Results for 'software verification'

470 found
Order:
  1. A Dynamic Software Certification and Verification Procedure.Julio Michael Stern & Carlos Alberto de Braganca Pereira - 1998 - SCI’99 Proceedings 2:426-435.
    in Oct-14-1998 ordinance INDESP-IO4 established the federal software certification and verification requirements for gaming machines in Brazil. The authors present the rationale behind these criteria, whose basic principles can find applications in several other software authentication applications.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. What Have Google’s Random Quantum Circuit Simulation Experiments Demonstrated about Quantum Supremacy?Jack K. Horner & John Symons - 2021 - In Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti & Quoc-Nam Tran (eds.), Advances in Software Engineering, Education, and E-Learning: Proceedings From Fecs'20, Fcs'20, Serp'20, and Eee'20. Springer.
    Quantum computing is of high interest because it promises to perform at least some kinds of computations much faster than classical computers. Arute et al. 2019 (informally, “the Google Quantum Team”) report the results of experiments that purport to demonstrate “quantum supremacy” – the claim that the performance of some quantum computers is better than that of classical computers on some problems. Do these results close the debate over quantum supremacy? We argue that they do not. In the following, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Introduction: Formal approaches to multi-agent systems: Special issue of best papers of FAMAS 2007.B. Dunin-Keplicz & R. Verbrugge - 2013 - Logic Journal of the IGPL 21 (3):309-310.
    Over the last decade, multi-agent systems have come to form one of the key tech- nologies for software development. The Formal Approaches to Multi-Agent Systems (FAMAS) workshop series brings together researchers from the fields of logic, theoreti- cal computer science and multi-agent systems in order to discuss formal techniques for specifying and verifying multi-agent systems. FAMAS addresses the issues of logics for multi-agent systems, formal methods for verification, for example model check- ing, and formal approaches to cooperation, multi-agent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Software is an abstract artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  7. SOCIAL VERIFICATION – HUMAN DIMENSONS OF THEORETICAL SCIENCE AND HIGH-TECH (CASUS BIOETHICS). Part Three. DYNAMICS OF GROWTH OF NEW KNOWLEDGE IN POSTACADEMICAL SCIENCE.Valentin Cheshko & Yulia Kosova - 2012 - Practical Philosophy 1:59-69.
    The new phase of science evolution is characterized by totality of subject and object of cognition and technology (high-hume). As a result, forming of network structure in a disciplinary matrix modern are «human dimensional» natural sciences and two paradigmal «nuclei» (attraktors). As a result, the complication of structure of disciplinary matrix and forming a few paradigm nuclei in modern «human dimensional» natural sciences are observed. In the process of social verification integration of scientific theories into the existent system of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. SOCIAL VERIFICATION – HUMAN DIMENSONS OF THEORETICAL SCIENCE AND HIGH-TECH (CASUS BIOETHICS). Part One.Valentin Cheshko & Yulia Kosova - 2011 - Practical Philosophy 1:94-100.
    The new phase of science evolution is characterized by totality of subject and object of cognition and technology (high-hume). As a result, forming of network structure in a disciplinary matrix modern are «human dimensional» natural sciences and two paradigmal «nuclei» (attraktors). As a result, the complication of structure of disciplinary matrix and forming a few paradigm nuclei in modern «human dimensional» natural sciences are observed. In the process of social verification integration of scientific theories into the existent system of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Verification: The Hysteron Proteron Argument.Francis Jeffry Pelletier & Bernard Linsky - 2018 - Journal for the History of Analytical Philosophy 6 (6).
    This paper investigates the strange case of an argument that was directed against a positivist verification principle. We find an early occurrence of the argument in a talk by the phenomenologist Roman Ingarden at the 1934 International Congress of Philosophy in Prague, where Carnap and Neurath were present and contributed short rejoinders. We discuss the underlying presuppositons of the argument, and we evaluate whether the attempts by Carnap (especially) actually succeed in answering this argument. We think they don’t, and (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  10. Constructive Verification, Empirical Induction, and Falibilist Deduction: A Threefold Contrast.Julio Michael Stern - 2011 - Information 2 (4):635-650.
