Search This Blog

Thursday, November 30, 2023

Midbrain

From Wikipedia, the free encyclopedia
Midbrain
Figure shows the midbrain (A) and surrounding regions; sagittal view of one cerebellar hemisphere. B: Pons. C: Medulla. D: Spinal cord. E: Fourth ventricle. F: Arbor vitae. G: Nodule. H: Tonsil. I: Posterior lobe. J: Anterior lobe. K: Inferior colliculus. L: Superior colliculus.
 
Inferior view in which the midbrain is encircled blue.
 
Details
PronunciationUK: /ˌmɛsɛnˈsɛfəlɒn, -kɛf-/, US: /ˌmɛzənˈsɛfələn/;
Part ofBrainstem
Identifiers
Latinmesencephalon
MeSHD008636
NeuroNames462
NeuroLex IDbirnlex_1667
TA98A14.1.03.005
TA25874
FMA61993

The midbrain or mesencephalon is the rostral-most portion of the brainstem connecting the diencephalon and cerebrum with the pons. It consists of the cerebral peduncles, tegmentum, and tectum.

It is functionally associated with vision, hearing, motor control, sleep and wakefulness, arousal (alertness), and temperature regulation.

The name comes from the Greek mesos, "middle", and enkephalos, "brain".

Anatomy

The midbrain is the shortest segment of the brainstem, measuring at less than 2cm in length. It is situated mostly in the posterior cranial fossa, with its superior part extending above the tentorial notch.

Structure

Brainstem (dorsal view).
A:Thalamus B:Midbrain C:Pons
D:Medulla oblongata
7 and 8 are the colliculi.

The principal regions of the midbrain are the tectum, the cerebral aqueduct, tegmentum, and the cerebral peduncles. Rostrally the midbrain adjoins the diencephalon (thalamus, hypothalamus, etc.), while caudally it adjoins the hindbrain (pons, medulla and cerebellum). In the rostral direction, the midbrain noticeably splays laterally.

Sectioning of the midbrain is usually performed axially, at one of two levels – that of the superior colliculi, or that of the inferior colliculi. One common technique for remembering the structures of the midbrain involves visualizing these cross-sections (especially at the level of the superior colliculi) as the upside-down face of a bear, with the cerebral peduncles forming the ears, the cerebral aqueduct the mouth, and the tectum the chin; prominent features of the tegmentum form the eyes and certain sculptural shadows of the face.

Tectum

Principal connections of the tectum

The tectum (Latin for roof) is the part of the midbrain dorsal to the cerebral aqueduct. The position of the tectum is contrasted with the tegmentum, which refers to the region in front of the ventricular system, or floor of the midbrain.

It is involved in certain reflexes in response to visual or auditory stimuli. The reticulospinal tract, which exerts some control over alertness, takes input from the tectum, and travels both rostrally and caudally from it.

The corpora quadrigemina are four mounds, called colliculi, in two pairs – a superior and an inferior pair, on the surface of the tectum. The superior colliculi process some visual information, aid the decussation of several fibres of the optic nerve (some fibres remain ipsilateral), and are involved with saccadic eye movements. The tectospinal tract connects the superior colliculi to the cervical nerves of the neck, and co-ordinates head and eye movements. Each superior colliculus also sends information to the corresponding lateral geniculate nucleus, with which it is directly connected. The homologous structure to the superior colliculus in non mammalian vertebrates including fish and amphibians, is called the optic tectum; in those animals, the optic tectum integrates sensory information from the eyes and certain auditory reflexes.

The inferior colliculi – located just above the trochlear nerve – process certain auditory information. Each inferior colliculus sends information to the corresponding medial geniculate nucleus, with which it is directly connected.

Cerebral aqueduct

Ventricular system anatomy showing the cerebral aqueduct, labelled centre right.

The cerebral aqueduct is the part of the ventricular system which links the third ventricle (rostrally) with the fourth ventricle (caudally); as such it is responsible for continuing the circulation of cerebrospinal fluid. The cerebral aqueduct is a narrow channel located between the tectum and the tegmentum, and is surrounded by the periaqueductal grey, which has a role in analgesia, quiescence, and bonding. The dorsal raphe nucleus (which releases serotonin in response to certain neural activity) is located at the ventral side of the periaqueductal grey, at the level of the inferior colliculus.

The nuclei of two pairs of cranial nerves are similarly located at the ventral side of the periaqueductal grey – the pair of oculomotor nuclei (which control the eyelid, and most eye movements) is located at the level of the superior colliculus, while the pair of trochlear nuclei (which helps focus vision on more proximal objects) is located caudally to that, at the level of the inferior colliculus, immediately lateral to the dorsal raphe nucleus. The oculomotor nerve emerges from the nucleus by traversing the ventral width of the tegmentum, while the trochlear nerve emerges via the tectum, just below the inferior colliculus itself; the trochlear is the only cranial nerve to exit the brainstem dorsally. The Edinger-Westphal nucleus (which controls the shape of the lens and size of the pupil) is located between the oculomotor nucleus and the cerebral aqueduct.

Tegmentum

Cross-section of the midbrain at the level of the superior colliculus
Cross-section of the midbrain at the level of the inferior colliculus.

