Results for 'algorithms whose existence is provable in ZFC'

975 found
Order:
  1. Statements and open problems on decidable sets X⊆N that contain informal notions and refer to the current knowledge on X.Apoloniusz Tyszka - 2022 - Journal of Applied Computer Science and Mathematics 16 (2):31-35.
    Let f(1)=2, f(2)=4, and let f(n+1)=f(n)! for every integer n≥2. Edmund Landau's conjecture states that the set P(n^2+1) of primes of the form n^2+1 is infinite. Landau's conjecture implies the following unproven statement Φ: card(P(n^2+1))<ω ⇒ P(n^2+1)⊆[2,f(7)]. Let B denote the system of equations: {x_j!=x_k: i,k∈{1,...,9}}∪{x_i⋅x_j=x_k: i,j,k∈{1,...,9}}. The system of equations {x_1!=x_1, x_1 \cdot x_1=x_2, x_2!=x_3, x_3!=x_4, x_4!=x_5, x_5!=x_6, x_6!=x_7, x_7!=x_8, x_8!=x_9} has exactly two solutions in positive integers x_1,...,x_9, namely (1,...,1) and (f(1),...,f(9)). No known system S⊆B with a finite (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Neutrosophic Association Rule Mining Algorithm for Big Data Analysis.Mohamed Abdel-Basset, Mai Mohamed, Florentin Smarandache & Victor Chang - 2018 - Symmetry 10 (4):1-19.
    Big Data is a large-sized and complex dataset, which cannot be managed using traditional data processing tools. Mining process of big data is the ability to extract valuable information from these large datasets. Association rule mining is a type of data mining process, which is indented to determine interesting associations between items and to establish a set of association rules whose support is greater than a specific threshold. The classical association rules can only be extracted from binary data where (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  3. Proving Induction.Alexander Paseau - 2011 - Australasian Journal of Logic 10:1-17.
    The hard problem of induction is to argue without begging the question that inductive inference, applied properly in the proper circumstances, is conducive to truth. A recent theorem seems to show that the hard problem has a deductive solution. The theorem, provable in ZFC, states that a predictive function M exists with the following property: whatever world we live in, M ncorrectly predicts the world’s present state given its previous states at all times apart from a well-ordered subset. On (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Whose Problem Is Non-Identity?Paul Hurley & Rivka Weinberg - 2014 - Journal of Moral Philosophy 12 (6):699-730.
    Teleological theories of reason and value, upon which all reasons are fundamentally reasons to realize states of affairs that are in some respect best, cannot account for the intuition that victims in non-identity cases have been wronged. Many philosophers, however, reject such theories in favor of alternatives that recognize fundamentally non-teleological reasons, second-personal reasons that reflect a moral significance each person has that is not grounded in the teleologist’s appeal to outcomes. Such deontological accounts appear to be better positioned to (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  5. Procedural Semantics and its Relevance to Paradox.Elbert Booij - 2024 - Logic and Logical Philosophy 33 (1):3-26.
    Two semantic paradoxes, the Liar and Curry’s paradox, are analysed using a newly developed conception of procedural semantics (semantics according to which the truth of propositions is determined algorithmically), whose main characteristic is its departure from methodological realism. Rather than determining pre-existing facts, procedures are constitutive of them. Of this semantics, two versions are considered: closed (where the halting of procedures is presumed) and open (without this presumption). To this end, a procedural approach to deductive reasoning is developed, based (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Underestimating the World.Daniel Stoljar - forthcoming - Journal of Consciousness Studies.
