Second Mechanism of Democratic Reason: Majority Rule

Author(s):  
Hélène Landemore

This chapter argues that majority rule is a useful complement of inclusive deliberation, not just because majority rule is more efficient timewise, but because it has distinct epistemic properties of its own. It also stresses that majority rule is best designed for collective prediction—that is, the identification of the best options out of those selected during the deliberative phase. Of all the competing alternatives (rule of one or rule of the few), majority rule maximizes the chances of predicting the right answer among the proposed options. The chapter considers several accounts of the epistemic properties of majority rule, including the Condorcet Jury Theorem, the Miracle of Aggregation, and a more fine-grained model based on cognitive diversity.

2021 ◽  
pp. 142-164
Author(s):  
Jason Brennan

This chapter defends an epistemic argument for democracy, namely the argument that the rule of the many is better at aggregating knowledge and, in the version presented here, at producing better decisions than the rule of the few. This argument builds on the formal properties of two key democratic decision-making mechanisms of democracy, namely inclusive deliberation on equal grounds and majority rule with universal suffrage. Properly used in sequence and under the right conditions, these two mechanisms ensure that no information and viewpoint is ignored and maximize the cognitive diversity brought to bear on collective political problems and predictions. Building on existing formal results by Lu Hong and Scott Page, the chapter introduces the “Number Trumps Ability” theorem, which formalizes the intuition that many minds are smarter than just a few. Under the right conditions systems governed by democratic decision-procedures can be expected to deliver greater epistemic performance than less inclusive and egalitarian systems.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4141
Author(s):  
Wouter Houtman ◽  
Gosse Bijlenga ◽  
Elena Torta ◽  
René van de Molengraft

For robots to execute their navigation tasks both fast and safely in the presence of humans, it is necessary to make predictions about the route those humans intend to follow. Within this work, a model-based method is proposed that relates human motion behavior perceived from RGBD input to the constraints imposed by the environment by considering typical human routing alternatives. Multiple hypotheses about routing options of a human towards local semantic goal locations are created and validated, including explicit collision avoidance routes. It is demonstrated, with real-time, real-life experiments, that a coarse discretization based on the semantics of the environment suffices to make a proper distinction between a person going, for example, to the left or the right on an intersection. As such, a scalable and explainable solution is presented, which is suitable for incorporation within navigation algorithms.


2021 ◽  
Author(s):  
Yo Nakawake ◽  
Mark Stanford

Previous studies showed that most children believe majority rule is the right decision rule, and prefer it to authority rule when making group decisions among peers. Yet, these were conducted mostly in Western or similar populations. Here, we conducted experiments with fifty-one Burmese children (4 to 11 years old) at three types of educational institutions: international schools, a monastery school and a day-care centre for street children. In the experiment, children were asked whether they prefer majority or authority rule in a hypothetical story. The result showed the educational institution influences the proportion choosing majority rule, suggesting that preference for majority rule may not be a universal pattern and decision preference may be shaped by cultural factors.


2011 ◽  
Vol 121-126 ◽  
pp. 867-871 ◽  
Author(s):  
Jie Li ◽  
Wei Wei Shan ◽  
Chao Xuan Tian

In order to evaluate the security of Application Specific Integrated Circuit (ASIC) implemented cryptographic algorithms at an early design stage, a Hamming distance model based power analysis is proposed. The Data Encryption Standard (DES) algorithm is taken as an example to illustrate the threats of differential power analysis (DPA) attack against the security of ASIC chip. A DPA attack against the ASIC implementation of a DES algorithm is realized based on hamming distance power model (HD model), and it realized the attack by successfully guessing the right 48-bit subkey. This result indicates that the power analysis attack based on the HD model is simple, rapid and effective for the design and evaluation of security chips.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Yongyi Li ◽  
Shiqi Wang ◽  
Shuang Dong ◽  
Xueling Lv ◽  
Changzhi Lv ◽  
...  

At present, person reidentification based on attention mechanism has attracted many scholars’ interests. Although attention module can improve the representation ability and reidentification accuracy of Re-ID model to a certain extent, it depends on the coupling of attention module and original network. In this paper, a person reidentification model that combines multiple attentions and multiscale residuals is proposed. The model introduces combined attention fusion module and multiscale residual fusion module in the backbone network ResNet 50 to enhance the feature flow between residual blocks and better fuse multiscale features. Furthermore, a global branch and a local branch are designed and applied to enhance the channel aggregation and position perception ability of the network by utilizing the dual ensemble attention module, as along as the fine-grained feature expression is obtained by using multiproportion block and reorganization. Thus, the global and local features are enhanced. The experimental results on Market-1501 dataset and DukeMTMC-reID dataset show that the indexes of the presented model, especially Rank-1 accuracy, reach 96.20% and 89.59%, respectively, which can be considered as a progress in Re-ID.


Computers ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 18 ◽  
Author(s):  
Konstantinos Rantos ◽  
Arnolnt Spyros ◽  
Alexandros Papanikolaou ◽  
Antonios Kritsas ◽  
Christos Ilioudis ◽  
...  

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.


Sign in / Sign up

Export Citation Format

Share Document