Results for 'adversary system'

910 found
Order:
  1. The Adversary System: Who Needs It?Edmund Byrne - 1986 - In Elliston M. Davis and F. A. (ed.), Ethics and the Legal Profession. Prometheus. pp. 204-215.
    -/- [Posted here is article as originally published (same title) in ALSA Forum VI (1982) pp. 1-17 plus rebuttal by Thomas D. Barton, pp. 18-22].
    Download  
     
    Export citation  
     
    Bookmark  
  2. Adversariality and Ideal Argumentation: A Second-Best Perspective.Marc-Kevin Daoust - 2021 - Topoi 40 (5):887-898.
    What is the relevance of ideals for determining virtuous argumentative practices? According to Bailin and Battersby (2016), the telos of argumentation is to improve our cognitive systems, and adversariality plays no role in ideally virtuous argumentation. Stevens and Cohen (2019) grant that ideal argumentation is collaborative, but stress that imperfect agents like us should not aim at approximating the ideal of argumentation. Accordingly, it can be virtuous, for imperfect arguers like us, to act as adversaries. Many questions are left unanswered (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Self-Adversarial Surveillance for Superalignment.R. Ishizaki & Mahito Sugiyama - manuscript
    In this paper, first we discuss the conditions under which a Large Language Model (LLM) can emulate a superior LLM and potentially trigger an intelligence explosion, along with the characteristics and dangers of the resulting superintelligence. We also explore ``superalignment,'' the process of safely keeping an intelligence explosion under human control. We discuss the goals that should be set for the initial LLM that might trigger the intelligence explosion and the Self-Adversarial Surveillance (SAS) system, which involves having the LLM (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Critical Realism and Ecological Economics: Counter-Intuitive Adversaries or Ostensible Soulmates?Lukáš Likavčan - 2016 - Teorie Vědy / Theory of Science 38 (4):449-471.
    The paper questions the compatibility of critical realism with ecological economics. In particular, it is argued that there is radical dissonance between ontological presuppositions of ecological economics and critical realist perspective. The dissonance lies in the need of ecological economics to state strict causal regularities in socio-economic realm, given the environmental intuitions about the nature of economy and the role of materiality and non-human agency in persistence of economic systems. Using conceptual apparatus derived from Andrew Brown’s critique of critical realism (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. What Forms Could Introspective Systems Take? A Research Programme.François Kammerer & Keith Frankish - 2023 - Journal of Consciousness Studies 30 (9):13-48.
    We propose a new approach to the study of introspection. Instead of asking what form introspection actually takes in humans or other animals, we ask what forms it could take, in natural or artificial minds. What are the dimensions along which forms of introspection could vary? This is a relatively unexplored question, but it is one that has the potential to open new avenues of study and reveal new connections between existing ones. It may, for example, focus attention on possible (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Human Rights vs. Political Reality: The Case of Europe’s Harmonising Criminal Justice Systems.Theo Gavrielides - 2005 - International Journal of Comparative Criminology 5 (1):60-84.
    The purpose of this article is to continue the discussion on Europe’s converging criminal justice systems. In particular, I test a hypothesis that has recently appeared in the literature, which sees the jurisprudence of the European Court of Human Rights as one of the most significant factors that encourage a harmonization process between the adversarial and inquisitorial criminal justice systems of Europe. This claim is supported by examining the Court’s jurisprudence to identify decisions that led to legislative and policy amendments (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  18
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Some Remarks on the Controversial Idea of PR Ethics.Cecilia Tohaneanu - 2014 - Romanian Journal of Journalism and Communication 1 (44).
    The paper attempts to outline the actual academic debates around the concept of PR ethics. The first part aims to show the intimate link between professionalism and ethics as well as their bearing on the reputation of the PR field. Whether and how ethical public relations are possible is the main issue analyzed in the second part of the article. The two paradigms of public relations, “the attorney-adversary system” and “the two-way symmetrical model”, are put face to face (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Logic of the Whole Truth.Joseph S. Fulda - 1989 - Rutgers Computer and Technology Law Journal 15 (2):435-446.
