Apologia di Galileo / Tommaso Campanella ; a cura di Luigi Firpo |
Autore | Campanella, Tommaso <1568-1639> |
Pubbl/distr/stampa | Torino, : Unione tipografico-editrice torinese, 1968 |
Descrizione fisica | 195 p., [4] carte di tav. : ill., ritr. ; 25 cm |
Disciplina | 215 |
Soggetto non controllato | Campanella, Tommaso. Apologia di Galileo |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione |
ita
lat |
Record Nr. | UNINA-9910469056103321 |
Campanella, Tommaso <1568-1639> | ||
Torino, : Unione tipografico-editrice torinese, 1968 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied informatics : Fifth International Conference, ICAI 2022, Arequipa, Peru, October 27-29, 2022, proceedings / / edited by Hector Florez and Henry Gomez |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (472 pages) |
Disciplina | 215 |
Collana | Communications in Computer and Information Science |
Soggetto topico | Computer science |
ISBN | 3-031-19647-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Artificial Intelligence -- A Genetic Algorithm for Scheduling Laboratory Rooms: A Case Study -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 4 Experimental Setup -- 5 Experimental Results -- 6 Conclusion -- References -- COVID-19 Article Classification Using Word-Embedding and Different Variants of Deep-Learning Approach -- 1 Introduction -- 2 Related Work -- 2.1 Text Classification -- 2.2 Deep Learning Methods -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Word Embedding -- 3.3 Feature Selection and Dimensionality Reduction -- 3.4 Deep Learning Models -- 3.5 Research Methodology -- 4 Findings and Discussion -- 4.1 RQ1: Which Word Embedding Technique Results in the Best Performance? -- 4.2 RQ2: What Is the Impact of Feature Selection and Dimensionality Reduction on the Performance? -- 4.3 RQ3: Which of the Eight Structures for the DL Neural Network Is the Most Suitable for Text Classification? -- 4.4 How Do the Performances of the Models Trained on the Title Dataset Compare with Those Trained on the Content Dataset? -- 5 Conclusion -- References -- Crop Classification Using Deep Learning: A Quick Comparative Study of Modern Approaches -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Understanding and Preparation -- 3.2 Modeling -- 3.3 Evaluation -- 4 Results and Discussion -- 5 Conclusions and Future Works -- References -- Internet of Things (IoT) for Secure and Sustainable Healthcare Intelligence: Analysis and Challenges -- 1 Introduction -- 2 Basic Elements of IoT Environment -- 3 IoT Applications for Healthcare Intelligence -- 3.1 Types of IoT Applications in Healthcare -- 4 Sustainable IoT Techniques for Error Reduction, and Challenges (Security) in Healthcare Delivery -- 4.1 Healthcare Error Reduction Using Secured IoT Solutions.
4.2 Healthcare Optimization Using IoT -- 4.3 Security Challenges in Healthcare Intelligence Delivery -- 5 Conclusion and Future Direction -- References -- Multiple Colour Detection of RGB Images Using Machine Learning Algorithm -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Overall Framework -- 3.2 K-Nearest Neighbour (KNN) -- 3.3 RGB Colour Histogram -- 3.4 Colour Classification Using KNN -- 4 Implementation and Results -- 4.1 Feature Extraction -- 4.2 Comparison -- 5 Conclusion -- References -- Neural Model-Based Similarity Prediction for Compounds with Unknown Structures -- 1 Introduction -- 2 Materials and Methods -- 2.1 Embeddings Construction -- 2.2 Neural Model -- 2.3 Dataset Construction -- 3 Results -- 3.1 Embeddings Selection -- 3.2 Optimization of the Neural Architecture -- 3.3 Similarity Prediction in Compounds of Unknown Structure -- 4 Conclusions -- References -- Data Analysis -- Classifying Incoming Customer Messages for an e-Commerce Site Using Supervised Learning -- 1 Introduccion -- 2 Related Work -- 3 Integration of Data Sources -- 4 Data Preparation -- 5 Modeling -- 6 Evaluation -- 7 Deployment -- 8 Conclusions and Future Work -- References -- Comparison of Machine Learning Models for Predicting Rainfall in Tropical Regions: The Colombian Case -- 1 Introduction -- 2 Literature Review -- 3 Data Understanding -- 3.1 Descriptive Statistics -- 4 Methodology -- 4.1 The Model -- 5 Model Evaluation -- 6 Discussion -- 7 Conclusions -- References -- Deep Mining Covid-19 Literature -- 1 Introduction -- 2 Dataset -- 3 Related Work -- 3.1 Search Engines -- 3.2 Mining of Cord19 -- 4 Text Mining -- 4.1 Classical Topic Modelling with Bag of Words: From LSA to LDA -- 4.2 Beyond Bag of Words: Text Classification and Clustering with Word Embeddings -- 4.3 Topic Analysis with Deep Architectures -- 5 Experiments -- 5.1 Preparing the Data. 5.2 Finding the Most Prominent Topics -- 6 Conclusion -- References -- Keyword-Based Processing for Assessing Short Answers in the Educational Field -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Automated Scoring -- 3.2 Effective Feedback -- 4 Results -- 4.1 Program Functioning -- 4.2 Relationship Between Calculated and Real Mark -- 4.3 Influence of Each Keyterm on the Mark -- 5 Discussion -- 6 Conclusions -- References -- Statistical Characterization of Image Intensities in Regions Inside Arteries to Facilitate the Extraction of Center Lines in Atherosclerosis Frameworks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Statistically Estimating Level of Intensities for Pathogenic Arteries -- 3 Results -- 3.1 Institution 1. Statistical Values for Lumen, Calcifications and Background -- 3.2 Institution 2. Statistical Values for Lumen, Calcifications and Background -- 3.3 Institution 3. Statistical Values for Lumen, Calcifications and Background -- 3.4 Institution 4. Statistical Values for Lumen, Calcifications and Background -- 4 Discussion -- 5 Conclusions -- References -- Text Encryption with Advanced Encryption Standard (AES) for Near Field Communication (NFC) Using Huffman Compression -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References s -- Decision Systems -- A Systematic Review on Phishing Detection: A Perspective Beyond a High Accuracy in Phishing Detection -- 1 Introduction -- 2 Methodology -- 2.1 Research Question Formulation -- 2.2 Sourcing of Relevant Literature -- 2.3 Literature Selection -- 3 Phishing Detection Stages, When? -- 3.1 Prevention Stage -- 3.2 Diffusion Stage -- 3.3 Mitigation Stage -- 4 Phishing Information Sources ¿Where? -- 5 Phishing Characterization What? -- 5.1 Challenges for Feature Selection -- 6 Phishing Detection How?. 6.1 Surveyed Papers for Detecting Phishing -- 6.2 Blacklist-Whitelist Approach -- 6.3 Heuristic Approaches -- 6.4 Machine Learning -- 6.5 Detection Phishing Methods -- 7 Opportunities for Future Researches -- 7.1 Identifying Challenges in the Review -- 7.2 Include of Brand Information to Improve Phishing Representation -- 7.3 How Patterns and Brand Features Can be Used in Prevention Stages -- 8 Conclusions -- References -- Application of Duality Properties of Renyi Entropy for Parameter Tuning in an Unsupervised Machine Learning Task -- 1 Introduction -- 2 The Entropic Approach to Topic Modeling -- 2.1 Introduction into Topic Modeling -- 2.2 Free Energy of a Textual Collection -- 2.3 Renyi and Tsallis Entropies for Textual Collections -- 3 The Duality of Topic Modeling -- 4 Results and Discussion -- 4.1 Description of Numerical Experiments -- 4.2 Renyi Entropy of Topic Models with E-M Algorithms (pLSA and VLDA Models) -- 4.3 Renyi Entropy of LDA Gibbs Sampling Model -- 5 Conclusion -- References -- Preliminary Study for Impact of Social Media Networks on Traffic Prediction -- 1 Introduction -- 2 Background -- 2.1 Social Media and Traffic Prediction -- 3 Method and Experimental Setting -- 3.1 Information Diffusion Model -- 3.2 Prediction Model -- 3.3 Experimental Setting -- 4 Evaluation and Validation -- 4.1 Case Study 1: All of 511NYC Accounts and Followers -- 4.2 Case Study 2: Account 55009968 and Network -- 4.3 Case Study 3: Merged Networks from Case Studies 1 and 2 -- 5 Conclusions and Discussion -- References -- Website Phishing Detection Using Machine Learning Classification Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 Single Classification Algorithm -- 2.2 Hybrid Classification Algorithms -- 3 Dataset Description -- 4 Methodology -- 4.1 XGBoost -- 4.2 Random Forest (RF) -- 4.3 Support Vector Machine (SVM) -- 4.4 Naïve Bayes (NB). 