Results for 'Node'

127 found
Order:
  1. Nodes and Arcs: Concept Map, Semiotics, and Knowledge Organization.Alon Friedman & R. P. Smiraglia - 2013 - Journal of Documentation 1 (69):27-48.
    Purpose – The purpose of the research reported here is to improve comprehension of the socially-negotiated identity of concepts in the domain of knowledge organization. Because knowledge organization as a domain has as its focus the order of concepts, both from a theoretical perspective and from an applied perspective, it is important to understand how the domain itself understands the meaning of a concept. Design/methodology/approach – The paper provides an empirical demonstration of how the domain itself understands the meaning of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Natural kinds as nodes in causal networks.Muhammad Ali Khalidi - 2018 - Synthese 195 (4):1379-1396.
    In this paper I offer a unified causal account of natural kinds. Using as a starting point the widely held view that natural kind terms or predicates are projectible, I argue that the ontological bases of their projectibility are the causal properties and relations associated with the natural kinds themselves. Natural kinds are not just concatenations of properties but ordered hierarchies of properties, whose instances are related to one another as causes and effects in recurrent causal processes. The resulting account (...)
    Download  
     
    Export citation  
     
    Bookmark   50 citations  
  3. Line Theory: Effect, Node, and Line in Space.Temesgen Degu - manuscript
    This paper introduces a conceptual framework, denoted as ‘Line Theory,’ which is predicated on the procedural anatomy inherent in ordinary plans. A plan, recognized as a set of instructions for execution, undergoes in-depth scrutiny to analyze its constituent elements. The concise examination delves into the formation of line and effect within real space stemming from procedures. Line theory serves the purpose of elucidating the absolute optimization of plans. It is formulated to inaugurate an exploration into the veracity of procedures and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. The Global Brain Argument: Nodes, Computroniums and the AI Megasystem (Target Paper for Special Issue).Susan Schneider - forthcoming - Disputatio.
    The Global Brain Argument contends that many of us are, or will be, part of a global brain network that includes both biological and artificial intelligences (AIs), such as generative AIs with increasing levels of sophistication. Today’s internet ecosystem is but a hodgepodge of fairly unintegrated programs, but it is evolving by the minute. Over time, technological improvements will facilitate smarter AIs and faster, higher-bandwidth information transfer and greater integration between devices in the internet-of-things. The Global Brain (GB) Argument says (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. DESIGN AND IMPLEMENTATION OF SENSOR NODE FOR WIRELESS SENSORS NETWORK TO MONITOR HUMIDITY OF HIGH-TECH POLYHOUSE ENVIRONMENT.B. P. Ladgaonkar - 2011 - International Journal of Advances in Engineering and Technology 1 (3):1-11.
    Wireless Sensors Network is a novel field shows tremendous application potential. To monitor the environmental parameters of high-tech polyhouse the Wireless Sensors Network (WSN) is developed. The heart of this ubiquitous field is the Wireless Sensor Node. Moreover, the field of microcontroller based embedded technology is innovative and more reliable. Therefore, based on an embedded technology and the RF module Zigbee a wireless senor node is designed about highly promising AVR ATmega8L microcontroller and implemented for WSN development. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Promoción municipal para el desarrollo local y territorial de nodos microrregionales en la provincia de Buenos Aires.Federico Del Giorgio Solfa & Luciana Mercedes Girotto - 2015 - Cardinalis 3 (5):116-131.
    This paper attempts to open the debate on the idea of local and territorial development of microregional nodes in the Province of Buenos Aires. Under this approach, a model that proposes the creation of Municipal Development Forum, with the participation of local actors, generate local development program is proposed. The proposal is formulated for territories over 5,000 and below 30,000 inhabitants. This criterion is based on the applicability of the proposed model to municipalities with potential for territorial development, large and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The world as a graph: defending metaphysical graphical structuralism.Nicholas Shackel - 2011 - Analysis 71 (1):10-21.