The midbrain tegmentum is the portion of the midbrain ventral to the cerebral aqueduct, and is much larger in size than the tectum. It communicates with the cerebellum by the superior cerebellar peduncles, which enter at the caudal end, medially, on the ventral side; the cerebellar peduncles are distinctive at the level of the inferior colliculus, where they decussate, but they dissipate more rostrally. Between these peduncles, on the ventral side, is the median raphe nucleus, which is involved in memory consolidation.

The main bulk of the tegmentum contains a complex synaptic network of neurons, primarily involved in homeostasis and reflex actions. It includes portions of the reticular formation. A number of distinct nerve tracts between other parts of the brain pass through it. The medial lemniscus – a narrow ribbon of fibres – passes through in a relatively constant axial position; at the level of the inferior colliculus it is near the lateral edge, on the ventral side, and retains a similar position rostrally (due to widening of the tegmentum towards the rostral end, the position can appears more medial). The spinothalamic tract – another ribbon-like region of fibres – are located at the lateral edge of the tegmentum; at the level of the inferior colliculus it is immediately dorsal to the medial lemiscus, but due to the rostral widening of the tegmentum, is lateral of the medial lemiscus at the level of the superior colliculus.

A prominent pair of round, reddish, regions – the red nuclei (which have a role in motor co-ordination) – are located in the rostral portion of the midbrain, somewhat medially, at the level of the superior colliculus. The rubrospinal tract emerges from the red nucleus and descends caudally, primarily heading to the cervical portion of the spine, to implement the red nuclei's decisions. The area between the red nuclei, on the ventral side – known as the ventral tegmental area – is the largest dopamine-producing area in the brain, and is heavily involved in the neural reward system. The ventral tegmental area is in contact with parts of the forebrain – the mammillary bodies (from the Diencephalon) and hypothalamus (of the diencephalon).

Cerebral peduncles

Brain anatomy – forebrain, midbrain, hindbrain.

The cerebral peduncles each form a lobe ventrally of the tegmentum, on either side of the midline. Beyond the midbrain, between the lobes, is the interpeduncular fossa, which is a cistern filled with cerebrospinal fluid.

The majority of each lobe constitutes the cerebral crus. The cerebral crus are the main tracts descending from the thalamus to caudal parts of the central nervous system; the central and medial ventral portions contain the corticobulbar and corticospinal tracts, while the remainder of each crus primarily contains tracts connecting the cortex to the pons. Older texts refer to the crus cerebri as the cerebral peduncle; however, the latter term actually covers all fibres communicating with the cerebrum (usually via the diencephalon), and therefore would include much of the tegmentum as well. The remainder of the crus pedunculi – small regions around the main cortical tracts – contain tracts from the internal capsule.

The portion of the lobes in connection with the tegmentum, except the most lateral portion, is dominated by a blackened band – the substantia nigra (literally black substance) – which is the only part of the basal ganglia system outside the forebrain. It is ventrally wider at the rostral end. By means of the basal ganglia, the substantia nigra is involved in motor-planning, learning, addiction, and other functions. There are two regions within the substantia nigra – one where neurons are densely packed (the pars compacta) and one where they are not (the pars reticulata), which serve a different role from one another within the basal ganglia system. The substantia nigra has extremely high production of melanin (hence the colour), dopamine, and noradrenalin; the loss of dopamine-producing neurons in this region contributes to the progression of Parkinson's disease.

Vasculature

Arterial supply

The midbrain is supplied by the following arteries:

Venous drainage

Venous blood from the midbrain is mostly drained into the basal vein as it passes around the peduncle. Some venous blood from the colliculi drains to the great cerebral vein.

Development

Mesencephalon of human embryo

During embryonic development, the midbrain (also known as the mesencephalon) arises from the second vesicle of the neural tube, while the interior of this portion of the tube becomes the cerebral aqueduct. Unlike the other two vesicles – the forebrain and hindbrain – the midbrain does not develop further subdivision for the remainder of neural development. It does not split into other brain areas. while the forebrain, for example, divides into the telencephalon and the diencephalon.

Throughout embryonic development, the cells within the midbrain continually multiply; this happens to a much greater extent ventrally than it does dorsally. The outward expansion compresses the still-forming cerebral aqueduct, which can result in partial or total obstruction, leading to congenital hydrocephalus. The tectum is derived in embryonic development from the alar plate of the neural tube.

Function

The mesencephalon is considered part of the brainstem. Its substantia nigra is closely associated with motor system pathways of the basal ganglia. The human mesencephalon is archipallian in origin, meaning that its general architecture is shared with the most ancient of vertebrates. Dopamine produced in the substantia nigra and ventral tegmental area plays a role in movement, movement planning, excitation, motivation and habituation of species from humans to the most elementary animals such as insects. Laboratory house mice from lines that have been selectively bred for high voluntary wheel running have enlarged midbrains. The midbrain helps to relay information for vision and hearing.

Virtual Network Computing

From Wikipedia, the free encyclopedia
Virtual Network Computing logo

Virtual Network Computing (VNC) is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It transmits the keyboard and mouse input from one computer to another, relaying the graphical-screen updates, over a network.

VNC is platform-independent – there are clients and servers for many GUI-based operating systems and for Java. Multiple clients may connect to a VNC server at the same time. Popular uses for this technology include remote technical support and accessing files on one's work computer from one's home computer, or vice versa.

