The Yijing – the Philosophical Foundation of the Binary System
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Hexadecimal Number System and Memory Addressing
C5537_App C_1107_03/16/2005 APPENDIX C The Hexadecimal Number System and Memory Addressing nderstanding the number system and the coding system that computers use to U store data and communicate with each other is fundamental to understanding how computers work. Early attempts to invent an electronic computing device met with disappointing results as long as inventors tried to use the decimal number sys- tem, with the digits 0–9. Then John Atanasoff proposed using a coding system that expressed everything in terms of different sequences of only two numerals: one repre- sented by the presence of a charge and one represented by the absence of a charge. The numbering system that can be supported by the expression of only two numerals is called base 2, or binary; it was invented by Ada Lovelace many years before, using the numerals 0 and 1. Under Atanasoff’s design, all numbers and other characters would be converted to this binary number system, and all storage, comparisons, and arithmetic would be done using it. Even today, this is one of the basic principles of computers. Every character or number entered into a computer is first converted into a series of 0s and 1s. Many coding schemes and techniques have been invented to manipulate these 0s and 1s, called bits for binary digits. The most widespread binary coding scheme for microcomputers, which is recog- nized as the microcomputer standard, is called ASCII (American Standard Code for Information Interchange). (Appendix B lists the binary code for the basic 127- character set.) In ASCII, each character is assigned an 8-bit code called a byte. -
Artificial Intelligence Is Stupid and Causal Reasoning Won't Fix It
Artificial Intelligence is stupid and causal reasoning wont fix it J. Mark Bishop1 1 TCIDA, Goldsmiths, University of London, London, UK Email: [email protected] Abstract Artificial Neural Networks have reached `Grandmaster' and even `super- human' performance' across a variety of games, from those involving perfect- information, such as Go [Silver et al., 2016]; to those involving imperfect- information, such as `Starcraft' [Vinyals et al., 2019]. Such technological developments from AI-labs have ushered concomitant applications across the world of business, where an `AI' brand-tag is fast becoming ubiquitous. A corollary of such widespread commercial deployment is that when AI gets things wrong - an autonomous vehicle crashes; a chatbot exhibits `racist' behaviour; automated credit-scoring processes `discriminate' on gender etc. - there are often significant financial, legal and brand consequences, and the incident becomes major news. As Judea Pearl sees it, the underlying reason for such mistakes is that \... all the impressive achievements of deep learning amount to just curve fitting". The key, Pearl suggests [Pearl and Mackenzie, 2018], is to replace `reasoning by association' with `causal reasoning' - the ability to infer causes from observed phenomena. It is a point that was echoed by Gary Marcus and Ernest Davis in a recent piece for the New York Times: \we need to stop building computer systems that merely get better and better at detecting statistical patterns in data sets { often using an approach known as \Deep Learning" { and start building computer systems that from the moment of arXiv:2008.07371v1 [cs.CY] 20 Jul 2020 their assembly innately grasp three basic concepts: time, space and causal- ity"[Marcus and Davis, 2019]. -
Chinese Philosophy