    Metaphysical graphical structuralism is the view that at some fundamental level the world is a mathematical graph of nodes and edges. Randall Dipert has advanced a graphical structuralist theory of fundamental particulars and Alexander Bird has advanced a graphical structuralist theory of fundamental properties. David Oderberg has posed a powerful challenge to graphical structuralism: that it entails the absurd inexistence of the world or the absurd cessation of all change. In this paper I defend graphical structuralism. A sharper formulation, some (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  8.  87
    Real-Time Procurement Data Portal: A Well as Vender Payment Data Portal.Lakkam Nikhith - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-16.
    In the contemporary landscape of public procurement, organizations face increasing complexities in managing procurement and vendor payment processes. This project focuses on developing a real-time procurement and vendor payment management system for North Eastern Electric Power Corporation Limited (NEEPCO), leveraging modern web technologies, including React, Node.js, Express, and SQL. The proposed system aims to centralize and automate the procurement lifecycle, enhancing operational efficiency, transparency, and compliance with government regulations. By integrating with the Government e-Marketplace (GeM), the system facilitates seamless (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The biosemiosis of prescriptive information.David L. Abel - 2009 - Semiotica 2009 (174):1-19.
    Exactly how do the sign/symbol/token systems of endo- and exo-biosemiosis differ from those of cognitive semiosis? Do the biological messages that integrate metabolism have conceptual meaning? Semantic information has two subsets: Descriptive and Prescriptive. Prescriptive information instructs or directly produces nontrivial function. In cognitive semiosis, prescriptive information requires anticipation and “choice with intent” at bona fide decision nodes. Prescriptive information either tells us what choices to make, or it is a recordation of wise choices already made. Symbol systems allow recordation (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Across-the-board binding meets verb second.Anna Szabolcsi - 1989 - In M. Nespor & J. Mascaro, Grammar in progress. Foris.
    Right-node raising of anaphors and bound pronouns out of coordinations, as in "Every student likes, and every professor hates, himself / his neighbors" is judged more acceptable in German and Dutch than in English. Using combinatory categorial grammar, this paper ties the cross-linguistic difference to the fact that German and Dutch are V-2 languages, and V-2 necessitates a lifted category for verbs that automatically caters to the right-node raised duplicator. The same lifted category is optionally available in English, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice command (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  55
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel capacity of main (...)
    Download  
     
    Export citation  
     
    Bookmark   62 citations  
  13. Vulnerability in Social Epistemic Networks.Emily Sullivan, Max Sondag, Ignaz Rutter, Wouter Meulemans, Scott Cunningham, Bettina Speckmann & Mark Alfano - 2020 - International Journal of Philosophical Studies 28 (5):1-23.
    Social epistemologists should be well-equipped to explain and evaluate the growing vulnerabilities associated with filter bubbles, echo chambers, and group polarization in social media. However, almost all social epistemology has been built for social contexts that involve merely a speaker-hearer dyad. Filter bubbles, echo chambers, and group polarization all presuppose much larger and more complex network structures. In this paper, we lay the groundwork for a properly social epistemology that gives the role and structure of networks their due. In particular, (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  14. Going to Bed White and Waking Up Arab: On Xenophobia, Affect Theories of Laughter, and the Social Contagion of the Comic Stage.Cynthia Willett - 2014 - Critical Philosophy of Race 2 (1):84-105.
    Like lynching and other mass hysterias, xenophobia exemplifies a contagious, collective wave of energy and hedonic quality that can point toward a troubling unpredictability at the core of political and social systems. While earlier studies of mass hysteria and popular discourse assume that cooler heads (aka rational individuals with their logic) could and should regain control over those emotions that are deemed irrational, and that boundaries are assumed healthy only when intact, affect studies pose individuals as nodes of biosocial networks (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Models and minds.Stuart C. Shapiro & William J. Rapaport - 1991 - In Robert C. Cummins, Philosophy and AI: Essays at the Interface. Cambridge: MIT Press. pp. 215--259.
