Isaac Asimov
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Very Short History of Cyberpunk
A Very Short History of Cyberpunk Marcus Janni Pivato Many people seem to think that William Gibson invented The cyberpunk genre in 1984, but in fact the cyberpunk aesthetic was alive well before Neuromancer (1984). For example, in my opinion, Ridley Scott's 1982 movie, Blade Runner, captures the quintessence of the cyberpunk aesthetic: a juxtaposition of high technology with social decay as a troubling allegory of the relationship between humanity and machines ---in particular, artificially intelligent machines. I believe the aesthetic of the movie originates from Scott's own vision, because I didn't really find it in the Philip K. Dick's novel, Do Androids Dream of Electric Sheep (1968), upon which the movie is (very loosely) based. Neuromancer made a big splash not because it was the "first" cyberpunk novel, but rather, because it perfectly captured the Zeitgeist of anxiety and wonder that prevailed at the dawning of the present era of globalized economics, digital telecommunications, and exponential technological progress --things which we now take for granted but which, in the early 1980s were still new and frightening. For example, Gibson's novels exhibit a fascination with the "Japanification" of Western culture --then a major concern, but now a forgotten and laughable anxiety. This is also visible in the futuristic Los Angeles of Scott’s Blade Runner. Another early cyberpunk author is K.W. Jeter, whose imaginative and disturbing novels Dr. Adder (1984) and The Glass Hammer (1985) exemplify the dark underside of the genre. Some people also identify Rudy Rucker and Bruce Sterling as progenitors of cyberpunk. -
Secure Transmission of Data Using Rabbit Algorithm
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072 Secure Transmission of Data using Rabbit Algorithm Shweta S Tadkal1, Mahalinga V Mandi2 1 M. Tech Student , Department of Electronics & Communication Engineering, Dr. Ambedkar institute of Technology,Bengaluru-560056 2 Associate Professor, Department of Electronics & Communication Engineering, Dr. Ambedkar institute of Technology,Bengaluru-560056 ---------------------------------------------------------------------***----------------------------------------------------------------- Abstract— This paper presents the design and simulation of secure transmission of data using rabbit algorithm. The rabbit algorithm is a stream cipher algorithm. Stream ciphers are an important class of symmetric encryption algorithm, which uses the same secret key to encrypt and decrypt the data and has been designed for high performance in software implementation. The data or the plain text in our proposed model is the binary data which is encrypted using the keys generated by the rabbit algorithm. The rabbit algorithm is implemented and the language used to write the code is Verilog and then is simulated using Modelsim6.4a. The software tool used is Xilinx ISE Design Suit 14.7. Keywords—Cryptography, Stream ciphers, Rabbit algorithm 1. INTRODUCTION In today’s world most of the communications done using electronic media. Data security plays a vitalkrole in such communication. Hence there is a need to predict data from malicious attacks. This is achieved by cryptography. Cryptographydis the science of secretscodes, enabling the confidentiality of communication through an in secure channel. It protectssagainstbunauthorizedapartiesoby preventing unauthorized alterationhof use. Several encrypting algorithms have been built to deal with data security attacks. -
Nanoelectronics the Original Positronic Brain?
Nanoelectronics the Original Positronic Brain? Dan Hammerstrom Department of Electrical and Computer Engineering Portland State University Maseeh College of Engineering 12/13/08 1 and Computer Science Wikipedia: “A positronic brain is a fictional technological device, originally conceived by science fiction writer Isaac Asimov “Its role is to serve as a central computer for a robot, and, in some unspecified way, to provide it with a form of consciousness recognizable to humans” How close are we? You can judge the algorithms, in this talk I will focus on hardware and what the future might hold Maseeh College of Engineering 12/13/08 Hammerstrom 2 and Computer Science Moore’s Law: The number of transistors doubles every 18-24 months No discussion of computing is complete without addressing Moore’s law The semiconductor industry has been following it for almost 30 years It is not really a physical law, but one of faith The fruits of a hyper-competitive $300 billion global industry Then there is Moore’s lesser known 2nd law st The 1 law requires exponentially increasing investment And what I call Moore’s 3rd law st The 1 law results in exponentially increasing design errata Maseeh College of Engineering 12/13/08 Hammerstrom 3 and Computer Science Intel is now manufacturing in their new, innovative 45 nm process Effective gate lengths of 37 nm (HkMG) And they recently announced a 32 nm scaling of the 45 nm process Transistors of this size are no longer acting like ideal switches And there are other problems … 45 nm Transistor -
