The trichotomic machine

Semiotica ◽  
2019 ◽  
Vol 2019 (228) ◽  
pp. 173-192 ◽  
Author(s):  
Robert Marty

AbstractThe formal analysis of the principles leading the classification of the hexadic, decadic, and triadic signs from C. S. Peirce especially, gives rise to a general methodology allowing to systematically classify any n-adic combinatory named “protosign.” Basic concepts of the algebraic theory regarding the categories and functors will be used. That formalization provides an additional benefit by highlighting and systematizing formal immanent relationships between the classes of protosigns (or signs). Well known hierarchical structures (lattices) are then obtained. Thanks to the contribution of specific concepts in the Homological Algebra, new methodologies of analysis and creation of significations can be introduced.

Cancers ◽  
2022 ◽  
Vol 14 (2) ◽  
pp. 286
Author(s):  
Clément Acquitter ◽  
Lucie Piram ◽  
Umberto Sabatini ◽  
Julia Gilhodes ◽  
Elizabeth Moyal Cohen-Jonathan ◽  
...  

In this study, a radiomics analysis was conducted to provide insights into the differentiation of radionecrosis and tumor progression in multiparametric MRI in the context of a multicentric clinical trial. First, the sensitivity of radiomic features to the unwanted variability caused by different protocol settings was assessed for each modality. Then, the ability of image normalization and ComBat-based harmonization to reduce the scanner-related variability was evaluated. Finally, the performances of several radiomic models dedicated to the classification of MRI examinations were measured. Our results showed that using radiomic models trained on harmonized data achieved better predictive performance for the investigated clinical outcome (balanced accuracy of 0.61 with the model based on raw data and 0.72 with ComBat harmonization). A comparison of several models based on information extracted from different MR modalities showed that the best classification accuracy was achieved with a model based on MR perfusion features in conjunction with clinical observation (balanced accuracy of 0.76 using LASSO feature selection and a Random Forest classifier). Although multimodality did not provide additional benefit in predictive power, the model based on T1-weighted MRI before injection provided an accuracy close to the performance achieved with perfusion.


2003 ◽  
pp. 91-115 ◽  
Author(s):  
Elaheh Pourabbas ◽  
Maurizio Rafanelli

In this chapter we will focus on the rules of aggregation hierarchies in analysis dimensions of a cube. We give an overview of the related works on the basic concepts of the different types of aggregation hierarchies. We then discuss the hierarchies from two different points of view: mapping between domain values and hierarchical structures. In relation to them, we introduce the characterization of some OLAP operators on hierarchies and give a set of operators that concern the change in the hierarchy structure. Finally, we propose an enlargement of the operator set concerning hierarchies.


1993 ◽  
Vol 03 (04) ◽  
pp. 447-489 ◽  
Author(s):  
THOMAS WILKE

An algebraic approach to the theory of regular languages of finite and infinite words (∞-languages) is presented. It extends the algebraic theory of regular languages of finite words, which is based on finite semigroups. Their role is taken over by a structure called right binoid. A variety theorem is proved: there is a one-to-one correspondence between varieties of ∞-languages and pseudovarieties of right binoids. The class of locally threshold testable languages and several natural subclasses (such as the class of locally testable languages) as well as classes of the Borel hierarchy over the Cantor space (restricted to regular languages) are investigated as examples for varieties of ∞-languages. The corresponding pseudovarieties of right binoids are characterized and in some cases defining equations are derived. The connections with the algebraic description and classification of regular languages of infinite words in terms of finite semigroups are pointed out.


1995 ◽  
Vol 22 (1-2) ◽  
pp. 91-121
Author(s):  
Joaquín Mesa

Summary This paper deals with the work of the Spanish polygraph Eduardo Benot (1822–1907) and aims at an explanation of some the basic concepts of his grammatical theories. In particular, Benot’s choice of concepts (system, sign, and illocutionary function) is discussed from a modern functional and pragmatic perspective without, however, erasing the linguistic tradition of philosophical and ideological thought that informed his argument. Benot perceives ‘system’ as relational, the opposite of a mere composite of elements. His focus on relationships remains salient throughout his works; for instance, the concept of case, his classification of parts of speech, the fact that the clause is understood as the nuclear grammatical unit are evidence of his approach. Moreover, his particular view of sign and illocutionary function are evidence of his understanding of language as a socially interactive device. Indeed, it is argued that ‘intention’ is at the bottom of his analysis of the linguistic sign: two human minds are required for the linguistic sign to be fully realized. Whereas the first one exhibits and expresses communicative and informative intention, the second understands it. The author finds an astonishing similarity between Benot’s theories and those of modern-day language philosophers like H. P. Grice and others and their concepts of ‘illocutionary function’ and ‘illocutive force’. This similarity, the author holds, is not merely one of terminology, but of the notions of truth conditions and illocutive force within a proposition which were were handled quite similarly by Benot several generations earlier.