CHINESE PHILOSOPHY Vatican Relations: Problems of Conflicting Authority, 1976–1986 EARLY HISTORY (Cambridge 1992). J. LEUNG, Wenhua Jidutu: Xianxiang yu lunz- heng (Cultural Christian: Phenomenon and Argument) (Hong Shang Dynasty (c.1600–c.1045 B.C.). Chinese Kong 1997). K. C. LIU, ed. American Missionaries in China: Papers philosophical thought took definite shape during the reign from Harvard Seminars (Cambridge 1966). Lutheran World Feder- of the Shang dynasty in Bronze Age China. During this ation/Pro Mundi Vita. Christianity and the New China (South Pasa- period, the primeval forms of ancestor veneration in Neo- dena 1976). L. T. LYALL, New Spring in China? (London 1979). J. G. LUTZ, ed. Christian Missions in China: Evangelist of What? lithic Chinese cultures had evolved to relatively sophisti- (Boston 1965). D. E. MACINNIS, Religion in China Today: Policy cated rituals that the Shang ruling house offered to their and Practice (Maryknoll, NY 1989). D. MACINNIS and X. A. ZHENG, ancestors and to Shangdi, the supreme deity who was a Religion under Socialism in China (Armonk, NY 1991). R. MAD- deified ancestor and progenitor of the Shang ruling fami- SEN, China Catholics: Tragedy and Hope in an Emerging Civil So- ciety (Berkeley 1998). R. MALEK and M. PLATE Chinas Katholiken ly. A class of shamans emerged, tasked with divination suchen neue (Freiburg 1987). Missiones Catholicae cura S. Con- and astrology using oracle bones for the benefit of the rul- gregationis de Propaganda Fide descriptae statistica (Rome 1901, ing class. Archaeological excavations have uncovered 1907, 1922, 1927). J. METZLER, ed. Sacrae Congregationis de Pro- elaborate bronze sacrificial vessels and other parapherna- paganda Fide Memoria Rerum, 1622–1972 (Rome 1976). -
The Thought Experiments Are Rigged: Mechanistic Understanding Inhibits Mentalistic Understanding
Georgia State University ScholarWorks @ Georgia State University Philosophy Theses Department of Philosophy Summer 8-13-2013 The Thought Experiments are Rigged: Mechanistic Understanding Inhibits Mentalistic Understanding Toni S. Adleberg Georgia State University Follow this and additional works at: https://scholarworks.gsu.edu/philosophy_theses Recommended Citation Adleberg, Toni S., "The Thought Experiments are Rigged: Mechanistic Understanding Inhibits Mentalistic Understanding." Thesis, Georgia State University, 2013. https://scholarworks.gsu.edu/philosophy_theses/141 This Thesis is brought to you for free and open access by the Department of Philosophy at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Philosophy Theses by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. THE THOUGHT EXPERIMENTS ARE RIGGED: MECHANISTIC UNDERSTANDING INHIBITS MENTALISTIC UNDERSTANDING by TONI ADLEBERG Under the Direction of Eddy Nahmias ABSTRACT Many well-known arguments in the philosophy of mind use thought experiments to elicit intuitions about consciousness. Often, these thought experiments include mechanistic explana- tions of a systems’ behavior. I argue that when we understand a system as a mechanism, we are not likely to understand it as an agent. According to Arico, Fiala, Goldberg, and Nichols’ (2011) AGENCY Model, understanding a system as an agent is necessary for generating the intuition that it is conscious. Thus, if we are presented with a mechanistic description of a system, we will be very unlikely to understand that system as conscious. Many of the thought experiments in the philosophy of mind describe systems mechanistically. I argue that my account of consciousness attributions is preferable to the “Simplicity Intuition” account proposed by David Barnett (2008) because it is more explanatory and more consistent with our intuitions. -
Bol Shao Yung 20130225 Combined.Pdf (249.3Kb)
On Shao Yong’s Method for Observing Things The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Bol, Peter. 2013. On Shao Yong’s Method for Observing Things. Monumenta Serica 61:287-299. Published Version http://www.monumenta-serica.de/monumenta-serica/publications/ journal/Catolog/Volume-LXI-2013.php Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:17935880 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP On Shao Yong’s Method for Observing Things Peter K. Bol Charles H. Carswell Professor of East Asian Languages and Civilizations, Harvard University, 2 Divinity Avenue, Cambridge, MA 02138, USA Title: 論邵雍之觀物法 Abstract: Shao Yong’s “Inner Chapters on Observing Things” develops a method for understanding the unity of heaven and man, tracing the decline of civilization from antiquity, and determining how the present can return to the ideal socio-political order of antiquity. Shao’s method is based on dividing any topic into fours aspects (for example, four Classics, four seasons, four kinds of rulers, etc.) and generating the systematic relations between these four member sets. Although Shao’s method was unusual at the time, the questions he was addressing were shared with mid-eleventh statecraft thinkers. 摘要:邵雍在《觀物內篇》中發展出了一種獨特的方法,用來理解天人合一、追溯三代以 後之衰、並確定如何才能復原三代理想的社會政治秩序。邵雍的方法立足於將任意一個主 題劃分為四個種類(例如,四種經典,四種季節,四種統治者,等等),並賦予這四個種 類之間以系統性的聯繫。雖然邵雍的方法在當時並非尋常,可是他所試圖解決的問題卻是 其他十一世紀中葉的政治制度思想家所共同思考的。 Shao’s claim to philosophical importance is based on a single book, the Huangji jingshi shu 皇極 經世書 (Supreme Principles for Governing the World) and the various charts and diagrams associated with it, and to much lesser extent his collection of poems, the Jirang ji 擊壤集. -