    Note: The author holds the copyright, and there was no agreement, express or implied, not to use a facsimile PDF. -/- Using erotetic logic, the paper defines the "the whole truth" in a manner consistent with U.S. Supreme Court precedent. It cannot mean "the whole story," as witnesses in an adversary system are permitted /only/ to answer the questions put to them, nor are they permitted to speculate, add irrelevant material, etc. Nor can it mean not to add (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  27
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  25
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Posthumanist Phenomenology and Artificial Intelligence.Avery Rijos - 2024 - Philosophy Papers (Philpapers).
    This paper examines the ontological and epistemological implications of artificial intelligence (AI) through posthumanist philosophy, integrating the works of Deleuze, Foucault, and Haraway with contemporary computational methodologies. It introduces concepts such as negative augmentation, praxes of revealing, and desedimentation, while extending ideas like affirmative cartographies, ethics of alterity, and planes of immanence to critique anthropocentric assumptions about identity, cognition, and agency. By redefining AI systems as dynamic assemblages emerging through networks of interaction and co-creation, the paper challenges traditional dichotomies such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The Weaponization of Artificial Intelligence: What The Public Needs to be Aware of.Birgitta Dresp-Langley - 2023 - Frontiers in Artificial Intelligence 6 (1154184):1-6..
    Technological progress has brought about the emergence of machines that have the capacity to take human lives without human control. These represent an unprecedented threat to humankind. This paper starts from the example of chemical weapons, now banned worldwide by the Geneva protocol, to illustrate how technological development initially aimed at the benefit of humankind has, ultimately, produced what is now called the “Weaponization of Artificial Intelligence (AI)”. Autonomous Weapon Systems (AWS) fail the so-called discrimination principle, yet, the wider public (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  27
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  14
    Recognizing the Anti-Mysticism Polemic in Genesis Rabbah: A Bourdieusian Reading.David H. Aaron - 2023 - Hebrew Union College Annual 94:135-186.
    Midrash Genesis Rabbah takes aim at a variety of ideological adversaries, but the most subtle polemic is directed at sages who went beyond standard hermeneutical practices to embrace mystical approaches to Torah learning. This essay seeks to expose the use of satire and other literary forms of critique among passages treating cosmology and Torah study. Analytic tools developed by Pierre Bourdieu, especially as they pertain to exposing the use of the symbolic language intrinsic to the establishment of systems of social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Evolution of the US-Australia Strategic Relationship.Shannon Brandt Ford - 2021 - In Scott D. McDonald & Andrew T. H. Tan (eds.), The Future of the United States-Australia Alliance. Taylor & Francis. pp. 103-121.
    The US-Australia strategic relationship has evolved from more or less an adversarial position in the 19th century to an Australia largely dependent on the US during the Cold War to the interdependent partnership we see today. Strategic interdependence means that the US-Australia relationship is not merely a one-sided affair; that Australia has something of substance to offer the strategic relationship. Part of the reason that the relationship is strong is because of a shared language, similar social values, and compatible political-legal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Creativity.Peter Langland-Hassan - 2020 - In Explaining Imagination. Oxford: Oxford University Press. pp. 262-296.
    Comparatively easy questions we might ask about creativity are distinguished from the hard question of explaining transformative creativity. Many have focused on the easy questions, offering no reason to think that the imagining relied upon in creative cognition cannot be reduced to more basic folk psychological states. The relevance of associative thought processes to songwriting is then explored as a means for understanding the nature of transformative creativity. Productive artificial neural networks—known as generative antagonistic networks (GANs)—are a recent example of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  18.  17
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Measuring Intelligence and Growth Rate: Variations on Hibbard's Intelligence Measure.Samuel Alexander & Bill Hibbard - 2021 - Journal of Artificial General Intelligence 12 (1):1-25.
    In 2011, Hibbard suggested an intelligence measure for agents who compete in an adversarial sequence prediction game. We argue that Hibbard’s idea should actually be considered as two separate ideas: first, that the intelligence of such agents can be measured based on the growth rates of the runtimes of the competitors that they defeat; and second, one specific (somewhat arbitrary) method for measuring said growth rates. Whereas Hibbard’s intelligence measure is based on the latter growth-rate-measuring method, we survey other methods (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent Threats (APTs), Automated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. World-Traveling, Double Consciousness, and Laughter.Chris A. Kramer - 2017 - Israeli Journal for Humor Research 2 (6):93-119.