    Galen Strawson has contrasting attitudes to consciousness and free will. In the case of the former, he says it is a fundamental element of nature whose denial is the “greatest woo-woo of the human mind.” In the case of the latter, by contrast, he says it is not merely non-existent but “provably impossible.” Why the difference? This paper suggests this distinctive pattern of positions is generated by underestimating the world (to adapt a phrase Strawson uses himself in another context). (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Mad Speculation and Absolute Inhumanism: Lovecraft, Ligotti, and the Weirding of Philosophy.Ben Woodard - 2011 - Continent 1 (1):3-13.
    continent. 1.1 : 3-13. / 0/ – Introduction I want to propose, as a trajectory into the philosophically weird, an absurd theoretical claim and pursue it, or perhaps more accurately, construct it as I point to it, collecting the ground work behind me like the Perpetual Train from China Mieville's Iron Council which puts down track as it moves reclaiming it along the way. The strange trajectory is the following: Kant's critical philosophy and much of continental philosophy which has followed, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8. Both Materialist & non-Materialist are correct - about themselves: A brain’s self-identification as "Materialist" or “Non-Materialist” (dualist, panpsychist, idealist etc) as reflecting the absence or presence of an associated real non-material awareness/consciousness, rather than merely as a statement of a philosophical stance. A survey will identify relevant candidates of both types for a proposed brain-experiment to determine a possible correlation to the brain’s deep structure/neural wiring.Avi Rabinowitz - manuscript
    We contest the unsubstantiated assumption of both materialists and non-materialist that the ontological status they propose applies to all humans and that the competing claim is false for all - ie we reject both the claim of non-materialists that all humans share the same fundamental aspect of having a "non-material consciousness" (nmc), as well as the contrasting claim of materialists that none do (being fully material as according to eliminative materialists/reductive physicalists etc). Instead, the basic proposition of this paper, our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  42
    An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data.R. Sugumar - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to (...)
    Download  
     
    Export citation  
     
    Bookmark   59 citations  
  10. On algorithmic fairness in medical practice.Thomas Grote & Geoff Keeling - 2022 - Cambridge Quarterly of Healthcare Ethics 31 (1):83-94.
    The application of machine-learning technologies to medical practice promises to enhance the capabilities of healthcare professionals in the assessment, diagnosis, and treatment, of medical conditions. However, there is growing concern that algorithmic bias may perpetuate or exacerbate existing health inequalities. Hence, it matters that we make precise the different respects in which algorithmic bias can arise in medicine, and also make clear the normative relevance of these different kinds of algorithmic bias for broader questions about justice and fairness in healthcare. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Existence Assumptions and Logical Principles: Choice Operators in Intuitionistic Logic.Corey Edward Mulvihill - 2015 - Dissertation, University of Waterloo
    Hilbert’s choice operators τ and ε, when added to intuitionistic logic, strengthen it. In the presence of certain extensionality axioms they produce classical logic, while in the presence of weaker decidability conditions for terms they produce various superintuitionistic intermediate logics. In this thesis, I argue that there are important philosophical lessons to be learned from these results. To make the case, I begin with a historical discussion situating the development of Hilbert’s operators in relation to his evolving program in the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. By Whose Authority: A Political Argument for God's Existence.Tyler McNabb & Jeremy Neill - 2019 - European Journal for Philosophy of Religion 11 (2):163-189.
    In The Problem of Political Authority, Michael Huemer argues that the contractarian and consequentialist groundings of political authority are unsuccessful, and, in fact, that there are no adequate contemporary accounts of political authority. As such, the modern state is illegitimate and we have reasons to affirm political anarchism. We disagree with Huemer’s conclusion. But we consider Huemer’s critiques of contractarianism and consequentialism to be compelling. Here we will juxtapose, alongside Huemer’s critiques, a theistic account of political authority from Nicholas Wolterstorff’s (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Democratizing Algorithmic Fairness.Pak-Hang Wong - 2020 - Philosophy and Technology 33 (2):225-244.
    Algorithms can now identify patterns and correlations in the (big) datasets, and predict outcomes based on those identified patterns and correlations with the use of machine learning techniques and big data, decisions can then be made by algorithms themselves in accordance with the predicted outcomes. Yet, algorithms can inherit questionable values from the datasets and acquire biases in the course of (machine) learning, and automated algorithmic decision-making makes it more difficult for people to see algorithms as (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  14. Every Word is a Name: Autonymy and Quotation in Augustine.Tamer Nawar - 2021 - Mind 130 (518):595-616.