    This article explores some open questions related to the problem of verification of theories in the context of empirical sciences by contrasting three epistemological frameworks. Each of these epistemological frameworks is based on a corresponding central metaphor, namely: (a) Neo-empiricism and the gambling metaphor; (b) Popperian falsificationism and the scientific tribunal metaphor; (c) Cognitive constructivism and the object as eigen-solution metaphor. Each of one of these epistemological frameworks has also historically co-evolved with a certain statistical theory and method for (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  11. Computer verification for historians of philosophy.Landon D. C. Elkind - 2022 - Synthese 200 (3):1-28.
    Interactive theorem provers might seem particularly impractical in the history of philosophy. Journal articles in this discipline are generally not formalized. Interactive theorem provers involve a learning curve for which the payoffs might seem minimal. In this article I argue that interactive theorem provers have already demonstrated their potential as a useful tool for historians of philosophy; I do this by highlighting examples of work where this has already been done. Further, I argue that interactive theorem provers can continue to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. SOCIAL VERIFICATION – HUMAN DIMENSONS OF THEORETICAL SCIENCE AND HIGH-TECH (CASUS BIOETHICS). Part Two.Valentin Cheshko & Yulia Kosova - 2011 - Practical Philosophy 2:46-55.
    The new phase of science evolution is characterized by totality of subject and object of cognition and technology (high-hume). As a result, forming of network structure in a disciplinary matrix modern are «human dimensional» natural sciences and two paradigmal «nuclei» (attraktors). As a result, the complication of structure of disciplinary matrix and forming a few paradigm nuclei in modern «human dimensional» natural sciences are observed.
    Download  
     
    Export citation  
     
    Bookmark  
  13. Handwritten Signature Verification using Deep Learning. [REVIEW]Eman Alajrami, Belal A. M. Ashqar, Bassem S. Abu-Nasser, Ahmed J. Khalil, Musleh M. Musleh, Alaa M. Barhoom & Samy S. Abu-Naser - manuscript
    Every person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions. There are two kinds of signature verification: static and dynamic. Static(off-line) verification is the process of verifying an electronic or document signature after it has been made, while dynamic(on-line) verification takes place as a person creates his/her signature on a digital tablet or a similar device. Offline signature verification is not (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  14. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Werner Ceusters, Barry Smith & James Matthew Fielding (eds.), Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). Springer. pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that is designed (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Ciencia de la computación y filosofía: unidades de análisis del software.Juan Manuel Durán - 2018 - Principia 22 (2):203-227.
    Una imagen muy generalizada a la hora de entender el software de computador es la que lo representa como una “caja negra”: no importa realmente saber qué partes lo componen internamente, sino qué resultados se obtienen de él según ciertos valores de entrada. Al hacer esto, muchos problemas filosóficos son ocultados, negados o simplemente mal entendidos. Este artículo discute tres unidades de análisis del software de computador, esto es, las especificaciones, los algoritmos y los procesos computacionales. El objetivo (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  18. On malfunctioning software.Giuseppe Primiero, Nir Fresco & Luciano Floridi - 2015 - Synthese 192 (4):1199-1220.
    Artefacts do not always do what they are supposed to, due to a variety of reasons, including manufacturing problems, poor maintenance, and normal wear-and-tear. Since software is an artefact, it should be subject to malfunctioning in the same sense in which other artefacts can malfunction. Yet, whether software is on a par with other artefacts when it comes to malfunctioning crucially depends on the abstraction used in the analysis. We distinguish between “negative” and “positive” notions of malfunction. A (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  19. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  82
    Preconceptual Modeling in Software Engineering: Metaphysics of Diagrammatic Representations.Sabah Al-Fedaghi - manuscript
    Conceptual modeling of a portion of the world is a necessary prerequisite to set the stage and define software system boundaries. In this context, one of the challenges is to provide a unified framework to create a comprehensive representation of the targeted domain. According to many researchers, conceptual model (CM) development is a hard task, and system requirements are difficult to collect, causing many miscommunication problems. Accordingly, CMs require more than modeling ability alone: they first require an understanding of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Why are Software Patents so Elusive? A Platonic Approach.Odin Kroeger - 2011 - Masaryk University Journal of Law and Technology 5 (1):57-70.