VNC was originally developed at the Olivetti & Oracle Research Lab in Cambridge, United Kingdom. The original VNC source code and many modern derivatives are open source under the GNU General Public License.

VNC in KDE 3.1

There are a number of variants of VNC which offer their own particular functionality; e.g., some optimised for Microsoft Windows, or offering file transfer (not part of VNC proper), etc. Many are compatible (without their added features) with VNC proper in the sense that a viewer of one flavour can connect with a server of another; others are based on VNC code but not compatible with standard VNC.

VNC and RFB are registered trademarks of RealVNC Ltd. in the US and some other countries.

History

The Olivetti & Oracle Research Lab (ORL) at Cambridge in the UK developed VNC at a time when Olivetti and Oracle Corporation owned the lab. In 1999, AT&T acquired the lab, and in 2002 closed down the lab's research efforts.

Developers who worked on VNC while still at the AT&T Research Lab include:

Following the closure of ORL in 2002, several members of the development team (including Richardson, Harter, Weatherall and Hopper) formed RealVNC in order to continue working on open-source and commercial VNC software under that name.

The original GPLed source code has fed into several other versions of VNC. Such forking has not led to compatibility problems because the RFB protocol is designed to be extensible. VNC clients and servers negotiate their capabilities with handshaking in order to use the most appropriate options supported at both ends.

As of 2013, RealVNC Ltd claims the term "VNC" as a registered trademark in the United States and in other countries.

Etymology

The name Virtual Network Computer/Computing (VNC) originated with ORL's work on a thin client called the Videotile, which also used the RFB protocol. The Videotile had an LCD display with pen input and a fast ATM connection to the network. At the time, network computer was commonly used as a synonym for a thin client; VNC is essentially a software-only (i.e. virtual) network computer.

Operation

  • The VNC server is the program on the machine that shares some screen (and may not be related to a physical display – the server can be "headless"), and allows the client to share control of it.
  • The VNC client (or viewer) is the program that represents the screen data originating from the server, receives updates from it, and presumably controls it by informing the server of collected local input.
  • The VNC protocol (RFB protocol) is very simple, based on transmitting one graphic primitive from server to client ("Put a rectangle of pixel data at the specified X,Y position") and event messages from client to server.

In the normal method of operation a viewer connects to a port on the server (default port: 5900). Alternatively (depending on the implementation) a browser can connect to the server (default port: 5800). And a server can connect to a viewer in "listening mode" on port 5500. One advantage of listening mode is that the server site does not have to configure its firewall to allow access on port 5900 (or 5800); the duty is on the viewer, which is useful if the server site has no computer expertise and the viewer user is more knowledgeable.

The server sends small rectangles of the framebuffer to the client. In its simplest form, the VNC protocol can use a lot of bandwidth, so various methods have been devised to reduce the communication overhead. For example, there are various encodings (methods to determine the most efficient way to transfer these rectangles). The VNC protocol allows the client and server to negotiate which encoding they will use. The simplest encoding, supported by all clients and servers, is raw encoding, which sends pixel data in left-to-right scanline order, and after the original full screen has been transmitted, transfers only rectangles that change. This encoding works very well if only a small portion of the screen changes from one frame to the next (as when a mouse pointer moves across a desktop, or when text is written at the cursor), but bandwidth demands get very high if a lot of pixels change at the same time (such as when scrolling a window or viewing full-screen video).

VNC by default uses TCP port 5900+N, where N is the display number (usually :0 for a physical display). Several implementations also start a basic HTTP server on port 5800+N to provide a VNC viewer as a Java applet, allowing easy connection through any Java-enabled web-browser. Different port assignments can be used as long as both client and server are configured accordingly. A HTML5 VNC client implementation for modern browsers (no plugins required) exists too.

Although possible even on low bandwidth, using VNC over the Internet is facilitated if the user has a broadband connection at both ends. However, it may require advanced network address translation (NAT), firewall and router configuration such as port forwarding in order for the connection to go through. Users may establish communication through virtual private network (VPN) technologies to ease usage over the Internet, or as a LAN connection if VPN is used as a proxy, or through a VNC repeater (useful in presence of a NAT).

Xvnc is the Unix VNC server, which is based on a standard X server. To applications, Xvnc appears as an X "server" (i.e., it displays client windows), and to remote VNC users it is a VNC server. Applications can display themselves on Xvnc as if it were a normal X display, but they will appear on any connected VNC viewers rather than on a physical screen. Alternatively, a machine (which may be a workstation or a network server) with screen, keyboard, and mouse can be set up to boot and run the VNC server as a service or daemon, then the screen, keyboard, and mouse can be removed and the machine stored in an out-of-the way location.

In addition, the display that is served by VNC is not necessarily the same display seen by a user on the server. On Unix/Linux computers that support multiple simultaneous X11 sessions, VNC may be set to serve a particular existing X11 session, or to start one of its own. It is also possible to run multiple VNC sessions from the same computer. On Microsoft Windows the VNC session served is always the current user session.

Users commonly deploy VNC as a cross-platform remote desktop system. For example, Apple Remote Desktop for Mac OS X (and for a time, "Back to My Mac" in 'Leopard' - Mac OS X 10.5 through 'High Sierra' - macOS 10.13) interoperates with VNC and will connect to a Unix user's current desktop if it is served with x11vnc, or to a separate X11 session if one is served with TightVNC. From Unix, TightVNC will connect to a Mac OS X session served by Apple Remote Desktop if the VNC option is enabled, or to a VNC server running on Microsoft Windows.