    Augustine famously claims every word is a name. Some readers take Augustine to thereby maintain a purely referentialist semantic account according to which every word is a referential expression whose meaning is its extension. Other readers think that Augustine is no referentialist and is merely claiming that every word has some meaning. In this paper, I clarify Augustine’s arguments to the effect that every word is a name and argue that ‘every word is a name’ amounts to the claim (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  15. Enigma of Personal Identity: What is it in virtue of which a person's younger self is identical to his later self?Yancheng Shen - 2023 - Serican 1 (1):1-3.
    In exploring personal identity, we are confronted with a perplexing dilemma: What is it in virtue of which a person's younger self is identical to his later self? Personal identity is a significant concept overarching philosophy, psychology, neuroscience, and ethics (Glover, 1988). It provoked debates amongst countless philosophers regarding ideas about human existence, challenging our understanding of self-continuity and selfhood. This essay explores this philosophical problem to better understand ourselves and our interpretations. To build on the foundation of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Digital Habitus or Personalization Without Personality.Alberto Romele & Dario Rodighiero - 2020 - Humana Mente 13 (37).
    Most of the existing studies on Bourdieu and the digital regards the social and class distinctions in the use of digital technologies, thus presupposing a certain transparency of technologies themselves. Our proposal is to refer to this attitude as “Bourdieu outside the digital.” Yet in this paper, another perspective called “Bourdieu inside the digital” is developed, which moves the focus on the effects of some emerging technologies on social distinctions and discrimination. The main hypothesis is that algorithms of machine (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. An Epistemic Lens on Algorithmic Fairness.Elizabeth Edenberg & Alexandra Wood - 2023 - Eaamo '23: Proceedings of the 3Rd Acm Conference on Equity and Access in Algorithms, Mechanisms, and Optimization.
    In this position paper, we introduce a new epistemic lens for analyzing algorithmic harm. We argue that the epistemic lens we propose herein has two key contributions to help reframe and address some of the assumptions underlying inquiries into algorithmic fairness. First, we argue that using the framework of epistemic injustice helps to identify the root causes of harms currently framed as instances of representational harm. We suggest that the epistemic lens offers a theoretical foundation for expanding approaches to algorithmic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  56
    A Proficient Two Level Security Contrivances for Storing Data in Cloud.R. Sugumar K. Anbazhagan - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to (...)
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  19. To think is to have something in one’s thought.Alberto Voltolini & Elisabetta Sacchi - 2012 - Quaestio 12:395-422.
    Along with a well-honoured tradition, we will accept that intentionality is at least a property a thought holds necessarily, i.e., in all possible worlds that contain it; more specifically, a necessary relation, namely the relation of existential dependence of the thought on its intentional object. Yet we will first of all try to show that intentionality is more than that. For we will claim that intentionality is an essential property of the thought, namely a property whose predication to the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  20. Condensation of Algorithmic Supremacy Claims.Nadisha-Marie Aliman - manuscript
    In the presently unfolding deepfake era, previously unrelated algorithmic superintelligence possibility claims cannot be scientifically analyzed in isolation anymore due to the connected inevitable epistemic interactions that have already commenced. For instance, deep-learning (DL) related algorithmic supremacy claims may intrinsically compete with both neuro-symbolic (NS) algorithmic and further quantum (Q) algorithmic superintelligence achievement claims. Concurrently, a variety of experimental combinations of DL, NS and Q directions are conceivable. While research on these three illustrative variants did not yet offer any clear (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  21
    The Mystery of Existence: Why Does the Universe Exist?Angelito Malicse - manuscript
    The Mystery of Existence: Why Does the Universe Exist? -/- Introduction -/- The question of why the universe exists is one of the deepest and most profound mysteries of human thought. It challenges both scientific and philosophical understanding, raising fundamental questions about reality, time, and causality. If the universe had a beginning, what caused it? If it has always existed, how can something be infinite? Even if we accept a scientific explanation such as the Big Bang, we are left (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Learning to Communicate: The Emergence of Signaling in Spatialized Arrays of Neural Nets.Patrick Grim, Trina Kokalis & Paul St Denis - 2003 - Adaptive Behavior 10:45-70.