4.5 Logistic Regression -- 4.6 K-Nearest Neighbours (KNN) -- 4.7 Decision Tree (DT) -- 4.8 AdaBoost -- 5 Implementation -- 6 Results and Discussion -- 7 Conclusions -- References -- Health Care Information Systems -- AESRSA: A New Cryptography Key for Electronic Health Record Security -- 1 Introduction -- 2 Background -- 2.1 Cryptography Keys -- 2.2 Common Cryptography Keys -- 3 Related Work -- 4 Approach for EHR Security Based on Improved Cryptography -- 4.1 Data Source -- 4.2 Implementation Environment -- 4.3 Implementation -- 4.4 Performance Evaluation -- 5 Experimental Result and Analysis -- 5.1 Result of EHR Data Encryption Evaluation -- 5.2 Result of EHR Data Decryption Process Evaluation -- 5.3 Analysis -- 6 Conclusions and Future Work -- References -- Detection of COVID-19 Using Denoising Autoencoders and Gabor Filters -- 1 Introduction -- 1.1 Artificial Intelligence (AI) -- 1.2 Chest Radiograph (CRG) -- 1.3 Computed Tomography (CT) Scan -- 2 Related Work -- 3 Existing Framework -- 3.1 DeepCoroNet -- 3.2 Deep Belief Networks (DBN) -- 3.3 Multilayer Perceptron (MLP) -- 3.4 Local Binary Patterns (LBP) -- 3.5 Issue Description -- 4 Datasets -- 5 Proposed Framework -- 5.1 Denoising Autoencoders -- 5.2 Gabor Filter -- 5.3 Architecture Explanation of Proposed Framework -- 6 Experimental Outcome -- 6.1 Overall Performance -- 6.2 Datasets for Training -- 6.3 Data Analysis -- 7 Conclusion -- References -- Development of a Mobile Application to Save Lives on Catastrophic Situations -- 1 Introduction -- 2 Seismic Hazards in Colombia -- 3 Natural Emergencies in Colombia -- 4 Colombian Geological Service -- 5 A Mobile Technology Strategy -- 5.1 Test and Operations -- 6 Conclusions -- References -- Internet of Things with Wearable Devices and Artificial Intelligence for Elderly Uninterrupted Healthcare Monitoring Systems -- 1 Introduction. 2 Materials and Methods. |
Record Nr. | UNISA-996495562403316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied informatics : Fifth International Conference, ICAI 2022, Arequipa, Peru, October 27-29, 2022, proceedings / / edited by Hector Florez and Henry Gomez |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (472 pages) |
Disciplina | 215 |
Collana | Communications in Computer and Information Science |
Soggetto topico | Computer science |
ISBN | 3-031-19647-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Artificial Intelligence -- A Genetic Algorithm for Scheduling Laboratory Rooms: A Case Study -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 4 Experimental Setup -- 5 Experimental Results -- 6 Conclusion -- References -- COVID-19 Article Classification Using Word-Embedding and Different Variants of Deep-Learning Approach -- 1 Introduction -- 2 Related Work -- 2.1 Text Classification -- 2.2 Deep Learning Methods -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Word Embedding -- 3.3 Feature Selection and Dimensionality Reduction -- 3.4 Deep Learning Models -- 3.5 Research Methodology -- 4 Findings and Discussion -- 4.1 RQ1: Which Word Embedding Technique Results in the Best Performance? -- 4.2 RQ2: What Is the Impact of Feature Selection and Dimensionality Reduction on the Performance? -- 4.3 RQ3: Which of the Eight Structures for the DL Neural Network Is the Most Suitable for Text Classification? -- 4.4 How Do the Performances of the Models Trained on the Title Dataset Compare with Those Trained on the Content Dataset? -- 5 Conclusion -- References -- Crop Classification Using Deep Learning: A Quick Comparative Study of Modern Approaches -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Understanding and Preparation -- 3.2 Modeling -- 3.3 Evaluation -- 4 Results and Discussion -- 5 Conclusions and Future Works -- References -- Internet of Things (IoT) for Secure and Sustainable Healthcare Intelligence: Analysis and Challenges -- 1 Introduction -- 2 Basic Elements of IoT Environment -- 3 IoT Applications for Healthcare Intelligence -- 3.1 Types of IoT Applications in Healthcare -- 4 Sustainable IoT Techniques for Error Reduction, and Challenges (Security) in Healthcare Delivery -- 4.1 Healthcare Error Reduction Using Secured IoT Solutions.