In July 2014 RealVNC published a Wayland developer preview.

Security

By default, RFB is not a secure protocol. While passwords are not sent in plain-text (as in telnet), cracking could prove successful if both the encryption key and encoded password were sniffed from a network. For this reason it is recommended that a password of at least 8 characters be used. On the other hand, there is also an 8-character limit on some versions of VNC; if a password is sent exceeding 8 characters, the excess characters are removed and the truncated string is compared to the password.

UltraVNC supports the use of an open-source encryption plugin which encrypts the entire VNC session including password authentication and data transfer. It also allows authentication to be performed based on NTLM and Active Directory user accounts. However, use of such encryption plugins makes it incompatible with other VNC programs. RealVNC offers high-strength AES encryption as part of its commercial package, along with integration with Active Directory. Workspot released AES encryption patches for VNC. According to TightVNC, TightVNC is not secure as picture data is transmitted without encryption. To circumvent this, it should be tunneled through an SSH connection (see below).

VNC may be tunneled over an SSH or VPN connection which would add an extra security layer with stronger encryption. SSH clients are available for most platforms; SSH tunnels can be created from UNIX clients, Microsoft Windows clients, Mac clients (including Mac OS X and System 7 and up) – and many others. There are also freeware applications that create instant VPN tunnels between computers.

An additional security concern for the use of VNC is to check whether the version used requires authorization from the remote computer owner before someone takes control of their device. This will avoid the situation where the owner of the computer accessed realizes there is someone in control of their device without previous notice.

Electronic publishing

From Wikipedia, the free encyclopedia

Electronic publishing (also referred to as publishing, digital publishing, or online publishing) includes the digital publication of e-books, digital magazines, and the development of digital libraries and catalogues. It also includes the editing of books, journals, and magazines to be posted on a screen (computer, e-reader, tablet, or smartphone).

About

Electronic publishing has become common in scientific publishing where it has been argued that peer-reviewed scientific journals are in the process of being replaced by electronic publishing. It is also becoming common to distribute books, magazines, and newspapers to consumers through tablet reading devices, a market that is growing by millions each year, generated by online vendors such as Apple's iTunes bookstore, Amazon's bookstore for Kindle, and books in the Google Play Bookstore. Market research suggested that half of all magazine and newspaper circulation would be via digital delivery by the end of 2015 and that half of all reading in the United States would be done without paper by 2015.

Although distribution via the Internet (also known as online publishing or web publishing when in the form of a website) is nowadays strongly associated with electronic publishing, there are many non-network electronic publications such as encyclopedias on CD and DVD, as well as technical and reference publications relied on by mobile users and others without reliable and high-speed access to a network. Electronic publishing is also being used in the field of test-preparation in developed as well as in developing economies for student education (thus partly replacing conventional books) – for it enables content and analytics combined – for the benefit of students. The use of electronic publishing for textbooks may become more prevalent with Apple Books from Apple Inc. and Apple's negotiation with the three largest textbook suppliers in the U.S.

Electronic publishing is increasingly popular in works of fiction. Electronic publishers are able to respond quickly to changing market demand, because the companies do not have to order printed books and have them delivered. E-publishing is also making a wider range of books available, including books that customers would not find in standard book retailers, due to insufficient demand for a traditional "print run". E-publication is enabling new authors to release books that would be unlikely to be profitable for traditional publishers. While the term "electronic publishing" is primarily used in the 2010s to refer to online and web-based publishers, the term has a history of being used to describe the development of new forms of production, distribution, and user interaction in regard to computer-based production of text and other interactive media.

History

Digitization

The first digitization initiative was in 1971 by Michael S. Hart, a student at the University of Illinois at Chicago, who launched Project Gutenberg, designed to make literature more accessible to everyone, through the internet. It took a while to develop, and in 1989 there were only 10 texts that were manually recopied on computer by Michael S. Hart himself and some volunteers. But with the appearance of the Web 1.0 in 1991 and its ability to connect documents together through static pages, the project moved quickly forward. Many more volunteers helped in developing the project by giving access to public domain classics.

In the 1970s, the French National Centre for Scientific Research digitized a thousand books from diverse subjects, mostly literature but also philosophy and science, dating back to the 12th century to present times. In this way were built the foundations of a large dictionary, the Trésor de la langue française au Québec. This foundation of e-texts, named Frantext, was published on a compact disc under the brand name Discotext, and then on the worldwide web in 1998.

Mass-scale digitization

In 1974, American inventor and futurist Raymond Kurzweil developed a scanner which was equipped with an Omnifont software that enabled optical character recognition for numeric inputs. The digitization projects could then be more ambitious since the time needed for digitization decreased considerably, and digital libraries were on the rise. All over the world, e-libraries started to emerge.

The ABU (Association des Bibliophiles Universels), was a public digital library project created by the Cnam in 1993. It was the first French digital library in the network; suspended since 2002, they reproduced over a hundred texts that are still available.

In 1992, the Bibliothèque nationale de France launched a vast digitization program. The president François Mitterrand had wanted since 1988 to create a new and innovative digital library, and it was published in 1997 under the name of Gallica. In 2014, the digital library was offering 80 255 online books and over a million documents, including prints and manuscripts.

