Science topics: PhilosophyLogic
Science topic

# Logic - Science topic

An open group for the discussion of various logics and their applications
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Logic (10,000)
Sorted by most recent
Conference Paper
Full-text available
Analytical database systems are typically designed to use a column-first data layout to access only the desired fields. On the other hand, storing data row-first works great for accessing, inserting, or updating entire rows. Transforming rows to columns at run-time is expensive, hence, many analytical systems ingest data in row-first form and trans...
Article
Full-text available
In his essay Down to Earth (2018), the French philosopher Bruno Latour proposes a hypothesis that connects a number of contemporary issues, ranging from climate denialism to deregulation and growing inequality. While his hypothesis, that the elites act as if they live in another world and are leaving the rest of the world behind, might seem like a...
Article
Full-text available
We begin with the proof of ÔÓ×Ø ¡ ÔÖ We reason, Ë´ ÔÓ×Ø ¡ ÔÖ µÊ relational composition Ì Ë ÔÓ×Ø Ì Ì ÔÖ Ê ´ logic ´Ë ÔÓ×Ø Ë Êµ ´Ë Ê ÔÖ Êµ laws for pre and post refinement dom Ë dom´Ë Êµ ´Ë Êµ ÔÖ ´Ë Êµ Ê law for pre refinement dom Ë dom´Ë Êµ Ê ¡ dom´Ë Êµ ´Ë Êµ By 3 cases, case 1= Ë Ê Ë Ê Ë dom Ë dom Ë Ê ¡ dom Ë Ë definition of Ë Ê case 2= Ê Ë Ë Ê Ê 1
Article
Full-text available
This paper examines discriminatory attitudes of Israeli Jews towards non-Jewish immigrants admitted into Israel under the Law of Return. We looked at three spheres of discrimination: admission, political rights, and welfare rights and focused on the role of realistic socioeconomic and symbolic threats in the emergence of discriminatory attitudes. W...
Article
Full-text available
Optical directed logic (DL) is a novel logic operation scheme that employs electrical signals as operands to control the working states of optical switches to perform the logic functions. This review first provides an overview of the concept and working principle of DL. The developing trends of DL computing are then discussed in detail, including t...
Article
Full-text available
Impurities hosted in semiconducting solid matrices represent an extensively studied platform for quantum computing applications. In this scenario, the so-called flip-flop qubit emerges as a convenient choice for scalable implementations in silicon. Flip-flop qubits are realized implanting phosphorous donor in isotopically purified silicon, and enco...
Article
Full-text available
The licensing of university technologies to private firms has become an important part of the technology transfer mission of many universities. An inherent challenge for the technology licensing of universities is that potential licensees find it difficult to judge the early stage technologies and their ultimate commercial value. We reason that pat...
Article
Full-text available
Translational research aims at reducing gaps between fundamental scientific discoveries and real-world applications. However, the trajectory of most scientific discoveries along the translation research continuum remains highly complex. Logic models are powerful tools that can help reduce this complexity. They are often used to lay out road maps an...
Conference Paper
Full-text available
Network Slicing (NS) is a predominant technology in future telecommunication networks, including Fifth Generation (5G), which supports the realization of heterogeneous applications and services. It allows the allocation of a dedicated logical network slice of the physical network to each application. Security is one of the paramount challenges in a...
Article
Full-text available
In this paper, we first define a primitive protocol of secure multiparty computations to privately compute the logic operator “OR” (SMC_OR). Accordingly, we design a feasible quantum SMC_OR protocol by using single photons, which can achieve information-theoretical security in the semi-honest model. Furthermore, we adopt the proposed quantum SMC_OR...
Article
Full-text available
The twenty-first century technological advances driven by exponential rise of artificial intelligence (AI) technology have ushered in a new era that offers many of us hitherto unimagined luxuries and facilities. However, under the guise of this progressive discourse, particularly in the backdrop of current neo-liberal late-capitalist postmodern wor...
Article
Full-text available
Most studies with blood flow restriction (BFR) training have been conducted using devices capable of regulating the restriction pressure, such as pneumatic cuffs. However, this may not be a viable option for the general population who exercise in gyms, squares and sports centers. Thinking about this logic, practical blood flow restriction (pBFR) tr...
Conference Paper
Full-text available
Composite resin restorative materials were developed to overcome the disadvantages of amalgam restorative materials.[1]Dental amalgams are unesthetic, and toxic. Composite resins are filled resins and they exhibit high compressive strength, abrasion resistance, ease of application and high translucency. Depending on the filler size and shapes, vari...
