首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 562 毫秒
1.
2.
ABSTRACT

Modern organizations face significant information security threats, to which they respond with various managerial techniques. It is widely believed that “one size does not fit all” for achieving employee information security policy compliance; nevertheless, it is yet to be determined which techniques work best to different organizational employees. We further this research stream by finding that different levels of users might be effectively motivated by different types of coercive and empowering techniques that are suitable to their level and position in the organizational chart. Our results suggest that participation in the ISP decision-making process might prove to be a more effective approach to motivate lower-level employees toward compliance and that enhancing the meaningfulness of policy compliance could be the preferred method among higher levels of management. Members within each level of the organization can be effectively influenced to comply with ISPs when such strategies are customized for their level.  相似文献   

3.
4.
Kurt Gödel’s Incompleteness theorem is well known in Mathematics/Logic/Philosophy circles. Gödel was able to find a way for any given P (UTM), (read as, “P of UTMforProgram of Universal Truth Machine”), actually to write down a complicated polynomial that has a solution iff (=if and only if), G is true, where G stands for a Gödel-sentence. So, if G’s truth is a necessary condition for the truth of a given polynomial, then P (UTM) has to answer first that G is true in order to secure the truth of the said polynomial. But, interestingly, P (UTM) could never answer that G was true. This necessarily implies that there is at least one truth a P (UTM), however large it may be, cannot speak out. Daya Krishna and Karl Potter’s controversy regarding the construal of India’s Philosophies dates back to the time of Potter’s publication of “Presuppositions of India’s Philosophies” (1963, Englewood Cliffs Prentice-Hall Inc.) In attacking many of India’s philosophies, Daya Krishna appears to have unwittingly touched a crucial point: how can there be the knowledge of a ‘non-cognitive’ mok?a? [‘mok?a’ is the final state of existence of an individual away from Social Contract]—See this author’s Indian Social Contract and its Dissolution (2008) mok?a does not permit the knowledge of one’s own self in the ordinary way with threefold distinction, i.e., subject–knowledge-object or knower–knowledge–known. But what is important is to demonstrate whether such ‘knowledge’ of non-cognitive mok?a state can be logically shown, in a language, to be possible to attain, and that there is no contradiction involved in such demonstration, because, no one can possibly express the ‘experience-itself’ in language. Hence, if such ‘knowledge’ can be shown to be logically not impossible in language, then, not only Daya Krishna’s arguments against ‘non-cognitive mok?a’ get refuted but also it would show the possibility of achieving ‘completeness’ in its truest sense, as opposed to Gödel’s ‘Incompleteness’. In such circumstances, man would himself become a Universal Truth Machine. This is because the final state of mok?a is construed as the state of complete knowledge in Advaita. This possibility of ‘completeness’ is set in this paper in the backdrop of ?rī ?a?karācārya’s Advaitic (Non-dualistic) claim involved in the mahāvākyas (extra-ordinary propositions). (Mahāvākyas that ?a?kara refers to are basically taken from different Upani?ads. For example, “Aham Brahmāsmi” is from B?hadāra?yaka Upanisad, and “Tattvamasi” is from Chāndogya Upani?ad. ?rī ?a?karācārya has written extensively. His main works include his Commentary on Brahma-Sūtras, on major Upani?ads, and on ?rīmadBhagavadGītā, called Bhā?yas of them, respectively. Almost all these works are available in English translation published by Advaita Ashrama, 5 Dehi Entally Road, Calcutta, 700014.) On the other hand, the ‘Incompleteness’ of Gödel is due to the intervening G-sentence, which has an adverse self-referential element. Gödel’s incompleteness theorem in its mathematical form with an elaborate introduction by R.W. Braithwaite can be found in Meltzer (Kurt Gödel: on formally undecidable propositions of principia mathematica and related systems. Oliver &; Boyd, Edinburgh, 1962). The present author believes first that semantic content cannot be substituted by any amount of arithmoquining, (Arithmoquining or arithmatization means, as Braithwaite says,—“Gödel’s novel metamathematical method is that of attaching numbers to the signs, to the series of signs (formulae) and to the series of series of signs (“proof-schemata”) which occur in his formal system…Gödel invented what might be called co-ordinate metamathematics…”) Meltzer (1962 p. 7). In Antone (2006) it is said “The problem is that he (Gödel) tries to replace an abstract version of the number (which can exist) with the concept of a real number version of that abstract notion. We can state the abstraction of what the number needs to be, [the arithmoquining of a number cannot be a proof-pair and an arithmoquine] but that is a concept that cannot be turned into a specific number, because by definition no such number can exist.”.), especially so where first-hand personal experience is called for. Therefore, what ultimately rules is the semanticity as in a first-hand experience. Similar points are voiced, albeit implicitly, in Antone (Who understands Gödel’s incompleteness theorem, 2006). (“…it is so important to understand that Gödel’s theorem only is true with respect to formal systems—which is the exact opposite of the analogous UTM (Antone (2006) webpage 2. And galatomic says in the same discussion chain that “saying” that it ((is)) only true for formal systems is more significant… We only know the world through “formal” categories of understanding… If the world as it is in itself has no incompleteness problem, which I am sure is true, it does not mean much, because that is not the world of time and space that we experience. So it is more significant that formal systems are incomplete than the inexperiencable ‘World in Itself’ has no such problem.—galatomic”) Antone (2006) webpage 2. Nevertheless galatomic certainly, but unwittingly succeeds in highlighting the possibility of experiencing the ‘completeness’ Second, even if any formal system including the system of Advaita of ?a?kara is to be subsumed or interpreted under Gödel’s theorem, or Tarski’s semantic unprovability theses, the ultimate appeal would lie to the point of human involvement in realizing completeness since any formal system is ‘Incomplete’ always by its very nature as ‘objectual’, and fails to comprehend the ‘subject’ within its fold.  相似文献   