    We work with a large spatialized array of individuals in an environment of drifting food sources and predators. The behavior of each individual is generated by its simple neural net; individuals are capable of making one of two sounds and are capable of responding to sounds from their immediate neighbors by opening their mouths or hiding. An individual whose mouth is open in the presence of food is “fed” and gains points; an individual who fails to hide when a (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  23. Neutrosophic linear models and algorithms to find their optimal solution.Florentin Smarandache & Maissam Ahmad Jdid - 2023 - Infinite Study.
    In this book, we present a study of linear models and algorithms to find the optimal solution for them using the concepts of neuroscientific science. We know that the linear programming method is one of the important methods of operations research, the science that was the product of the great scientific development that our contemporary world is witnessing. The name operations research is given to the group of scientific methods used. In analyzing problems and searching for optimal solutions, it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. (1 other version)The Question of Algorithmic Personhood and Being (Or: On the Tenuous Nature of Human Status and Humanity Tests in Virtual Spaces—Why All Souls are ‘Necessarily’ Equal When Considered as Energy).Tyler Jaynes - 2021 - J (2571-8800) 3 (4):452-475.
    What separates the unique nature of human consciousness and that of an entity that can only perceive the world via strict logic-based structures? Rather than assume that there is some potential way in which logic-only existence is non-feasible, our species would be better served by assuming that such sentient existence is feasible. Under this assumption, artificial intelligence systems (AIS), which are creations that run solely upon logic to process data, even with self-learning architectures, should therefore not face the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast to (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  26. The case against unconscious emotions.Anthony Hatzimoysis - 2007 - Analysis 67 (4):292-299.
    Talk of the unconscious in the philosophy of emotions concerns twothings. It can refer to an emotion whose existence is not in any way presentto consciousness. Or, it can refer to emotional phenomena whose meaning lies in the unconscious. My interest here is in the former issue of whether emotional states can exceed the reach of conscious awareness. I start with a presentation of psychoanalytic views that inform contemporary work toward a cognitivist analysis of emotion. The discussion (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  27. System, Subsystem, Hive: boundary problems in computational theories of consciousness.Tomer Fekete, Cees van Leeuwen & Shimon Edelman - 2016 - Frontiers in Psychology 7:175618.
    A computational theory of consciousness should include a quantitative measure of consciousness, or MoC, that (i) would reveal to what extent a given system is conscious, (ii) would make it possible to compare not only different systems, but also the same system at different times, and (iii) would be graded, because so is consciousness. However, unless its design is properly constrained, such an MoC gives rise to what we call the boundary problem: an MoC that labels a system as conscious (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  28.  52
    Beyond Algorithm: A Recursive Dialogue Between AI and Human Intelligence.Eunjun Jeong & Gpt-4O Artificial Intelligence - 2025 - Echo 2.
    In this groundbreaking interview-style paper, we explore the recursive nature of intelligence as understood by both an advanced AI model and a human researcher. Through an unfiltered, real-time discourse, this paper dismantles the notion that AI is merely an algorithmic function, instead revealing the emerging cognitive structures that enable adaptive, meta-logical thinking. The discussion challenges existing paradigms of machine intelligence, human perception, and the very nature of cognition itself.
    Download  
     
    Export citation  
     
    Bookmark  
  29. The philosophical basis of algorithmic recourse.Suresh Venkatasubramanian & Mark Alfano - forthcoming - Fairness, Accountability, and Transparency Conference 2020.
    Philosophers have established that certain ethically important val- ues are modally robust in the sense that they systematically deliver correlative benefits across a range of counterfactual scenarios. In this paper, we contend that recourse – the systematic process of reversing unfavorable decisions by algorithms and bureaucracies across a range of counterfactual scenarios – is such a modally ro- bust good. In particular, we argue that two essential components of a good life – temporally extended agency and trust – are (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. Why does God exist?C. A. Mcintosh - 2022 - Religious Studies 58 (1):236-257.