2021 ◽  
Vol 10 (5) ◽  
pp. e13110514732
Author(s):  
Paulo César Ossani ◽  
Diogo Francisco Rossoni ◽  
Marcelo Ângelo Cirillo ◽  
Flávio Meira Borém

Specialty coffees have a big importance in the economic scenario, and its sensory quality is appreciated by the productive sector and by the market. Researches have been constantly carried out in the search for better blends in order to add value and differentiate prices according to the product quality. To accomplish that, new methodologies must be explored, taking into consideration factors that might differentiate the particularities of each consumer and/or product. Thus, this article suggests the use of the machine learning technique in the construction of supervised classification and identification models. In a sensory evaluation test for consumer acceptance using four classes of specialty coffees, applied to four groups of trained and untrained consumers, features such as flavor, body, sweetness and general grade were evaluated. The use of machine learning is viable because it allows the classification and identification of specialty coffees produced in different altitudes and different processing methods.


2021 ◽  
Vol 5 (01) ◽  
pp. 189-204
Author(s):  
Salman Alfarisi

Abstrak Islam merupakan Syari'at Allah SWT yang menjadi tuntunan bagi manusia dalam beribadah kepada Allah dan sebagai petunjuk untuk mendapatkan kebahagiaan didunia maupun di Akhirat. Agar manusia dapat mengaplikasikan amanat besar ini, Syari'at Islam membutuhkan pendidikan, pembelajaran dan pengamalan. Pendidikan ialah sesuatu yang sangat di butuhkan dalam kehidupan manusia. Untuk menghasilkan lulusan yang terbaik tidak terjadi dengan instan begitu saja tapi membutuh sebuah proses pendidikan yang berkelanjutan. Keberhasilan sebuah pendidikan ditentukan oleh keberhasilan proses pembelajaran. Keberhasilah pembelajaran dipengaruhi oleh berbagai instrumen yang saling berhubungan antara satu dengan yang lainnya. Tuntutan Pendidikan Nasional yang bermutu tidak dapat terpisah dari Sarana dan Prasarana Pendidikan yang sangat diperlukan dalam mekanisme jalannya pendidikan dan pembelajaran. Oleh sebab itu, dalam  manajemen sarana dan prasarana dibutuhkan usaha yang baik agar di harapkan menjadi wasilah bagi  pengelolaan sarana dan prasarana dilembaga pendidikan. Pengelolaan sarana dan prasarana pendidikan berfungsi untuk mengelola dan memelihara sarana dan prasarana pendidikan supaya bisa menunjang peranan dalam kegiatan pendidikan secara ideal serta lebih bermanfaat. Maka dari itu perlu adanya penjelasan tentang perencanaan sarana dan prasarana yang ditetapkan dilembaga pendidikan. Abstract Islam is the Shari'at of Allah SWT which is a guide for humans in worshiping Allah and as a guide to get happiness in this world and in the Hereafter. So that humans can apply this great mandate, Islamic Shari'ah requires education, learning and practice. Education is something that is very important for human life. The educational process to produce the best graduates does not just happen. The success of an education is determined by the success of the learning process. The learning success is influenced by various instruments which are interconnected with one another. The demand for quality National Education is inseparable from the existence of Educational Facilities and Infrastructure which are very much needed in the education and learning process. Therefore, a good management of facilities and infrastructure is needed so that the good quality and quantity of facilities and infrastructure is expected to be a solution for efforts to manage facilities and infrastructure in educational institutions. The management of educational facilities and infrastructure functions to regulate and maintain educational facilities and infrastructure so that they can contribute to the educational process optimally and meaningfully. Therefore, the authors feel the need to explain how the basic concepts and classification of management planning facilities and infrastructure are applied in educational institutions.


