Movatterモバイル変換


[0]ホーム

URL:


PhilPapersPhilPeoplePhilArchivePhilEventsPhilJobs

Results for 'Jun Shen'

974 found
Order:

1 filter applied
  1.  44
    Based on Agent Model and K-Core Decomposition to Analyze the Diffusion of Mass Incident in Microblog.Jun Pan,HuizhangShen &Zhong Chen -2017 -Complexity:1-10.
    No categories
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark  
  2.  24
    Homeostasis Is Maintained in Yan Xin Life Science Technology-Optimized Caloric Restriction: Physiological and Biochemical Studies.Jun Wang,HuaShen,Wei Chin,Chao Lu,Canhui Li &Xin Yan -2002 -Bulletin of Science, Technology and Society 22 (5):397-402.
    Yan Xin Life Science Technology-Optimized Caloric Restriction (YXLST-CR) is a unique food abstinence, which suppresses appetite and sensation of hunger while maintaining physiological homeostasis. The authors review the first clinical case study on YXLST-CR, or YXLST-bigu, a 15-day, 24-hour observation in 1987 on a 21-year-old female undergoing YXLST-bigu for several months. The participant took no food or water and conducted normal physical activities. The daily records of body weight, temperature, pulse rate, blood pressure, and daily urine test results showed no (...) abnormalities. Homeostasis was maintained during YXLST-CR. The authors also report serum leptin levels in a group of individuals undergoing YXLST-CR and a control group before and after a 24-hour water-only period. The leptin level prior to the observation for the YXLST-CR group was lower than that for the control group and remained unchanged during the observation, suggesting the possibilities of an established metabolic adaptation. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  20
    Research on Risk Identification System Based on Random Forest Algorithm-High-Order Moment Model.Li-Jun Liu,Wei-KangShen &Jia-Ming Zhu -2021 -Complexity 2021:1-10.
    With the continuous development of the stock market, designing a reasonable risk identification tool will help to solve the irrational problem of investors. This paper first selects the stocks with the most valuable investment value in the future through the random forest algorithm in the nine-factor model and then analyzes them by using the higher-order moment model to find that different investors’ preferences will make the weight of the portfolio change accordingly, which will eventually make the optimal return and risk (...) set of the composition of the portfolio change. The risk identification system designed in this paper can provide an effective risk identification tool for investors and help them make rational judgments. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  4.  17
    The object as the unit for state switching in visual working memory.Shengnan Zhu,Yongqi Li,Yingtao Fu,Jun Yin,MoweiShen &Hui Chen -2024 -Cognition 249 (C):105808.
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  19
    FLP answer set semantics without circular justifications for general logic programs.Yi-DongShen,Kewen Wang,Thomas Eiter,Michael Fink,Christoph Redl,Thomas Krennwallner &Jun Deng -2014 -Artificial Intelligence 213 (C):1-41.
  6.  105
    Deployment of Attention on Handshakes.MoweiShen,Jun Yin,Xiaowei Ding,Rende Shui &Jifan Zhou -2016 -Frontiers in Psychology 7.
  7.  28
    Historically‐informed nursing: A transnational case study in China.Jun Lu,Sonya Grypma,Yingjuan Cao,Lijuan Bu,LinShen &Patricia M. Davidson -2018 -Nursing Inquiry 25 (1):e12205.