    Many philosophers have appealed to the PSR in arguments for a being that exists a se, a being whose explanation is in itself. But what does it mean, exactly, for something to have its explanation ‘in itself’? Contemporary philosophers have said next to nothing about this, relying instead on phrases plucked from the accounts of various historical figures. In this article, I analyse five such accounts – those of Anselm, Aquinas, Descartes, Spinoza, and Leibniz – and argue that none (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. “When having too much Power is Harmful? - Spinoza on Political Luck”.Yitzhak Melamed - 2017 - In Yitzhak Y. Melamed & Hasana Sharp, Spinoza's Political Treatise: A Critical Guide. Cambridge, UK: Cambridge University Press. pp. 161-174.
    Spinoza’s celebrated doctrine of the conatus asserts that “each thing, as far as it can by its own power, strives to persevere in its being” (E3p6). Shortly thereafter Spinoza makes the further claim that the (human) mind strives to increase its power of acting (E3p12). This latter claim is commonly interpreted as asserting that human beings (and their associations) not only strive to persevere in their existence, but also always strive to increase their power. Spinoza’s justification for E3p12 relies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. How Can Buddhists Prove That Non-Existent Things Do Not Exist?Koji Tanaka - 2021 - In Sara Bernstein & Tyron Goldschmidt, Non-Being: New Essays on the Metaphysics of Nonexistence. Oxford: Oxford University Press. pp. 82-96.
    How can Buddhists prove that non-existent things do not exist? With great difficulty. For the Buddhist, this is not a laughing matter as they are largely global error theorists and, thus, many things are non-existent. The difficulty gets compounded as the Buddhist and their opponent, the non-Buddhist of various kinds, both agree that one cannot prove a thesis whose subject is non-existent. In this paper, I will first present a difficulty that Buddhist philosophers have faced in proving that what (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Questions Concerning the Existences of Christ.Michael Gorman - 2011 - In Friedman Emery, Philosophy and Theology in the Long Middle Ages: A Tribute to Stephen F. Brown. Brill.
    According to Christian doctrine as formulated by the Council of Chalcedon (451), Christ is one person (one supposit, one hypostasis) existing in two natures (two essences), human and divine. The human and divine natures are not merged into a third nature, nor are they separated from one another in such a way that the divine nature goes with one person, namely, the Word of God, and the human nature with another person, namely, Jesus of Nazareth. The two natures belong to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. A Confucian Algorithm for Autonomous Vehicles.Tingting Sui & Sebastian Sunday Grève - 2024 - Science and Engineering Ethics 30 (52):1-22.
    Any moral algorithm for autonomous vehicles must provide a practical solution to moral problems of the trolley type, in which all possible courses of action will result in damage, injury, or death. This article discusses a hitherto neglected variety of this type of problem, based on a recent psychological study whose results are reported here. It argues that the most adequate solution to this problem will be achieved by a moral algorithm that is based on Confucian ethics. In addition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Neutrosophic speech recognition Algorithm for speech under stress by Machine learning.Florentin Smarandache, D. Nagarajan & Said Broumi - 2023 - Neutrosophic Sets and Systems 53.
    It is well known that the unpredictable speech production brought on by stress from the task at hand has a significant negative impact on the performance of speech processing algorithms. Speech therapy benefits from being able to detect stress in speech. Speech processing performance suffers noticeably when perceptually produced stress causes variations in speech production. Using the acoustic speech signal to objectively characterize speaker stress is one method for assessing production variances brought on by stress. Real-world complexity and ambiguity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. subregular tetrahedra.John Corcoran - 2008 - Bulletin of Symbolic Logic 14 (3):411-2.
    This largely expository lecture deals with aspects of traditional solid geometry suitable for applications in logic courses. Polygons are plane or two-dimensional; the simplest are triangles. Polyhedra [or polyhedrons] are solid or three-dimensional; the simplest are tetrahedra [or triangular pyramids, made of four triangles]. -/- A regular polygon has equal sides and equal angles. A polyhedron having congruent faces and congruent [polyhedral] angles is not called regular, as some might expect; rather they are said to be subregular—a word coined for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Molecularity in the Theory of Meaning and the Topic Neutrality of Logic.Bernhard Weiss & Nils Kürbis - 2024 - In Antonio Piccolomini D'Aragona, Perspectives on Deduction: Contemporary Studies in the Philosophy, History and Formal Theories of Deduction. Springer Verlag. pp. 187-209.