In 2003, Wikisource was launched, and the project aspired to constitute a digital and multilingual library that would be a complement to the Wikipedia project. It was originally named "Project Sourceberg", as a word play to remind the Project Gutenberg. Supported by the Wikimedia Foundation, Wikisource proposes digitized texts that have been verified by volunteers.

In December 2004, Google created Google Books, a project to digitize all the books available in the world (over 130 million books) to make them accessible online. 10 years later, 25 000 000 books, from a hundred countries and in 400 languages, are on the platform. This was possible because by that time, robotic scanners could digitize around 6 000 books per hour.

In 2008, the prototype of Europeana was launched; and by 2010, the project had been giving access to over 10 million digital objects. The Europeana library is a European catalog that offers index cards on millions of digital objects and links to their digital libraries. In the same year, HathiTrust was created to put together the contents of many university e-libraries from USA and Europe, as well as Google Books and Internet Archive. In 2016, over six millions of users had been using HathiTrust.

Electronic publishing

The first digitization projects were transferring physical content into digital content. Electronic publishing is aiming to integrate the whole process of editing and publishing (production, layout, publication) in the digital world.

Alain Mille, in the book Pratiques de l'édition numérique (edited by Michael E. Sinatra and Marcello Vitali-Rosati), says that the beginnings of Internet and the Web are the very core of electronic publishing, since they pretty much determined the biggest changes in the production and diffusion patterns. Internet has a direct effect on the publishing questions, letting creators and users go further in the traditional process (writer-editor-publishing house).

The traditional publishing, and especially the creation part, were first revolutionized by new desktop publishing softwares appearing in the 1980s, and by the text databases created for the encyclopedias and directories. At the same time the multimedia was developing quickly, combining book, audiovisual and computer science characteristics. CDs and DVDs appear, permitting the visualization of these dictionaries and encyclopedias on computers.

The arrival and democratization of Internet is slowly giving small publishing houses the opportunity to publish their books directly online. Some websites, like Amazon, let their users buy eBooks; Internet users can also find many educative platforms (free or not), encyclopedic websites like Wikipedia, and even digital magazines platforms. The eBook then becomes more and more accessible through many different supports, like the e-reader and even smartphones. The digital book had, and still has, an important impact on publishing houses and their economical models; it is still a moving domain, and they yet have to master the new ways of publishing in a digital era.

Online edition

Based on new communications practices of the web 2.0 and the new architecture of participation, online edition opens the door to a collaboration of a community to elaborate and improve contents on Internet, while also enriching reading through collective reading practices. The web 2.0 not only links documents together, as did the web 1.0, it also links people together through social media: that's why it's called the Participative (or participatory) Web.

Many tools were put in place to foster sharing and creative collective contents. One of the many is the Wikipedia encyclopedia, since it is edited, corrected and enhanced by millions of contributors. OpenStreetMap is also based on the same principle. Blogs and comment systems are also now renown as online edition and publishing, since it is possible through new interactions between the author and its readers, and can be an important method for inspiration but also for visibility.

Process

The electronic publishing process follows some aspects of the traditional paper-based publishing process but differs from traditional publishing in two ways: 1) it does not include using an offset printing press to print the final product and 2) it avoids the distribution of a physical product (e.g., paper books, paper magazines, or paper newspapers). Because the content is electronic, it may be distributed over the Internet and through electronic bookstores, and users can read the material on a range of electronic and digital devices, including desktop computers, laptops, tablet computers, smartphones or e-reader tablets. The consumer may read the published content online on a website, in an application on a tablet device, or in a PDF document on a computer. In some cases, the reader may print the content onto paper using a consumer-grade ink-jet or laser printer or via a print-on-demand system. Some users download digital content to their devices, enabling them to read the content even when their device is not connected to the Internet (e.g., on an airplane flight).

Distributing content electronically as software applications ("apps") has become popular in the 2010s, due to the rapid consumer adoption of smartphones and tablets. At first, native apps for each mobile platform were required to reach all audiences, but in an effort toward universal device compatibility, attention has turned to using HTML5 to create web apps that can run on any browser and function on many devices. The benefit of electronic publishing comes from using three attributes of digital technology: XML tags to define content,[27] style sheets to define the look of content, and metadata (data about data) to describe the content for search engines, thus helping users to find and locate the content (a common example of metadata is the information about a song's songwriter, composer, genre that is electronically encoded along with most CDs and digital audio files; this metadata makes it easier for music lovers to find the songs they are looking for). With the use of tags, style sheets, and metadata, this enables "reflowable" content that adapts to various reading devices (tablet, smartphone, e-reader, etc.) or electronic delivery methods.

Because electronic publishing often requires text mark-up (e.g., HyperText Markup Language or some other markup language) to develop online delivery methods, the traditional roles of typesetters and book designers, who created the printing set-ups for paper books, have changed. Designers of digitally published content must have a strong knowledge of mark-up languages, the variety of reading devices and computers available, and the ways in which consumers read, view or access the content. However, in the 2010s, new user friendly design software is becoming available for designers to publish content in this standard without needing to know detailed programming techniques, such as Adobe Systems' Digital Publishing Suite and Apple's iBooks Author. The most common file format is .epub, used in many e-book formats. .epub is a free and open standard available in many publishing programs. Another common format is .folio, which is used by the Adobe Digital Publishing Suite to create content for Apple's iPad tablets and apps.