    The term ‘nurse’ (hushi—’caring scholar’) did not enter the Chinese language until the early 20th century. Modern nursing—a fundamentally Western notion popularized by Nightingale and introduced to China in 1884—profoundly changed the way care of the sick was practiced. For 65 years, until 1949, nursing developed in China as a transnational project, with Western and Chinese influences shaping the profession of nursing in ways that linger today. Co‐authored by Chinese, Canadian, and American nurses, this paper examines the early stages of (...) nursing in one province of China as an exemplar of the transnational nature of nursing development. By identifying sociopolitical influences on the early development of nursing in Shandong, the authors aimed not only to contribute to the nascent body of knowledge on China nursing history, but also to heighten readers’ sensitivity to the existence of historical echoes, residue, and resonances in their own nursing practices. Tracing current issues, values, or practices back to their roots provides context and helps us to better understand the present. Whether we are aware of the details or not, the gestalt of nursing practice in a particular place has been shaped by its history—including in Shandong province in China. (shrink)
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  8.  63
    Outlier detection of air temperature series data using probabilistic finite state automata‐based algorithm.JunShen,Minhua Yang,Bin Zou,Neng Wan &Yufang Liao -2012 -Complexity 17 (5):48-57.
  9.  68
    Social grouping: Perceptual grouping of objects by cooperative but not competitive relationships in dynamic chase.Jun Yin,Xiaowei Ding,Jifan Zhou,Rende Shui,Xinyu Li &MoweiShen -2013 -Cognition 129 (1):194-204.
  10.  32
    Social constraints from an observer’s perspective: Coordinated actions make an agent’s position more predictable.Jun Yin,Haokui Xu,Xiaowei Ding,Junying Liang,Rende Shui &MoweiShen -2016 -Cognition 151 (C):10-17.
    No categories
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark  
  11.  24
    Corrigendum to “Social constraints from an observer’s perspective: Coordinated actions make an agent’s position more predictable” [Cognition 151 (2016) 10–17]. [REVIEW]Jun Yin,Haokui Xu,Xiaowei Ding,Junying Liang,Rende Shui &MoweiShen -2016 -Cognition 153 (C):212.
    No categories
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark  
  12.  31
    Effectiveness of Electroacupuncture and Electroconvulsive Therapy as Additional Treatment in Hospitalized Patients With Schizophrenia: A Retrospective Controlled Study.Jie Jia,JunShen,Fei-Hu Liu,Hei Kiu Wong,Xin-Jing Yang,Qiang-Ju Wu,Hui Zhang,Hua-Ning Wang,Qing-Rong Tan &Zhang-Jin Zhang -2019 -Frontiers in Psychology 10.
    Electroacupuncture (EA) and electroconvulsive therapy (ECT) are often used in the management of schizophrenia. This study sought to determine whether additional EA and ECT could augment antipsychotic response and reduce related side effects. In this retrospective controlled study, 287 hospitalized schizophrenic patients who received antipsychotics (controls, n = 50) alone or combined with EA (n = 101), ECT (n = 55) or both (EA+ECT, n = 81) were identified. EA and ECT were conducted for 5 and 3 sessions per week, (...) respectively, with a maximum of 12 sessions for ECT during hospitalization. The Scale for the Assessment of Positive Symptoms (SAPS) and Scale for the Assessment of Negative Symptoms (SANS) were used to assess the severity of psychotic symptoms. Clinical response on SAPS and SANS, weight gain, and adverse events were compared. Survival analysis revealed that the ECT and EA+ECT groups had markedly greater clinical response rate than controls on SAPS [72.7% and 90.1% vs. 64.0%; relative risk (RR), 1.974 and 2.628, respectively, P ≤ 0.004] and on SANS (67.3% and 70.4% vs. 42.0%; RR, 1.951 and 2.009, respectively, P ≤ 0.015). A significantly greater response rate on SANS than controls was also observed in the EA group (64.4% versus 42.0%; RR = 1.938, P = 0.008). EA-containing regimens remarkably reduced weight gain and incidences of headache, insomnia, dry mouth, and electrocardiographic abnormalities. These results suggest that EA and ECT can serve as additional treatment for enhancing antipsychotic response and reduce the side effects in hospitalized patients with schizophrenia. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  13.  35
    Heterosexual Rejection and Mate Choice: A Sociometer Perspective.Lin Zhang,Shen Liu,Yue Li &Lu-Jun Ruan -2015 -Frontiers in Psychology 6.
    Direct download(5 more)  
     
