253 research outputs found

    Relations in the Trinitarian Reality: Two approaches

    Get PDF
    The Greek model of the Trinity, based on the Theological Orations of Gregory of Nazianzus, treats the Trinitarian relations as connections between the Father and the two other persons: the Son and the Holy Spirit. The two relations have to be heteronymous, and have to be interpreted from the extreme realistic position. The Latin Trinitarian model, based on Boethius’ De Trinitate, treats relations as three subsistent persons. The relations have to be unidirectional: from the Father to the Son, and from both of them to the Holy Spirit. Both models are adequate and effective, but incompatible. One of the consequences of this incompatibility is the problem of filioque: the introduction of an additional relation of procession into the Greek model as well as the exclusion of this relation from the Latin model result in the inadequacy of the models. From the point of view of the complementability of a model, the Greek model allows introduction of new elements, while the Latin model does not. The soteriological consequences are such that the Greek model welcomes a human person to establish a unique relation with the person of the Father, which leads to the theosis of a creature. The Latin model requires the saving relation to be established with the whole Trinity, and theosis is not supported

    The Eucharistic Conquest of Time

    Get PDF
    Roman Catholic and Eastern Orthodox theologians claim that the unique event of Christ’s sacrifice on Calvary is present in Eucharistic liturgies. A popular explanatory strategy for this miraculous presence suggests that due to its supernatural character the Eucharist “conquers time,” transcends its boundaries, and allows for temporal coincidence of two chronologically distant events. I discuss the four main approaches within this strategy that can be discovered in contemporary theological writings. The first approach implies a time travel of the Calvary event. The second suggests the time travel of Eucharistic participants. The third eliminates the chronological distance by relocating one of the events into a timeless reality. The fourth assumes multilocation of the event across time. I argue that each of these approaches is untenable on philosophical or theological grounds

    User profiles matching for different social networks based on faces embeddings

    Full text link
    It is common practice nowadays to use multiple social networks for different social roles. Although this, these networks assume differences in content type, communications and style of speech. If we intend to understand human behaviour as a key-feature for recommender systems, banking risk assessments or sociological researches, this is better to achieve using a combination of the data from different social media. In this paper, we propose a new approach for user profiles matching across social media based on embeddings of publicly available users' face photos and conduct an experimental study of its efficiency. Our approach is stable to changes in content and style for certain social media.Comment: Submitted to HAIS 2019 conferenc

    The goals of industrial policy of the Russian Federation : state intervention into the economy as a factor of industrialization

    Get PDF
    The article studies the problems of formation and implementation of the state industrial policy of the Russian Federation. The main methods, values and goals underlying the formation of the modern industrial policy of the Russian Federation are emphasized. Under the conditions of deepening risks of economic isolation the issues of achieving economic independence and economic sovereignty are the main factors of the national security. Therefore, a sufficiently high level of autarchy should act as a safety cushion in the face of unfavorable global economic conditions. Based on the current challenges facing the Russian system of state administration it is concluded that in order to carry out re-industrialization it is necessary to conduct a further transition to an active model of industrial policy based on the essential role of state intervention in economic activity. The world experience shows that if a forced development is needed, then a free market system unregulated by the state is not used. The transition from protectionism to the free market is possible only after the development of the national productive forces. The modern economy is a system of management, the effective functioning and innovative development of which is ensured by the state of its infrastructure. Therefore, the implementation of big infrastructural projects is one of the most important elements of the state industrial policy formed in the Russian Federation.peer-reviewe

    What Exactly Are the Intra-Trinitarian Relations?

    Get PDF
    The core of a Trinitarian model is the internal layout of intra-Trinitarian relations. Depending on different metaphysical interpretations of the nature of the relations, various patristic authors have produced different and oftentimes incompatible Trinitarian models, and, consequently, conflicting expositions of the doctrine of the Trinity. In order to elucidate the differences in their Trinitarian theologies, I demonstrate the divergence in their understanding of the divine relations using the contemporary philosophical taxonomy of relations. I analyze the models of Basil of Caesarea, Gregory Nazianzen, and Boethius, and their attempted synthesis by Thomas Aquinas. Each of the patristic Trinitarian models, in spite of being fully orthodox, uses completely different types of relations, which makes them incompatible. One of the results of this incompatibility is the problem of the filioque, which cannot be resolved without addressing the metaphysics of relations

    Factors Affecting the Performance of Web Application Firewall

    Get PDF
    Web application firewalls (WAF) have been proven to be a useful tool in a much needed security for internet applications. Automation of ruleset development for WAF may reduce human errors and establish required baseline for web security. This research paper shows that mechanical implementation of highest paranoia levels on WAF may severely affect the productivity of the system and calls for the need for human intervention to critically review the proposed ruleset and find the optimal paranoia level that suits specific web application

    Honeykeys: deception mechanisms in single packet authorization

    Get PDF
    Single packet authorization is a technique that allows shielding a protected network service from an outside world. The protection is achieved by hiding the respective transport layer port until cryptographically protected packet received by another service authorizes port opening. The technique has a known weakness related to the key leakage. If secret key is known to the attacker, the shield can be removed by one message. The paper proposes to use a novel Honeykeys authorization scheme that is aimed at deceiving the attacker by storing decoy cryptographic keys on both server and client sides along with the actual keys. In such scheme, if keys are compromised it will not lead to the full-scale system compromise. In addition to that, Honeykeys scheme allows establishing segregation of duties in the authorization process and enables early detection of compromised keys. Apart from presenting theoretical concept of Honeykeys the paper shows preliminary implementation results from the pilot project. These results show acceptable authorization delay times imposed by additional security mechanism
    corecore