Academic publishing

After an article is submitted to an academic journal for consideration, there can be a delay ranging from several months to more than two years before it is published in a journal, rendering journals a less than ideal format for disseminating current research. In some fields, such as astronomy and some areas of physics, the role of the journal in disseminating the latest research has largely been replaced by preprint repositories such as arXiv.org. However, scholarly journals still play an important role in quality control and establishing scientific credit. In many instances, the electronic materials uploaded to preprint repositories are still intended for eventual publication in a peer-reviewed journal. There is statistical evidence that electronic publishing provides wider dissemination, because when a journal is available online, a larger number of researchers can access the journal. Even if a professor is working in a university that does not have a certain journal in its library, she may still be able to access the journal online. A number of journals have, while retaining their longstanding peer review process to ensure that the research is done properly, established electronic versions or even moved entirely to electronic publication.

Copyright

In the early 2000s, many of the existing copyright laws were designed around printed books, magazines and newspapers. For example, copyright laws often set limits on how much of a book can be mechanically reproduced or copied. Electronic publishing raises new questions in relation to copyright, because if an e-book or e-journal is available online, millions of Internet users may be able to view a single electronic copy of the document, without any "copies" being made.

Emerging evidence suggests that e-publishing may be more collaborative than traditional paper-based publishing; e-publishing often involves more than one author, and the resulting works are more accessible, since they are published online. At the same time, the availability of published material online opens more doors for plagiarism, unauthorized use, or re-use of the material. Some publishers are trying to address these concerns. For example, in 2011, HarperCollins limited the number of times that one of its e-books could be lent in a public library. Other publishers, such as Penguin, are attempting to incorporate e-book elements into their regular paper publications.

Examples

Electronic versions of traditional media

New media

Business models

  • Digital distribution
  • Online advertising
  • Open access (publishing)
  • Pay-per-view
  • Print on demand
  • Self-publishing
  • Subscriptions
  • Non-subsidy publishing
  • Wednesday, November 29, 2023

    Fallacy

    From Wikipedia, the free encyclopedia
    https://en.wikipedia.org/wiki/Fallacy

    A fallacy, also known as paralogia in modern psychology, is the use of invalid or otherwise faulty reasoning in the construction of an argument that may appear to be well-reasoned if unnoticed. The term was introduced in the Western intellectual tradition by the Aristotelian De Sophisticis Elenchis.

    Fallacies may be committed intentionally to manipulate or persuade by deception, unintentionally because of human limitations such as carelessness, cognitive or social biases and ignorance, or potentially due to the limitations of language and understanding of language. These delineations include not only the ignorance of the right reasoning standard but also the ignorance of relevant properties of the context. For instance, the soundness of legal arguments depends on the context in which they are made.

    Fallacies are commonly divided into "formal" and "informal." A formal fallacy is a flaw in the structure of a deductive argument that renders the argument invalid, while an informal fallacy originates in an error in reasoning other than an improper logical form. Arguments containing informal fallacies may be formally valid, but still fallacious.

    A special case is a mathematical fallacy, an intentionally invalid mathematical proof with a concealed, or subtle, error. Mathematical fallacies are typically crafted and exhibited for educational purposes, usually taking the form of false proofs of obvious contradictions.

    Overview

    Fallacies are types of erroneous reasoning that render arguments logically unsound. According to The New Handbook of Cognitive Therapy Techniques, they include "unsubstantiated assertions that are often delivered with a conviction that makes them sound as though they are proven facts." Informal fallacies, in particular, are frequently found in mass media such as television and newspapers. Understanding fallacies may allow one to recognize them in either one's own or others' writing. Avoiding fallacies may help improve one's ability to produce sound arguments.

    It can be difficult to evaluate whether an argument is fallacious, as arguments exist along a continuum of soundness and an argument that has several stages or parts might have some sound sections and some fallacious ones. Moreover, whether a specific argument is fallacious often depends on the content rather than the form of the argument. An example is a probabilistically valid instance of the formally invalid argument form of denying the antecedent or affirming the consequent.  Thus, "fallacious arguments usually have the deceptive appearance of being good arguments,  because for most fallacious instances of an argument form, a similar but non-fallacious instance can be found." Evaluating an instance of an argument as fallacious is therefore often a matter of evaluating the context of the argument.

    Recognizing fallacies in everyday arguments may be difficult since arguments are often embedded in rhetorical patterns that obscure the logical connections between statements. Informal fallacies may also exploit the emotional, intellectual, or psychological weaknesses of the audience. Recognizing fallacies can develop reasoning skills to expose the weaker links between premises and conclusions to better discern between what appears to be true and what is true.

    Argumentation theory provides a different approach to understanding and classifying fallacies. In the pragma-dialectical theory, for instance, an argument is regarded as an interactive protocol between individuals who attempt to resolve their disagreement on the merits of a case. The protocol consists of normative rules of interaction, and violations of these rules are considered fallacies because they frustrate the attempt at resolving the disagreement.

    Fallacies are used in place of valid reasoning to communicate a point with the intention to persuade. Examples in the mass media today include but are not limited to propaganda, advertisements, politics, newspaper editorials, and opinion-based news shows.