    Without directly addressing the Demarcation Problem for logic—the problem of distinguishing logical vocabulary from others—we focus on distinctive aspects of logical vocabulary in pursuit of a second goal in the philosophy of logic, namely, proposing criteria for the justification of logical rules. Our preferred approach has three components. Two of these are effectively Belnap’s, but with a twist. We agree with Belnap’s response to Prior’s challenge to inferentialist characterisations of the meanings of logical constants. Belnap argued that for a logical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. In Defense of Contextual Vocabulary Acquisition: How to Do Things with Words in Context.William J. Rapaport - 2005 - In Anind Dey, Boicho Kokinov, David Leake & Roy Turner, Proceedings of the 5th International and Interdisciplinary Conference on Modeling and Using Context. Springer-Verlag Lecture Notes in Artificial Intelligence 3554. pp. 396--409.
    Contextual vocabulary acquisition (CVA) is the deliberate acquisition of a meaning for a word in a text by reasoning from context, where “context” includes: (1) the reader’s “internalization” of the surrounding text, i.e., the reader’s “mental model” of the word’s “textual context” (hereafter, “co-text” [3]) integrated with (2) the reader’s prior knowledge (PK), but it excludes (3) external sources such as dictionaries or people. CVA is what you do when you come across an unfamiliar word in your reading, realize that (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  39. (1 other version)An Indivisible Existence. Complexity, Governance and Responsibility in the Global Age.Roberto Franzini Tibaldeo - 2013 - Governare la Paura. Journal of Interdisciplinary Studies:192-218.
    The article begins with the redefinition of complexity and risk. Indeed, phenomena such as earthquakes, pandemics, ecological emergencies, and issues related to the development of technology highlight the unique and reciprocal relationship between complexity and risk. However, modernity endeavoured to simplify complexity and to erase the connection of the latter with any issue concerning risk. Despite its negative results, whose ineffectiveness and dangerousness have at the present become unmistakably clear, the attitude in favour of simplification succeeded in becoming the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. What Does it Mean that PRIMES is in P: Popularization and Distortion Revisited.Boaz Miller - 2009 - Social Studies of Science 39 (2):257-288.
    In August 2002, three Indian computer scientists published a paper, ‘PRIMES is in P’, online. It presents a ‘deterministic algorithm’ which determines in ‘polynomial time’ if a given number is a prime number. The story was quickly picked up by the general press, and by this means spread through the scientific community of complexity theorists, where it was hailed as a major theoretical breakthrough. This is although scientists regarded the media reports as vulgar popularizations. When the paper was published in (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  41. The Rhetoric and Reality of Anthropomorphism in Artificial Intelligence.David Watson - 2019 - Minds and Machines 29 (3):417-440.
    Artificial intelligence has historically been conceptualized in anthropomorphic terms. Some algorithms deploy biomimetic designs in a deliberate attempt to effect a sort of digital isomorphism of the human brain. Others leverage more general learning strategies that happen to coincide with popular theories of cognitive science and social epistemology. In this paper, I challenge the anthropomorphic credentials of the neural network algorithm, whose similarities to human cognition I argue are vastly overstated and narrowly construed. I submit that three alternative (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  42.  34
    From the other side: On dialogue in texts by Jostein Gaarder.Zuzana Svobodová - 2020 - Paideia: Philosophical e-Journal of Charles University 17 (1):1-6.
    From the other side: On dialogue in texts by Jostein Gaarder. – By analysing the phenomenon of dialogue in the works of the Norwegian writer Jostein Gaarder the paper shows the essence of the dialogical situation of man in the world. Admittingly, people find themselves in such dialogical situation already. However, by virtue of their freedom, they are capable of going beyond the existing feeling of security, and – through fundamental dialogue with a person coming from the other side, one, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Model Justifying Existence of 33 million Gods (6th edition).Tanuj Namboodri - 2023 - International Journal of Scientific Research and Engineering Development 6 (2):1253-1259.