Introduction to Philosophy Fall 2019—Test 3 1. According to Descartes, … A. What I Really Am Is a Body, but I Also Possess
Introduction to Philosophy Fall 2019—Test 3 1. According to Descartes, … a. what I really am is a body, but I also possess a mind. b. minds and bodies can’t causally interact with one another, but God fools us into believing they do. c. cats and dogs have immortal souls, just like us. d. conscious states always have physical causes, but never have physical effects. e. what I really am is a mind, but I also possess a body. 2. Which of the following would Descartes agree with? a. We can conceive of existing without a body. b. We can conceive of existing without a mind. c. We can conceive of existing without either a mind or a body. d. We can’t conceive of mental substance. e. We can’t conceive of material substance. 3. Substance dualism is the view that … a. there are two kinds of minds. b. there are two kinds of “basic stuff” in the world. c. there are two kinds of physical particles. d. there are two kinds of people in the world—those who divide the world into two kinds of people, and those that don’t. e. material substance comes in two forms, matter and energy. 4. We call a property “accidental” (as opposed to “essential”) when ... a. it is the result of a car crash. b. it follows from a thing’s very nature. c. it is a property a thing can’t lose (without ceasing to exist). d. it is a property a thing can lose (without ceasing to exist). -
Bits and Bytes
BITS AND BYTES To understand how a computer works, you need to understand the BINARY SYSTEM. The binary system is a numbering system that uses only two digits—0 and 1. Although this may seem strange to humans, it fits the computer perfectly! A computer chip is made up of circuits. For each circuit, there are two possibilities: An electric current flows through the circuit (ON), or An electric current does not flow through the circuit (OFF) The number 1 represents an “on” circuit. The number 0 represents an “off” circuit. The two digits, 0 and 1, are called bits. The word bit comes from binary digit: Binary digit = bit Every time the computer “reads” an instruction, it translates that instruction into a series of bits (0’s and 1’s). In most computers every letter, number, and symbol is translated into eight bits, a combination of eight 0’s and 1’s. For example the letter A is translated into 01000001. The letter B is 01000010. Every single keystroke on the keyboard translates into a different combination of eight bits. A group of eight bits is called a byte. Therefore, a byte is a combination of eight 0’s and 1’s. Eight bits = 1 byte Capacity of computer memory, storage such as USB devices, DVD’s are measured in bytes. For example a Word file might be 35 KB while a picture taken by a digital camera might be 4.5 MG. Hard drives normally are measured in GB or TB: Kilobyte (KB) approximately 1,000 bytes MegaByte (MB) approximately 1,000,000 (million) bytes Gigabtye (GB) approximately 1,000,000,000 (billion) bytes Terabyte (TB) approximately 1,000,000,000,000 (trillion) bytes The binary code that computers use is called the ASCII (American Standard Code for Information Interchange) code. -
Binary Bracelets