5.
In this paper I argue that Turing’s responses to the mathematical objection are straightforward, despite recent claims to the contrary. I then go on to show that by understanding the importance of learning machines for Turing as related not to the mathematical objection, but to Lady Lovelace’s objection, we can better understand Turing’s response to Lady Lovelace’s objection. Finally, I argue that by understanding Turing’s responses to these objections more clearly, we discover a hitherto unrecognized, substantive thesis in his philosophical thinking about the nature of mind.
Darren AbramsonEmail:
  相似文献   

6.
Euler’s problem on stationary configurations of elastic rod with fixed endpoints and tangents at the endpoints is considered. The corresponding optimal control problem is reduced to several systems of algebraic equations in Jacobi’s functions. An algorithm and software for solving the optimal control problem are constructed.  相似文献   

7.
Geometer Rachel Fletcher introduces the Geometer’s Angle, a column in the Nexus Network Journal dedicated to geometrical constructions, the procedures for drawing them, their use, significance and symbolism.  相似文献   

8.
From Dubins’ car to Reeds and Shepp’s mobile robot   总被引:1,自引:0,他引:1  
In the paper, a control system with intermediate dynamics between Dubins’ car and Reeds and Shepp’s mobile robot is investigated. Time-limited reachable sets and reachable sets at given time are computed. Families of semipermeable curves that are useful for the detection of jumps of the value function of time-optimal control problem are constructed. Research is partly supported by the Russian Foundation for Fundamental Research under Grants 06-01-00414 and 07-01-96085.  相似文献   

9.
Simulation optimization aims at determining the best values of input parameters, given an output criterion. We address here the much more complex case where design options have to be chosen, which can themselves necessitate choices about other sub-options, as well as numerical parameters. This so-called configuration problem is addressed using simulation associated with a distributed evolutionary algorithm, and is illustrated through an example. This approach allows a large variety of new types of problems to be solved, such as design of complex dynamic systems. In the light of these results, the limits in the optimized configuration of systems are shown to be now determined by the modeling and simulation tools and concepts. In this respect, a possible research direction, based on so-called functional simulation, is discussed and some research perspectives are introduced.  相似文献   

10.
Moment invariants are features calculated on an image, which do not change their values after a transformation of the image. This paper focuses on the so called combined invariants, which obey additional requirement of invariance to image blurring. Our first contribution is a review of achievements most relevant to the derivation of algebraic, moment and combined invariants. The review explains and develops parallels between the moment and the blur invariants. Gradually, it reveals new properties, simplifying construction of the combined invariants, but having more general extent. Resulting substitution rules for easy construction of the combined invariants from other invariants are thus the main results of this paper. All the conclusions can be understood without knowledge of the tensor calculus. This paper addresses construction of the combined invariants in arbitrary dimension.
Jan FlusserEmail:
  相似文献   

11.
12.
13.