    Export citation  
     
    Bookmark  
  14.  21
    Studies on the Fundamental Theory of Bigu (Food Abstinence)—Preliminary Experimental Observations of Cellular Bigu.Zhen-Qin Xia,HuaShen,Jun Wang,Hongmei Li,Alexis Traynor-Kaplan &Xin Yan -2002 -Bulletin of Science, Technology and Society 22 (5):392-396.
    Clinical studies as well as hundreds of case reports have indicated that Yan Xin Life Science Technology has enabled human participants to live a normal life with little or no food intake for prolonged periods—a state referred to as bigu. Bigu is described in historical records as “taking in qi to avoid food,” and is regarded as a special technique to achieve a long and healthy life. In this study, experiments were designed to study whether cells in vitro can survive (...) without commonly acknowledged essential nutrients after receiving external qi treatments from Dr. Yan Xin, a chief physician and a renowned life scientist. Results reported here indicate that mouse hybridoma cells can survive in Dulbeco’s modified Eagles medium without serum or in phosphate-buffered saline buffer without other nutrient ingredients after qi treatment. These results are the first evidence that a cellular equivalent of the human bigu phenomenon or cellular bigu phenomenon may occur. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  25
    Alterations of Interhemispheric Functional Connectivity in Parkinson’s Disease With Depression: A Resting-State Functional MRI Study.Haiyan Liao,Jie Fan,QinShen,Sainan Cai,Min Wang,Chunyu Wang,Hainan Zhang,Jun Liu,Xiongzhao Zhu &Changlian Tan -2020 -Frontiers in Human Neuroscience 14.
  16.  42
    Two-Level Domain Adaptation Neural Network for EEG-Based Emotion Recognition.Guangcheng Bao,Ning Zhuang,Li Tong,Bin Yan,Jun Shu,Linyuan Wang,Ying Zeng &ZhichongShen -2021 -Frontiers in Human Neuroscience 14.
    Emotion recognition plays an important part in human-computer interaction. Currently, the main challenge in electroencephalogram -based emotion recognition is the non-stationarity of EEG signals, which causes performance of the trained model decreasing over time. In this paper, we propose a two-level domain adaptation neural network to construct a transfer model for EEG-based emotion recognition. Specifically, deep features from the topological graph, which preserve topological information from EEG signals, are extracted using a deep neural network. These features are then passed through (...) TDANN for two-level domain confusion. The first level uses the maximum mean discrepancy to reduce the distribution discrepancy of deep features between source domain and target domain, and the second uses the domain adversarial neural network to force the deep features closer to their corresponding class centers. We evaluated the domain-transfer performance of the model on both our self-built data set and the public data set SEED. In the cross-day transfer experiment, the ability to accurately discriminate joy from other emotions was high: sadness, anger, and fear on the self-built data set. The accuracy reached 74.93% on the SEED data set. In the cross-subject transfer experiment, the ability to accurately discriminate joy from other emotions was equally high: sadness, anger, and fear on the self-built data set. The average accuracy reached 87.9% on the SEED data set, which was higher than WGAN-DA. The experimental results demonstrate that the proposed TDANN can effectively handle the domain transfer problem in EEG-based emotion recognition. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  29
    Action Generalization Across Group Members: Action Efficiency Matters.Jipeng Duan,Yingdong Jiang,Yunfeng He,Feng Zhang,MoweiShen &Jun Yin -2021 -Cognitive Science 45 (4):e12957.
    Actions are usually generalized among social group members. Importantly, the efficiency of an action with respect to achieving an external target determines action understanding, and it may have different degrees of social relevance to social groups. Thus, this study explored the role of action efficiency in action generalization. We used computer animations to simulate actions in social groups initiated by visual action cues or category labels, and we measured differences in response times between identifying actions that were and were not (...) consistent with group members, without explicit requirements regarding generalization. It was found that in both visually introduced and explicitly labeled social groups, when the group members acted inefficiently toward the external object, perceivers identified group‐consistent actions faster than group‐inconsistent actions, indicating that the exemplars' common inefficient actions are generalized to the unknown ingroup member, accordingly facilitating the identification of expected consistent inefficient action (Experiment 1). As this effect was not present when removing social group cues, it was determined to be specific to social groups (Experiment 2). Importantly, such generalization was not observed when the identical action was deemed efficient toward the external object (Experiment 3) and was specific to the demonstration of the action being completed by multiple group members rather than being repeated twice by one group member, supporting the group‐based inference and ruling out the possibility of the increased memorability of inefficient actions leading to more generalization relative to efficient actions (Experiment 4). Therefore, the efficiency of an action bounds the generalization of the action across social group members through a process that is spontaneous and implicit. This constrained action generalization may be due to inefficient actions being represented as culture‐specific conventional forms. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Jun shi mei chu tan.MingShen -1996 - Beijing Shi: Jun shi ke xue chu ban she.
     
