Results for ' Hash'

53 found
Order:
  1. A Recipe for Support Staff Professional Development.Vickie Hash - 2002 - Inquiry (ERIC) 7 (1):8-10.
     
    Export citation  
     
    Bookmark  
  2. Mengzi di zhi hui.Hash - 1980 - Taibei: fa xing suo Guo jia shu dian you xian gong si.
     
    Export citation  
     
    Bookmark  
  3. Ninjō to giri: hyūmanizumu no shōtai.Hash - 1978 - Tōkyō: Taimatsusha.
    No categories
     
    Export citation  
     
    Bookmark  
  4.  38
    Article about the reception of the encyclical.Achad Hash'erit - 1993 - The Chesterton Review 19 (3):417-419.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5. Disjunctivism.HTML::Element=HASH(0x55e425c05ef8) - 2009 - Internet Encyclopedia of Philosophy.
    Disjunctivism, as a theory of visual experience, claims that the mental states involved in a “good case” experience of veridical perception and a “bad case” experience of hallucination differ, even in those cases in which the two experiences are indistinguishable for their subject. Consider the veridical perception of a bar stool and an indistinguishable hallucination; both of these experiences might be classed together as experiences (as) of a bar stool or experiences of seeming to see a bar stool. This might (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  6.  8
    Arts-based research across textual media in education: expanding visual epistemology.Jason Dehart & Peaches Hash (eds.) - 2023 - New York: Routledge.
    In company with its sister volume, Arts-Based Research Across Textual Media in Education explores arts-based approaches to research across media, including film and comics-related material, from a variety of geographic locations and across a range of sub-disciplines within the field of education. This first volume takes a textual focus, capturing process, poetic, and dramaturgical approaches. The authors aim to highlight some of the approaches that are not always centered in arts-based research. The contributors represent a variety of arts-based practices and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  3
    Hardening and microstructure evolution in proton-irradiated model and commercial pressure-vessel steels.G. S. Was, M. Hash & R. G. Odette - 2005 - Philosophical Magazine 85 (4-7):703-722.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  4
    Hardening and microstructure evolution in proton-irradiated model and commercial pressure-vessel steels.G. S. Was *, M. Hash & R. G. Odette - 2005 - Philosophical Magazine 85 (4-7):703-722.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Cryptographic hash functions based on ALife.Mark A. Bedau, Richard Crandall & Michael J. Raven - 2009 - Psipress.
    There is a long history of cryptographic hash functions, i.e. functions mapping variable-length strings to fixed-length strings, and such functions are also expected to enjoy certain security properties. Hash functions can be effected via modular arithmetic, permutation-based schemes, chaotic mixing, and so on. Herein we introduce the notion of an artificial-life (ALife) hash function (ALHF), whereby the requisite mixing action of a good hash function is accomplished via ALife rules that give rise to complex evolution of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  7
    Connectionist hashed associative memory.Ronald L. Greene - 1991 - Artificial Intelligence 48 (1):87-98.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  1
    HASH(0x55a475563790).Wayne Hugo - 2015 - Cape Town, South Africa: African Minds.
    All the schools of the world -- Unpacking classrooms -- How the 'brain' learns -- Charting the space between demons and angels -- History of the world in a child -- From one-world classroom to one learning sequence -- Conclusion, exercising the educational imagination.
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  6
    HASH (0xb7ee0818).C. Wild - 2008 - Poiesis and Praxis: International Journal of Ethics of Science and Technology Assessment 5 (1):1-14.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. Approximate counting by hashing in bounded arithmetic.Emil Jeřábek - 2009 - Journal of Symbolic Logic 74 (3):829-860.
    We show how to formalize approximate counting via hash functions in subsystems of bounded arithmetic, using variants of the weak pigeonhole principle. We discuss several applications, including a proof of the tournament principle, and an improvement on the known relationship of the collapse of the bounded arithmetic hierarchy to the collapse of the polynomial-time hierarchy.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14. Hash runners and hellenistic philosophers.Richard DeWitt - 2007 - In Michael W. Austin (ed.), Running and Philosophy: A Marathon for the Mind. Blackwell.
  15. Cryptographic hash functions from sequences of lifted Paley graphs.Serena Yuan - 2016 - In Delaram Kahrobaei, Bren Cavallo & David Garber (eds.), Algebra and computer science. Providence, Rhode Island: American Mathematical Society.
     