    Software patents are commonly criticised for being fuzzy, context-sensitive, and often granted for trivial inventions. More often than not, these shortcomings are said to be caused by the abstract nature of software - with little further analysis offered. Drawing on Plato’s Parmenides, this paper will argue (1) that the reason why software patents seem to be elusive is that patent law suggests to think about algorithms as paradigmatic examples and (2) that Plato’s distinction between two modes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Validation and Verification in Social Simulation: Patterns and Clarification of Terminology.Nuno David - 2009 - Epistemological Aspects of Computer Simulation in the Social Sciences, EPOS 2006, Revised Selected and Invited Papers, Lecture Notes in Artificial Intelligence, Squazzoni, Flaminio (Ed.) 5466:117-129.
    The terms ‘verification’ and ‘validation’ are widely used in science, both in the natural and the social sciences. They are extensively used in simulation, often associated with the need to evaluate models in different stages of the simulation development process. Frequently, terminological ambiguities arise when researchers conflate, along the simulation development process, the technical meanings of both terms with other meanings found in the philosophy of science and the social sciences. This article considers the problem of verification and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Using Argument Diagramming Software in the Classroom.Maralee Harrell - 2005 - Teaching Philosophy 28 (2):163-177.
    Many undergraduates, philosophy majors included, read philosophical texts similar to the way they read stories. One method for teaching students how to discern the argumentative structure of a philosophy text is through argument diagrams (text boxes used to represent claims with arrows and lines used to represent connections between these claims). This paper provides criteria for an ideal argument diagramming software and then reviews the strengths and weaknesses of such software currently available, e.g. Araucaria, Argutect, Athena Standard, Inspiration, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  25. Plagiarism Software is a Creator or Destroyer for Effective Writing.A. Subaveerapandiyan - 2022 - DESIDOC Journal of Library and Information Technology 42 (2): 114-118.
    Plagiarism is malpractice, the fabrication of others’ “ideas or work” published without the proper permission or citation of the original contributors. Plagiarism is detected through different software, i.e., Turnitin, before publishing any research data. The present survey study assesses whether academicians, researchers, and scholars around the world perceive this software as a creator or destroyer of new thoughts and ideas. A survey of this research data was conducted with academicians, researchers, and scholars around the globe. The number of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Tableau Software: Vizualizarea și analiza datelor.Nicolae Sfetcu - 2023 - It and C 2 (3):36-42.
    În prezent, datele sunt generate peste tot, precum YouTube, Tumblr, Reddit, Facebook, WhatsApp FacebookNS, Twitter, Instagram, Gmail, LinkedIn și Academia. Înțelegerea acestor date este foarte importantă, deoarece aceasta este o entitate crucială și foarte importantă a unei organizații, națiuni și instituții. Analiza și vizualizările seturilor de date pot oferi noi tendințe în afaceri, politică, sau intelligence, pot preveni bolile și pot modela pentru a prognoza paradigmele viitoare și a combate criminalitatea, și așa mai departe. În acest moment, cel mai utilizat (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Meaning and Verification.Moritz Schlick - 1936 - Philosophical Review 45 (4):339-369.
    Download  
     
    Export citation  
     
    Bookmark   86 citations  
  28. "La vérification en science et en théologie : qui valide quoi ?".Gagnon Philippe - 2022 - Connaître : Cahiers de l'Association Foi Et Culture Scientifique 57 (March):59-74.
    Très souvent, on compte sur la science pour nous sauver. Le rapport qu'on établit avec elle peut donner à penser que la science parlerait ainsi de choses, validerait quelque chose comme des évidences immédiates. La connaissance scientifique est inférentielle. Si elle a un objet, ce qu'en rigueur de termes la philosophie n'a pas, elle doit néanmoins se mettre à distance de lui pour se faire science. Elle valide ainsi des schèmes abstraits, qui ne sont scientifiques que dans cette mesure. Nous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. SP2MN: a Software Process Meta-Modeling Language.Hisham Khdair - 2015 - International Review on Computers and Software 10 (7):726-734.
    In the last two decades, software process modeling has been an area of interest within both academia and industry. Software process modeling aims at defining and representing software processes in the form of models. A software process model represents the medium that allows better understanding, management and control of the software process. Software process metamodeling rather, provides standard metamodels which enable the defining of customized software process models for a specific project in hand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Improve Popper and procure a perfect simulacrum of verification indistinguishable from the real thing.Nicholas Maxwell - 2021 - Journal for General Philosophy of Science.