4.2 Healthcare Optimization Using IoT -- 4.3 Security Challenges in Healthcare Intelligence Delivery -- 5 Conclusion and Future Direction -- References -- Multiple Colour Detection of RGB Images Using Machine Learning Algorithm -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Overall Framework -- 3.2 K-Nearest Neighbour (KNN) -- 3.3 RGB Colour Histogram -- 3.4 Colour Classification Using KNN -- 4 Implementation and Results -- 4.1 Feature Extraction -- 4.2 Comparison -- 5 Conclusion -- References -- Neural Model-Based Similarity Prediction for Compounds with Unknown Structures -- 1 Introduction -- 2 Materials and Methods -- 2.1 Embeddings Construction -- 2.2 Neural Model -- 2.3 Dataset Construction -- 3 Results -- 3.1 Embeddings Selection -- 3.2 Optimization of the Neural Architecture -- 3.3 Similarity Prediction in Compounds of Unknown Structure -- 4 Conclusions -- References -- Data Analysis -- Classifying Incoming Customer Messages for an e-Commerce Site Using Supervised Learning -- 1 Introduccion -- 2 Related Work -- 3 Integration of Data Sources -- 4 Data Preparation -- 5 Modeling -- 6 Evaluation -- 7 Deployment -- 8 Conclusions and Future Work -- References -- Comparison of Machine Learning Models for Predicting Rainfall in Tropical Regions: The Colombian Case -- 1 Introduction -- 2 Literature Review -- 3 Data Understanding -- 3.1 Descriptive Statistics -- 4 Methodology -- 4.1 The Model -- 5 Model Evaluation -- 6 Discussion -- 7 Conclusions -- References -- Deep Mining Covid-19 Literature -- 1 Introduction -- 2 Dataset -- 3 Related Work -- 3.1 Search Engines -- 3.2 Mining of Cord19 -- 4 Text Mining -- 4.1 Classical Topic Modelling with Bag of Words: From LSA to LDA -- 4.2 Beyond Bag of Words: Text Classification and Clustering with Word Embeddings -- 4.3 Topic Analysis with Deep Architectures -- 5 Experiments -- 5.1 Preparing the Data. 5.2 Finding the Most Prominent Topics -- 6 Conclusion -- References -- Keyword-Based Processing for Assessing Short Answers in the Educational Field -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Automated Scoring -- 3.2 Effective Feedback -- 4 Results -- 4.1 Program Functioning -- 4.2 Relationship Between Calculated and Real Mark -- 4.3 Influence of Each Keyterm on the Mark -- 5 Discussion -- 6 Conclusions -- References -- Statistical Characterization of Image Intensities in Regions Inside Arteries to Facilitate the Extraction of Center Lines in Atherosclerosis Frameworks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Statistically Estimating Level of Intensities for Pathogenic Arteries -- 3 Results -- 3.1 Institution 1. Statistical Values for Lumen, Calcifications and Background -- 3.2 Institution 2. Statistical Values for Lumen, Calcifications and Background -- 3.3 Institution 3. Statistical Values for Lumen, Calcifications and Background -- 3.4 Institution 4. Statistical Values for Lumen, Calcifications and Background -- 4 Discussion -- 5 Conclusions -- References -- Text Encryption with Advanced Encryption Standard (AES) for Near Field Communication (NFC) Using Huffman Compression -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References s -- Decision Systems -- A Systematic Review on Phishing Detection: A Perspective Beyond a High Accuracy in Phishing Detection -- 1 Introduction -- 2 Methodology -- 2.1 Research Question Formulation -- 2.2 Sourcing of Relevant Literature -- 2.3 Literature Selection -- 3 Phishing Detection Stages, When? -- 3.1 Prevention Stage -- 3.2 Diffusion Stage -- 3.3 Mitigation Stage -- 4 Phishing Information Sources ¿Where? -- 5 Phishing Characterization What? -- 5.1 Challenges for Feature Selection -- 6 Phishing Detection How?. 6.1 Surveyed Papers