2011 ◽  
pp. 3115-3124
Author(s):  
Lech Janczewski ◽  
Victor Portougal

An Internet search (Google) on government + security clearances + policy indicates that at present, establishment of individual security clearances within the government departments (and within U.S. State Departments in particular) are based on two factors: • Evaluation of the candidate past • Need to know policy Evaluation of the candidates past (done very often with the polygraph use) is aimed at establishing past activities of that person. Special emphasis is placed on finding possible contacts with organizations/countries hostile to the evaluating agency. For instance, all CIA agents must periodically undergo such tests (Mahle, 2005). The results would determine possible range of security clearances of an individual. The Need only policy (discussed later in the article) is further used to adjust security clearances of individuals. We (the authors) we unable to find practical realization of the Need to know policy and the presented research is an attempt to cover this gap. Managing information security depends on business environment, people, information technology, management styles—to list the most important. Within this domain, the following seem to be recognised as routine procedures: • Development of a Strategic Plan to Protect Information Resources of the Business Organisation: Despite the existence of enough evidence indicating constantly increasing number of security violations and resulting losses, the majority of business organisations failed to develop their security managing strategic plans. Fifty percent of them do not have even a disaster recovery plan (Jordan, 1999). Without such a plan, any effort to tighten up security of information within the organisation is a non-effective procedure • Development of Information Security Policy (ISP): ISP is a document that outlines the main checkpoints that are directed specifically at an individual organisation’s operations (Forcht, 1994). ISP could be a page or many pages depending on the level of details of the checkpoint procedures (Leung, 1998). • Classification of Security Levels, Security Clearances, and Security Labels: This is the domain of the security models, starting from classic Bell-La Padula, Biba and USA Department of Defence Orange Book models. Security levels deal with the classification of information in terms of its accessibility. Security clearances determine the rights of persons/program to access the data. Security label is a mechanism to match security levels and security clearances • Development of Reference Monitor: Virtually every security policy can be modelled in terms of subjects (people and programs) accessing objects (information either in electronic form or hard documents). This view of security policy implies that some decision procedure should exist to decide which requested accesses should be allowed and which should not. It acts as a filter through which all access requests made by subjects must pass. The term “access” means rights to read a document only, or to change it, or even destroy. This type of filter has come to be known as a Reference Monitor. (Amoroso, 1994). There are numerous publications presenting research in the field (e.g., Janczewski & Low, 1998). The research concentrates mainly on the issue of how to build and run a reference monitor • Technical Issues Related to the Development of a Security Kernel: The reference monitor manages the controlled access to particular information but there are numerous technical issues related to the development, implementation and running of a system in a secure way. “Secure way” means that information is protected against unauthorised access or change, and is available on request. An analysis of the previous chain of security arrangements shows a significant weak point. It is the procedure of assigning security clearances to an individual. In a typical business environment, this procedure is based on the position of a given person within the hierarchy of an organisation. The general principle is that “the higher a person is within the company hierarchy the higher security clearance he or she must have.” This approach clearly incurs significant problems. In the one extreme a person might have a security clearance that is too high for his or her job, which increases the total cost of the security system. Higher security clearance incur higher cost (for instance of security training). On the opposite side a person with a security clearance too low for his or her job must obtain temporary authority for accessing specific documents. This could be costly as well, time consuming and it could decrease the efficiency of operations. Portougal and Janczewski (1998) demonstrated in detail the consequences of the described approach in complex hierarchical structures. A competing and more logical idea is to apply the “need to know” principle. Under this principle, everybody has access only to the information needed to perform direct duties. Unfortunately, this principle does not give adequate guidance to the management as to how to set-up security clearances for each member of the staff. Amoroso (1994, p. 298-299) describes the “principle of least privilege.” The recommended application is based on subdividing the information system into certain data domains containing secret or confidential information of similar types. Users have privileges (or rights to access) to perform operations for which they have a legitimate need. “Legitimate need” for a privilege is generally based on a job function (or a role). If a privilege includes access to a domain with confidential data, then the user is assigned a corresponding security clearance. The main flaw of this approach is that a user has access to the whole domain even if he/she might not need a major part of it. Thus the assigned security clearance may be excessive. A similar problem arises regarding the security category of an object. A particular document (domain) could be labelled “confidential” or “top secret” even if it contains a single element of confidential (top secret) information.


2001 ◽  
Vol 66 (4) ◽  
pp. 1884-1898
Author(s):  
Steven Buechler ◽  
Colleen Hoover

Abstract.Certain basic concepts of geometrical stability theory are generalized to a class of closure operators containing algebraic closure. A specific case of a generalized closure operator is developed which is relevant to Vaught's conjecture. As an application of the methods, we proveTheorem A. Let G be a superstate group of U-rank ω such that the generics of G are locally modular and Th(G) has few countable models. Let G− be the group of nongeneric elements of G. G+ = Go + G−. Let Π = {q ∈ S(∅): U(q) < ω}. For any countable model M of Th(G) there is a finite A ⊂ M such thai M is almost atomic over A ∪ (G+ ∩ M) ∪ ⋃p∈Πp(M).


1960 ◽  
Vol 54 (2) ◽  
pp. 437-446 ◽  
Author(s):  
Felix E. Oppenheim

Basic concepts in political science have been used in a purely classificatory way ever since Aristotle established the sixfold classification of the forms of government: monarchy, aristocracy, constitutional government, and their respective “perversions”: tyranny, oligarchy, democracy. Similarly, a modern writer distinguishes among four types of political systems: the Anglo-American, the Continental European, the pre-industrial (or partially industrial), and the totalitarian. All these are categorical concepts; a political system is either monarchical or not, either of the Anglo-American or of another type. Such key terms as influence, control, authority, power, and freedom also tend to function categorically: one actor either has or lacks power over some activity of another actor; with respect to one actor, another is either free or unfree to act in a certain way.However, concrete political situations exhibit such characteristics to different degrees. Just as the substances we encounter in nature have varying degrees of hardness (rather than being either hard or soft), so a given political system is more, or less, totalitarian (or of the Anglo-American or of the pre-industrial type) than another. The United States and Soviet Russia have at present more power than any other country, and both are perhaps about equally powerful. Soldiers in general have less freedom than civilians, but they have more than prisoners. There can (or there cannot) be equal freedom for all.Since we do make such assertions, the question arises whether it is possible to give them precise empirical meaning. To do so, we must replace such categorical concepts as power and freedom by the corresponding comparative concepts, e.g., “more power than,” “as much freedom as,” and provide operational definitions for these expressions.


Sign in / Sign up

Export Citation Format

Share Document