Evidence Francis Quinn Was a Politician of the New School. That, Of
Evidence Francis Quinn was a politician of the new school. That, of course, is a meaningless expression, as are all expressions of the sort. Most of the “new schools” we have were duplicated in the social life of ancient Greece, and perhaps, if we knew more about it, in the social life of ancient Sumeria and in the lake dwellings of prehistoric Switzerland as well. But, to get out from under what promises to be a dull and complicated beginning, it might be best to state hastily that Quinn neither ran for office nor canvassed for votes, made no speeches and stuffed no ballot boxes. Any more than Napoleon pulled a trigger at Austerlitz. And since politics makes strange bedfellows, Alfred Lanning sat at the other side of the desk with his ferocious white eyebrows bent far forward over eyes in which chronic impatience had sharpened to acuity. He was not pleased. The fact, if known to Quinn, would have annoyed him not the least. His voice was friendly, perhaps professionally so. “I assume you know Stephen Byerley, Dr. Lanning.” “I have heard of him. So have many people.” “Yes, so have I. Perhaps you intend voting for him at the next election.” “I couldn’t say.” There was an unmistakable trace of acidity here. “I have not followed the political currents, so I’m not aware that he is running for office.” “He may be our next mayor. Of course, he is only a lawyer now, but great oaks--” “Yes,” interrupted Lanning, “I have heard the phrase before. But I wonder if we can get to the business at hand.” “We are at the business at hand, Dr. -
The Fundamental Articles of I.AM Cyborg Law
Beijing Law Review, 2020, 11, 911-946 https://www.scirp.org/journal/blr ISSN Online: 2159-4635 ISSN Print: 2159-4627 The Fundamental Articles of I.AM Cyborg Law Stephen Castell CASTELL Consulting, Witham, UK How to cite this paper: Castell, S. (2020). Abstract The Fundamental Articles of I.AM Cyborg Law. Beijing Law Review, 11, 911-946. Author Isaac Asimov first fictionally proposed the “Three Laws of Robotics” https://doi.org/10.4236/blr.2020.114055 in 1942. The word “cyborg” appeared in 1960, describing imagined beings with both artificial and biological parts. My own 1973 neologisms, “neural Received: November 2, 2020 plug compatibility”, and “softwiring” predicted the computer software-driven Accepted: December 15, 2020 Published: December 18, 2020 future evolution of man-machine neural interconnection and synthesis. To- day, Human-AI Brain Interface cyborg experiments and “brain-hacking” de- Copyright © 2020 by author(s) and vices are being trialed. The growth also of Artificial Intelligence (AI)-driven Scientific Research Publishing Inc. Data Analytics software and increasing instances of “Government by Algo- This work is licensed under the Creative Commons Attribution International rithm” have revealed these advances as being largely unregulated, with insuf- License (CC BY 4.0). ficient legal frameworks. In a recent article, I noted that, with automation of http://creativecommons.org/licenses/by/4.0/ legal processes and judicial decision-making being increasingly discussed, Open Access RoboJudge has all but already arrived; and I discerned also the cautionary Castell’s Second Dictum: “You cannot construct an algorithm that will relia- bly decide whether or not any algorithm is ethical”. -
Arxiv:2009.09068V1 [Cs.CY] 16 Sep 2020
Hacking with God: a Common Programming Language of Robopsychology and Robophilosophy Norbert Bátfai∗ Department of Information Technology University of Debrecen, Hungary September 22, 2020 Abstract This note is a sketch of how the concept of robopsychology and robophi- losophy could be reinterpreted and repositioned in the spirit of the original vocation of psychology and philosophy. The notion of the robopsychology as a fictional science and a fictional occupation was introduced by Asimov in the middle of the last century. The robophilosophy, on the other hand, is only a few years old today. But at this moment, none of these new emerging disciplines focus on the fundamental and overall issues of the development of artificial general intelligence. Instead, they focus only on issues that, although are extremely important, play a complementary role, such as moral or ethical ones, rather than the big questions of life. We try to outline a conception in which the robophilosophy and robopsychology will be able to play a similar leading rule in the progress of artificial intel- ligence than the philosophy and psychology have done in the progress of human intelligence. To facilitate this, we outline the idea of a visual artifi- cial language and interactive theorem prover-based computer application called Prime Convo Assistant. The question to be decided in the future is whether we can develop such an application. And if so, can we build a computer game on it, or even an esport game? It may be an interesting question in order for this game will be able to transform human thinking on the widest possible social scale and will be able to develop a stan- dard mathematical logic-based communication channel between human and machine intelligence. -
