Results 201 to 210 of about 556 (219)
Abstract This essay, designed as a complement to opinions expressed by Rowan Williams and some speakers at the conference in his honour, explores features of early Christianity which suggest a positive evaluation of artificial intelligence. Noting that the fear of reducing humans to machines has been joined in the modern age by the fear that machines ...
Mark J. Edwards
wiley +1 more source
“That We May Love the As Yet Unknown God”: The Meaning of Analogy in Augustine’s De Trinitate
Abstract Recent interest in the idea of analogy and the analogy of being, along with the apparent invocation of Augustine’s De Trinitate in the definition of Lateran IV, calls for a renewed investigation into the idea of analogy in the aforementioned text. Methodologically, “analogy” in De Trin. names a form of discourse which attempts to see the truth
Samuel J. Korb
wiley +1 more source
An Analysis and Simulation of Security Risks in Radar Networks from the Perspective of Cybersecurity. [PDF]
Chen R, Zhang Y, Li X, Ran J.
europepmc +1 more source
ABSTRACT This article explores Russia's genocidal discourses on Ukrainians, focusing on the predominant narrative that frames cultural genocide as the ‘liberation’ of Ukrainians through the erasure of their cultural identity. Existing literature tends to overlook this form of genocidal discourse, which diverges from typical ‘othering’ by instead ...
Martin Laryš
wiley +1 more source
Spectrally Compatible Deceptive Jamming Waveform Design for Synthetic Aperture Radar Countermeasures
Yuhao Chen +4 more
openalex +1 more source
Trustworthy Localization in IoT Networks: A Survey of Localization Techniques, Threats, and Mitigation. [PDF]
Pettorru G, Pilloni V, Martalò M.
europepmc +1 more source
ABSTRACT How should we understand the duration of a pleasant or unpleasant sensation, insofar as its duration modulates how good or bad the experience is overall? Given that we seem able to distinguish between subjective and objective duration and that how well or badly someone's life goes is naturally thought of as something to be assessed from her ...
Andreas L. Mogensen
wiley +1 more source
Detection of GPS Spoofing Attacks in UAVs Based on Adversarial Machine Learning Model. [PDF]
Alhoraibi L, Alghazzawi D, Alhebshi R.
europepmc +1 more source
Why Are All the Sets All the Sets?
ABSTRACT Necessitists about set theory think that the pure sets exists, and are the way they are, as a matter of necessity. They cannot explain why the sets (de rebus) are all the sets. This constitutes the Ur‐Objection against necessitism; it is the primary motivation cited by potentialists about set theory.
Tim Button
wiley +1 more source
Bayesian Inference for Joint Estimation Models Using Copulas to Handle Endogenous Regressors
ABSTRACT This study proposes a Bayesian approach for finite‐sample inference of the Gaussian copula endogeneity correction. Extant studies use frequentist inference, build on a priori computed estimates of marginal distributions of explanatory variables, and use bootstrapping to obtain standard errors. The proposed Bayesian approach facilitates precise
Rouven E. Haschka
wiley +1 more source