    Export citation  
     
    Bookmark  
  16. Color representations as hash values.Justin C. Fisher - 2005
    The goal of this paper is to answer the following question: When we have mental states that represent certain things as being colored, what properties are our mental states representing these things as having?
     
    Export citation  
     
    Bookmark  
  17.  4
    A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics.Gongzheng Liu, Jingsha He & Xinggang Xuan - 2021 - Complexity 2021:1-12.
    Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require. However, the current data preservation models and technologies are only the combination of cryptography technology, and there is a risk of being attacked and cracked. And in the process of data preservation, human participation is also needed, which may lead to data tampering. To solve problems given, this paper presents (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  21
    Design of a New Distributed NoSQL Database with Distributed Hash Tables.Agustín San Román Guzmán, Diego Valdeolmillos, Alberto Rivas, Angélica González Arrieta & Pablo Chamoso - 2022 - Logic Journal of the IGPL 30 (4):566-577.
    Databases play a fundamental role in today’s world, being used by most companies, especially those that offer services through the Internet. Today there is a wide variety of database models, each adapted for use according to the specific requirements of each application. Traditionally, the relational models with centralized architectures have been used mostly due to their simplicity and general-purpose query language, which made relational systems suitable for almost any application. However, with the growth of the Internet in recent decades, both (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  9
    A Critical Edition of the “Ĥāshıya ‘alā Muqaddımāt al-Arba‘a” of Muśliĥu’d-Dīn al-Kastalī and an Analytical Interpretation of the Work.Mustafa Bilal ÖZTÜRK - 2020 - Kader 18 (2):666-724.
    The text of “The Four Premises” (Muqaddimāt al-Arba‘a), which began with Sadr al-Sharī‘ah (d. 747/1346), centralizes on the actions of human beings by connecting it with the problem of good and evil in the field of kalām, Islamic philosophy and logic, and fıqh. It was also commented in with incisive and critical footness by Sa‘d al-Dīn al-Taftāzānī (d. 791/1390). In Ĥāshiya ‘alā Muqaddimāt al-Arba‘a, al-Kastalī (d. 901/1496) discusses the two main issues. One of them is good/husn-evil/qubh, the other is human (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  91
    Justin Fisher's 'color representations as hash values'.Benj Hellie - manuscript
    Justin makes a novel case, based on reflection on the “telos” of color vision, for a dispositional theory of colors. Justin’s case is highly suggestive, and comes tantalizingly close to resolving the debate in the metaphysics of color. But I have a few questions which I would like to see answered before I am converted.
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Bishārat: khudā bih zādgāhash ba̲z mīʹgardad.Hūshang Muʻīnʹzādah - 2005 - France: Āz̲arakhsh.
    No categories
     