    In this paper I borrow from Maria Lugones’ work on playful “world-traveling” and W.E.B. Du Bois’ notion of “double consciousness” to make the case that humor can facilitate an openness and cooperative attitude among an otherwise closed, even adversarial audience. I focus on what I call “subversive” humor, that which is employed by or on behalf of those who have been continually marginalized. When effectively used, such humor can foster the inclination and even desire to listen to others and, if (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. « Qui choisirait de poser ce flambeau dans un lieu autre ou meilleur que celui d’où il peut illuminer le tout simultanément ? » : examen de la pertinence d’un argument copernicien de convenance.Jean-François Stoffel - 2018 - Revue des Questions Scientifiques 189 (4):409-458.
    In what is quite possibly the most famous passage of the De revolutionibus, Copernicus implies that nobody could ever place this supreme flaming torch that is the Sun in another or better place than that from which it can illuminate everything simultaneously, namely the centre of this extremely beautiful temple that is our world. Considering the fact that he leaves an interrogatory twist to this argument of convenience, and since he makes this statement without any justification as it seems entirely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The Truth, the Whole Truth, and Nothing but the Truth: Robert Grosseteste on Universals (and the Posterior Analytics ).Christina Van Dyke - 2010 - Journal of the History of Philosophy 48 (2):pp. 153-170.
    The reintroduction of Aristotle's Analytics to the Latin West—in particular, the reintroduction of the Posterior Analytics—forever altered the course of medieval epistemological discussions. Although the Analytics fell decidedly from grace in later centuries, the sophisticated account of human cognition developed in the Posterior Analytics appealed so strongly to thirteenth-century European scholars that it became one of the two central theories of knowledge advocated in the later Middle Ages. Robert Grosseteste's 'Commentarius in Posteriorum Analyticorum Libro', written in the 1220s, is most (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. The Fundamental Principles of Existence and the Origin of Physical Laws.Attila Grandpierre - 2002 - Ultimate Reality and Meaning 25 (2):127-147.
    Our concept of the universe and the material world is foundational for our thinking and our moral lives. In an earlier contribution to the URAM project I presented what I called 'the ultimate organizational principle' of the universe. In that article (Grandpierre 2000, pp. 12-35) I took as an adversary the wide-spread system of thinking which I called 'materialism'. According to those who espouse this way of thinking, the universe consists of inanimate units or sets of material such (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  28
    Recognizing the Anti-Mystical Polemic in Genesis Rabbah: A Bourdieusian Reading.David H. Aaron - 2023 - Hebrew Union College Annual 94:135-186.
    Midrash Genesis Rabbah takes aim at a variety of ideological adversaries, but the most subtle polemic is directed at sages who went beyond standard hermeneutical practices to embrace mystical approaches to Torah learning. This essay seeks to expose the use of satire and other literary forms of critique among passages treating cosmology and Torah study. Analytic tools developed by Pierre Bourdieu, especially as they pertain to exposing the use of the symbolic language intrinsic to the establishment of systems of social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Posthumanist Phenomenology and Artificial Intelligence.Avery Rijos - unknown - Medium.
    This paper examines the ontological and epistemological implications of artificial intelligence (AI) through posthumanist philosophy, integrating the works of Deleuze, Foucault, and Haraway with contemporary computational methodologies. It introduces concepts such as negative augmentation, praxes of revealing, and desedimentation, while extending ideas like affirmative cartographies, ethics of alterity, and planes of immanence to critique anthropocentric assumptions about identity, cognition, and agency. By redefining AI systems as dynamic assemblages emerging through networks of interaction and co-creation, the paper challenges traditional dichotomies such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. An Adversarial Ethics of Campaigns and Elections.Samuel Bagg & Isak Tranvik - 2019 - Perspectives on Politics 4 (17):973-987.
    Existing approaches to campaign ethics fail to adequately account for the “arms races” incited by competitive incentives in the absence of effective sanctions for destructive behaviors. By recommending scrupulous devotion to unenforceable norms of honesty, these approaches require ethical candidates either to quit or lose. To better understand the complex dilemmas faced by candidates, therefore, we turn first to the tradition of “adversarial ethics,” which aims to enable ethical participants to compete while preventing the most destructive excesses of competition. As (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  28. Adversarial Sampling for Fairness Testing in Deep Neural Network.Tosin Ige, William Marfo, Justin Tonkinson, Sikiru Adewale & Bolanle Hafiz Matti - 2023 - International Journal of Advanced Computer Science and Applications 14 (2).
