exclusive disjunction
Recently Published Documents


TOTAL DOCUMENTS

28
(FIVE YEARS 8)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Franc Lanko Marušič ◽  
Zheng Shen

AbstractThis paper addresses two issues: 1. Empirically, we report novel experimental data on agreement with exclusively disjoined subjects in Slovenian; 2. Theoretically, we look into the nature of attested agreement strategies with coordinated NPs. In particular, we investigate how these strategies behave under coordinators with different semantics, i.e. exclusive disjunction and conjunction. Based on the elicitation results, we argue that closest conjunct agreement, resolved agreement, and highest conjunct agreement are all present under exclusive disjunction to different extents, which suggests a uniform set of agreement strategies under disjunction and conjunction despite the semantic difference. Further, we argue against the presence of default agreement under both disjunction and conjunction in Slovenian, and argue for a particular set of gender resolution rules.


Author(s):  
Luis Alcides Brandini De Boni ◽  

Background: In late 2019, a new coronavirus variant, SARS-CoV-2, emerged and caused a pandemic. Several were the consequences of the appearance of this new virus, including, but not limited to, death, unemployment, bankruptcies (moral and economic), hunger, and misery. Aim: the purpose of this work is to analyze two hypotheses through logical propositions about the possibility of natural origin, or not, of SARS-CoV-2. Methods: research in an open public audiovisual database, censored, and non-peer-reviewed was used to identify subjects that support the proposition that the virus has a natural origin (group A) and those who claim otherwise (group B) aiming to hear your conjecture. A photographic survey was also carried out in order to identify the characters studied. The logical analysis of the propositions was performed through the construction of an exclusive disjunction truth table. Results and Discussion: The truth table produced four scenarios, two impossible and two possible. The impossible scenarios were discarded, and the possible scenarios were analyzed and confronted with the results of the audiovisual research. Conclusions: with the exclusion of impossible scenarios, only the possibilities remain that SARS-CoV-2 has evolved or not naturally, one of the lines of reasoning will be wrong as to the origin of SARS-CoV-2 if it ever becomes determined.


Author(s):  
G. Golovko ◽  
A. Matiashenko ◽  
N. Solopihin

This article offers an example of using an application whose main task is to encrypt data such as files and private messages. Data encryption is performed using an encryption algorithm - xor. The XOR cipher is a data encryption algorithm using exclusive disjunction. Acquired widespread use in computer networks in the 90's due to the ease of implementation. Used to encrypt Microsoft Word documents in Windows. The XOR encryption algorithm is to "overlay" a sequence of random numbers on the text to be encrypted. A sequence of random numbers is called a gamma sequence, and is used to encrypt and decrypt data. If you use a key with a length at least equal to the length of the message, the XOR cipher becomes much more crypto-resistant than when using a duplicate key. For cryptological protection of information of the travel company Rest & Travel, EDcrypt software has been created, which performs the following functions: account login; inability to use the system without logging in to the account; notification of entering incorrect user data; message encryption; decryption of messages; the ability to select the recipient of the message; encryption of text files; decryption of text files; sending text files to selected recipients; three interface languages: English, Russian, Ukrainian


Cognition ◽  
2021 ◽  
Vol 207 ◽  
pp. 104507
Author(s):  
Shalini Gautam ◽  
Thomas Suddendorf ◽  
Jonathan Redshaw

2021 ◽  
Author(s):  
Geetha Pavani P ◽  
Birendra Biswal ◽  
M V S Sairam ◽  
Pradyut Kumar Biswal

2019 ◽  
Vol 4 (1) ◽  
pp. 13
Author(s):  
Virginia Dawson

Tiwa (Tibeto-Burman; India) has two disjunctive particles, which give rise to different interpretations in sentences with other operators. I argue that this semantic distinction is not one of inclusive vs. exclusive disjunction, but one of scope. I provide an analysis that captures this scopal distinction: one particle lexicalizes a choice function variable (subject to existential closure high in the structure), and the other lexicalizes an alternative-set former which interacts with higher operators. I also show that wide scope disjunction in Tiwa behaves differently from wide scope readings of English "or", and suggest that they warrant different analyses.


Author(s):  
J.L. Bell

Boolean algebra, or the algebra of logic, was devised by the English mathematician George Boole (1815–64) and embodies the first successful application of algebraic methods to logic. Boole seems to have had several interpretations for his system in mind. In his earlier work he thinks of each of the basic symbols of his ‘algebra’ as standing for the mental operation of selecting just the objects possessing some given attribute or included in some given class; later he conceives of these symbols as standing for the attributes or classes themselves. In each of these interpretations the basic symbols are conceived as being capable of combination under certain operations: ‘multiplication’, corresponding to conjunction of attributes or intersection of classes; ‘addition’, corresponding to (exclusive) disjunction or (disjoint) union; and ‘subtraction’, corresponding to ‘excepting’ or difference. He also recognizes that the algebraic laws he proposes are satisfied if the basic symbols are interpreted as taking just the number values 0 and 1. Boole’s ideas have since undergone extensive development, and the resulting concept of Boolean algebra now plays a central role in mathematical logic, probability theory and computer design.


Sign in / Sign up

Export Citation Format

Share Document