scholarly journals On the Spatiotemporal Nature of Vision, as Revealed by Covered Bridges and Puddles: A Dispatch from Vermont

i-Perception ◽  
2021 ◽  
Vol 12 (6) ◽  
pp. 204166952110626
Author(s):  
Gideon Paul Caplovitz

Retinal painting, anorthoscopic perception and amodal completion are terms to describe visual phenomena that highlight the spatiotemporal integrative mechanisms that underlie primate vision. Although commonly studied using simplified lab-friendly stimuli presented on a computer screen, this is a report of observations made in a novel real-world context that highlight the rich contributions the mechanisms underlying these phenomena make to naturalistic vision.

2010 ◽  
pp. 2310-2325
Author(s):  
Adam Slagell ◽  
Kiran Lakkaraju

It is desirable for many reasons to share information, particularly computer and network logs. Researchers need it for experiments, incident responders need it for collaborative security, and educators need this data for real world examples. However, the sensitive nature of this information often prevents its sharing. Anonymization techniques have been developed in recent years that help reduce risk and navigate the trade-offs between privacy, security and the need to openly share information. This chapter looks at the progress made in this area of research over the past several years, identifies the major problems left to solve and sets a roadmap for future research.


2008 ◽  
pp. 465-471
Author(s):  
E. M. Alkhalifa

The rich contributions made in the field of human computer interaction (HCI) have played a pivotal role in shifting the attention of the industry to the interaction between users and computers (Myers, 1998). However, technologies that include hypertext, multimedia, and manipulation of graphical objects were designed and presented to the users without referring to critical findings made in the field of cognitive psychology. These findings allow designers of multimedia educational systems to present knowledge in a fashion that would optimize learning.


Unsaying God ◽  
2019 ◽  
pp. 293-300
Author(s):  
Aydogan Kars

This chapter highlights the broader theoretical points that can be made on the basis of the analysis made in the previous chapters. It engages with contemporary philosophical and theological discussions beyond Islamic studies, criticizing the reduction of negative theology to paradoxicality, and the modern association of apophaticism with mysticism, critical thinking, and morality. It further argues that “negative theology” does not address a sui generis category or an enduring, well-defined group of intellectuals; it is rather a conceptual construct with debated meanings in changing historical settings. The chapter reminds that there were numerous negative theological positions regarding but a single question in a rich field of intellectual activity. These positions could and did transcend disciplinary boundaries as they were adopted by scholars with diverse orientations and backgrounds. Thus, construction of singular and distinct Christian, Jewish, or Muslim “negative theological traditions” not only overlooks the diversity, and sometimes conflicts, among various theological positions within religious traditions, but it also misses the historical fact that the negative theological positions among intellectuals from different religious backgrounds had strong overlaps. The rich theological networks highlighted the intellectual porosities between not only disciplines but also religious traditions.


2020 ◽  
Vol 10 (10) ◽  
pp. 3367
Author(s):  
Robert-Alexandru Dobre ◽  
Radu-Ovidiu Preda ◽  
Marian Vlădescu

Methods for inspecting the integrity of audio recordings become a necessity. The evolution of technology allowed the manufacturing of small, performant, recording devices and significantly decreased the difficulty of audio editing. Any person that participates in a conversation can secretly record it, obtaining their own version of the audio captured using their personal device. The recordings can be easily edited afterwards to change the meaning of the message. The challenge is to prove if recordings were tampered with or not. A reliable solution for this was the highly acclaimed Electrical Network Frequency (ENF) criterion. Newer recording devices are built to avoid picking up the electrical network signal because, from the audio content point of view, it represents noise. Thus, the classic ENF criterion becomes less effective for recordings made with newer devices. The paper describes a novel sonic watermarking (i.e., the watermark is acoustically summed with the dialogue) solution, based on an ambient sound that can be easily controlled and is not suspicious to listeners: the ticking of a clock. This signal is used as a masker for frequency-swept (chirp) signals that are used to encode the ENF and embed it into all the recordings made in a room. The ENF embedded using the proposed watermark solution can be extracted and checked at any later moment to determine if a recording has been tampered with, thus allowing the use of the ENF criterion principles in checking the recordings made with newer devices. The experiments highlight that the method offers very good results in ordinary real-world conditions.


2020 ◽  
Author(s):  
Kevin Miller ◽  
Sarah Jo Venditto

Decisions in the natural world are rarely made in isolation. Each action that an organism selects will affect the future situations in which it finds itself, and those situations will in turn affect the future actions that are available. Achieving real-world goals often requires successfully navigating a sequence of many actions. An efficient and flexible way to achieve such goals is to construct an internal model of the environment, and use it to plan behavior multiple steps into the future. This process is known as multi-step planning, and its neural mechanisms are only beginning to be understood. Here, we review recent advances in our understanding of these mechanisms, many of which take advantage of multi-step decision tasks for humans and animals.