On the Use of Continued Fractions for Stream Ciphers
On the use of continued fractions for stream ciphers Amadou Moctar Kane Département de Mathématiques et de Statistiques, Université Laval, Pavillon Alexandre-Vachon, 1045 av. de la Médecine, Québec G1V 0A6 Canada. [email protected] May 25, 2013 Abstract In this paper, we present a new approach to stream ciphers. This method draws its strength from public key algorithms such as RSA and the development in continued fractions of certain irrational numbers to produce a pseudo-random stream. Although the encryption scheme proposed in this paper is based on a hard mathematical problem, its use is fast. Keywords: continued fractions, cryptography, pseudo-random, symmetric-key encryption, stream cipher. 1 Introduction The one time pad is presently known as one of the simplest and fastest encryption methods. In binary data, applying a one time pad algorithm consists of combining the pad and the plain text with XOR. This requires the use of a key size equal to the size of the plain text, which unfortunately is very difficult to implement. If a deterministic program is used to generate the keystream, then the system will be called stream cipher instead of one time pad. Stream ciphers use a great deal of pseudo- random generators such as the Linear Feedback Shift Registers (LFSR); although cryptographically weak [37], the LFSRs present some advantages like the fast time of execution. There are also generators based on Non-Linear transitions, examples included the Non-Linear Feedback Shift Register NLFSR and the Feedback Shift with Carry Register FCSR. Such generators appear to be more secure than those based on LFSR. -
The Complete Stories
The Complete Stories by Franz Kafka a.b.e-book v3.0 / Notes at the end Back Cover : "An important book, valuable in itself and absolutely fascinating. The stories are dreamlike, allegorical, symbolic, parabolic, grotesque, ritualistic, nasty, lucent, extremely personal, ghoulishly detached, exquisitely comic. numinous and prophetic." -- New York Times "The Complete Stories is an encyclopedia of our insecurities and our brave attempts to oppose them." -- Anatole Broyard Franz Kafka wrote continuously and furiously throughout his short and intensely lived life, but only allowed a fraction of his work to be published during his lifetime. Shortly before his death at the age of forty, he instructed Max Brod, his friend and literary executor, to burn all his remaining works of fiction. Fortunately, Brod disobeyed. Page 1 The Complete Stories brings together all of Kafka's stories, from the classic tales such as "The Metamorphosis," "In the Penal Colony" and "The Hunger Artist" to less-known, shorter pieces and fragments Brod released after Kafka's death; with the exception of his three novels, the whole of Kafka's narrative work is included in this volume. The remarkable depth and breadth of his brilliant and probing imagination become even more evident when these stories are seen as a whole. This edition also features a fascinating introduction by John Updike, a chronology of Kafka's life, and a selected bibliography of critical writings about Kafka. Copyright © 1971 by Schocken Books Inc. All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Schocken Books Inc., New York. Distributed by Pantheon Books, a division of Random House, Inc., New York. -
Grein a New Non-Linear Cryptoprimitive
UNIVERSITY OF BERGEN Grein A New Non-Linear Cryptoprimitive by Ole R. Thorsen Thesis for the degree Master of Science December 2013 in the Faculty of Mathematics and Natural Sciences Department of Informatics Acknowledgements I want to thank my supervisor Tor Helleseth for all his help during the writing of this thesis. Further, I wish to thank the Norwegian National Security Authority, for giving me access to their Grein cryptosystem. I also wish to thank all my colleagues at the Selmer Centre, for all the inspiring discus- sions. Most of all I wish to thank prof. Matthew Parker for all his input, and my dear friends Stian, Mikal and Jørgen for their spellchecking, and socialising in the breaks. Finally, I wish to thank my girlfriend, Therese, and my family, for their continuous sup- port during the writing of this thesis. Without you, this would not have been possible. i Contents Acknowledgementsi List of Figures iv List of Tablesv 1 Introduction1 2 Cryptography2 2.1 Classical Cryptography............................3 2.2 Modern Cryptography.............................4 3 Stream Ciphers5 3.1 Stream Cipher Fundamentals.........................5 3.2 Classification of Stream Ciphers........................6 3.3 One-Time Pad.................................7 4 Building Blocks8 4.1 Boolean Functions...............................8 4.1.1 Cryptographic Properties....................... 10 4.2 Linear Feedback Shift Registers........................ 11 4.2.1 The Recurrence Relation....................... 12 4.2.2 The Matrix Method.......................... 12 4.2.3 Characteristic Polynomial....................... 13 4.2.4 Period of a Sequence.......................... 14 4.3 Linear Complexity............................... 16 4.4 The Berlekamp-Massey Algorithm...................... 16 4.5 Non-Linear Feedback Shift Registers.................... -