    Export citation  
     
    Bookmark  
  19.  37
    Common and Specific Alterations of Amygdala Subregions in Major Depressive Disorder With and Without Anxiety: A Combined Structural and Resting-State Functional MRI Study.Yao Yao Li,Xiao Kang Ni,Ya Feng You,Yan hua Qing,Pei Rong Wang,Jia shu Yao,Ke Ming Ren,Lei Zhang,Zhi wei Liu,Tie jun Song,Jinhui Wang,Yu-Feng Zang,Yue diShen &Wei Chen -2021 -Frontiers in Human Neuroscience 15.
    Anxious major depressive disorder is a common subtype of major depressive disorder; however, its unique neural mechanism is not well-understood currently. Using multimodal MRI data, this study examined common and specific alterations of amygdala subregions between patients with and without anxiety. No alterations were observed in the gray matter volume or intra-region functional integration in either patient group. Compared with the controls, both patient groups showed decreased functional connectivity between the left superficial amygdala and the left putamen, and between the (...) right superficial amygdala and the bilateral anterior cingulate cortex and medial orbitofrontal cortex, while only patients with anxiety exhibited decreased activity in the bilateral laterobasal and superficial amygdala. Moreover, the decreased activity correlated negatively with the Hamilton depression scale scores in the patients with anxiety. These findings provided insights into the pathophysiologic processes of anxious major depressive disorder and may help to develop new and effective treatment programs. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  11
    Dikaer di yi zhe xue yan jiu.Jun Feng -1989 - Beijing: Xin hua shu dian jing xiao.
    Di ka mi shi ou zhou jin dai li xing zhu yi zhe xue de chuang shi ren. ben shu li tu dui di ka mi di yi zhe xue de si xiang zuo yi quan mian yan jiu, dui ta de fang fa lun " wo si gu wo zai " wu fu guan nian lun, xinshen guan xi deng zhu yao li lun jin xing le xi tong yan jiu.
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  15
    Zhongguo xian dai zhi jue lun yan jiu.jun Hu -2014 - Beijing Shi: Beijing ta xue chu ban she.
    Ben shu xi tong jie shi le zhi jue lun si xiang zai zhong guo xian dai zhe xue fa zhan yan bian de gui ji, Fen xi le liang shu ming, Xiong shi li, Feng you lan, He lin, Mou zong san, Fang dong mei, Tang jun yi deng ren yun yong zhi jue fang fa lai jian gou ge zi zhe xue si xiang ti xi zhi de yu shi, Ji you zhuan ti yan jiu deshen (...) du, You jian gu le shi de guang du, Xian ming gou le chu zhi jue lun zai zhong guo xian dai zhe xue yan jiu zhong de du te lun kuo. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  4
    Jun renshen mei jiao yu.Renbo Fu -1988 - Hefei Shi: Xin hua shu dian jing xiao.
    Direct download  
     
    Export citation  
     
    Bookmark  
  23. Kongzi yun jun yu Zhuangzishen zhi si xiang.Kezhuang Li -2003 - Taibei Shi: Zhongguo wen hua da xue chu ban bu.
     
    Export citation  
     
    Bookmark  
  24.  18
    Chu tu wen xian yu jun zishen du:shen du wen ti tao lun ji.Tao Liang &Yunlong Si (eds.) -2012 - Guilin Shi: Li Jiang chu ban she.
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  20
    Cong ru xue xin xing lun dao dao de xing shang xue de shan bian: yi Tang Junyi wei zhong xin.Jifu Duan -2014 - Shanghai: Shanghai gu ji chu ban she.
    Ben shu yi "zhou xin shi dai" Zhongguo wen hua ren wen xing te zheng xing cheng ji qi dui Zhongguo zhe xue te zhi de su zao wei qie ru dian, zai xi tong shu li ru xue xin xing lun de ji ben zhu ti he li shi fa zhan, jie shi qi te zheng de ji chu shang, cong dao de yu sheng ming, dao de shi jian deng fang mian dui tang jun yi dao de xing (...) shang xue jin xing leshen ru de yan jiu. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  45
    Disclosing false identity through hybrid link analysis.Tossapon Boongoen,QiangShen &Chris Price -2010 -Artificial Intelligence and Law 18 (1):77-102.
    Combating the identity problem is crucial and urgent as false identity has become a common denominator of many serious crimes, including mafia trafficking and terrorism. Without correct identification, it is very difficult for law enforcement authority to intervene, or even trace terrorists’ activities. Amongst several identity attributes, personal names are commonly, and effortlessly, falsified or aliased by most criminals. Typical approaches to detecting the use of false identity rely on the similarity measure of textual and other content-based characteristics, which are (...) usually not applicable in the case of highly deceptive, erroneous and unknown descriptions. This barrier can be overcome through analysis of link information displayed by the individual in communication behaviours, financial interactions and social networks. In particular, this paper presents a novel link-based approach that improves existing techniques by integrating multiple link properties in the process of similarity evaluation. It is utilised in a hybrid model that proficiently combines both text-based and link-based measures of examined names to refine the justification of their similarity. This approach is experimentally evaluated against other link-based and text-based techniques, over a terrorist-related dataset, with further generalization to a similar problem occurring in publication databases. The empirical study demonstrates the great potential of this work towards developing an effective identity verification system. (shrink)
    Direct download(4 more)  
     