2020 ◽  
pp. 25
Author(s):  
Konstantinos Papageorgiou ◽  
Demetrios Lekkas

In this work, we undertake the task of laying out some basic considerations towards straightening out the foundations of an abstract logical system. We venture to explain what theory is as well as what is not theory, to discriminate between the roles of truth in theory and in reality, as well as to open the road towards clarifying the relationship between theory and the real world. Etymological, cultural and conceptual analyses of truth are brought forth in order to reveal problems in modern approaches and to set the stage for more consistent solutions. One such problem addressed here is related to negation per se, to its asymmetry towards affirmative statements and to the essential ramifications of this duality with respect to the common perceptual and linguistic aspects of words indicating concepts akin to truth in various languages and to attitudes reflected and perpetuated in them and to their consequent use in attempted informal or formal logic and its understanding. Finally, a case study invoking the causes or “causes” of gravity both clarifies and reinforces the points made in this paper.


2019 ◽  
Vol 32 (2) ◽  
pp. 77-88
Author(s):  
Asad Zaman Asad Zaman

Conventional economics is deeply and fundamentally flawed, beyond the possibility of reform and repair. Its failings in the real world became obvious to all following the global financial crisis. The root of the problem is the theory of human behavior represented by “homo economicus”. The idea that short-sighted greed is “rational” is sheer folly. The theory is maintained in face of overwhelming empirical evidence to the contrary only because it serves the ideological interests of the rich and powerful capitalist classes. The philosophy of wealth maximization has led to the destruction of families, societies, economies, environment, fauna, and flora, as all are ruthlessly exploited for the creation and maximization of profits. Islamic teachings created a revolution in world history by promoting a society based on cooperation, generosity, and social responsibility. These ideas, completely missing from modern economics, have the same revolutionary potential today. The challenge for the Muslims today is to demonstrate this potential by translating these ideas into reality.


2014 ◽  
Vol 10 (3) ◽  
pp. 191-203
Author(s):  
Ram Krishna Mandal

From beginning of the known history the handloom and handicrafts forms a valuable cultural trait of a society. The cultural pattern of a society is reflected in the quality and craftsmanship of their handicrafts. The term handloom and handicrafts refers those products of a common folk or a specific community, which are produced manually with their indigenous technology. The handicrafts of a society are one of the chief means of livelihood. The people of Arunachal Pradesh are artistically minded and gifted with deft hands and skilled fingers. Handloom and Handicraft for instance, offer wide scope to produce a variety of artistically blended and beautifully designed clothing. Handicraft is a very common craft in Arunachal Pradesh. The main handicraft items made in the state are masks, carpets, painted wooden vessels and silver articles. Cane and Bamboo play an important role in the rural economy of the state. Arunachal Pradesh has a rich tradition of Bamboo and Cane Handicrafts. The products reflect the rich and varied culture of the tribes inhabiting this enchanting State and the products featured are representative of the wide range of Handicrafts produced in the State.


Author(s):  
Si Gao ◽  
Ben Marshall ◽  
Dan Page ◽  
Elisabeth Oswald

Masking is a well loved and widely deployed countermeasure against side channel attacks, in particular in software. Under certain assumptions (w.r.t. independence and noise level), masking provably prevents attacks up to a certain security order and leads to a predictable increase in the number of required leakages for successful attacks beyond this order. The noise level in typical processors where software masking is used may not be very high, thus low masking orders are not sufficient for real world security. Higher order masking however comes at a great cost, and therefore a number techniques have been published over the years that make such implementations more efficient via parallelisation in the form of bit or share slicing. We take two highly regarded schemes (ISW and Barthe et al.), and some corresponding open source implementations that make use of share slicing, and discuss their true security on an ARM Cortex-M0 and an ARM Cortex-M3 processor (both from the LPC series). We show that micro-architectural features of the M0 and M3 undermine the independence assumptions made in masking proofs and thus their theoretical guarantees do not translate into practice (even worse it seems unpredictable at which order leaks can be expected). Our results demonstrate how difficult it is to link theoretical security proofs to practical real-world security guarantees.


2010 ◽  
Vol 1 (3) ◽  
pp. 56-69
Author(s):  
Stephen Mutula

The debate about whether the digital divide between Africa and the developed world is narrowing or widening has intensified over the last five years. Some believe that access to technology is positively correlated to economic development and wealth creation, however, since the dawn of the last century, the gap between the rich and the poor within and between developed and developing countries has continued to grow. The protagonists in this debate do not seem to appreciate the notion that the digital divide is not about a single technology, and is driven by a complex set of factors that exist beyond wires. This paper attempts to deconstruct the concept of the digital divide beyond access to PCs, telephones, Internet, cable TV, etc… The authors argue that the phenomenon as currently conceived is misleading and flawed, and so are the indices for its measurement. Suggestions that a new model for mapping the phenomenon is made in order to bridge the divide between developed and developing countries. In deconstructing the digital divide, the authors use the Declaration of Principles of the World Summit on Information Society and the indices used to measure e-readiness, information society, digital opportunity, and e-government.


Sign in / Sign up

Export Citation Format

Share Document