    Cognitive agents, whether human or computer, that engage in natural-language discourse and that have beliefs about the beliefs of other cognitive agents must be able to represent objects the way they believe them to be and the way they believe others believe them to be. They must be able to represent other cognitive agents both as objects of beliefs and as agents of beliefs. They must be able to represent their own beliefs, and they must be able to represent beliefs (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  16. A graph-theoretic account of logics.A. Sernadas, C. Sernadas, J. Rasga & Marcelo E. Coniglio - 2009 - Journal of Logic and Computation 19 (6):1281-1320.
    A graph-theoretic account of logics is explored based on the general notion of m-graph (that is, a graph where each edge can have a finite sequence of nodes as source). Signatures, interpretation structures and deduction systems are seen as m-graphs. After defining a category freely generated by a m-graph, formulas and expressions in general can be seen as morphisms. Moreover, derivations involving rule instantiation are also morphisms. Soundness and completeness theorems are proved. As a consequence of the generality of the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. An Essay on Material Necessity.Barry Smith - 1992 - Canadian Journal of Philosophy (sup1):301-322.
    Where Humeans rule out the possibility of material or non-logical necessity, and thus of any associated knowledge a priori, the German legal philosopher Adolf Reinach defends the existence of a wide class of material necessities falling within the domain of what can be known a priori, for example in fields such as color and shape, rational psychology, law and economics. Categories such as promise or claim or obligation are, in Reinach’s view, exist as nodes in a system of necessary relations, (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  18. (1 other version)Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions.Luciano Floridi - 2016 - Philosophical Transactions of the Royal Society A 374:20160112.
    The concept of distributed moral responsibility (DMR) has a long history. When it is understood as being entirely reducible to the sum of (some) human, individual and already morally loaded actions, then the allocation of DMR, and hence of praise and reward or blame and punishment, may be pragmatically difficult, but not conceptually problematic. However, in distributed environments, it is increasingly possible that a network of agents, some human, some artificial (e.g. a program) and some hybrid (e.g. a group of (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  19. 160 Years of Borders Evolution in Dunkirk: Petroleum, Permeability, and Porosity.Stephan Hauser, Penglin Zhu & Asma Mehan - 2021 - Urban Planning 6 (3):58-68.
    Since the 1860s, petroleum companies, through their influence on local governments, port authorities, international actors and the general public gradually became more dominant in shaping the urban form of ports and cities. Under their development and pressure, the relationships between industrial and urban areas in port cities hosting oil facilities evolved in time. The borders limiting industrial and housing territories have continuously changed with industrial places moving progressively away from urban areas. Such a changing dynamic influenced the permeability of these (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  20. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  21. Adapting the Environment instead of Oneself.David Kirsh - 1996 - Adaptive Behavior 4 (3-4):415-452.
    This paper examines some of the methods animals and humans have of adapting their environment. Because there are limits on how many different tasks a creature can be designed to do well in, creatures with the capacity to redesign their environments have an adaptive advantage over those who can only passively adapt to existing environmental structures. To clarify environmental redesign I rely on the formal notion of a task environment as a directed graph where the nodes are states and the (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  22. A Proposal for a Bohmian Ontology of Quantum Gravity.Antonio Vassallo & Michael Esfeld - 2013 - Foundations of Physics (1):1-18.
    The paper shows how the Bohmian approach to quantum physics can be applied to develop a clear and coherent ontology of non-perturbative quantum gravity. We suggest retaining discrete objects as the primitive ontology also when it comes to a quantum theory of space-time and therefore focus on loop quantum gravity. We conceive atoms of space, represented in terms of nodes linked by edges in a graph, as the primitive ontology of the theory and show how a non-local law in which (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  23. Stable adaptive strategy of Homo sapiens. Biopolitical alternatives. God problem. (in Russian).Valentin Cheshko (ed.) - 2012 - publ.house "INGEK".
