  25. Disciplinary capture and epistemological obstacles to interdisciplinary research: Lessons from central African conservation disputes.Evelyn Brister - 2016 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 56:82-91.
    Complex environmental problems require well-researched policies that integrate knowledge from both the natural and social sciences. Epistemic differences can impede interdisciplinary collaboration, as shown by debates between conservation biologists and anthropologists who are working to preserve biological diversity and support economic development in central Africa. Disciplinary differences with regard to 1) facts, 2) rigor, 3) causal explanation, and 4) research goals reinforce each other, such that early decisions about how to define concepts or which methods to adopt may tilt research (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  26. Conscious vision guides motor action—rarely.Benjamin Kozuch - 2023 - Philosophical Psychology 36 (3):443-476.
    According to Milner and Goodale’s dual visual systems (DVS) theory, a division obtains between visual consciousness and motor action, in that the visual system producing conscious vision (the ventral stream) is distinct from the one guiding action (the dorsal stream). That there would be this division is often taken (by Andy Clark and others) to undermine the folk view on how consciousness and action relate. However, even if this division obtains, this leaves open the possibility that con- scious ventral information (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. Imperative Inference and Practical Rationality.Daniel W. Harris - 2021 - Philosophical Studies (4):1065-1090.
    Some arguments include imperative clauses. For example: ‘Buy me a drink; you can’t buy me that drink unless you go to the bar; so, go to the bar!’ How should we build a logic that predicts which of these arguments are good? Because imperatives aren’t truth apt and so don’t stand in relations of truth preservation, this technical question gives rise to a foundational one: What would be the subject matter of this logic? I argue that declaratives are used (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. ‘‘Describing our whole experience’’: The statistical philosophies of W. F. R. Weldon and Karl Pearson.Charles H. Pence - 2011 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 42 (4):475-485.
    There are two motivations commonly ascribed to historical actors for taking up statistics: to reduce complicated data to a mean value (e.g., Quetelet), and to take account of diversity (e.g., Galton). Different motivations will, it is assumed, lead to different methodological decisions in the practice of the statistical sciences. Karl Pearson and W. F. R. Weldon are generally seen as following directly in Galton’s footsteps. I argue for two related theses in light of this standard interpretation, based on a (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  29. Gods of Transhumanism.Alex V. Halapsis - 2019 - Anthropological Measurements of Philosophical Research 16:78-90.
    Purpose of the article is to identify the religious factor in the teaching of transhumanism, to determine its role in the ideology of this flow of thought and to identify the possible limits of technology interference in human nature. Theoretical basis. The methodological basis of the article is the idea of transhumanism. Originality. In the foreseeable future, robots will be able to pass the Turing test, become “electronic personalities” and gain political rights, although the question of the possibility of machine (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Without a Trace: Why did Corona Apps Fail?Lucie White & Philippe van Basshuysen - 2021 - Journal of Medical Ethics 47 (12):1-4.
    At the beginning of the COVID-19 pandemic, high hopes were put on digital contact tracing, using mobile phone apps to record and immediately notify contacts when a user reports as infected. Such apps can now be downloaded in many countries, but as second waves of COVID-19 are raging, these apps are playing a less important role than anticipated. We argue that this is because most countries have opted for app configurations that cannot provide a means of rapidly informing users of (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  31. The Impact of Obstacles to the Application of Knowledge Management to Performance Excellence.Samer M. Arqawi, Amal A. Al Hila, Samy S. Abu-Naser & Mazen J. Al Shobaki - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (10):32-50.
    The aim of this study was to identify the obstacles facing the application of knowledge management and its impact on performance at Palestine Technical University-Kadoorei from the point of view of employees and to detect the differences between the average views of the study sample on the subject of the study according to some variables such as (gender, nature of work, Education Level, specialization, years of experience). The study followed the descriptive analytical method and the questionnaire as a tool for (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32. Modals, Contextual Parameters, and the Modal Uniformity Hypothesis.Daniel Skibra - manuscript
    There is a common assumption in the semantics of modal auxiliaries in natural language; in utterances of MOD φ , where MOD is a modal and φ is the prejacent, context determines the particular flavor of modality expressed by the modal. Such is the standard contextualist semantics of Kratzer and related proposals. This winds up being a problem, because there is a significant class of modals which have constraints on the admissible modal flavor that are not traceable to context. For (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The prolegomens to theory of human stable evolutionarciety at age of controlled evolution techny strategy as ideology of risk soologies.V. T. Cheshko - 2016 - In Teodor N. Țîrdea (ed.), // Strategia supravietuirii din perspectiva bioeticii, filosofiei și medicinei. Culegere de articole științifice. Vol. 22–. pp. 134-139.