for Detecting Phishing -- 6.2 Blacklist-Whitelist Approach -- 6.3 Heuristic Approaches -- 6.4 Machine Learning -- 6.5 Detection Phishing Methods -- 7 Opportunities for Future Researches -- 7.1 Identifying Challenges in the Review -- 7.2 Include of Brand Information to Improve Phishing Representation -- 7.3 How Patterns and Brand Features Can be Used in Prevention Stages -- 8 Conclusions -- References -- Application of Duality Properties of Renyi Entropy for Parameter Tuning in an Unsupervised Machine Learning Task -- 1 Introduction -- 2 The Entropic Approach to Topic Modeling -- 2.1 Introduction into Topic Modeling -- 2.2 Free Energy of a Textual Collection -- 2.3 Renyi and Tsallis Entropies for Textual Collections -- 3 The Duality of Topic Modeling -- 4 Results and Discussion -- 4.1 Description of Numerical Experiments -- 4.2 Renyi Entropy of Topic Models with E-M Algorithms (pLSA and VLDA Models) -- 4.3 Renyi Entropy of LDA Gibbs Sampling Model -- 5 Conclusion -- References -- Preliminary Study for Impact of Social Media Networks on Traffic Prediction -- 1 Introduction -- 2 Background -- 2.1 Social Media and Traffic Prediction -- 3 Method and Experimental Setting -- 3.1 Information Diffusion Model -- 3.2 Prediction Model -- 3.3 Experimental Setting -- 4 Evaluation and Validation -- 4.1 Case Study 1: All of 511NYC Accounts and Followers -- 4.2 Case Study 2: Account 55009968 and Network -- 4.3 Case Study 3: Merged Networks from Case Studies 1 and 2 -- 5 Conclusions and Discussion -- References -- Website Phishing Detection Using Machine Learning Classification Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 Single Classification Algorithm -- 2.2 Hybrid Classification Algorithms -- 3 Dataset Description -- 4 Methodology -- 4.1 XGBoost -- 4.2 Random Forest (RF) -- 4.3 Support Vector Machine (SVM) -- 4.4 Naïve Bayes (NB). 4.5 Logistic Regression -- 4.6 K-Nearest Neighbours (KNN) -- 4.7 Decision Tree (DT) -- 4.8 AdaBoost -- 5 Implementation -- 6 Results and Discussion -- 7 Conclusions -- References -- Health Care Information Systems -- AESRSA: A New Cryptography Key for Electronic Health Record Security -- 1 Introduction -- 2 Background -- 2.1 Cryptography Keys -- 2.2 Common Cryptography Keys -- 3 Related Work -- 4 Approach for EHR Security Based on Improved Cryptography -- 4.1 Data Source -- 4.2 Implementation Environment -- 4.3 Implementation -- 4.4 Performance Evaluation -- 5 Experimental Result and Analysis -- 5.1 Result of EHR Data Encryption Evaluation -- 5.2 Result of EHR Data Decryption Process Evaluation -- 5.3 Analysis -- 6 Conclusions and Future Work -- References -- Detection of COVID-19 Using Denoising Autoencoders and Gabor Filters -- 1 Introduction -- 1.1 Artificial Intelligence (AI) -- 1.2 Chest Radiograph (CRG) -- 1.3 Computed Tomography (CT) Scan -- 2 Related Work -- 3 Existing Framework -- 3.1 DeepCoroNet -- 3.2 Deep Belief Networks (DBN) -- 3.3 Multilayer Perceptron (MLP) -- 3.4 Local Binary Patterns (LBP) -- 3.5 Issue Description -- 4 Datasets -- 5 Proposed Framework -- 5.1 Denoising Autoencoders -- 5.2 Gabor Filter -- 5.3 Architecture Explanation of Proposed Framework -- 6 Experimental Outcome -- 6.1 Overall Performance -- 6.2 Datasets for Training -- 6.3 Data Analysis -- 7 Conclusion -- References -- Development of a Mobile Application to Save Lives on Catastrophic Situations -- 1 Introduction -- 2 Seismic Hazards in Colombia -- 3 Natural Emergencies in Colombia -- 4 Colombian Geological Service -- 5 A Mobile Technology Strategy -- 5.1 Test and Operations -- 6 Conclusions -- References -- Internet of Things with Wearable Devices and Artificial Intelligence for Elderly Uninterrupted Healthcare Monitoring Systems -- 1 Introduction. 2 Materials and Methods. |