    Systems of classification

    Fallacies are generally classified strictly by either their structure or their content, such as by classifying them as formal fallacies or informal fallacies, respectively. The classification of informal fallacies may be subdivided into categories such as linguistic, relevance through omission, relevance through intrusion, and relevance through presumption. Alternatively, fallacies may be classified by the process by which they occur, such as material fallacies (content), verbal fallacies (linguistic), and formal fallacies (error in inference). In turn, material fallacies may be placed into the more general category of informal fallacies. Verbal fallacies may be placed in either formal or informal classifications: Compare equivocation, which is a word- or phrase-based ambiguity, to the fallacy of composition, which is premise- and inference-based ambiguity.

    Greek logic

    The Greek philosopher Aristotle (384–322 BC) was the first to systematize logical errors into a list to make it easier to refute an opponent's thesis and thus win an argument. Aristotle's "Sophistical Refutations" (De Sophisticis Elenchis) identifies thirteen fallacies. He divided them up into two major types: linguistic fallacies and non-linguistic fallacies, some of which depend on language and others that do not. These fallacies are called verbal fallacies and material fallacies, respectively. A material fallacy is an error in what the arguer is talking about, while a verbal fallacy is an error in how the arguer is talking. Verbal fallacies are those in which a conclusion is obtained by improper or ambiguous use of words. An example of a language dependent fallacy is given as a debate as to who in humanity are learners: the wise or the ignorant. A language-independent fallacy is, for example:

    1. "Coriscus is different from Socrates."
    2. "Socrates is a man."
    3. "Therefore, Coriscus is different from a man."

    Indian logic

    Indian logicians took great pains to identify fallacies in arguments. An influential collection of texts on logic and reason, the Nyāya Sūtras, attributed to Aksapada Gautama, variously estimated to have been composed between the 6th century BCE and the 2nd century CE, lists in its theory of inference five such reasons used in an argument that was further developed by later logicians.

    1. Asiddha: It is the unproved reason that results in this fallacy. [Paksadharmata]
    2. Savyabhichara: This is the fallacy of irregular reason.
    3. Satpratipaksa: Here the reason is contradicted by another reason. If both have equal force, then nothing follows. 'Sound is eternal, because it is audible', and 'Sound is non-eternal, because it is produced'. Here 'audible' is counterbalanced by 'produced' and both are of equal force.
    4. Badhita: When another proof (as by perception) definitely contradicts and disproves the middle term (reason). 'Fire is cold because it is a substance'.
    5. Viruddha: Instead of proving something it is proving the opposite. 'Sound is eternal because it is produced'.

    Whately's grouping

    English scholar and theologian Richard Whately (1787–1863) defines a fallacy broadly as, "any argument, or apparent argument, which professes to be decisive of the matter at hand, while in reality it is not".

    Whately divided fallacies into two groups: logical and material. According to Whately, logical fallacies are arguments where the conclusion does not follow from the premises. Material fallacies are not logical errors because the conclusion follows from the premises. He then divided the logical group into two groups: purely logical and semi-logical. The semi-logical group included all of Aristotle's sophisms except ignoratio elenchi, petitio principii, and non causa pro causa, which are in the material group.

    Other systems of classification

    Other famous methods of classifying fallacies are those of Francis Bacon and J. S. Mill. Bacon (Novum Organum, Aph. 33, 38 sqq.) divided fallacies into four Idola (Idols, i.e. False Appearances), which summarize the various kinds of mistakes to which the human intellect is prone. J. S. Mill discussed the subject in book five of his Logic, and Jeremy Bentham's Book of Fallacies (1824) contains valuable remarks.

    Formal fallacy

    A formal fallacy, deductive fallacy, logical fallacy or non sequitur (Latin for "it does not follow") is a flaw in the structure of a deductive argument that renders the argument invalid. The flaw can be expressed in the standard system of logic. Such an argument is always considered to be wrong. The presence of the formal fallacy does not imply anything about the argument's premises or its conclusion. Both may actually be true or may even be more probable as a result of the argument, but the deductive argument is still invalid because the conclusion does not follow from the premises in the manner described.

    Even non-deductive arguments can be said to be fallacious: for example, an inductive argument that incorrectly applies principles of probability or causality. But "since deductive arguments depend on formal properties and inductive arguments don't, formal fallacies apply only to deductive arguments."

    A logical form such as "A and B" is independent of any particular conjunction of meaningful propositions. Logical form alone can guarantee that, given true premises, a true conclusion must follow. However, formal logic makes no such guarantee if any premise is false; the conclusion can be either true or false. Any formal error or logical fallacy similarly invalidates the deductive guarantee. Both the argument and all its premises must be true for a conclusion to be true.

    The term logical fallacy is in a sense self-contradictory because logic refers to valid reasoning, whereas a fallacy is the use of poor reasoning. Therefore, the term formal fallacy is preferred. In informal discourse, however, logical fallacy is used to mean an argument that is problematic for any reason.

    The term non sequitur denotes a general formal fallacy, often meaning one that does not belong to any named subclass of formal fallacies, like affirming the consequent.

    Common examples

    Ecological fallacy

    An ecological fallacy is committed when one draws an inference from data based on the premise that qualities observed for groups necessarily hold for individuals; for example, "if countries with more Protestants tend to have higher suicide rates, then Protestants must be more likely to commit suicide."