    Mechanisms to ensure the integrity of the system stable evolutionary strategy Homo sapiens – genetic and cultural coevolution techno-cultural balance – are analyzed. оe main content of the study can be summarized in the following the- ses: stable adaptive strategy of Homo sapiens includes superposition of three basic types (biological, cultural and technological) of adaptations, the integrity of the system provides by two coevolutionary ligament its elements – the genetic-cultural coevolution and techno-cultural balance, the system takes as result of by (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  24. A Universal Money Pump for the Myopic, Naive, and Minimally Sophisticated.Johan E. Gustafsson - forthcoming - Mind:fzae061.
    The money-pump argument aims to show that cyclic preferences are irrational. The argument can be based on a number of different exploitation schemes that vary in what needs to be assumed about the agent. The Standard Money Pump works for myopic and naive agents, but not for sophisticated agents who use backward induction. The Upfront Money Pump works for sophisticated agents, but not for myopic or naive agents. In this paper, I present a new money pump, the Universal Money Pump, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The emerging structure of the Extended Evolutionary Synthesis: where does Evo-Devo fit in?Alejandro Fábregas-Tejeda & Francisco Vergara-Silva - 2018 - Theory in Biosciences 137.
    The Extended Evolutionary Synthesis (EES) debate is gaining ground in contemporary evolutionary biology. In parallel, a number of philosophical standpoints have emerged in an attempt to clarify what exactly is represented by the EES. For Massimo Pigliucci, we are in the wake of the newest instantiation of a persisting Kuhnian paradigm; in contrast, Telmo Pievani has contended that the transition to an EES could be best represented as a progressive reformation of a prior Lakatosian scientific research program, with the extension (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  26. Of black sheep and wrhite crows: Extending the bilingual dual coding theory to memory for idioms.Lena Pritchett, Jyotsna Vaid & Sumeyra Tosun - 2016 - Cogent Psychology 3 (1):1-18.
    Are idioms stored in memory in ways that preserve their surface form or language or are they represented amodally? We examined this question using an inci- dental cued recall paradigm in which two word idiomatic expressions were presented to adult bilinguals proficient in Russian and English. Stimuli included phrases with idiomat- ic equivalents in both languages (e.g. “empty words/пycтыe cлoвa”) or in one language only (English—e.g. “empty suit/пycтoй кocтюм” or Russian—e.g. “empty sound/пycтoй звyк”), or in neither language (e.g. “empty rain/пycтoй (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  79
    Quarks and the Cosmic Control Panel Theory.Jalal Khawaldeh - 2024 - Papers.Ssrn.
    This paper introduces a comprehensive theoretical framework that integrates quantum mechanics and metaphysical philosophy to investigate the intricate relationship between cosmic order and governance. In an effort to transcend the traditional divide between science and philosophy, this study establishes its foundations in mathematical formalism and empirical analogies, thereby mitigating the risk of philosophical overreach often associated with theoretical physics. The proposed framework reimagines quarks as fundamental nodes within a cosmic information network, governed by the principles of quantum chromodynamics (QCD) and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable manner in the current (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  26
    Protecting the Hadoop Cluster on the Basis of Big Data Security.Pamarthi Kartheek - 2023 - Journal of Artificial Intelligence, Machine Learning and Data Science 1 (3):831-837.
    Gathering and analyzing enormous volumes of data is known as "big data," and it includes information from users, sensors, healthcare providers, and companies. Using the Hadoop framework, large amounts of data are stored, managed, and dispersed across multiple server nodes. Big Data issues, including security holes in the Hadoop Distributed File System (HDFS), the architecture's core layer, are highlighted in this article. The methodology includes setting up a Hadoop environment, integrating Kerberos for authentication, enabling HDFS encryption zones, implementing SSL/TLS for (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  30. Scientific Theories as Bayesian Nets: Structure and Evidence Sensitivity.Patrick Grim, Frank Seidl, Calum McNamara, Hinton E. Rago, Isabell N. Astor, Caroline Diaso & Peter Ryner - 2022 - Philosophy of Science 89 (1):42-69.