    Stable adaptive strategy of Homo sapiens (SESH) is a superposition of three different adaptive data arrays: biological, socio-cultural and technological modules, based on three independent processes of generation and replication of an adaptive information – genetic, socio-cultural and symbolic transmissions (inheritance). Third component SESH focused equally to the adaptive transformation of the environment and carrier of SESH. With the advent of High Hume technology, risk has reached the existential significance level. The existential level of technical risk is, by definition, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. A problem for Wegner and colleagues' model of the sense of agency.Glenn Carruthers - 2010 - Phenomenology and the Cognitive Sciences 9 (3):341-357.
    The sense of agency, that is the sense that one is the agent of one’s bodily actions, is one component of our self-consciousness. Recently, Wegner and colleagues have developed a model of the causal history of this sense. Their model takes it that the sense of agency is elicited for an action when one infers that one or other of one’s mental states caused that action. In their terms, the sense of agency is elicited by the inference to apparent mental (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  35. (1 other version)Peirce: Underdetermination, agnosticism, and related mistakes.P. D. Magnus - 2005 - Inquiry: An Interdisciplinary Journal of Philosophy 48 (1):26 – 37.
    There are two ways that we might respond to the underdetermination of theory by data. One response, which we can call the agnostic response, is to suspend judgment: "Where scientific standards cannot guide us, we should believe nothing". Another response, which we can call the fideist response, is to believe whatever we would like to believe: "If science cannot speak to the question, then we may believe anything without science ever contradicting us". C.S. Peirce recognized these options and suggested (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  36. A Puzzle About Disagreement and Rationality.Jonathan Matheson - 2014 - Social Epistemology Review and Reply Collective 3 (4):1-3.
    According to Conciliationism, rationality calls for a removal of dissenting opinions – in the end, the disagreement should lead to skepticism toward the disputed proposition for all the involved parties. However, psychological data regarding group inquiry indicates that groups with dissenting members are more successful in their inquiry with respect to the disputed propositions. So, according to the psychological data, rationality calls for preserving dissent – disagreement should be embraced as a great tool for getting at true beliefs. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  37. John Buridan on the Eucharist. With a Translation of his Questions on Aristotle's 'Metaphysics' 4.6.Boaz Faraday Schuman - 2023 - In Gyula Klima (ed.), The Metaphysics and Theology of the Eucharist: A Historical-Analytical Survey of the Problems of the Sacrament. Springer Verlag. pp. 297–319.
    It may come as a surprise to readers familiar with the life and work of the Arts Master that he discusses the Eucharist at all. As he likes to remind us, theological topics are generally out of his wheelhouse. Even so, in his Questions on the “Metaphysics” of Aristotle (QM) 4.6, Buridan takes the sacrament of the Eucharist as a key data point in his discussion of Aristotle’s Categories. In the Eucharist, the accidents of the bread and wine—their color, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Meaning shift and the purity of 'I'.Edison Barrios - 2013 - Philosophical Studies 164 (1):263-288.
    In this paper I defend the “Standard View” of the semantics of ‘I’—according to which ‘I’ is a pure, automatic indexical—from a challenge posed by “deferred reference” cases, in which occurrences of ‘I’ are (allegedly) not speaker-referential, and thus non-automatic. In reply, I offer an alternative account of the cases in question, which I call the “Description Analysis” (DA). According to DA, seemingly deferred-referential occurrences of the first person pronoun are interpreted as constituents of a definite description, whose operator scopes (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39.  84
    Emerging technologies in urban design pedagogy: augmented reality applications.Asma Mehan & Sina Mostafavi - 2024 - Architectural Intelligence 3 (1):1-14.
    In the contemporary era of urban design, the advent of big data and digital technologies has ushered in innovative approaches to exploring urban spaces. This study focuses on the application of Augmented Reality (AR) and Extended Reality (XR) technologies in the metropolitan areas of Houston and Amsterdam. These technologies create immersive 'Phygital Installations' that blend physical and digital elements, effectively capturing people's perceptions and enhancing urban design proposals. By fostering human-centered planning, AR and XR technologies make urban design more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Critique and Refinement of the Wakefieldian Concept of Disorder: An Improvement of the Harmful Dysfunction Analysis.Emmanuel Smith - 2022 - Journal of Medicine and Philosophy 47 (4):530-539.
    One way in which bioethicists can benefit the medical community is by clarifying the concept of disorder. Since insurance companies refer to the DSM for whether a patient should receive assistance, one must consider the consequences of one’s concept of disorder for who should be provided with care. I offer a refinement of Jerome Wakefield’s hybrid concept of disorder, the harmful dysfunction analysis. I criticize both the factual component and the value component of Wakefield’s account and suggest how they might (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Switching Partners: Dancing with the Ontological Engineers.Werner Ceusters & Barry Smith - 2011 - In Switching Codes. Thinking through Digital Technology in the Humanities and the Arts. University of Chicago Press. pp. 103--124.