    Export citation  
     
    Bookmark  
  22.  92
    Meaningful electronic signatures based on an automatic indexing method.Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous & Nathanael Cottin - 2006 - Artificial Intelligence and Law 14 (3):161-175.
    Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in concern. Therefore, these new and evolving technologies offer powerful abilities, such as identification, authentication and certification. The latter contribute to increase the global security of legal digital archives conservation and access. However, currently used cryptographic and hash coding concepts cannot intrinsically enclose cognitive information about both the signer and the signed content. Indeed, an evolution of these (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  23. Internalism about reasons: sad but true?Kate Manne - 2014 - Philosophical Studies 167 (1):89-117.
    Internalists about reasons following Bernard Williams claim that an agent’s normative reasons for action are constrained in some interesting way by her desires or motivations. In this paper, I offer a new argument for such a position—although one that resonates, I believe, with certain key elements of Williams’ original view. I initially draw on P.F. Strawson’s famous distinction between the interpersonal and the objective stances that we can take to other people, from the second-person point of view. I suggest that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  24. Algorithmic content moderation: Technical and political challenges in the automation of platform governance.Christian Katzenbach, Reuben Binns & Robert Gorwa - 2020 - Big Data and Society 7 (1):1–15.
    As government pressure on major technology companies builds, both firms and legislators are searching for technical solutions to difficult platform governance puzzles such as hate speech and misinformation. Automated hash-matching and predictive machine learning tools – what we define here as algorithmic moderation systems – are increasingly being deployed to conduct content moderation at scale by major platforms for user-generated content such as Facebook, YouTube and Twitter. This article provides an accessible technical primer on how algorithmic moderation works; examines (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  25.  8
    Facial Expression Recognition Using Kernel Entropy Component Analysis Network and DAGSVM.Xiangmin Chen, Li Ke, Qiang Du, Jinghui Li & Xiaodi Ding - 2021 - Complexity 2021:1-12.
    Facial expression recognition plays a significant part in artificial intelligence and computer vision. However, most of facial expression recognition methods have not obtained satisfactory results based on low-level features. The existed methods used in facial expression recognition encountered the major issues of linear inseparability, large computational burden, and data redundancy. To obtain satisfactory results, we propose an innovative deep learning model using the kernel entropy component analysis network and directed acyclic graph support vector machine. We use the KECANet in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  26
    Humean Reductionism about Laws of Nature.Ned Hall - 2015 - In Barry Loewer & Jonathan Schaffer (eds.), A Companion to David Lewis. Oxford, UK: Wiley. pp. 262–277.
    This chapter investigates the prospects for an important position that falls under the "mere patterns" approach: what, for reasons that will emerge, the author calls"Humean reductionism" about laws of nature, a view championed perhaps most prominently by David Lewis. He reviews some of the most interesting arguments against this position from the literature, and adds some of his own that, he thinks, are more effective. The chapter considers how the best system account (BSA) would apply to the Newtonian particle world. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   38 citations  
  27. Vocation to Love: Supererogation in Aquinas.James Dominic Rooney - 2022 - International Journal of Systematic Theology 24 (2):156-172.
    Thomas Aquinas’ account of religious vocation has been interpreted as involving a qualified duty, where ordinary people fall short of living up to the moral ideal of becoming a monk or nun. Such an account of religious vocation makes a hash of Aquinas’ thought and misses important aspects of his ethics. Aquinas holds that religious life is praiseworthy, but not morally required, because there are multiple sources of normativity. I conclude by proposing that, while elements of Aquinas’ notion of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  13
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. I watch, therefore I am: from Socrates to Sartre, the great mysteries of life as explained through Howdy Doody, Marcia Brady, Homer Simpson, Don Draper, and other TV icons.Gregory Bergman - 2011 - Avon, Massachusetts: Adams Media. Edited by Peter Archer.
    Leave it to the boob tube to explain the meaning of existence. Let Gilligan's Island teach you about situational ethics. Learn about epistemology from The Brady Bunch. Explore Aristotle's Poetics by watching 24. Television has grappled with a wide range of philosophical conundrums. According to the networks, it's the ultimate source of all knowledge in the universe. So why not look at the small screen for answers to all of humanity's dilemmas? There's not a single issue discussed by the great (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  11
