208 research outputs found
Morally Respectful Listening and its Epistemic Consequences
What does it mean to listen to someone respectfully, that is, insofar as they are due recognition respect? This paper addresses that question and gives the following answer: it is to listen in such a way that you are open to being surprised. A specific interpretation of this openness to surprise is then defended
The Periodic Standing-Wave Approximation: Overview and Three Dimensional Scalar Models
The periodic standing-wave method for binary inspiral computes the exact
numerical solution for periodic binary motion with standing gravitational
waves, and uses it as an approximation to slow binary inspiral with outgoing
waves. Important features of this method presented here are: (i) the
mathematical nature of the ``mixed'' partial differential equations to be
solved, (ii) the meaning of standing waves in the method, (iii) computational
difficulties, and (iv) the ``effective linearity'' that ultimately justifies
the approximation. The method is applied to three dimensional nonlinear scalar
model problems, and the numerical results are used to demonstrate extraction of
the outgoing solution from the standing-wave solution, and the role of
effective linearity.Comment: 13 pages RevTeX, 5 figures. New version. A revised form of the
nonlinearity produces better result
The Iowa Homemaker vol.3, no.7
Table of Contents
Home Economics Cleans House – Division Ready for New Year by Anna E. Richardson, page 1
Storing the Winter’s Supply of Vitamines by C. L. Fitch, page 2
First Hand Acquaintance With Tokyo’s Earthquake by Katherine Cranor, page 3
Hurrah for the Pumpkin Pie by Ruth Elaine Wilson, page 4
Choosing the Fall Hat by Florence Faust, page 5
Who is Responsible for the Child? by An “Old – Maid Aunt”, page 6
A Review of Farm Meats by Viola M. Bell, page 6
Color Hints From Gay October by Ruth Spencer, page 7
Paying Homage to the King of Fruits by Jeanette Beyer, page 8
Sheppard-Towner Bill by Lois Miller Herd, page 9
Buttons and _______ Buttons by Esther Ellen Rayburn, page 9
Candy Popularity by Esther Ellen Rayburn, page 13
Before the Bar of Science by Eda Lord Murphy, page 15
Gingered Pears by Elizabeth Storm, page 1
Computational fact checking from knowledge networks
Traditional fact checking by expert journalists cannot keep up with the
enormous volume of information that is now generated online. Computational fact
checking may significantly enhance our ability to evaluate the veracity of
dubious information. Here we show that the complexities of human fact checking
can be approximated quite well by finding the shortest path between concept
nodes under properly defined semantic proximity metrics on knowledge graphs.
Framed as a network problem this approach is feasible with efficient
computational techniques. We evaluate this approach by examining tens of
thousands of claims related to history, entertainment, geography, and
biographical information using a public knowledge graph extracted from
Wikipedia. Statements independently known to be true consistently receive
higher support via our method than do false ones. These findings represent a
significant step toward scalable computational fact-checking methods that may
one day mitigate the spread of harmful misinformation
SPAM detection: Naïve bayesian classification and RPN expression-based LGP approaches compared
An investigation is performed of a machine learning algorithm and the Bayesian classifier in the spam-filtering context. The paper shows the advantage of the use of Reverse Polish Notation (RPN) expressions with feature extraction compared to the traditional Naïve Bayesian classifier used for spam detection assuming the same features. The performance of the two is investigated using a public corpus and a recent private spam collection, concluding that the system based on RPN LGP (Linear Genetic Programming) gave better results compared to two popularly used open source Bayesian spam filters. © Springer International Publishing Switzerland 2016
Simple Nudges for Better Password Creation
Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords
Social and ethical checkpoints for bottom-up synthetic biology, or protocells
An alternative to creating novel organisms through the traditional “top-down” approach to synthetic biology involves creating them from the “bottom up” by assembling them from non-living components; the products of this approach are called “protocells.” In this paper we describe how bottom-up and top-down synthetic biology differ, review the current state of protocell research and development, and examine the unique ethical, social, and regulatory issues raised by bottom-up synthetic biology. Protocells have not yet been developed, but many expect this to happen within the next five to ten years. Accordingly, we identify six key checkpoints in protocell development at which particular attention should be given to specific ethical, social and regulatory issues concerning bottom-up synthetic biology, and make ten recommendations for responsible protocell science that are tied to the achievement of these checkpoints
- …