    In this research, we focus on the usage of adversarial sampling to test for the fairness in the prediction of deep neural network model across different classes of image in a given dataset. While several framework had been proposed to ensure robustness of machine learning model against adversarial attack, some of which includes adversarial training algorithm. There is still the pitfall that adversarial training algorithm tends to cause disparity in accuracy and robustness among different group. Our research is aimed at (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. Adversarial Attacks on Image Generation With Made-Up Words.Raphaël Millière - manuscript
    Text-guided image generation models can be prompted to generate images using nonce words adversarially designed to robustly evoke specific visual concepts. Two approaches for such generation are introduced: macaronic prompting, which involves designing cryptic hybrid words by concatenating subword units from different languages; and evocative prompting, which involves designing nonce words whose broad morphological features are similar enough to that of existing words to trigger robust visual associations. The two methods can also be combined to generate images associated with more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Against Adversarial Discussion.Maarten Steenhagen - 2016 - Collingwood and British Idealism Studies 22 (1):87-112.
    Why did R.G. Collingwood come to reject the adversarial style of philosophical discussion so popular among his Oxford peers? The main aim of this paper is to explain that Collingwood came to reject his colleagues’ specific style of philosophical dialogue on methodological grounds, and to show how the argument against adversarial philosophical discussion is integrated with Collingwood’s overall criticism of realist philosophy. His argument exploits a connection between method and practice that should be taken seriously even today.
    Download  
     
    Export citation  
     
    Bookmark  
  31. Adversarial argumentation and common ground in Aristotle’s Sophistical Refutations.Colin Guthrie King - 2021 - Topoi 40 (5):939-950.
    In this paper I provide support for the view that at least some forms of adversariality in argumentation are legitimate. The support comes from Aristotle’s theory of illegitimate adversarial argumentation in dialectical contexts: his theory of eristic in his work On Sophistical Refutations. Here Aristotle develops non-epistemic standards for evaluating the legitimacy of dialectical procedures, standards which I propose can be understood in terms of the pragmatic notion of context as common ground. Put briefly, Aristotle makes the answerer’s meaning in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Adversaries or allies? Occasional thoughts on the Masham-Astell exchange.Jacqueline Broad - 2003 - Eighteenth-Century Thought 1:123-49.
    Against the backdrop of the English reception of Locke’s Essay, stands a little-known philosophical dispute between two seventeenth-century women writers: Mary Astell (1666-1731) and Damaris Cudworth Masham (1659-1708). On the basis of their brief but heated exchange, Astell and Masham are typically regarded as philosophical adversaries: Astell a disciple of the occasionalist John Norris, and Masham a devout Lockean. In this paper, I argue that although there are many respects in which Astell and Masham are radically opposed, the two women (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  33. Pro-Generative Adversarial Network and V-stack Perceptron, Diamond Holographic Principle, and Pro-Temporal Emergence.Shanna Dobson - manuscript
    We recently presented our Efimov K-theory of Diamonds, proposing a pro-diamond, a large stable (∞,1)-category of diamonds (D^{diamond}), and a localization sequence for diamond spectra. Commensurate with the localization sequence, we now detail four potential applications of the Efimov K-theory of D^{diamond}: emergent time as a pro-emergence (v-stack time) in a diamond holographic principle using Scholze’s six operations in the ’etale cohomology of diamonds; a pro-Generative Adversarial Network and v-stack perceptron; D^{diamond}cryptography; and diamond nonlocality in perfectoid quantum physics.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  51
    Comprehensive Review on Advanced Adversarial Attack and Defense Strategies in Deep Neural Network.Anderson Brown - 2023 - International Journal of Research and Innovation in Applied Sciences.