    We model scientific theories as Bayesian networks. Nodes carry credences and function as abstract representations of propositions within the structure. Directed links carry conditional probabilities and represent connections between those propositions. Updating is Bayesian across the network as a whole. The impact of evidence at one point within a scientific theory can have a very different impact on the network than does evidence of the same strength at a different point. A Bayesian model allows us to envisage and analyze the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. The Revision Theory of Resurrection.Eric Steinhart - 2008 - Religious Studies 44 (1):63-81.
    A powerful argument against the resurrection of the body is based on the premise that all resurrection theories violate natural laws. We counter this argument by developing a fully naturalistic resurrection theory. We refer to it as the revision theory of resurrection (the RTR). Since Hick’s replica theory is already highly naturalistic, we use Hick’s theory as the basis for the RTR. According to Hick, resurrection is the recreation of an earthly body in another universe. The recreation is a resurrection (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Enacting the aesthetic: A model for raw cognitive dynamics.Carlos Vara Sánchez - 2021 - Phenomenology and the Cognitive Sciences 21 (2):317-339.
    One challenge faced by aesthetics is the development of an account able to trace out the continuities and discontinuities between general experience and aesthetic experiences. Regarding this issue, in this paper, I present an enactive model of some raw cognitive dynamics that might drive the progressive emergence of aesthetic experiences from the stream of general experience. The framework is based on specific aspects of John Dewey’s pragmatist philosophy and embodied aesthetic theories, while also taking into account research in ecological psychology, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  33. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond. Second volume.Takaaki Fujita & Florentin Smarandache - 2024
    The second volume of “Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond” presents a deep exploration of the progress in uncertain combinatorics through innovative methodologies like graphization, hyperization, and uncertainization. This volume integrates foundational concepts from fuzzy, neutrosophic, soft, and rough set theory, among others, to further advance the field. Combinatorics and set theory, two central pillars of mathematics, focus on counting, arrangement, and the study of collections under defined rules. Combinatorics excels in handling (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  58
    Trust based authentication technique for cluster based _vehicular ad hoc networks (VANET).Sugumar R. - 2016 - Journal of Mobile Communication, Computation and Information 10 (6):1-10. Translated by Sugumar R..
    Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  35. On graph-theoretic fibring of logics.A. Sernadas, C. Sernadas, J. Rasga & M. Coniglio - 2009 - Journal of Logic and Computation 19 (6):1321-1357.
    A graph-theoretic account of fibring of logics is developed, capitalizing on the interleaving characteristics of fibring at the linguistic, semantic and proof levels. Fibring of two signatures is seen as a multi-graph (m-graph) where the nodes and the m-edges include the sorts and the constructors of the signatures at hand. Fibring of two models is a multi-graph (m-graph) where the nodes and the m-edges are the values and the operations in the models, respectively. Fibring of two deductive systems is an (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. (1 other version)Contemporary Natural Philosophy and Philosophies - Part 1.Gordana Dodig-Crnkovic & Marcin J. Schroeder (eds.) - 2019 - Basel, Switzerland: MDPI.
    From the Philosophies journal program, one of the main aims of the journal is to help establish a new unity in diversity in human knowledge, which would include both “Wissen” (i.e., “Wissenschaft”) and “sc¯ıre” (i.e., “science”). As is known, “Wissenshaft” (the pursuit of knowledge, learning, and scholarship) is a broader concept of knowledge than “science”, as it involves all kinds of knowledge,including philosophy, and not exclusively knowledge in the form of directly testable explanations and predictions. The broader notion of scholarship (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Gene as a Natural Kind.Francesca Bellazzi - 2023 - In José Manuel Viejo & Mariano Sanjuán, Life and Mind - New Directions in the Philosophy of Biology and Cognitive Sciences. Springer. pp. pp 259–278.