    According to Karl Popper, science cannot verify its theories empirically, but it can falsify them, and that suffices to account for scientific progress. For Popper, a law or theory remains a pure conjecture, probability equal to zero, however massively corroborated empirically it may be. But it does just seem to be the case that science does verify empirically laws and theories. We trust our lives to such verifications when we fly in aeroplanes, cross bridges and take modern medicines. We can (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  32. The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Good and evil as softwares of the brain, on psychological immediates underlying the metaphysical ultimates-a contribution from cognitive social-psychology and semantic differential research.Guido Peeters - 1986 - Ultimate Reality and Meaning 9 (3):210-231.
    Download  
     
    Export citation  
     
    Bookmark  
  35. The Hemingway's Six-Word Story Effect: A Psycholinguistic Verification.Vitalii Shymko - 2022 - Psycholinguistics 32 (1).
    Purpose. An empirical verification of the Hemingway’s “sad hypothesis” and study of some individual characteristics of a discourse formation in a process of short texts understanding. -/- Methods and procedure of research. The study was based on the principle of a standardized interview, which was carried out on a random sample (103 respondents) using the questionnaire. The subjects interpreted two proverbs and the short story by Hemingway (“For sale: baby shoes, never worn”). In each case, it was proposed to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Epistemic issues in computational reproducibility: software as the elephant in the room.Alexandre Hocquet & Frédéric Wieber - 2021 - European Journal for Philosophy of Science 11 (2):1-20.
    Computational reproducibility possesses its own dynamics and narratives of crisis. Alongside the difficulties of computing as an ubiquitous yet complex scientific activity, computational reproducibility suffers from a naive expectancy of total reproducibility and a moral imperative to embrace the principles of free software as a non-negotiable epistemic virtue. We argue that the epistemic issues at stake in actual practices of computational reproducibility are best unveiled by focusing on software as a pivotal concept, one that is surprisingly often overlooked (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. Comparative study of manual and computerized software techniques of data management and analysis in educational research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):35-45.
    The study was conducted to compare manual and computerized software techniques of data management and analysis in educational research. Specifically, the study investigated whether there was a significant difference in the results of Pearson correlation, independent t-test and ANOVA obtained from using manual and computerized software technique of data analyses. Three null hypotheses were formulated accordingly to guide the study. The study adopted a quasi-experimental research design where several data were generated by the researchers and analyzed using manual (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  38. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. A Preliminary Experimental Verification of Violation of Bell Inequality in a Quantum Model of Jung Theory of Personality Formulated with Clifford Algebra.Elio Conte - 2010 - Journal of Consciousness Exploration and Research 1 (7):831-849.
    We comment some recent results obtained by using a Clifford bare bone skeleton of quantum mechanics in order to formulate the conclusion that quantum mechanics has its origin in the logic, and relates conceptual entities. Such results touch directly the basic problem about the structure of our cognitive and conceptual dynamics and thus of our mind. The problem of exploring consciousness results consequently to be strongly linked. This is the reason because studies on quantum mechanics applied to this matter are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Working platform design - Verification by static and dynamic plate load testing, case study Tirana, Albania.Klodjan Xhexhi - 2023 - Research Inventy: International Journal of Engineering and Science 13 (2):04-11.
    The foundation of a building connects the main body superstructure to the ground. Every form of foundation and footing have a unique application in a given location for a certain weather condition. Understanding the foundation work is crucial for carrying out building activities. Due to the variety of structures they support, foundations are frequently built in different subsoil conditions and are exposed to static loads. The proper evaluation of soil-bearing capacity is fundamental to the construction of various buildings. One of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Falsification of theories without verification of basic statements – an argument for the possibility of knowledge growth.Rainer Willi Maurer - manuscript
    Karl Popper rightly contests the possibility of a verification of basic statements. At the same time he strictly believes in the possibility of growth of empirical knowledge. Knowledge growth, however, is only possible if empirical theories can be falsified. This raises the question, how theories can be falsified, if a verification of those statements that falsify theories – i.e. basic statements – is not possible. This problem is often referred to as the “basic problem” or “problem of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The mind as the software of the brain.Ned Block - 1990 - In Daniel N. Osherson & Edward E. Smith (eds.), An Invitation to Cognitive Science: Visual cognition. 2. MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  43. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between physicality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Relevance and Verification.Ben Blumson - 2021 - Philosophical Quarterly 71 (3):457-480.