    In adversarial machine learning, attackers add carefully crafted perturbations to input, where the perturbations are almost imperceptible to humans, but can cause models to make wrong predictions. In this paper, we did comprehensive review of some of the most recent research, advancement and discoveries on adversarial attack, adversarial sampling generation, the potency or effectiveness of each of the existing attack methods, we also did comprehensive review on some of the most recent research, advancement and discoveries on adversarial defense strategies, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. In defence of adversarial philosophy?Terence Rajivan Edward - manuscript
    Adversarial philosophy is under attack (!), but I speculate that it is useful for working out the level of a philosopher and sometimes for increasing the respect awarded to some individuals and groups. There may be no alternative to it when you have an excess of philosophers of around the same level.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Policy Response, Social Media and Science Journalism for the Sustainability of the Public Health System Amid the COVID-19 Outbreak: The Vietnam Lessons.La Viet Phuong, Pham Thanh Hang, Manh-Toan Ho, Nguyen Minh Hoang, Nguyen Phuc Khanh Linh, Vuong Thu Trang, Nguyen To Hong Kong, Tran Trung, Khuc Van Quy, Ho Manh Tung & Quan-Hoang Vuong - 2020 - Sustainability 12:2931.
    Vietnam, with a geographical proximity and a high volume of trade with China, was the first country to record an outbreak of the new Coronavirus disease (COVID-19), caused by the Severe Acute Respiratory Syndrome Coronavirus 2 or SARS-CoV-2. While the country was expected to have a high risk of transmission, as of April 4, 2020—in comparison to attempts to contain the disease around the world—responses from Vietnam are being seen as prompt and effective in protecting the interests of its citizens, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. Comprehensive Review on Advanced Adversarial Attack and Defense Strategies in Deep Neural Network (8th edition). [REVIEW]Smith Oliver & Brown Anderson - 2023 - International Journal of Research and Innovation in Applied Science:156-166.
    In adversarial machine learning, attackers add carefully crafted perturbations to input, where the perturbations are almost imperceptible to humans, but can cause models to make wrong predictions. In this paper, we did comprehensive review of some of the most recent research, advancement and discoveries on adversarial attack, adversarial sampling generation, the potency or effectiveness of each of the existing attack methods, we also did comprehensive review on some of the most recent research, advancement and discoveries on adversarial defense strategies, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. DIGITAL CULTURE AND THE INFORMATION REGIME: Political governance in times of democratic system crisis (4th edition).Jesus Enrrique Caldera Ynfante - 2023 - Techno Review 13 (10.37467/revtechno.v13.4817):1-17.
    The information regime is mediated by the culture of the electronic device. It is characterized by the control of the deluded citizen through the deployment of freedom, thereby nullifying the core issue of human life: freedom. Through phenomenological-hermeneutic methodology (Heidegger, 2002), this work starts from the world of digital life to direct the interpretation towards digital governance, all of which appears as a hermeneutic horizon the information regime. It is concluded that in this new social order the political and all (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. “The Bright Initiator of Such a Great System.” Suárez and Fonseca in Iberian Jesuit Journals (1945–1975).Simone Guidi - 2023 - Noctua 10 (2–3):441-498.
    In this paper I focus on the historiographical fate of Francisco Suárez (1548–1617) and Pedro da Fonseca (1528–1599) in two Iberian journals ran by Jesuits and founded in 1945: the Spanish Pensamiento, and the Portuguese Revista portuguesa de filosofia. I endeavor to show that the discussions of Suárez’s and Fonseca’s ideas on these journal is a two-sided case of constructing the legacies of major figures in late scholasticism, and I emphasize how the demand to identify cultural national heroes intertwines with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational culture, decision-making responsibility, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. The freedom of crime: property, theft, and recognition in Hegel’s System of Ethical Life.Jacob Blumenfeld - 2022 - British Journal for the History of Philosophy 31 (1):103-126.
    Volume 31, Issue 1, January 2023, Page 103-126.
    Download  
     
    Export citation  
     
    Bookmark  
  42. Reserve system design for allocation of scarce medical resources in a pandemic: some perspectives from the field.Parag Pathak, Govind Persad, Tayfun Sönmez & M. Utku Unver - 2022 - Oxford Review of Economic Policy 38 (4):924–940.
    Reserve systems are a tool to allocate scarce resources when stakeholders do not have a single objective. This paper introduces some basic concepts about reserve systems for pandemic medical resource allocation. At the onset of the Covid-19 pandemic, we proposed that reserve systems can help practitioners arrive at compromises between competing stakeholders. More than a dozen states and local jurisdictions adopted reserve systems in initial phases of vaccine distribution. We highlight several design issues arising in some of these implementations. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Analysis of Student's Academic Achievement in Music of Visayas State University System.Joselle R. Cayetano - 2022 - Universal Journal of Educational Research 1 (4):210-217.