    Export citation  
     
    Bookmark  
  27.  3
    杜威谈中国.John Dewey &YihongShen -2001 - Hangzhou: Zhejiang Sheng Xin hua shu dian jing xiao. Edited by Yihong Shen.
    全书收录了杜威的五大讲演。包括:社会哲学与政治哲学、教育哲学、思想之派别、现代的三个哲学家、伦理讲演纪略。.
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  56
    The impact of adjacent-dependencies and staged-input on the learnability of center-embedded hierarchical structures.Jun Lai &Fenna H. Poletiek -2011 -Cognition 118 (2):265-273.
    Direct download(4 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  29.  78
    Alerting and orienting of attention without visual awareness.Shena Lu,Yongchun Cai,MoweiShen,Ying Zhou &Shihui Han -2012 -Consciousness and Cognition 21 (2):928-938.
    Two types of the attentional network, alerting and orienting, help organisms respond to environmental events for survival in the temporal and spatial dimensions, respectively. Here, we applied chromatic flicker beyond the critical fusion frequency to address whether awareness was necessary for activation of the two attentional networks. We found that high-frequency chromatic flicker, despite its failure to reach awareness, produced the alerting and orienting effects, supporting the dissociation between attention and awareness. Furthermore, as the flicker frequency increased, the orienting effect (...) attenuated whereas the alerting effect remained unchanged. According to the systematic decline in temporal frequency sensitivity across the visual hierarchy, this finding suggests that unconscious alerting might be associated with activity in earlier visual areas than unconscious orienting. Since high-frequency flicker has been demonstrated to only activate early visual cortex, we suppose that neural activation in early visual areas might be sufficient to activate the two attentional networks. (shrink)
    Direct download(4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  21
    Different Dominant Models and Fairness Concern of E-Supply Chain.Yuyan Wang,Zhaoqing Yu,LiangShen,Yan Ge &Jing Li -2018 -Complexity 2018:1-13.
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  31.  15
    Revisiting the Gender Revolution: Time on Paid Work, Domestic Work, and Total Work in East Asian and Western Societies 1985–2016.Jiweon Jun,Shohei Yoda,Ekaterina Hertog,Kamila Kolpashnikova,Muzhi Zhou &Man-Yee Kan -2022 -Gender and Society 36 (3):368-396.
    We analyze time use data of four East Asian societies and 12 Western countries between 1985 and 2016 to investigate the gender revolution in paid work, domestic work, and total work. The closing of gender gaps in paid work, domestic work, and total work time has stalled in the most recent decade in several countries. The magnitude of the gender gaps, cultural contexts, and welfare policies plays a key role in determining whether the gender revolution in the division of labor (...) will stall or continue. Women undertake more total work than men across all societies: The gender gap ranges from 30 minutes to 2 hours a day. Our findings suggest that cultural norms interact with institutional contexts to affect the patterns of gender convergence in time use, and gender equality might settle at differing levels of egalitarianism across countries. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  916
    Political Theory and History: The Case of Anarchism.Nathan Jun &Matthew S. Adams -2015 -Journal of Political Ideologies 20 (3):244-262.
    This essay critically examines one of the dominant tendencies in recent theoretical discussions of anarchism, postanarchism, and argues that this tradition fails to engage sufficiently with anarchism’s history. Through an examination of late 19th-century anarchist political thought—as represented by one of its foremost exponents, Peter Kropotkin—we demonstrate the extent to which postanarchism has tended to oversimplify and misrepresent the historical tradition of anarchism. The article concludes by arguing that all political-theoretical discussions of anarchism going forward should begin with a fresh (...) appraisal of the actual content of anarchist political thought, based on a rigorous analysis of its political, social, and cultural history. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  15
    Research on WiFi Penetration Testing with Kali Linux.He-Jun Lu &Yang Yu -2021 -Complexity 2021:1-8.
    Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. The experimental results show that the method of WiFi network penetration testing with Kali (...) Linux has a good effect on improving the security evaluation of WiFi network. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  34. Introduction to "Anarchism: A Conceptual Approach".Nathan Jun,Benjamin Franks &Leonard Williams -2018 - In Benjamin Franks, Nathan Jun & Leonard Williams,Anarchism: A Conceptual Approach. London: Routledge. pp. 1-12.
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  53
    Virtual Reality Church as a New Mission Frontier in the Metaverse: Exploring Theological Controversies and Missional Potential of Virtual Reality Church.Guichun Jun -2020 -Transformation: An International Journal of Holistic Mission Studies 37 (4):297-305.
    The combination of COVID-19 and the Fourth Industrial Revolution has brought an unprecedented new normal, which has affected all aspects of human life, including religious activities. As a consequence, church mission and different ministries have found themselves more dependent on media. Furthermore, the convergent digital technology continually develops augmented reality and virtual reality, in which churches are planted and continue to carry out their mission and ministries. Although virtual reality churches are new mission frontiers in the digital age, there are (...) several theological issues from the conventional perspective of church ministry and mission. This paper aims to address the controversial theological issues and reflect on them from an ecclesiological perspective to explore a theological possibility to overcome the issues and to justify their mission and ministries in virtual reality. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  462
    Rethinking the Anarchist Canon: History, Philosophy, and Interpretation.Nathan Jun -2013 -Anarchist Developments in Cultural Studies 3 (1):79-111.
    How we define the anarchist canon—let alone how we decide which thinkers, theories, and texts should count as canonical—depends very much on what we take the purpose of the anarchist canon to be. In this essay, I distinguish between thinkers, theories, or texts that are “anarchist,” by virtue of belonging to actually-existing historical anarchist movements, and those which are “anarchist” in virtue of expressing “anarchistic” (or “anarchic”) ideas. I argue that the anarchist canon is best conceived as a repository of (...) historically-expressed anarchistic ideas and, for this reason, should include both kinds of theories, thinkers, and texts. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  419
    Reconsidering Poststructuralism and Anarchism.Nathan Jun -2011 - In Duane Rousselle & Süreyyya Evren,Post-Anarchism: A Reader. Pluto Press. pp. 231-249.
  38.  30
    Inf-Hesitant Fuzzy Ideals in BCK/BCI-Algebras.Young Bae Jun &Seok-Zun Song -2020 -Bulletin of the Section of Logic 49 (1).
    Based on the hesitant fuzzy set theory which is introduced by Torra in the paper [12], the notions of Inf-hesitant fuzzy subalgebras, Inf-hesitant fuzzy ideals and Inf-hesitant fuzzy p-ideals in BCK/BCI-algebras are introduced, and their relations and properties are investigated. Characterizations of an Inf-hesitant fuzzy subalgebras, an Inf-hesitant fuzzy ideals and an Inf-hesitant fuzzy p-ideal are considered. Using the notion of BCK-parts, an Inf-hesitant fuzzy ideal is constructed. Conditions for an Inf-hesitant fuzzy ideal to be an Inf-hesitant fuzzy p-ideal are (...) discussed. Using the notion of Inf-hesitant fuzzy ideals, a characterization of a p-semisimple BCI-algebra is provided. Extension properties for an Inf-hesitant fuzzy p-ideal is established. (shrink)
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  377
    The Current State of Anarchist Studies in France: An Interview.Nathan Jun,Vivien García &Irène Pereira -2014 -Anarchist Developments in Cultural Studies 1.
  40.  346
    Hegel and Anarchist Communism.Nathan Jun -2014 -Anarchist Studies 22 (2):26-52.
    In this essay, I argue that there are two more or less distinct theories of the State in Hegel. The first, and better known, is developed in the Philosophy of Right, wherein Hegel endorses the notion of a coercive, centralised, and hierarchical 'Ideal State'. This is precisely the theory which certain radical Hegelians of the nineteenth century (e.g., Marx and Bakunin) viewed with such deep suspicion. The second, which has not received as much attention by commentators, appears in the Phenomenology (...) and other early writings. Although this theory introduces many of the key components of Hegel's later political philosophy, it is nonetheless far more radical in its political implications--most important, in its