scholarly journals Editorial: Virtual Philosophy

Philosophy ◽  
2004 ◽  
Vol 79 (1) ◽  
pp. 1-2

We hear a lot these days about distance learning, about tutorials by e-mail and about universities on the internet. The idea in each case is that the student works at his or her computer and does not have to travel to a university or actually meet real tutors and professors in the flesh. There may be tutors and professors involved, but they will be transmitted in electronic form, through lectures beamed up and downloaded, and through tutorials wafting back and forth in cyber-space.To some extent these ideas may be a response to problems arising from the over-expansion of existing (physical) universities. There are too many students and too few good staff. So sharing staff around via the internet would give more students access to good lectures and tutorials, while at the same time (possibly) giving dons more time for their own scholarship.An initial reaction to such a prospect might be that internet contact between philosophers and students is better than no contact at all. But there would still be a feeling among many that it would be at best a substitute for the real thing. Is this feeling right, though?After all, it might be said, philosophy is above all discussion of abstract ideas in the abstract. Might philosophy not lend itself particularly to discussion which is not just abstract, but disembodies too? In philosophy at least, virtual tutorials need not be just a substitute for real tutorials. They might actually be better. For they would be conducted without any of the distractions of physical reality and appearance and sheer contingency which in the real world interfere with the unhindered development of pure thought.This, though, overlooks the importance in any genuine education of encounters between real teachers and real students. We have all had the experience of reading something in a book, and being initially convince by it, only to dissuade from its truth when we have actually had to expound or defend it in person. Part of what is involved in what Leavis used to call the ‘collaborative-creative process’ of university level discussion, a process at once critical and constructive, is personal identification with what one is saying or thinking, and the testing of this identification against other people equally personally involved in the dialogue. It is I who am identifying myself with this view, and staking myself on it, I, the whole person, and not some disembodied phantasm involved in an irresponsible simulacrum of communication and with some other equally disembodied phantasm, we know not where. We do not need to reflect on the conundra of the Chinese room here; the all too well-known inconveniences and fantasizing of chat rooms should be enough to warn us off the idea of a purely ‘virtual’ tutorial. We forget, at our peril that a thinker, at least the sort of thinker we might hope emerges from a philosophical education, is and has to be a person, with all that that involves in terms of integrity, consistency and development of character.Postal and e-mail tutorials may be better than none at all, but they are at best substitutes for real meetings between real students and real tutors. Some may find it moot whether it might not be better to have an internet lecture or e-mail tutorial from some charismatic and telegenic star of the screen than to meet dull old Dr Smith of The University of the Balls Pond Road, but assuming that Smith has any knowledge or life in him at all, once the initial excitement is over, there is really no comparison at all. Even if a student receives as detailed a set of comments on an essay as could be imagined (a big if, one imagines, in most cases), written comments are only the start of a real tutorial. The student needs to be able to discuss these comments in the light of his or her actual understanding, and the tutor needs to be able to expand and qualify what he or she has written in the light of the student's living reactions. Nor, for similar reasons is there any substitute for a student building up a real relation with a real tutor, which is all but impossible without real and frequent contact.And apart from formal encounters with one's teachers, a crucial part of a university education is one's informal encounters with one's peers. In such encounters young people discuss with each other all manner of questions, philosophical, cultural, scientific, political, moral and personal, related and unrelated to their formal studies. Those who talk of virtual universities forget that education, if it is real education, is education of the whole person, in which the whole person is engaged both inside and outside formal sessions. It is vital to remember this above all in the case of philosophical education, where the abstractness of the subject can too easily lead us to forget its ultimate point.

Author(s):  
Nasreen Abdel - Ilah Zahra

The study was used to study the reality of the use of postgraduate students for e- mail. The descriptive descriptive method was used. The questionnaire was used as a tool for study، which averaged 1.99 and a standard deviation of 0.61. It was applied to 45 students from post- Different The results showed that postgraduate students have a desire to use e- mail in university education and to communicate with colleagues and faculty members. However، there are obstacles to their use. The faculty members do not encourage students to use e- mail، lack e- mail skills، Access to the internet laboratory at the college، the reluctance of faculty members to give their email address to students، network problems (slow) In the light of the results، a set of recommendations and proposals were presented to activate the use of e- mail in university education، especially among postgraduate students in the Faculty of Education and various Syrian and Arab universities


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Author(s):  
Е.Н. Юдина

интернет-пространство стало частью реального мира современных студентов. В наши дни особенно актуальна проблема активизации использования интернета как дополнительного ресурса в образовательном процессе. В статье приводятся результаты небольшого социологического исследования, посвященного использованию интернета в преподавании социологических дисциплин. Internet space has become a part of the real world of modern students. The problem of increasing the use of the Internet as an additional resource in the educational process is now particularly topical. The article contains the results of a small sociological study on the use of the Internet in teaching sociological disciplines.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 539 ◽  
Author(s):  
Arun Kumar Sangaiah ◽  
Ali Asghar Rahmani Hosseinabadi ◽  
Morteza Babazadeh Shareh ◽  
Seyed Yaser Bozorgi Rad ◽  
Atekeh Zolfagharian ◽  
...  