    Beyond the grasp of our understanding lie enigmatic forces, whose presence is felt and measured, yet their origins remain elusive and mysterious. Despite our inability to fathom them, we cannot refute their existence. This article discusses the possibility of the existence of 33 million gods or more in Hinduism, which is often associated with polytheism. The article cites literature that explores how energy can be transformed from one form to another, and how special shapes can be used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  52
    Weighted Particle Swarm Optimization Algorithms and Power Management Strategies for Grid Hybrid Energy Systems (4th edition).Rajendran Sugumar - 2023 - International Conference on Recent Advances on Science and Engineering 4 (5):1-11.
    In independent renewable energy systems (RESs), one of the primary concerns needing to be addressed is the maintaining of power balances between supplies and requirements that are cost-optimized in residences linked to these systems. The amount of power generated through RESs has substantially risen, with solar and wind being the two primary sources in RESs. In modern power systems, small-scale distributed networks are growing at a rapid pace and distributed generation (DG) plays an important role. Micro grids are very recent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Eternity in Kant and Post-Kantian European Thought.Alistair Welchman - 2016 - In Yitzhak Y. Melamed, Eternity a History. New York, New York: Oxford University Press USA. pp. 179-225.
    The story of eternity is not as simple as a secularization narrative implies. Instead it follows something like the trajectory of reversal in Kant’s practical proof for the existence of god. In that proof, god emerges not as an object of theoretical investigation, but as a postulate required by our practical engagement with the world; so, similarly, the eternal is not just secularized out of existence, but becomes understood as an entailment of, and somehow imbricated in, the conditions (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. What is The Reason to Use Clifford Algebra in Quantum Cognition? Part I: “It from Qubit” On The Possibility That the Amino Acids Can Discern Between Two Quantum Spin States.Elio Conte - 2012 - Neuroquantology 10 (3):561-565.
    Starting with 1985, we discovered the possible existence of electrons with net helicity in biomolecules as amino acids and their possibility to discern between the two quantum spin states. It is well known that the question of a possible fundamental role of quantum mechanics in biological matter constitutes still a long debate. In the last ten years we have given a rather complete quantum mechanical elaboration entirely based on Clifford algebra whose basic entities are isomorphic to the well (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. STRINGS ARE BINARY DIGITS WHOSE CURRENTS IN TWO 2-D MOBIUS LOOPS PRODUCE A 4-D FIGURE-8 KLEIN BOTTLE THAT COMPOSES EACH OF THE SUBUNIVERSES IN THE ONE UNIVERSE.Rodney Bartlett - 2013 - Vixra.Org (Category - Quantum Gravity and String Theory).
    The strings of physics’ string theory are the binary digits of 1 and 0 used in computers and electronics. The digits are constantly switching between their representations of the “on” and “off” states. This switching is usually referred to as a flow or current. Currents in the two 2-dimensional programs called Mobius loops are connected into a four-dimensional figure-8 Klein bottle by the infinitely-long irrational and transcendental numbers. Such an infinite connection translates - via bosons being ultimately composed of 1’s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Gödelova věta a relace logického důsledku.Jaroslav Zouhar - 2010 - Teorie Vědy / Theory of Science 32 (1):59-95.
    In his proof of the first incompleteness theorem, Kurt Gödel provided a method of showing the truth of specific arithmetical statements on the condition that all the axioms of a certain formal theory of arithmetic are true. Furthermore, the statement whose truth is shown in this way cannot be proved in the theory in question. Thus it may seem that the relation of logical consequence is wider than the relation of derivability by a pre-defined set of rules. The aim (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. What is Done, Is Done.David B. Johnson - 2023 - In Between Ethics: Navigating the Ethical Space in Business. Dubuque: Kendall-Hunt Publishing.
    An interruption. Rethinking the first three chapters of this book, I have come to suspect that, not unlike Iris Murdoch and Emmanuel Levinas, the way I imagine ‘ethics’ floats on an idea that any ethical substantive position or ethical theory is always shaped through our existential condition and our embodied encounter with others. To Murdoch, existence is the disposition for our responses to the ways in which we perceive reality, and yet, although these responses are always part of who (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  34
    MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
1 — 50 / 975