    Caveat Emptor Doesn’t Cut It.Rachel Cooper - 2013 - Voices in Bioethics 2013.
    We live in the era of Facebook, Fitbit, and Skype. As such, it would be unreasonable to expect that the healthcare industry would not see the same kind of globalization as do our social spheres and consumer activities. Indeed, the explosion of information technology, the ease of transcontinental travel, and the emergence of a more globally aware citizenry allows for scientific collaboration that has had many positive effects on global health. However, the economic and structural disparities between systems of healthcare (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  4
    “We Need to Cut the Neck!”: Confronting Psychological and Moral Distress during Emergency Cricothyrotomy.Stephanie Cooper - 2013 - Narrative Inquiry in Bioethics 3 (2):5-9.
    In lieu of an abstract, here is a brief excerpt of the content:“We Need to Cut the Neck!”Confronting Psychological and Moral Distress during Emergency Cricothyrotomy1Stephanie CooperEnoughYou didn’t die in the ER, but rather, began your inexorable demise. The last, first, and only words I ever heard you utter was the weak mewl “tight, tight” as the blood pressure cuff constricted your left arm. You were 98–years–old, bed–bound, at the end. Your world was already partitioning itself from us, your brain tunneling (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  15
    Approximate counting and NP search problems.Leszek Aleksander Kołodziejczyk & Neil Thapen - 2022 - Journal of Mathematical Logic 22 (3).
    Journal of Mathematical Logic, Volume 22, Issue 03, December 2022. We study a new class of NP search problems, those which can be proved total using standard combinatorial reasoning based on approximate counting. Our model for this kind of reasoning is the bounded arithmetic theory [math] of [E. Jeřábek, Approximate counting by hashing in bounded arithmetic, J. Symb. Log. 74(3) (2009) 829–860]. In particular, the Ramsey and weak pigeonhole search problems lie in the new class. We give a purely computational (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  51
    Proving Possession of Arbitrary Secrets While not Giving them Away: New Protocols and a Proof in GNY Logic.Wouter Teepe - 2006 - Synthese 149 (2):409-443.
    This paper introduces and describes new protocols for proving knowledge of secrets without giving them away: if the verifier does not know the secret, he does not learn it. This can all be done while only using one-way hash functions. If also the use of encryption is allowed, these goals can be reached in a more efficient way. We extend and use the GNY authentication logic to prove correctness of these protocols.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Expanding the Duty to Rescue to Climate Migration.David N. Hoffman, Anne Zimmerman, Camille Castelyn & Srajana Kaikini - 2022 - Voices in Bioethics 8.
    Photo by Jonathan Ford on Unsplash ABSTRACT Since 2008, an average of twenty million people per year have been displaced by weather events. Climate migration creates a special setting for a duty to rescue. A duty to rescue is a moral rather than legal duty and imposes on a bystander to take an active role in preventing serious harm to someone else. This paper analyzes the idea of expanding a duty to rescue to climate migration. We address who should have (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  27
    Structured Pigeonhole Principle, Search Problems and Hard Tautologies.Jan Krajíček - 2005 - Journal of Symbolic Logic 70 (2):619 - 630.
    We consider exponentially large finite relational structures (with the universe {0.1}ⁿ) whose basic relations are computed by polynomial size (nO(1)) circuits. We study behaviour of such structures when pulled back by P/poly maps to a bigger or to a smaller universe. In particular, we prove that: 1. If there exists a P/poly map g: {0.1} → {0.1}m, n < m, iterable for a proof system then a tautology (independent of g) expressing that a particular size n set is dominating in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  24
    Aristotle and the Constitution of the Political Community.Esben Korsgaard Rasmussen - 2018 - Epoché: A Journal for the History of Philosophy 23 (1):19-46.
    In this paper I will argue that the distinction between biological life and political life as found in Hannah Arendt’s reading of Aristotle and later repeated and elaborated by Giorgio Agamben under the headings of and, is in fact a fertile point of entry to, and the only viable option in order the grasp what constitutes the political as such for Aristotle. By hashing out the conceptual steps necessary for the establishment of what can be called a “political community”, I (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Oḥilah la-El: "Maʻarkhe Lev", le-Lev Śafah Meyuhedet Ha-Niḳret Maʻarakhah, Be-Sefer Zeh Nenaseh Yaḥad Li-Lemod Ule-Havin Otah.Jack Cohen - 2009 - Yaʻaḳov Y. Kohen.
    kerekh 1. Mifṿan maʼamarim meratḳim meha-ḥayim ha-yom yomiyim ha-medabrim el ha-lev ṿe-lo notnim la-hizdamnut la-ḥalof mi-beli le-hashʼir ṭaʻam shel ʻod.
     