Record Nr. | UNINA-9910617307103321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Are there limits to science? / / edited by Gillian Straine |
Pubbl/distr/stampa | Newcastle upon Tyne, England : , : Cambridge Scholars Publishing, , 2017 |
Descrizione fisica | 1 online resource (201 pages) : illustrations |
Disciplina | 215 |
Soggetto topico |
Religion and science
Science - Philosophy |
Soggetto genere / forma | Electronic books. |
ISBN | 1-5275-0041-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910480056403321 |
Newcastle upon Tyne, England : , : Cambridge Scholars Publishing, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Are there limits to science? / / edited by Gillian Straine |
Pubbl/distr/stampa | Newcastle upon Tyne, England : , : Cambridge Scholars Publishing, , 2017 |
Descrizione fisica | 1 online resource (201 pages) : illustrations |
Disciplina | 215 |
Soggetto topico |
Religion and science
Science - Philosophy |
ISBN | 1-5275-0041-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | God, naturalism, and the limits of science / Fiona Ellis -- From the limits of science to the limits of metaphysics : a philosophical evaluation of Fiona Ellis' naturalistic theology / Mikael Leidenhag -- An elephant in the room : why the causal joint is still worth talking about / Sarah Lane Ritchie -- The wild experiment : emotion, reason, and the limits of science / Donovan O. Schaefer -- What should Christian theology (not) learn from science? the case of the human brain / Neil Messer -- Physics : the endless frontier / Nathan Aviezer -- The case of Thales' ox : an historical limit to science (and its relation to religion) / Michael Fuller -- John Spencer and the limits of natural causation in early modern England / Peter N. Jordan -- Naturalism, the limits of science and the case for non-scientific knowledge / Emmanuel Nartey -- The limits to science : a Barthian approach / Philip Chapman -- Ways to develop students' appreciation of the power and limitations of science / Berry Billingsley and Mehdi Nassaji -- A Christian response to transhumanism / David Ashford -- Among the limits to science : some after-dinner thoughts / Neil Spurway -- Closing reflections / Mark Harris. |
Record Nr. | UNINA-9910794913703321 |
Newcastle upon Tyne, England : , : Cambridge Scholars Publishing, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Are there limits to science? / / edited by Gillian Straine |
Pubbl/distr/stampa | Newcastle upon Tyne, England : , : Cambridge Scholars Publishing, , 2017 |
Descrizione fisica | 1 online resource (201 pages) : illustrations |
Disciplina | 215 |
Soggetto topico |
Religion and science
Science - Philosophy |
ISBN | 1-5275-0041-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | God, naturalism, and the limits of science / Fiona Ellis -- From the limits of science to the limits of metaphysics : a philosophical evaluation of Fiona Ellis' naturalistic theology / Mikael Leidenhag -- An elephant in the room : why the causal joint is still worth talking about / Sarah Lane Ritchie -- The wild experiment : emotion, reason, and the limits of science / Donovan O. Schaefer -- What should Christian theology (not) learn from science? the case of the human brain / Neil Messer -- Physics : the endless frontier / Nathan Aviezer -- The case of Thales' ox : an historical limit to science (and its relation to religion) / Michael Fuller -- John Spencer and the limits of natural causation in early modern England / Peter N. Jordan -- Naturalism, the limits of science and the case for non-scientific knowledge / Emmanuel Nartey -- The limits to science : a Barthian approach / Philip Chapman -- Ways to develop students' appreciation of the power and limitations of science / Berry Billingsley and Mehdi Nassaji -- A Christian response to transhumanism / David Ashford -- Among the limits to science : some after-dinner thoughts / Neil Spurway -- Closing reflections / Mark Harris. |