    A. J. Ayer’s empiricist criterion of meaning was supposed to have sorted all statements into nonsense on the one hand, and tautologies or genuinely factual statements on the other. Unfortunately for Ayer, it follows from classical logic that his criterion is trivial—it classifies all statements as either tautologies or genuinely factual, but none as nonsense. However, in this paper, I argue that Ayer’s criterion of meaning can be defended from classical proofs of its triviality by the adoption of a relevant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The effect of negative polarity items on inference verification.Anna Szabolcsi, Lewis Bott & Brian McElree - 2008 - Journal of Semantics 25 (4):411-450.
    The scalar approach to negative polarity item (NPI) licensing assumes that NPIs are allowable in contexts in which the introduction of the NPI leads to proposition strengthening (e.g., Kadmon & Landman 1993, Krifka 1995, Lahiri 1997, Chierchia 2006). A straightforward processing prediction from such a theory is that NPI’s facilitate inference verification from sets to subsets. Three experiments are reported that test this proposal. In each experiment, participants evaluated whether inferences from sets to subsets were valid. Crucially, we manipulated (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  46.  17
    Introduction to Develop Some Software Programs for Dealing with Neutrosophic Sets.A. Salama, Haitham A. El-Ghareeb, Ayman M. Manie & Florentin Smarandache - 2014 - Neutrosophic Sets and Systems 3:51-52.
    In this paper, we have developed an Excel package to be utilized for calculating neutrosophic data and analyze them. The use of object oriented programming techniques and concepts as they may apply to the design and development a new framework to implement neutrosophic data operations, the c# programming language, NET Framework and Microsoft Visual Studio are used to implement the neutrosophic classes. We have used Excel as it is a powerful tool that is widely accepted and used for statistical analysis. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego (Podlasie economy starters. Analysis of economic growth and innovation areas of Podlaskie: software production sector).Bogusław Plawgo, Anna Grabska, Magdalena Klimczuk-Kochańska, Andrzej Klimczuk, Jacek Kierklo & Justyna Żynel-Etel - 2011 - Wojewódzki Urząd Pracy W Białymstoku.
    More Info: B. Plawgo, A. Grabska, M. Klimczuk-Kochańska, A. Klimczuk, J. Kierklo, J. Żynel-Etel, Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego (Podlasie economy starters. Analysis of economic growth and innovation areas of Podlaskie: software production sector), Wojewódzki Urząd Pracy w Białymstoku, Białystok 2011.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. Halting problem proofs refuted on the basis of software engineering ?P. Olcott - manuscript
    This is an explanation of a possible new insight into the halting problem provided in the language of software engineering. Technical computer science terms are explained using software engineering terms. No knowledge of the halting problem is required. -/- It is based on fully operational software executed in the x86utm operating system. The x86utm operating system (based on an excellent open source x86 emulator) was created to study the details of the halting problem proof counter-examples at the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. A Corpus Study of "Know": On the Verification of Philosophers' Frequency Claims about Language.Nat Hansen, J. D. Porter & Kathryn Francis - 2019 - Episteme 18 (2):242-268.
    We investigate claims about the frequency of "know" made by philosophers. Our investigation has several overlapping aims. First, we aim to show what is required to confirm or disconfirm philosophers’ claims about the comparative frequency of different uses of philosophically interesting expressions. Second, we aim to show how using linguistic corpora as tools for investigating meaning is a productive methodology, in the sense that it yields discoveries about the use of language that philosophers would have overlooked if they remained in (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  50. A Study of Obstacles in Plagiarism Software Subscribing by Colleges in Tamil Nadu.A. Subaveerapandiyan & N. Sakthivel - 2022 - DESIDOC Journal of Library and Information Technology 42 (5):318-324.
    This article attempts to comprehend the current issues and hurdles that Indian colleges affiliated with Tamil Nadu State Universities encounter when trying to subscribe to a software that detects plagiarism. The study’s goals are to determine whether colleges employ anti-plagiarism software, whether they ensure that their student-given assignments are free of copyright infringement, whether tutors teach about academic misconduct, and what people seem to think of anti-plagiarism software. We surveyed for this study and distributed the questionnaires among (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 470