    Export citation  
     
    Bookmark  
  38.  23
    An Analysis on Articles about Religious Education in the Journals Published by Theology Faculties in Turkey.Adem GÜNEŞ - 2018 - Cumhuriyet İlahiyat Dergisi 22 (3):1537-1561.
    Faculty journals are one of the necessary platforms for qualified academic production. Since 2018, the number of the published journals of theology faculty has reached 56. The purpose of this study is to analyze the articles on religious education published at journals of theology faculty between 1925 and 2017 by virtue of the used research methods such as qualitative and quantitative, and numerical distribution according to the journals, subject area diversity, scientific research methods used, contributions of different science branches, number (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  29
    Ruby vs. Perl – the Languages of Bioinformatics.Maciej Goliński & Agnieszka Kitlas Golińska - 2013 - Studies in Logic, Grammar and Rhetoric 35 (1):143-155.
    Ruby and Perl are programming languages used in many fields. In this paper we would like to present their usefulness with regard to basic bioinformatic problems. We concentrate on a comparison of widely used Perl and relatively rarely used Ruby to show that Ruby can be a very efficient tool in bioinformatics. Both Perl and Ruby have a built-in regular expressions engine, which is essential in solving many problems in bioinformatics. We present some selected examples: printing the file content, removing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  2
    Market Movers: the case of bitcoin in the Covid-19 setting.Daniela Penela - 2022 - Human Review. International Humanities Review / Revista Internacional de Humanidades 11 (7):1-11.
    Bitcoin is a virtual currency that provides a completely decentralized secure alternative to the currencies currently used. Nakamoto, the creator of this cryptocurrency, published an article on an encryption mailing list in 2008 with the title “Bitcoin: A Peer-to-Peer Electronic Cash System”, thus giving the creation of this virtual currency. This study aims to analyze the Bitcoin and what factors can influence its price, in the context of a pandemic. This work will focus on the bitcoin price and on five (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. The Garage (Take One).Sean Smith - 2013 - Continent 3 (2):70-87.
    This piece, included in the drift special issue of continent. , was created as one step in a thread of inquiry. While each of the contributions to drift stand on their own, the project was an attempt to follow a line of theoretical inquiry as it passed through time and the postal service(s) from October 2012 until May 2013. This issue hosts two threads: between space & place and between intention & attention . The editors recommend that to experience the (...)
     
    Export citation  
     
    Bookmark  
  42. Reply to Nagel 5/23; 18bot+end.Keith DeRose - unknown
    The key test cases for deciding between my brand of contextualism and Jennifer Nagel’s brand of invariantism are the third-person examples. As matters currently stand, first-person cases, like my original Bank cases (pp. 1-2), are pretty useless here. Nagel can agree that the speaker’s claim to “know” in Case A and his admission that he doesn’t “know” in Case B are both true; she just accepts a different account of why it is that both assertions can be, and are, true, (...)
     