Record Nr. | UNINA-9910819788603321 |
Newcastle upon Tyne, England : , : Cambridge Scholars Publishing, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
L'autre économie : une économie alternative : présentation / / Raymond Lemieux |
Autore | Lemieux Raymond |
Pubbl/distr/stampa | Chicoutimi : , : J.-M. Tremblay, , 2006 |
Descrizione fisica | 1 online resource |
Disciplina | 215 |
Collana | Classiques des sciences sociales |
Soggetto topico | Religion and science |
ISBN | 1-4123-5638-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Altri titoli varianti | L'autre économie |
Record Nr. | UNINA-9910131236503321 |
Lemieux Raymond | ||
Chicoutimi : , : J.-M. Tremblay, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain for Teens : With Case Studies and Examples of Blockchain Across Various Industries / / by Brian Wu, Bridget Wu |
Autore | Wu Brian |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023 |
Descrizione fisica | 1 online resource (444 pages) |
Disciplina | 215 |
Soggetto topico |
Blockchains (Databases)
Computer science |
ISBN | 1-4842-8808-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Blockchain: A Groundbreaking Technology -- Chapter 2: Cryptography: The Backbone of Blockchain Security -- Chapter 3: Bitcoin: The Future of Money -- Chapter 4: Ethereum: A Gateway to Cryptocurrency -- Chapter 5: Smart Contracts and Dapps: From Theory to Practice -- Chapter 6: NFT: Crypto as Collectibles. Chapter 7 Metaverse: The World Reimagined -- Chapter 8: Decentralized Finance (DeFi): Reinventing Financial Services -- Chapter 9: The Future of Blockchain. |
Record Nr. | UNINA-9910639896903321 |
Wu Brian | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Catholic church and modern science : documents from the Archives of the Roman Congregations of the Holy office and the Index. Vol. I : Sixteenth-Century Documents / edited by Ugo Baldini and Leen Spruit - Roma : Libreria Editrice Vaticana, 2009 - 4 tomi [3379 p.] ; 25 cm] |
Disciplina | 215(Scienza e religione) |
Soggetto topico | CHIESA CATTOLICA ROMANA - Archivi - Sec. 16 |
ISBN | 978-88-209-8288-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNIOR-UON00382194 |
Materiale a stampa | ||
Lo trovi qui: Univ. L'Orientale | ||
|
Chance or dance [[electronic resource] ] : an evaluation of design / / Jimmy H. Davis and Harry L. Poe |
Autore | Davis Jimmy H. <1948-> |
Edizione | [Rev. ed.] |
Pubbl/distr/stampa | West Conshohocken, Pa., : Templeton Foundation Press, c2008 |
Descrizione fisica | 1 online resource (257 p.) |
Disciplina | 215 |
Altri autori (Persone) |
PoeHarry Lee <1950->
DavisJimmy H. <1948-> |
Soggetto topico |
Religion and science
Intelligent design (Teleology) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-26034-4
9786613260345 1-59947-213-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Half Title Page; Title Page; Copyright; Dedication; Contents; Illustrations; Preface to the Revised Edition; Preface; Acknowledgments; 1: The Appearance of Design; 2: The Design Argument; 3: The Mechanical Universe; 4: A Fine-tuned Universe; 5: The Comprehensible Universe; 6: The Complexity of Life; 7: The Intelligent Design Project; 8: Awe and Wonder; 9: Epilogue; Notes; Index |
Record Nr. | UNINA-9910461740903321 |
Davis Jimmy H. <1948-> | ||
West Conshohocken, Pa., : Templeton Foundation Press, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|