10010011011000110 10010011011000110110000100010001000001000 1001001101100011011000010001000111000110110 00010 001 1000001000 100 10011 011 000110 110000 10001000 001000 11000010 010000 010001010001000001000 100100110 010 010 110110000100010001000001000 1001001101 1000 110110000100010001000001000 1001001101 10001101100001000100010000 010 01000 10010011011000110110 00010 001 1000001000 100 10011 011 000110 110000 10001000001000 11000010 010000 01000 010 010 11000110110 00010 001 1000001000 100 10011 011 000110 110000 1000 10000 01 000 11000 010 010000 010 010 010 010 010 0100010010011011000110 10010011011000110110000100010001000001000 10010011011000110110000100010001110001101 10 00010 001BINARY 1000001000 101000110110000100010001000001000 BRACELETS 10010011011000110110 00010 001 1000001000 100 10011 011 000110 110000 10001000001000 11000010 010000 01000 11000110110 00010 001 1000001000 100 10011 011 000110 110000 1000 10000 01 000 1110 1100011011000010001000100000 000110 110000 10001000001000 11000010 010000 01000 11000110110 00010 001 1000001000 100 10011 011 000110 110000 1000 10010011011000110110 00010 001 1000001000 100 10011 011 Binary Code We are often used to representing numbers using ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. This is called a base-10, or decimal system. Binary code, however, uses only zeros and ones in a sequence of eight spots. We often to refer to these binary, or base-2, digits as “bits.” Binary code is used to communicate information between computers, communication devices, and many more modern technologies. It’s useful to build into electronic devices because it is a simple system that requires something turn on or off (where 1 is the on state and 0 is the off state). This activity will allow you to embed your own name or nickname in this secret code on a bracelet. The binary code for capital letters is found on the back of this page. -
Fuzzy Flexible Flow Shops on More Than Two Machine Centers
The Subtle Path to Heterodoxy: Reflections on the Concept of ‘Yiduan’ in the Jinsilu Milan Hejtmanek1 ARTICLE INFO ABSTRACT Available Online October 2013 Neo-Confucian philosophy in - Key words: partook of a moral discourse that drew extensively on Song Chinese Heterodoxy; texts from the 11th and 12theth centuries. Korean Chosǒn Among period these, (1392 the Jinsilu1910) Korea; ; 1175 proved especially influential. This paper examines in detail a Neo-Confucianism; central(Reflections theme on of Things the Jinsilu: at Hand), heterodoxy compiled or by yiduan, Zhu Xi situatingand LüZuqian it both in Jinsilu.Chosǒn dynasty within the broader traditions of earlier Confucianism and as well as within the context of Neo-Confucian thought or daoxue as it was developed the 11th century, by the brothers Cheng Yi and Cheng Hao. It identifies three distinct, if overlapping conceptions of heterodoxy in the Jinsilu. The paper argues that the most pessimistic and aggressive attitude toward the danger of straying from the orthodox way and the condemning of those who had done so derived from Cheng Yi. His thought and sense of near dread concerning heterodoxy would prove highly influential in Chosǒn Korea. Introduction It is a remarkable feature of recorded human civilization that discourse drawn from a wide variety of times and places displays fierce struggles over what constitutes proper moral behavior and correspondingly what should be castigated as wrong and evil. Moral traditions in the West as diverse as Judaism, Islam, and in the East Buddhism, Hinduism, and Confucianism ha rhetorical strategies to argue both sides of complex ethical issues. The production and reproduction of dogma and its antithesis, heresy or heterodoxy, isve a bequeathed central activity prolific of any discourses system of deploying moral thought. -
Preston, John, & Bishop, Mark
Preston, John, & Bishop, Mark (2002), Views into the Chinese Room: New Essays on Searle and Artificial Intelligence (Oxford: Oxford University Press), xvi + 410 pp., ISBN 0-19-825057-6. Reviewed by: William J. Rapaport Department of Computer Science and Engineering, Department of Philosophy, and Center for Cognitive Science, State University of New York at Buffalo, Buffalo, NY 14260-2000; [email protected], http://www.cse.buffalo.edu/ rapaport ∼ This anthology’s 20 new articles and bibliography attest to continued interest in Searle’s (1980) Chinese Room Argument. Preston’s excellent “Introduction” ties the history and nature of cognitive science, computation, AI, and the CRA to relevant chapters. Searle (“Twenty-One Years in the Chinese Room”) says, “purely . syntactical processes of the implemented computer program could not by themselves . guarantee . semantic content . essential to human