Thesis
Full-text available
This thesis addresses the rational properties of women’s gender identification and self-representation from political theorist Lois McNay’s generative logics, employing the Praedia of Julia Felix, Pompeii, as a case study. Previous debates rooted in semantics and representationalism have focused on non-elite stereotypes or negative gendered dichoto...
Article
Full-text available
Emerging markets often experience instability due to rapid changes to the institutional environment, social changes like rapid urbanization, or even unrest. We argue that emerging market multinationals (EMNEs) manage such instability by constructing and changing locational portfolios, and qualitatively analyze six cases in South Africa over a perio...
Book
Full-text available
The subjects described in the book are BCC-algebras and an even wider class of weak BCC-algebras. The aim of the book is to summarize the achievements to date in the subject and to present them in the form of a logically created theory. Through appropriate grading and a precise description of the steps of the proofs, this theory is easily assimilat...
Article
Full-text available
When we study the Karnaugh map in the switching theory course, we learn that the ones in the map are combined in rectangles whose length and width must be a power of two. The result is the logic function described as a sum of products. This paper shows that we can also make groups where the length and width of the rectangles are equal to three. Thi...
Conference Paper
Full-text available
We address the problem of measuring inconsistency in declarative process specifications, with an emphasis on linear temporal logic on fixed traces (LTL ff). As we will show, existing inconsistency measures for classical logic cannot provide a meaningful assessment of inconsistency in LTL in general, as they cannot adequately handle the temporal ope...
Conference Paper
Full-text available
Reasoners can be used to derive implicit consequences from an ontology. Sometimes unwanted consequences are revealed, indicating errors or privacy-sensitive information, and the ontology needs to be appropriately repaired. The classical approach is to remove just enough axioms such that the unwanted consequences vanish. However, this is often too r...
Article
Full-text available
This article attempts to explain the special place that Sylvie occupies in both Nerval’s œuvre and the general context of nineteenth-century French prose. The structure of the nouvelle is examined through a close reading of two key motifs: vines intertwined with roses, and flowing water. The different iterations of these motifs are interpreted as e...
Article
Full-text available
We study private equity in a dynamic general equilibrium model and ask two questions: (i) Why does the investment of venture funds respond more strongly to the business cycle than that of buyout funds? (ii) Why are venture fund returns higher than those of buyout? On (i), venture brings in new capital whereas buyout largely reorganizes existing cap...
Article
Full-text available
Philosophers tend to assume a close logical connection between seeing-as reports and seeing-that reports. But the proposals they have made have one striking feature in common: they are demonstrably false. Going against the trend, I suggest we stop trying to lump together seeing-as and seeing-that. Instead, we need to realize that there is a deep lo...
Article
Full-text available
This paper presents two new inexact sum-based 1-bit approximate full adders (AFAs). The proposed 1-bit approximate adders (PAAs), namely PAA1 and PAA2, are derived based on the majority logic. The layouts of PAAs are designed in quantum cellular automata (QCA) technology using the QCADesigner tool. To assess the performance of PAAs, we compare them...
Article
Full-text available
A new 1‐bit full adder (FA) cell illustrating low‐power, high‐speed, and a small area is presented by a combination of transmission gate (TG), pass transistor logic (PTL), and float techniques. Using the proposed cell, a 4:2 compressor is implemented and its performance is investigated under diverse circumstances of voltage, temperature, and drivin...
Article
Full-text available
Alan Turing’s﻿ ﻿1950﻿ imitation game has been widely understood as a means for testing if an entity is intelligent. Following a series of papers by Diane Proudfoot, I offer a socio-technological interpretation of Turing’s paper and present an alternative way of understanding both the imitation game and Turing’s concept of intelligence. Turing, I cl...
Article
Full-text available
Adders are used to design the basic building blocks of very large scale integrated systems. Most of the computer arithmetic applications need highest degree of accuracy with good performance. In this paper a new efficient two step binary adder using carry substitution algorithm is proposed and it is implemented in digital FIR filter for filtering p...
Article
Full-text available
This paper presents a puzzle about the logic of real definition. I demonstrate that five principles concerning definition—that it is coextensional and irreflexive, that it applies to its cases, that it permits expansion, and that it is itself defined—are logically incompatible. I then explore the advantages and disadvantages of each principle—one o...
Article
Full-text available
This paper aims to investigate mind-body correlation and to propose an understanding of the unique movement of the invisible body in psychotherapy. The author examined the intermediate field of mind and body with reference to concepts of mind-body boundary in different schools. And they were examined once put into clinical practice based on bodily...