    What is a gene? Does it represent a natural kind, or is it just a tool for genomics? A clear answer to these questions has been challenged by postgenomic discoveries. In response, I will argue that the gene can be deemed a natural kind as it satisfies some requirements for genuine kindhood. Specifically, natural kinds are projectible categories in our best scientific theories, and they represent nodes in the causal network of the world (as in Khalidi. Natural Categories and Human (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. The aesthetic appeal of minimal structures: Judging the attractiveness of solutions to traveling salesperson problems.D. Vickers, M. Lee, M. Dry, P. Hughes & Jennifer A. McMahon - 2007 - Perception and Psychophysics 68 (1):32-42.
    Ormerod and Chronicle reported that optimal solutions to traveling salesperson problems were judged to be aesthetically more pleasing than poorer solutions and that solutions with more convex hull nodes were rated as better figures. To test these conclusions, solution regularity and the number of potential intersections were held constant, whereas solution optimality, the number of internal nodes, and the number of nearest neighbors in each solution were varied factorially. The results did not support the view that the convex hull is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Computational Dynamics of Natural Information Morphology, Discretely Continuous.Gordana Dodig-Crnkovic - 2017 - Philosophies 2 (4):23.
    This paper presents a theoretical study of the binary oppositions underlying the mechanisms of natural computation understood as dynamical processes on natural information morphologies. Of special interest are the oppositions of discrete vs. continuous, structure vs. process, and differentiation vs. integration. The framework used is that of computing nature, where all natural processes at different levels of organisation are computations over informational structures. The interactions at different levels of granularity/organisation in nature, and the character of the phenomena that unfold through (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  40. Araucaria as a Tool for Diagramming Arguments in Teaching and Studying Philosophy .F. Macagno, D. Walton, G. Rowe & C. Reed - 2006 - Teaching Philosophy 29 (2):111-124,.
    This paper explains how to use a new software tool for argument diagramming available free on the Internet, showing especially how it can be used in the classroom to enhance critical thinking in philosophy. The user loads a text file containing an argument into a box on the computer interface, and then creates an argument diagram by dragging lines from one node to another. A key feature is the support for argumentation schemes, common patterns of defeasible reasoning historically know (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  41. Ultrametric Distance in Syntax.Mark D. Roberts - manuscript
    Phrase structure trees have a hierarchical structure. In many subjects, most notably in {\bf taxonomy} such tree structures have been studied using ultrametrics. Here syntactical hierarchical phrase trees are subject to a similar analysis, which is much simpler as the branching structure is more readily discernible and switched. The occurrence of hierarchical structure elsewhere in linguistics is mentioned. The phrase tree can be represented by a matrix and the elements of the matrix can be represented by triangles. The height at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. CARO: The Common Anatomy Reference Ontology.Melissa Haendel, Fabian Neuhaus, David Osumi-Sutherland, Paula M. Mabee, José L. V. Mejino Jr, Chris J. Mungall & Barry Smith - 2008 - In Haendel Melissa, A. Neuhaus, Fabian Osumi-Sutherland, David Mabee, Paula M., Mejino Jr José L. V., Mungall Chris, J. Smith & Barry, Anatomy Ontologies for Bioinformatics: Principles and Practice. Springer. pp. 327-349.
    The Common Anatomy Reference Ontology (CARO) is being developed to facilitate interoperability between existing anatomy ontologies for different species, and will provide a template for building new anatomy ontologies. CARO has a structural axis of classification based on the top-level nodes of the Foundational Model of Anatomy. CARO will complement the developmental process sub-ontology of the GO Biological Process ontology, using it to ensure the coherent treatment of developmental stages, and to provide a common framework for the model organism communities (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. Social Epistemology as a New Paradigm for Journalism and Media Studies.Yigal Godler, Zvi Reich & Boaz Miller - forthcoming - New Media and Society.
    Journalism and media studies lack robust theoretical concepts for studying journalistic knowledge ‎generation. More specifically, conceptual challenges attend the emergence of big data and ‎algorithmic sources of journalistic knowledge. A family of frameworks apt to this challenge is ‎provided by “social epistemology”: a young philosophical field which regards society’s participation ‎in knowledge generation as inevitable. Social epistemology offers the best of both worlds for ‎journalists and media scholars: a thorough familiarity with biases and failures of obtaining ‎knowledge, and a strong (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Open future, supervaluationism and the growing-block theory: a stage-theoretical account.Roberto Loss - 2021 - Synthese 199 (5-6):14249-14266.