    In order to enhance music education courses, the study's primary goal is to evaluate students' academic performance in music at Visayas State University (VSU). It specifically sought to establish the respondents' age, gender, educational attainment, and demographic profile. It also aimed to determine the students’ academic success in music and provide suggestions to enhance the curriculum at the Visayas State University. In the demographic profile of the respondents in terms of age, the students dominate the younger generation wherein they belong (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Expert System for Chest Pain in Infants and Children.Randa A. Khella & Samy S. Abu-Naser - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 1 (4):138-148.
    Chest pain is the pain felt in the chest by infants, children and adolescents. In most cases the pain is not associated with the heart. It is mainly recognized by the observance or report of pain by the infant, child or adolescent by reports of distress by parents or care givers. Chest pain is not unusual in children. Lots of children are seen in ambulatory clinics, emergency rooms and hospitals and cardiology clinics. Usually there is a benign cause for the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  45.  53
    The Theory of Ideas in Schelling's Identity System: A Wittgensteinian Interpretation.Amir Yaretzky - 2024 - Review of Metaphysics 78 (2):277-300.
    This article offers an interpretation of Schelling's theory of ideas within his philosophy of identity, arguing that it should be understood as a theory of the intelligibility of being—that is, the capacity for the world to be meaningfully articulated in thought. By placing Schelling's ideas into dialogue with Wittgenstein's Tractatus Logico -Philosophicus, the author aims to show how Schelling's philosophy might provide valuable insights for contemporary analytic interpretations of German idealism. Schelling's notion of ideas encompasses three key features: (1) they (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The Asymmetries of Disability Rights Protection in the Inter-American System.Ottavio Quirico & Pablo Cristóbal Jiménez Lobeira - 2022 - In Inclusive Sustainability: Harmonising Disability Law and Policy. Springer.
    This contribution explores disability rights protection in Inter-American States within the framework of the OAS and in the context of the obligations established under the CIADDIS and the CRPD. Following the classical division between ‘primary’ and ‘secondary’ rules, the contribution first sketches key regulatory initiatives in the area of disability rights and second considers compliance and enforcement mechanisms. Along these lines, the first section illustrates similarities and differences between the CIADDIS and the CRPD and, within this framework, essential regional regulatory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Forgiveness and Punishment in Kant's Moral System.Paula Satne - 2018 - In Larry Krasnoff, Nuria Sánchez Madrid & Paula Satne (eds.), Kant's Doctrine of Right in the 21st Century. Cardiff: University of Wales Press. pp. 201-219.
    Forgiveness as a positive response to wrongdoing is a widespread phenomenon that plays a role in the moral lives of most persons. Surprisingly, Kant has very little to say on the matter. Although Kant dedicates considerable space to discussing punishment, wrongdoing and grace, he addresses the issues of human forgiveness directly only in some short passages in the Lectures on Ethics and in one passage of the Metaphysics of Morals. As noted by Sussman, the TL passage, however, betrays some ambivalence. (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  48. Developmental Systems Theory.Paul Griffiths & Adam Hochman - 2015 - eLS:1-7.
    Developmental systems theory (DST) is a wholeheartedly epigenetic approach to development, inheritance and evolution. The developmental system of an organism is the entire matrix of resources that are needed to reproduce the life cycle. The range of developmental resources that are properly described as being inherited, and which are subject to natural selection, is far wider than has traditionally been allowed. Evolution acts on this extended set of developmental resources. From a developmental systems perspective, development does not proceed according (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  49. The Platonism of Leibniz's 'New System of Nature'. Mercer - 1996 - In R. S. Woolhouse (ed.), Leibniz's new system (1695). Firenze: L.S. Olschki.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Recommender systems and their ethical challenges.Silvia Milano, Mariarosaria Taddeo & Luciano Floridi - 2020 - AI and Society (4):957-967.
    This article presents the first, systematic analysis of the ethical challenges posed by recommender systems through a literature review. The article identifies six areas of concern, and maps them onto a proposed taxonomy of different kinds of ethical impact. The analysis uncovers a gap in the literature: currently user-centred approaches do not consider the interests of a variety of other stakeholders—as opposed to just the receivers of a recommendation—in assessing the ethical impacts of a recommender system.
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
1 — 50 / 910