Article
Full-text available
Starting from a recursive construction of the natural numbers, a Cartesian sum of prime numbers with the elements of the set of powers of 2 is described. Boolean and logical matrices generated through recurring Cartesian sums permit the definition of extended twin primes. That is, primes separated by a gap of a power 2 N, for a natural number N are...
Article
Full-text available
Human Ensemble Cell Atlas (hECA) provides a unified informatics framework and the cell-centric-assembled single-cell transcriptome data of 1,093,299 labeled human cells from 116 published datasets. In this protocol, we provide three applications of hECA: “quantitative portraiture” exploration with websites, customizable reference creation for autom...
Article
Full-text available
Recently, the concept of overlap functions on complete lattices has been introduced by extending the truth values set from the unit closed interval to complete lattices. On the other hand, the residual implications induced from commonly used aggregation functions (see, e.g., t-norms, pseudo-t-norms, uninorms, semi-uninorms and pseudo-uninorms), as...
Article
Full-text available
Smart contracts (i.e., agreements enforced by a blockchain) are supposed to work at lower transaction costs than traditional (and incomplete) contracts that instead exploit a costly legal enforcement. This paper challenges that claim. I argue that because of the need for adaptation to mutable and unpredictable occurrences (a chief challenge of tran...
Article
Full-text available
The essential idea of the residuation principle plays a fundamental role in the residuated lattice theory based on R-implications, which are derived from left-continuous t-norms providing a general logical framework frequently applied to achieve solutions for multiple criteria and decision-making problems. The definition of n-dimensional fuzzy R-im...
Article
Full-text available
This study presents a low phase noise static 2:1 frequency divider in a 0.15 µm gallium arsenide pseudomorphic high electron mobility transisitor process. The proposed divider is based on an improved source coupled logic structure. The maximum bandwidth utilization of the frequency divider is improved up to 100% through theoretical analysis. This f...
Article
Full-text available
An uncertainty based model, parallel to the soft set (SS) model introduced by Molodtsov, was proposed by Smarandache in the form of hypersoft sets (HSS). The basic characteristic of both these models is that these are parametrized family of sets which are induced by the parameters involved. However, Smarandache had left open the basic operation on...
Article
Full-text available
The acquaintance with significant philosophical doctrines emerging in the West has been a systematic process in the leading Russian-language philosophical journals, collections of articles, monographs and translations. Practically all the most important Western philosophical doctrines have been subjected to scrutiny by Russian philosophers. One of...
Presentation
Full-text available
Lesson 1: Defining your research and choosing a topic. Scope: This lesson explains the primary process and purpose of all degrees. That is, to teach you how to observe, think and communicate your ideas about your observations. Our ancient Near East is an ethereal imagined world. We necessarily must pin it down with facts. These facts are our primar...
Article
Full-text available
Magnetic skyrmions are topological spin textures that hold great promise as nanoscale information carriers in non-volatile memory and logic devices. While room-temperature magnetic skyrmions and their current-induced motion were recently demonstrated, the stray field resulting from their finite magnetisation and their topological charge limit their...
Preprint
Full-text available
This text concerns a particular flavor of cognitive blindness referred to as C-Causal Blindness, or C-CB. A blindness where the policy to obtain the objective leads to the state to be avoided. A literal example of C-CB would be Kurt G\"odel's decision to starve for "fear of being poisoned" - take this to be premise A. The objective being "to avoid...
Article
Full-text available
Recently, several studies were done on SRAM bitcells at different supply‐voltages; upper, near or lower to threshold voltage. To the best of the author's knowledge, none of them discussed at threshold supply‐voltage with proper subthreshold operations and Nano/Pico power‐dissipations, hence this paper decides to investigate challenges and solutions...
Preprint
Full-text available
India is in a situation where dialogue is silenced by the autocratic governmentality. In this video collage, three consecutive situations are projected to show that all the three different Indian political parties are acting in the same way– halting the dialogue. Thus, this collage proposes a decentralized, self-reliant partyless society where logi...
Preprint
Full-text available
Over-approximating (OX) program logics, such as separation logic, are used to verify properties of heap-manipulating programs: all terminating behaviour is characterised but the reported results and errors need not be reachable. OX function specifications are thus incompatible with true bug-finding supported by symbolic execution tools such as Puls...
Article
Full-text available
Different strategies for the combination of merging and splitting transformation procedures for incompletely specified finite state machines implemented on field-programmable logic devices are offered. In these methods, such optimization criteria as the speed of operation, power consumption and implementation cost are considered already in the earl...