    Export citation  
     
    Bookmark  
  43.  16
    Technology and Security Analysis of Cryptocurrency Based on Blockchain.Chao Yu, Wenke Yang, Feiyu Xie & Jianmin He - 2022 - Complexity 2022:1-15.
    Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan and Choi and find that the top ten platforms play critical roles (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  34
    Aristotle and the Constitution of the Political Community.Esben Korsgaard Rasmussen - 2018 - Epoché: A Journal for the History of Philosophy 23 (1):19-46.
    In this paper I will argue that the distinction between biological life and political life as found in Hannah Arendt’s reading of Aristotle and later repeated and elaborated by Giorgio Agamben under the headings of (“bare life”) and (“qualified life”), is in fact a fertile point of entry to, and the only viable option in order the grasp what constitutes the political as such for Aristotle. By hashing out the conceptual steps necessary for the establishment of what can be called (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  10
    Research on Human Motion Recognition Based on Data Redundancy Technology.Hong-Lan Yang, Meng-Zhe Huang & Zheng-Qun Cai - 2021 - Complexity 2021:1-6.
    Aiming at the problems of low recognition rate and slow recognition speed of traditional body action recognition methods, a human action recognition method based on data deduplication technology is proposed. Firstly, the data redundancy technology and perceptual hashing technology are combined to form an index, and the image is filtered from the structure, color, and texture features of human action image to achieve image redundancy processing. Then, the depth feature of processed image is extracted by depth motion map; finally, feature (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  21
    Parallel Attribute Reduction Algorithm for Complex Heterogeneous Data Using MapReduce.Tengfei Zhang, Fumin Ma, Jie Cao, Chen Peng & Dong Yue - 2018 - Complexity 2018:1-11.
    Parallel attribute reduction is one of the most important topics in current research on rough set theory. Although some parallel algorithms were well documented, most of them are still faced with some challenges for effectively dealing with the complex heterogeneous data including categorical and numerical attributes. Aiming at this problem, a novel attribute reduction algorithm based on neighborhood multigranulation rough sets was developed to process the massive heterogeneous data in the parallel way. The MapReduce-based parallelization method for attribute reduction was (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  18
    Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study.Effy Vayena, Marcello Ienca & James Scheibner - 2022 - BMC Medical Ethics 23 (1):1-13.
    BackgroundIncreasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on all transfers and processing of patient data, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  18
    Detection of forest fires outbreaks by dynamic fuzzy logic controller.Josué Toledo-Castro, Nayra Rodríguez-Pérez, Pino Caballero-Gil, Iván Santos-González, Candelaria Hernández-Goya & Ricardo Aguasca-Colomo - forthcoming - Logic Journal of the IGPL.
    The use of wireless sensor networks and the Internet of things to detect forest fire outbreaks may help to reduce the response time and avoid natural disasters. This work proposes the deployment of WSN to enhance the real-time monitoring of dynamic variables such as polluting gases, temperature or the presence of fire flames by infrared. In addition, the activation of forest fire alerts if environmental status may involve evidence of a recent fire outbreak. A fuzzy-based controller is implemented to manage (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  13
    Operation Arbitration: Privatizing Medical Malpractice Claims.Myriam Gilles - 2014 - Theoretical Inquiries in Law 15 (2):671-696.
    Binding arbitration is generally less available in tort suits than in contract suits because most tort plaintiffs do not have a pre-dispute contract with the defendant, and are unlikely to consent to arbitration after the occurrence of an unforeseen injury. But the Federal Arbitration Act applies to all “contract[s] evincing a transaction involving commerce,” including contracts for healthcare and medical services. Given the broad trend towards arbitration in nearly every other business-to-consumer industry, coupled with some rollbacks in tort reform measures (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  80
    When Ideas Matter: The Moral Philosophy of Fontenelle.Gregory Matthew Adkins - 2000 - Journal of the History of Ideas 61 (3):433-452.
    In lieu of an abstract, here is a brief excerpt of the content:Journal of the History of Ideas 61.3 (2000) 433-452 [Access article in PDF] When Ideas Matter: The Moral Philosophy of Fontenelle Gregory Matthew Adkins Introduction There has been a recent trend in the historiography of seventeenth- and eighteenth-century intellectual culture to analyze that culture from a sociological perspective. This perspective, a necessary corrective to a pure history of ideas, takes knowledge as a socially constructed phenomenon and thus subject (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 53