Parkinson’s disease (PD) is a neurological disorder marked by decreased dopamine levels in the brain. Persons suffering from PD, exhibits vocal symptoms such as dysphonia and dysarthria. Speech impairments in PD are grouped together and called as hypokinetic dysarthria. Traditional PD management is based on a patient’s clinical history and through physical examination as there are currently no known biomarkers for its diagnosis. Automatic analysis techniques aid clinicians in diagnosis and monitoring patients using speech and provide frequent, cost effective and objective assessment. This paper presents pilot experiment to detect presence of dysarthria in speech and detect level of severity based on deep learning approach. Automated feature extraction and classification using convolutional neural network shows 77.48% accuracy on test samples of TORGO database with five fold validation. Using transfer learning, system performance is further analyzed for gender specific performance as well as in detection of severity of disease.

  相似文献   

14.
15.
This article describes the most recent development in the European telecommunications industry from the end-user perspective, considering generic user interface elements for interaction with mobile communication systems, as described in a series of European Telecommunication Standards Institute (ETSI) deliverables. It also reports the results of work from recent and ongoing activities in the ETSI Technical Committee Human Factors (TCHF), performed by major industry representatives under the European Commissions eEurope Initiative. The availability of a standardised set of universal, generic interaction elements increases the transfer of knowledge to use mobile devices and services, improves the overall usability of the entire interactive mobile environment and improves access for all. Such a transfer becomes even more important in a world of ubiquitous devices and services to the young, elderly and disabled.  相似文献   

16.
《Card Technology Today》2001,13(5):12-13
When it comes to managing customer relationships, the majority of companies are making serious mistakes, says Professor Merlin Stone of the Bristol Business School at the University of the West of England. Marketeers have been obsessed with obtaining a single, centralised, real-time updated view of their customers and they have been distracted by the Internet and mobile telephony. As result they have overlooked the smart card, which could be the very integrating tool that they need.  相似文献   

17.
The objective of this research is the rapid reconstruction of ancient buildings of historical importance using a single image. The key idea of our approach is to reduce the infinite solutions that might otherwise arise when recovering a 3D geometry from 2D photographs. The main outcome of our research shows that the proposed methodology can be used to reconstruct ancient monuments for use as proxies for digital effects in applications such as tourism, games, and entertainment, which do not require very accurate modeling. In this article, we consider the reconstruction of ancient Mughal architecture including the Taj Mahal. We propose a modeling pipeline that makes an easy reconstruction possible using a single photograph taken from a single view, without the need to create complex point clouds from multiple images or the use of laser scanners. First, an initial model is automatically reconstructed using locally fitted planar primitives along with their boundary polygons and the adjacency relation among parts of the polygons. This approach is faster and more accurate than creating a model from scratch because the initial reconstruction phase provides a set of structural information together with the adjacency relation, which makes it possible to estimate the approximate depth of the entire structural monument. Next, we use manual extrapolation and editing techniques with modeling software to assemble and adjust different 3D components of the model. Thus, this research opens up the opportunity for the present generation to experience remote sites of architectural and cultural importance through virtual worlds and real-time mobile applications. Variations of a recreated 3D monument to represent an amalgam of various cultures are targeted for future work.  相似文献   

18.
From human regulations to regulated software agents’ behavior   总被引:2,自引:0,他引:2  
In order to design and implement electronic institutions that incorporate norms governing the behavior of the participants of those institutions, some crucial steps should be taken. The first problem is that human norms are (on purpose) specified on an abstract level. This ensures applicability of the norms over long periods of time in many different circumstances. However, for an electronic institution to function according to those norms, they should be concrete enough to be able to check them run time. A second problem is that norms describe which behavior is desirable and permitted, but not how this is achieved in an institution. In the “real world" regulations often indicate procedures for implementing and enforcing the law. Likewise we should devise means to annotate the norms with practical aspects such as enforcement mechanisms, sanctions, etc. in order to get requirements for an institution that will enforce norms (by either constraining behavior within the norms or reacting to violation of the norms). The choice of which kind of mechanism is chosen is not a normative one, but usually based on criteria of efficiency and/or feasibility of the mechanism. In this paper we present our view on how to approach these problems and other related issues to be solved in order to develop e-institutions capable to operate in complex, highly regulated scenarios.
Frank DignumEmail:
  相似文献   

19.
20.
The Japanese National Police Agency (NPA) has announced plans to begin issuing contactless smart card driver’s licences to more than 75 million licence holders. One of the aims of the card is to cut down on card forgeries, which have become a particular problem in recent years.This is a short news story only. Visit www.compseconline.com for the latest computer security industry news.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号