Preprint
Full-text available
Integrating logical reasoning and machine learning by approximating logical inference with differentiable operators is a widely used technique in Neuro-Symbolic systems. However, some differentiable operators could bring a significant bias during backpropagation and degrade the performance of Neuro-Symbolic learning. In this paper, we reveal that t...
Article
Full-text available
This study analyzed a survey sample from China and investigated how (1) news interest, (2) affordance utilization, and (3) friending were associated with consumptive news feed curation (CNFC), a practice of selective exposure, as well as the ways in which these associations were mediated and moderated by psychological factors. Findings showed that...
Article
Full-text available
In her recent article published in Sexuality & Culture, “This is my TERF! Lesbian Feminists and the Stigmatization of Trans Women,” Worthen focuses on feminist lesbians and their alleged “anti-trans” and “trans-exclusionary” beliefs. Analyzing a subsample of ‘cis women’ from a larger online survey, Worthen examines whether feminist lesbians “expres...
Preprint
Full-text available
Quantum photonic neural networks are variational photonic circuits that can be trained to implement high-fidelity quantum operations. However, work-to-date has assumed idealized components, including a perfect $\pi$ Kerr nonlinearity. Here, we investigate the limitations of realistic quantum photonic neural networks that suffer from fabrication imp...
Article
Full-text available
Formalism, along with logicism and intuitionism, constitutes the "classical" philosophical programs for grounding mathematics; however, formalism is in many respects the least clearly defined. While logicism and intuitionism have crisply outlined programs by Gottlob Frege and Jan Brouwer respectively, with the advantages and disadvantages of the pr...
Preprint
Full-text available
Through 19 interviews with scientists, this study examines scientists' use of media logic and their relationships with journalists using research as the focal point. The authors identified that the scientists shared a basic understanding of media logic classified in three patterns. Two patterns were previously identified by Olesk: 1) adaption (abil...
Article
Full-text available
In this paper, we have elected to reflect on the question of what is the method of doing philosophy. This critique proceeds from a preliminary discourse on the various methods that have been deployed in doing philosophy in the past to a discourse on Bochenski's thought on what should be the method of contemporary thought. The paper, found out that...
Article
Full-text available
In view of the risk of collision with humans or equipment arising from a lack of protection in the operation process of combined support and anchor equipment on the heading face, this paper designs a safety interlock system for combined support and anchor equipment. Firstly, a mathematical model of hydraulic power system control and a valve control...
Article
Full-text available
We report a solution to an open problem regarding the axiomatization of the convex hull of a type of nonclassical evaluations. We then investigate the meaning of this result for the larger context of the relation between rational credence functions and nonclassical probability. We claim that the notions of bets and Dutch Books typically employed in...
Article
Full-text available
The associations between socioeconomic status (SES) and depressive symptoms have been found in previous studies. However, the role of SES in different trajectories of depressive symptoms in Chinese college freshmen has not been discovered. The present study aims to identify how depressive symptom trajectories are related to SES during the first sem...
Conference Paper
Full-text available
CMOS compatibility and the low process temperature of hafnium oxide (HfO2) make HfO2-based ferroelectric FETs an excellent candidate for logic, memory, and neuromorphic devices. This article discusses the challenges and opportunities of using hafnium oxide-based ferroelectric memory for in-memory-computing applications. Finally, we try to draw the...
Article
Full-text available
This article employs digital mapping to better understand historical and contemporary interpretations of pilgrimage routes in Vārāṇasī, North India. Focusing on visitation circuits linking the Aṣṭabhairava (Eight Bhairavas), it compares digital maps of these circuits to descriptions in the fourteenth-century Kāśī Khaṇḍa, nineteenth- and twentieth-c...
Preprint
Full-text available
The way the topic of black-body radiation is presented in standard textbooks (i.e. from Rayleigh-Jeans to Max Planck) does not follow the actual historical timeline of the understanding of the black-body radiation problem. Authors believe that a presentation which follows an actual timeline of the ideas (although not a logical presentation of the f...
Preprint
Full-text available
An institutional logics perspective is not logical at all. I seek to ground certain constellations of productive practice in conjunctions of the ontological and the teleological which are not demonstrable, but depend on and are immanent to a kind of practical reason. I supplant the value term with institutional substance, invisible goods which can...
Article
Full-text available
Information-centric networking (ICN) separates the identifier and locator of network entities, providing a natural advantage in supporting mobility. To gain the advantage of ICN to support mobility, an urgent challenge is the problem of practical implementation with performance optimization. Software-defined networking (SDN) can be regarded as infr...
