MATHEMATICS: 'Cranky' Proof Reveals Hidden Regularities

Science ◽  
2005 ◽  
Vol 308 (5718) ◽  
pp. 36b-37b
Author(s):  
D. Mackenzie
Keyword(s):  
1997 ◽  
Vol 20 (1) ◽  
pp. 67-68
Author(s):  
John A. Bullinaria

I suggest that the difficulties inherent in discovering the hidden regularities in realistic (type-2) problems can often be resolved by learning algorithms employing simple constraints (such as symmetry and the importance of local information) that are natural from an evolutionary point of view. Neither “heavy-duty nativism” nor “representational recoding” appear to offer totally appropriate descriptions of such natural learning processes.


1996 ◽  
Vol 12 (2) ◽  
pp. 112-123 ◽  
Author(s):  
Magnus S. Magnusson

It is widely believed that human interaction is much more regular than has yet been detected. What kinds of hidden regularities exist is, however, unsettled. In this paper a structural hypothesis is proposed where each continuous human interaction is seen as the performance of a set of a particular type of temporal patterns. Some of these repeated intra- and inter-individual real-time behavior patterns may be mutually exclusive in time while others may overlap in various ways. Perceptual limitations making such patterns hidden to the naked eye are illustrated. A computerized detection method and illustrative empirical findings from various types of face-to-face interactions in children and adults are presented. The specially developed pattern detection and analysis software, THEME, is also shortly described.


Author(s):  
Sergey Petoukhov ◽  
Matthew He

This chapter is devoted to a consideration of the Kronecker family of the genetic matrices, but in the new numerical form of their presentation. This numeric presentation gives opportunities to investigate ensembles of parameters of the genetic code by means of system analysis including matrix and symmetric methods. In this way, new knowledge is obtained about hidden regularities of element ensembles of the genetic code and about connections of these ensembles with famous mathematical objects and theories from other branches of science. First of all, this chapter demonstrates the connection of moleculargenetic system with the golden section and principles of musical harmony.


2015 ◽  
Vol 39 (8) ◽  
pp. 1881-1911 ◽  
Author(s):  
Anja Jamrozik ◽  
Dedre Gentner
Keyword(s):  

Author(s):  
Anatoliy Osipenko ◽  
Vladislav Solovev

The digitalization of society, associated with a large-scale introduction of digital technologies in all socially relevant spheres, not only brough about positive changes, but also had a powerful effect on the transformation of crime and criminogenic factors. This has created an urgent need for understanding the prospects of criminological science in the new conditions, for strengthening its role in ensuring national security, for improving its methodology in new ways. The authors define key criminal threats to the security of the digital space: a rapid increase of its criminalization due to the features attractive for criminals (trans-national character of cyberspace, widespread anonymization and encryption, digital means of committing crimes and concealing their traces, etc.); the emergence and widening of criminogenic zones of cyberspace, with DarkNet holding a special place; the use of «digital» methods of resisting law enforcement, including cryptocurrencies and artificial intelligence. It is concluded that the abovementioned circumstances make it necessary to change the methodology of criminological research and the practice of law enforcement. The collection and generalization of information from publicly available digital sources, its analysis with the use of big data acquire a special research potential connected with the possibility of finding hidden regularities and obtaining criminological knowledge that cannot be found elsewhere. The digitalization of society creates conditions for the introduction of a preventive model of law enforcement based on predictive analysis methods. It becomes possible to quickly detect signs of criminal activity that require both a specific reaction of law enforcement and systemic managerial decisions. It also opens broad prospects for predicting individual criminal behavior by analyzing the Internet activity of specific individuals. The authors then highlight the most relevant directions for the development of criminological theory and the practice of crime prevention in the conditions of the digitalization of society.


Sign in / Sign up

Export Citation Format

Share Document