cognition” (51). “Semantic content” appears to be mind-external entities “attached” (53) to the program’s symbols. But the program’s implementation must accept these entities as input (suitably transduced), so the program in execution, accepting and processing this input, would provide the required content. The transduced input would then be internal representatives of the external content and would be related to the symbols of the formal, syntactic program in ways that play the same roles as the “attachment” relationships between the external contents and the symbols (Rapaport 2000). The “semantic content” could then just be those mind-internal -
Research on the Time When Ping Split Into Yin and Yang in Chinese Northern Dialect
Chinese Studies 2014. Vol.3, No.1, 19-23 Published Online February 2014 in SciRes (http://www.scirp.org/journal/chnstd) http://dx.doi.org/10.4236/chnstd.2014.31005 Research on the Time When Ping Split into Yin and Yang in Chinese Northern Dialect Ma Chuandong1*, Tan Lunhua2 1College of Fundamental Education, Sichuan Normal University, Chengdu, China 2Sichuan Science and Technology University for Employees, Chengdu, China Email: *[email protected] Received January 7th, 2014; revised February 8th, 2014; accepted February 18th, 2014 Copyright © 2014 Ma Chuandong, Tan Lunhua. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In accordance of the Creative Commons Attribution License all Copyrights © 2014 are reserved for SCIRP and the owner of the intellectual property Ma Chuandong, Tan Lun- hua. All Copyright © 2014 are guarded by law and by SCIRP as a guardian. The phonetic phenomenon “ping split into yin and yang” 平分阴阳 is one of the most important changes of Chinese tones in the early modern Chinese, which is reflected clearly in Zhongyuan Yinyun 中原音韵 by Zhou Deqing 周德清 (1277-1356) in the Yuan Dynasty. The authors of this paper think the phe- nomenon “ping split into yin and yang” should not have occurred so late as in the Yuan Dynasty, based on previous research results and modern Chinese dialects, making use of historical comparative method and rhyming books. The changes of tones have close relationship with the voiced and voiceless initials in Chinese, and the voiced initials have turned into voiceless in Song Dynasty, so it could not be in the Yuan Dynasty that ping split into yin and yang, but no later than the Song Dynasty. -
Digital Culture: Pragmatic and Philosophical Challenges
DIOGENES Diogenes 211: 23–39 ISSN 0392-1921 Digital Culture: Pragmatic and Philosophical Challenges Marcelo Dascal Over the coming decades, the so-called telematic technologies are destined to grow more and more encompassing in scale and the repercussions they will have on our professional and personal lives will become ever more accentuated. The transforma- tions resulting from the digitization of data have already profoundly modified a great many of the activities of human life and exercise significant influence on the way we design, draw up, store and send documents, as well as on the means used for locating information in libraries, databases and on the net. These changes are transforming the nature of international communication and are modifying the way in which we carry out research, engage in study, keep our accounts, plan our travel, do our shopping, look after our health, organize our leisure time, undertake wars and so on. The time is not far off when miniaturized digital systems will be installed everywhere – in our homes and offices, in the car, in our pockets or even embedded within the bodies of each one of us. They will help us to keep control over every aspect of our lives and will efficiently and effectively carry out multiple tasks which today we have to devote precious time to. As a consequence, our ways of acting and thinking will be transformed. These new winds of change, which are blowing strongly, are giving birth to a new culture to which the name ‘digital culture’ has been given.1 It is timely that a study should be made of the different aspects and consequences of this culture, but that this study should not be just undertaken from the point of view of the simple user who quickly embraces the latest successful inno- vation, in reaction essentially to market forces.