gesturing toward a society which makes room for the realisation of the stateless, classless vision of anarchist communism. The point is not to demonstrate that Hegel is inconsistent or self-contradictory, but show that there are elements of creative tension within his political theory which are not only sufficient to vindicate him from the criticisms of Marx and Bakunin, but also to re-contextualise him as a radical precursor. As I shall argue, the kind of society that emerges in the final chapters of the Phenomenology need not contain the elements of coercion and class struggle which appear in the Philosophy of Right and repulse Marx and Bakunin. On the contrary, such a society may be understood as prefiguring the classless, stateless society which both Marx and Bakunin ultimately endorse. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  41.  335
    Paideia for Praxis: Philosophy and Pedagogy as Practices of Liberation.Nathan Jun -2012 - In Robert Haworth,Anarchist Pedagogies: Collective Actions, Theories, and Critical Reflections on Education. PM Press. pp. 283-302.
  42.  277
    On the Spiritual Exploitation of the Poor.Nathan Jun -2017 - In Michael Truscello & Ajamu Nangwaya,Why Don't the Poor Rise Up? Organizing the Twenty-First Century Resistance. AK Press. pp. 133-144.
  43.  252
    Toward a Girardian Politics.Nathan Jun -2007 -Studies in Social and Political Thought 12 (14):22-42.
  44.  423
    Reconsidering the Comfort Women Case: Inherited Responsibility as Civic Responsibility.Jun-Hyeok Kwak -2010 -Korea Observer 41 (3):329-349.
    The comfort women case in South Korea has been a polemic issue in the context of inherited responsibility. The Japanese government who emphasizes on state as an agent for taking the responsibility tends either to deny collective responsibility of historic wrongdoings or to limit the scope of its roles to superficial ways such as reparation. Meanwhile South Korea demands not only reparation but official apology, emotional compassion, and material compensation on the ground that nation, not state, should be accountable for (...) historic injustice, but this claim still encounters a difficulty of application to cases originated in multinational countries. Based on these observations, I will develop two arguments: (1) that reciprocal nondomination conceptualized with civic responsibility will better the comfort women case in the context of inherited responsibility because this contains full ground of deliberation in which those who come from regardless of state or nation can participate; (2) that reciprocal nondomination embodied with civic responsibility can be operated as a regulative principle which prompts both victims and wrongdoers to have their deliberative stances and to reach an agreement conducive to transitional justice. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  45.  30
    Structural Biology of the HEAT‐Like Repeat Family of DNA Glycosylases.Rongxin Shi,Xing-XingShen,Antonis Rokas &Brandt F. Eichman -2018 -Bioessays 40 (11):1800133.
    DNA glycosylases remove aberrant DNA nucleobases as the first enzymatic step of the base excision repair (BER) pathway. The alkyl‐DNA glycosylases AlkC and AlkD adopt a unique structure based on α‐helical HEAT repeats. Both enzymes identify and excise their substrates without a base‐flipping mechanism used by other glycosylases and nucleic acid processing proteins to access nucleobases that are otherwise stacked inside the double‐helix. Consequently, these glycosylases act on a variety of cationic nucleobase modifications, including bulky adducts, not previously associated with (...) BER. The related non‐enzymatic HEAT‐like repeat (HLR) proteins, AlkD2, and AlkF, have unique nucleic acid binding properties that expand the functions of this relatively new protein superfamily beyond DNA repair. Here, we review the phylogeny, biochemistry, and structures of the HLR proteins, which have helped broaden our understanding of the mechanisms by which DNA glycosylases locate and excise chemically modified DNA nucleobases. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  46.  26
    The Strength of an Axiom of Finite Choice for Branches in Trees.G. O. H. Jun Le -2023 -Journal of Symbolic Logic 88 (4):1367-1386.