Robot Visions - Isaac Asimov
Robot Visions - Isaac Asimov ISAAC ASIMOV ROBOT VISIONS ILLUSTRATIONS BY RALPH McQUARRIE file:///E|/Documents%20and%20Settings/Princess%20D...20Visions/Robot%20Visions%20-%20Isaac%20Asimov.htm (1 of 222)11/19/2005 3:59:53 AM Robot Visions - Isaac Asimov To Gardner Dozois and Stan Schmidt, colleagues and friends CONTENTS Introduction: The Robot Chronicles STORIES Robot Visions Too Bad! Robbie Reason Liar! Runaround Evidence Little Lost Robot The Evitable Conflict Feminine Intuition The Bicentennial Man Someday Think! Segregationist Mirror Image Lenny Galley Slave Christmas Without Rodney ESSAYS Robots I Have Known The New Teachers Whatever You Wish The Friends We Make Our Intelligent Tools The Laws Of Robotics Future Fantastic The Machine And The Robot The New Profession The Robot As Enemy? file:///E|/Documents%20and%20Settings/Princess%20D...20Visions/Robot%20Visions%20-%20Isaac%20Asimov.htm (2 of 222)11/19/2005 3:59:53 AM Robot Visions - Isaac Asimov Intelligences Together My Robots The Laws Of Humanics Cybernetic Organism The Sense Of Humor Robots In Combination Introduction: The Robot Chronicles What is a robot? We might define it most briefly and comprehensively as “an artificial object that resembles a human being.” When we think of resemblance, we think of it, first, in terms of appearance. A robot looks like a human being. It could, for instance, be covered with a soft material that resembles human skin. It could have hair, and eyes, and a voice, and all the features and appurtenances of a human being, so that it would, as far as outward appearance is concerned, be indistinguishable from a human being. -
Dr. Asimov's Automatons
Dr. Asimov’s Automatons Take on a Life of their Own Twenty years after his death, author Isaac Asimov’s robot fiction offers a blueprint to our robotic future...and the problems we could face by Alan S. Brown HIS PAST April, the University of Miami School These became the Three Laws. Today, they are the starting of Law held We Robot, the first-ever legal and point for any serious conversation about how humans and policy issues conference about robots. The name robots will behave around one another. of the conference, which brought together lawyers, As the mere fact of lawyers discussing robot law shows, engineers, and technologists, played on the title the issue is no longer theoretical. If robots are not yet of the most famous book intelligent, they are increasingly t ever written about robots, autonomous in how they carry out I, Robot, by Isaac Asimov. tasks. At the most basic level, every The point was underscored by day millions of robotic Roombas de- Laurie Silvers, president of Holly- cide how to navigate tables, chairs, wood Media Corp., which sponsored sofas, toys, and even pets as they the event. In 1991, Silvers founded vacuum homes. SyFy, a cable channel that specializ- At a more sophisticated level, es in science fiction. Within moments, autonomous robots help select in- she too had dropped Asimov’s name. ventory in warehouses, move and Silvers turned to Asimov for ad- position products in factories, and vice before launching SyFy. It was a care for patients in hospitals. South natural choice. Asimov was one of the Korea is testing robotic jailers. -
A Study in Nelville, Thain, Purdy, and Reller
THE RO~~NCE-P~~ODY: A STUDY IN NELVILLE, THAIN, PURDY, AND RELLER A Thesis Presented to the Faculty of the Department of English Kansas State Teachers College, Emporia In Partial Fulfillment of the Requirements for the Degree, Haster of Arts by Constance Denn~ston Nay 1965 Approved for the Major Department ~~._~.~.~ Approved for the Graduate Council ~~./ 21862:1 PREFACE -~ To criticize one genre according to the standards of another genre serves to confuse more than to clarify. It ~'!.... 0< i,viil be shc\~1. w '" tl1.e fO\:r v~cse fictio~s ex~nincd in this i,.;o::-k belong to the genre of romance-parody, but are often criticized because they do not conform to the genre of the novel or the genre of the romance. Many contemporary critics, especially Richard Cnase and Northrop Frye, refuse to relegate all long prose fiction to o~e category, the novel. They mcl~e a distinction between the novel and the romance, much as Hawthorne had done earlier. According to this distinction, the novel presents the every day experiences of ordinary people, i.cl1ereasthe romance pre sents extraordinary experiences of characte~ types from myths and legends and has a tendency to be allegorical. The four prose fictions examined in this work have much in co~~on with romance, in li&~t of the above distinc tions. However, it will be shovn1 that these fictions use the structure, conventions, and subjects of the romance ironically and satirically. Melville's The Confidence Man is a parody of religion. Twain's Ptldd'nb.ead Hilson parodies human justice.