Preprint
Full-text available
We present an alternative proof of the NEXP-hardness of the satisfiability of {\em Dependency Quantified Boolean Formulas} (DQBF). Besides being simple, our proof also gives us a general method to reduce NEXP-complete problems to DQBF. We demonstrate its utility by presenting explicit reductions from a wide variety of NEXP-complete problems to DQBF...
Preprint
Full-text available
Network telemetry provides more accurate and reliable services for intelligent network control by pushing fresh status information actively with help of data plane. However, most existing network telemetry methods are dicult to be deployed eectively in business environment due to the lack of runtime recongurability, huge time-space overhead, and hi...
Article
Full-text available
There has been the tendency to construe one for the other or to say that the one passes synonymously for the other, logical positivism and logical atomism. The thrust of this study is to unclad this locus that is gradually becoming widespread and accentuated. Upon a critical assessment of the main thrust of logical positivism, we find that it is a...
Preprint
Full-text available
Spreadsheets are widely used for table manipulation and presentation. Stylistic formatting of these tables is an important property for both presentation and analysis. As a result, popular spreadsheet software, such as Excel, supports automatically formatting tables based on data-dependent rules. Unfortunately, writing these formatting rules can be...
Article
Full-text available
A logical fallacy is an argument that can be disproven through reasoning. This is different from a subjective opinion or one that can be disproven with facts; for a position to be a logical fallacy, it must be logically flawed or deceptive. A false dilemma is one of the very well-known logical fallacies. Sometimes called the "either-or" fallacy, a...
Article
Full-text available
We developed a "thinking-behavior-outcome" logical framework to explore the effect of entrepreneurs' cognitive flexibility on dual innovation and the performance of new ventures, drawing on social cognitive theory, and collected data from a sample of 293 new ventures through a questionnaire to conduct an empirical analysis. We find that entrepreneu...
Article
Full-text available
Shift register is one of the important components in any digital circuit. By improving the performance of shift register, one can improvise the whole system performance. Shift registers are the basic memory units and data transfer devices in IoT applications. The efficacy of computing devices depends on the performance of arithmetic circuits, inclu...
Article
Full-text available
Prime factorization (P = M × N) is a promising application for quantum computing. Shor’s algorithm is a key concept for breaking the limit for analyzing P, which cannot be effectively solved by classical computation; however, the algorithm requires error-correctable logical qubits. Here, we describe a quantum annealing method for solving prime fact...
Preprint
Full-text available
MBA (mixed boolean and arithmetic) expressions are hard to simplify, so used for malware obfuscation to hinder analysts' diagnosis. Some MBA simplification methods with high performance have been developed, but they narrowed the target to "linear" MBA expressions, which allows efficient solutions based on logic/term-rewriting. However such restrict...
Chapter
Full-text available
This chapter provides an overview of the philosophical assumptions that underly qualitative research, including the types of logics employed as well as the axiological, epistemological, and ontological perspectives of various designs, methods, and methodologies. Readers new to qualitative inquiry will gain an introductory understanding of the histo...
Preprint
Full-text available
Robotic systems used in safety-critical industrial situations often rely on modular software architectures, and increasingly include autonomous components. Verifying that these modular robotic systems behave as expected requires approaches that can cope with, and preferably take advantage of, this inherent modularity. This paper describes a composi...
Article
Full-text available
The incompleteness of set theory ZF C leads one to look for natural nonconservative extensions of ZF C in which one can prove statements independent of ZF C which appear to be "true". One approach has been to add large cardinal axioms.Or, one can investigate second-order expansions like Kelley-Morse class theory, KM or Tarski-Grothendieck set theor...
Article
Full-text available
In this paper we present an extension of (bunched) separation logic, Boolean BI, with epistemic and dynamic epistemic modalities. This logic, called action model separation logic (AMSL), can be seen as a generalization of public announcement separation logic in which we replace public announcements with action models. Then we not only model public...
Article
Full-text available
With the invention of the concept of ‘geophilosophy’, Deleuze and Guattari did not intend to invoke a new subfield of philosophy; for them, all philosophy is geophilosophy by virtue of its constitutive relationship with contingency. What is less well understood, however, are the implications of Deleuze and Guattari’s geophilosophical approach for h...
Article
Full-text available
This study explores the value co-creation framework to revive tradition-bound products using rhetorical history and service-dominant logic. This framework shows the effects of using historical significance to enable value co-creation in a new ecosystem by engaging consumers and local communities without eliminating their traditions. Existing studie...