    In their logical analysis of theorems about disjoint rays in graphs, Barnes, Shore, and the author (hereafter BGS) introduced a weak choice scheme in second-order arithmetic, called the $\Sigma ^1_1$ axiom of finite choice (hereafter finite choice). This is a special case of the $\Sigma ^1_1$ axiom of choice ( $\Sigma ^1_1\text {-}\mathsf {AC}_0$ ) introduced by Kreisel. BGS showed that $\Sigma ^1_1\text {-}\mathsf {AC}_0$ suffices for proving many of the aforementioned theorems in graph theory. While it is not known (...) if these implications reverse, BGS also showed that those theorems imply finite choice (in some cases, with additional induction assumptions). This motivated us to study the proof-theoretic strength of finite choice. Using a variant of Steel forcing with tagged trees, we show that finite choice is not provable from the $\Delta ^1_1$ -comprehension scheme (even over $\omega $ -models). We also show that finite choice is a consequence of the arithmetic Bolzano–Weierstrass theorem (introduced by Friedman and studied by Conidis), assuming $\Sigma ^1_1$ -induction. Our results were used by BGS to show that several theorems in graph theory cannot be proved using $\Delta ^1_1$ -comprehension. Our results also strengthen results of Conidis. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  47.  44
    The tendency of unconscious thought toward global processing style.Jiansheng Li,Fan Wang,MoweiShen &Gang Fan -2017 -Consciousness and Cognition 53:14-22.
  48.  26
    Non-domination with Nothingness: Supplementing Pettit’s Theory of Democratic Deliberation.Jun-Hyeok Kwak -2023 -Journal of Social and Political Philosophy 2 (1):60-77.
    Democratic deliberation has an inherent tension between self-government and good government. It grants democratic politics a legitimacy which depends on its responsiveness to the collective opinion of the members of a political community, while it also seeks good decisions, the justification of which adheres to an ideal of right action beyond the opinion of the majority. In this regard, Philip Pettit proposes liberty as non-domination as a regulative ideal that guides democratic deliberation for self-government without jettisoning the ideal of good (...) government. His republican theory of democratic deliberation is worthy of our consideration in the sense that without endorsing either any pre-existing commonality in a society or a set of inalienable individual rights, it successfully justifies the imposition of external premises in democratic deliberation. However, his theory of democratic deliberation still falls prey to charges of having an anti-self-government tendency, particularly when civil contention between individuals or groups is driven by contrasting views of liberty as non-domination. Based on this observation, in this paper, supplementing his consequentialism with the Daoist practices of becoming ‘nothingness’, I will suggest the ethics of ‘difference’ as an additional regulative principle that helps better steer democratic deliberation toward the premise of liberty as non-domination. (shrink)
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  49.  8
    Research on the Path of Integrating Party Construction Aesthetics into Ideological and Political Education in Colleges and Universities.L. I. Jun,G. U. Gaofei,Meng Tian &L. I. N. Danyun -2024 -Philosophy Study 14 (4).
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  50.  36
    Confucian Role-Ethics with Non-Domination: Civil Compliance in Times of Crisis.Jun-Hyeok Kwak -2022 -Ethical Theory and Moral Practice 25 (2):199-213.
    In this article, combining the Confucian notion of relationality with the republican principle of non-domination, I will shed new light on the ethics of civil compliance in an emergency situation. More specifically, first, by exploring the culturally biased distinctions between individualism and collectivism in the current debates on ‘pandemic’ nationalism, I will put forward the need for a relationality through which civil cooperation with emergency governance can facilitate the enhancement of both individual freedom and democratic commonality in the long run. (...) Then, by supplementing the moral vision of role-constituted relationality in Confucian role-ethics with the principle of liberty as non-domination in neo-Roman republicanism, I will suggest an ethics of civil compliance which can steer emergency governance toward the consolidation of democratic accountability. (shrink)
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 974
Export
Limit to items.
Filters





Configure languageshere.Sign in to use this feature.

Viewing options


Open Category Editor
Off-campus access
Using PhilPapers from home?

Create an account to enable off-campus access through your institution's proxy server or OpenAthens.


[8]ページ先頭

©2009-2025 Movatter.jp