    Ontologies are today being applied in almost every field to support the alignment and retrieval of data of distributed provenance. Here we focus on new ontological work on dance and on related cultural phenomena belonging to what UNESCO calls the “intangible heritage.” Currently data and information about dance, including video data, are stored in an uncontrolled variety of ad hoc ways. This serves not only to prevent retrieval, comparison and analysis of the data, but may also (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Ambiguity Tests, Polysemy, and Copredication.David Liebesman & Ofra Magidor - 2024 - Australasian Journal of Philosophy 102 (3):551-560.
    A family of familiar linguistic tests purport to help identify when a term is ambiguous. These tests are philosophically important: a familiar philosophical strategy is to claim that some phenomenon is disunified and its accompanying term is ambiguous. The tests have been used to evaluate disunification proposals about causation, pain, and knowledge, among others. -/- These ambiguity tests, however, have come under fire. It has been alleged that the tests fail for polysemy, a common type of ambiguity, and one that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Perishable Traces: Reconstructing the History of Iranian Women Architects.Asma Mehan - 2024 - In Eva María Alvarez Isidro (ed.), ICAG 2023 - VI International Conference on Architecture and Gender. Valencia, Spain: Editorial Universitat Politècnica de València. pp. 522-530.
    In this paper, I seek to address the underrepresentation of Iranian women architects in historical narratives, exploring the perishable traces of their work and contributions to the field of architecture. Inspired by Carla Lonzi's call for women to consider their narrative incomplete and the International Archive of Women in Architecture (IAWA), I delve into the unique challenges Iranian women architects face and their impact on architectural history. I examine the historiographical review of Iranian women architects, their work, and their contributions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Anthropomorphism and anthropectomy as friendly competitors.Aliya R. Dewey - 2017 - Philosophical Psychology 30 (7):970-991.
    Principles help comparative psychologists select from among multiple hypotheses that account for the data. Anthropomorphic principles select hypotheses that have the most human–animal similarities while anthropectic principles select hypotheses that have the most human–animal differences. I argue that there is no way for the comparative psychologist on their own to justify their selection of one principle over the other. However, the comparative psychologist can justify their selection of one principle over the other in virtue of being members of comparative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of data and this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Sleep and Brain Plasticity.Pierre Maquet, Carlyle Smith & Robert Stickgold (eds.) - 2003 - Oxford University Press UK.
    Sleep has long been a topic of fascination for artists and scientists. Why do we sleep? What function does sleep serve? Why do we dream? What significance can we attach to our dreams? We spend so much of our lives sleeping, yet its precise function is unclear, in spite of our increasing understanding of the processes generating and maintaining sleep. We now know that sleep can be accompanied by periods of intense cerebral activity, yet only recently has experimental data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. History of the NeoClassical Interpretation of Quantum and Relativistic Physics.Shiva Meucci - 2018 - Cosmos and History 14 (2):157-177.
    The need for revolution in modern physics is a well known and often broached subject, however, the precision and success of current models narrows the possible changes to such a great degree that there appears to be no major change possible. We provide herein, the first step toward a possible solution to this paradox via reinterpretation of the conceptual-theoretical framework while still preserving the modern art and tools in an unaltered form. This redivision of concepts and redistribution of the (...) can revolutionize expectations of new experimental outcomes. This major change within finely tuned constraints is made possible by the fact that numerous mathematically equivalent theories were direct precursors to, and contemporaneous with, the modern interpretations. In this first of a series of papers, historical investigation of the conceptual lineage of modern theory reveals points of exacting overlap in physical theories which, while now considered cross discipline, originally split from a common source and can be reintegrated as a singular science again. This revival of an an older associative hierarchy, combined with modern insights, can open new avenues for investigation. This reintegration cross-disciplinary theories and tools is defined as the “Neoclassical Interpretation.” . (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Cultural Mapping of Traditional Healers in a Local Community.June Rex Bombales - 2024 - Psychology and Education: A Multidisciplinary Journal 17 (8):807-821.
    Despite centuries of colonization in the Philippines, the traditional Filipino healing system has survived. However, as modern education has continued to spread and Western medicine has grown in influence, traditional healing practices have been pushed to the margins and labeled as unscientific or mere superstition. This also suggests that unrecorded information may be lost forever. For future generations to appreciate this rich cultural heritage, cultural mapping of traditional healers in a local community is necessary. Thus, the researcher explored, identified, documented, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Pierre Nora's Concept of Contrasting Memory and History.Hanna Nosova - 2021 - International Journal of Philosophy 9 (4):216.
    The article is based on an analysis of the works of the French historian Pierre Nora, who, trying to find a "true" history, comes to the opposition of history and memory. Outright political agitation and national imperatives are dominated in History, therefore history cannot be correct and objective. Instead of history, the philosopher believes, we should focus on the right memory. But when memory itself has been torn apart, it can only exist on the basis of "memory places" - mnemonic (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 967