    I present a ‘stage-theoretical’ interpretation of the supervaluationist semantics for the growing-block theory of time according to which the ‘nodes’ on the branching tree of historical possibilities are taken to be possible stages of the growth of the growing-block. As I will argue, the resulting interpretation (i) is very intuitive, (ii) can easily ward off an objection to supervaluationist treatments of the growing-block theory presented by Fabrice Correia and Sven Rosenkranz, and (iii) is also not saddled by the problems affecting (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. A conceptual framework for legal personality and its application to AI.Claudio Novelli, Giorgio Bongiovanni & Giovanni Sartor - 2022 - Jurisprudence 13 (2):194-219.
    In this paper, we provide an analysis of the concept of legal personality and discuss whether personality may be conferred on artificial intelligence systems (AIs). Legal personality will be presented as a doctrinal category that holds together bundles of rights and obligations; as a result, we first frame it as a node of inferential links between factual preconditions and legal effects. However, this inferentialist reading does not account for the ‘background reasons’ of legal personality, i.e., it does not explain (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  79
    Online Block Chain Based Certificate Generation and The Validation.P. Vinayasree P. Vinayasree - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (12):1 - 7.
    Every year, thousands of people receive degrees as a result of an ineffective anti-forge process, events that cause the graduation certificate to be forged often get noticed. According to the Education statistics, a document certificate of document verification is a complex domain that involves various challenging processes to authenticate. Every node in the vast, publicly accessible Certificate of Block chain network saves and authenticates identical data. The handbook suggested block chain-based method lowers the probability of certificate forgery. The system's (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Representations without rules, connectionism and the syntactic argument.Kenneth Aizawa - 1994 - Synthese 101 (3):465-92.
    Terry Horgan and John Tienson have suggested that connectionism might provide a framework within which to articulate a theory of cognition according to which there are mental representations without rules (RWR) (Horgan and Tienson 1988, 1989, 1991, 1992). In essence, RWR states that cognition involves representations in a language of thought, but that these representations are not manipulated by the sort of rules that have traditionally been posited. In the development of RWR, Horgan and Tienson attempt to forestall a particular (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  48.  81
    AWSAR-A Job Portal.M. Praveen Kumar - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-15.
    The AWSAR Job Portal is developed to provide job seekers with a platform to register, log in, and apply for jobs with ease. The purpose of this project was to create a full-stack web application, ensuring smooth user experience and addressing common challenges such as responsiveness and compatibility across browsers. The project used technologies like React.js, Tailwind CSS for frontend development, and Node.js with Express.js for backend management. MongoDB was implemented for database storage. The key challenge faced was the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Connectionism and the Intentionality of the Programmer.Mark Ressler - 2003 - Dissertation, San Diego State University
    Connectionism seems to avoid many of the problems of classical artificial intelligence, but has it avoided all of them? In this thesis I examine the problem that Intentionality, the directedness of thought to an object, raises for connectionism. As a preliminary approach, I consider the role of Intentionality in classical artificial intelligence from the programmer’s point of view. In this investigation, one problem I identify with classical artificial intelligence is that the Intentionality of the programmer seems to be projected onto (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Studying strategies and types of players: experiments, logics and cognitive models.Sujata Ghosh & Rineke Verbrugge - 2018 - Synthese 195 (10):4265-4307.
    How do people reason about their opponent in turn-taking games? Often, people do not make the decisions that game theory would prescribe. We present a logic that can play a key role in understanding how people make their decisions, by delineating all plausible reasoning strategies in a systematic manner. This in turn makes it possible to construct a corresponding set of computational models in a cognitive architecture. These models can be run and fitted to the participants’ data in terms of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 127