The Internet of Things (IoT) is a distributed system that connects everything via internet. IoT infrastructure contains multiple resources and gateways. In such a system, the problem of optimizing IoT resource allocation and scheduling (IRAS) is vital, because resource allocation (RA) and scheduling deals with the mapping between recourses and gateways and is also responsible for optimally allocating resources to available gateways. In the IoT environment, a gateway may face hundreds of resources to connect. Therefore, manual resource allocation and scheduling is not possible. In this paper, the whale optimization algorithm (WOA) is used to solve the RA problem in IoT with the aim of optimal RA and reducing the total communication cost between resources and gateways. The proposed algorithm has been compared to the other existing algorithms. Results indicate the proper performance of the proposed algorithm. Based on various benchmarks, the proposed method, in terms of “total communication cost”, is better than other ones.


2015 ◽  
Vol 47 (1) ◽  
pp. 5-17
Author(s):  
Jolanta Korycka-Skorupa

Abstract The author discuss effectiveness of cartographic presentations. The article includes opinions of cartographers regarding effectiveness, readability and efficiency of a map. It reminds the principles of map graphic design in order to verify them using examples of small-scale thematic maps. The following questions have been asked: Is the map effective? Why is the map effective? How do cartographic presentation methods affect effectiveness of the cartographic message? What else can influence effectiveness of a map? Each graphic presentation should be effective, as its purpose is to complete written word, draw the recipients’ attention, make text more readable, expose the most important information. Such a significant role of graphics results in the fact that graphic presentations (maps, diagrams) require proper preparation. Users need to have a chance to understand the graphics language in order to draw correct conclusions about the presented phenomenon. Graphics should demonstrate the most important elements, some tendencies, and directions of changes. It should generalize and present a given subject from a slightly different perspective. There are numerous examples of well-edited and poorly edited small-scale thematic maps. They include maps, which are impossible to interpret correctly. They are burdened with methodological defects and they cannot fulfill their task. Cartography practice indicates that the principles related to graphic design of cartographic presentation are frequently omitted during the process of developing small-scale thematic maps used – among others – in the press and on the Internet. The purpose of such presentations is to quickly interpret them. On such maps editors’ problems with the selection of an appropriate symbol and graphic variable (fig. 1A, 9B) are visible. Sometimes they use symbols which are not sufficiently distinguishable nor demonstrative (fig. 11), it does not increase their readability. Sometime authors try too hard to reflect presented phenomenon and therefore the map becomes more difficult to interpret (fig. 4A,B). The lack of graphic sense resulting in the lack of graphic balance and aesthetics constitutes a weak point of numerous cartographic presentations (fig. 13). Effectiveness of cartographic presentations consists of knowledge and skills of the map editor, as well as the recipients’ perception capabilities and their readiness to read and interpret maps. The qualifications of the map editor should include methodological qualifications supported by the knowledge of the principles for cartographic symbol design, as well as relevant technical qualifications, which allow to properly use the tools to edit a map. Maps facilitate the understanding of texts they accompany and they present relationships between phenomenon better than texts, appealing to the senses.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


2017 ◽  
Vol 2017 ◽  
pp. 1-8
Author(s):  
Xingcheng Li ◽  
Shuangbiao Zhang

To solve the real-time problem of attitude algorithm for high dynamic bodies, a real-time structure of attitude algorithm is developed by analyzing the conventional structure that has two stages, and a flow diagram of a real-time structure for a Matlab program is provided in detail. During the update of the attitude matrix, the real-time structure saves every element of attitude matrix in minor loop in real time and updates the next attitude matrix based on the previous matrix every subsample time. Thus, the real-time structure avoids lowering updating frequency, though the multisubsample algorithms are used. Simulation and analysis show that the real-time structure of attitude algorithm is better than the conventional structure due to short update time of attitude matrix and small drifting error, and it is more appropriate for high dynamic bodies.


Sign in / Sign up

Export Citation Format

Share Document