    Fallacy fork

    Maarten Boudry and others have argued that formal, deductive fallacies rarely occur in real life and that arguments that would be fallacious in formally deductive terms are not necessarily so when context and prior probabilities are taken into account, thus making the argument defeasible and/or inductive. Boudry coined the term fallacy fork. For a given fallacy, one must either characterize it by means of a deductive argumentation scheme, which rarely applies (the first prong of the fork), or one must relax definitions and add nuance to take the actual intent and context of the argument into account (the other prong of the fork). To argue, for example, that one became nauseated after eating a mushroom because the mushroom was poisonous could be an example of the post hoc ergo propter hoc fallacy.

    Informal fallacy

    In contrast to a formal fallacy, an informal fallacy originates from a reasoning error other than a flaw in the logical form of the argument. A deductive argument containing an informal fallacy may be formally valid, but still remain rationally unpersuasive. Nevertheless, informal fallacies apply to both deductive and non-deductive arguments.

    Though the form of the argument may be relevant, fallacies of this type are "types of mistakes in reasoning that arise from the mishandling of the content of the propositions constituting the argument".

    Faulty generalization

    A special subclass of the informal fallacies is the set of faulty generalizations, also known as inductive fallacies. Here, the most important issue concerns inductive strength or methodology (for example, statistical inference). In the absence of sufficient evidence, drawing conclusions based on induction is unwarranted and fallacious. With the backing of sufficient amounts of the right type of empirical evidence, however, the conclusions may become warranted and convincing (at which point the arguments are no longer considered fallacious).

    Hasty generalization

    Hasty generalization is described as making assumptions about a whole group or range of cases based on a sample that is inadequate (usually because it is atypical or just too small). Stereotypes about people ("frat boys are drunkards", "grad students are nerdy", "women don't enjoy sports", etc.) are common examples of the principle.

    Hasty generalization often follows a pattern such as:

    X is true for A.
    X is true for B.
    Therefore, X is true for C, D, etc.

    While never a valid logical deduction, if such an inference can be made on statistical grounds, it may nonetheless be convincing. This is because with enough empirical evidence, the generalization is no longer a hasty one.

    Relevance fallacy

    The fallacies of relevance are a broad class of informal fallacies, generically represented by missing the point: presenting an argument that may be sound but fails to address the issue in question.

    Argument from silence

    An argument from silence is a faulty conclusion that is drawn based on the absence of evidence rather than on the presence of evidence.

    Examples of informal fallacies

    Post hoc (false cause)

    The post hoc fallacy assumes that because B comes after A, A caused B. It gets its name from the Latin phrase "post hoc, ergo propter hoc", which translates as "after this, therefore because of this".

    Sometimes one event really does cause another one that comes later—for example, if one registers for a class and their name later appears on the roll, it's true that the first event caused the one that came later. But sometimes two events that seem related in time are not really related as cause and event. That is, temporal correlation does not necessarily entail causation. For example, if one eats a sandwich and then gets food poisoning, that does not necessarily mean the sandwich caused the food poisoning. Something else eaten earlier might have caused the food poisoning.

    Slippery slope

    For an argument to be a slippery slope type of argument, it must meet the requirements of that argumentation scheme. A slippery slope argument originates from a conversation or debate in which two actors take turns. It usually originates from one actor giving advice on a decision or act. Along the way, the actor must make additional choices on similar matters through which the actor enters the ‘grey area’ of the slippery slope. At this point, the actor potentially loses control over the direction of the arguments, thus leading to a ‘fatal’ outcome.

    Such an argument is built up according to the following argumentation scheme: initial premise, sequential premise, indeterminacy premise, control premise, loss of control premise, catastrophic outcome premise, and conclusion. Slippery slope arguments may be defeated by asking critical questions or giving counterarguments.

    There are several reasons for a slippery slope to be fallacious: for example, the argument is going too far into the future, it is a too complex argument whose structure is hard to identify, or the argument makes emotional appeals.

    It may be that a slippery slope is not necessarily fallacious if context is taken into account and there is an effort to assess plausibility.

    False analogy

    Informally known as the "apples and oranges" fallacy, a false analogy uses unsound comparisons.

    Straw man fallacy

    The straw man fallacy refers to the refutation of a standpoint in an argument that was never proposed. The fallacy usually occurs in the presentation of an opponent's standpoint as more extreme, distorted, or simplistic than it actually is. Compared to criticizing the opponent's actual standpoint, this allows the arguer to offer a seeming refutation of what is, however, not the actual standpoint. Such an argument involves two arguers, with one criticizing the other's perspective. The reason for the straw man argument to be fallacious originates from the problem of how to deal with natural discourse. The opponent's argument is not reflected by the arguments that are proposed by the speaker.

    Measurement fallacy

    Some of the fallacies described above may be committed in the context of measurement. Where mathematical fallacies are subtle mistakes in reasoning leading to invalid mathematical proofs, measurement fallacies are unwarranted inferential leaps involved in the extrapolation of raw data to a measurement-based value claim. The ancient Greek Sophist Protagoras was one of the first thinkers to propose that humans can generate reliable measurements through his "human-measure" principle and the practice of dissoi logoi (arguing multiple sides of an issue). This history helps explain why measurement fallacies are informed by informal logic and argumentation theory.

    Knowledge value measurement fallacy

    The increasing availability and circulation of big data are driving a proliferation of new metrics for scholarly authority, and there is lively discussion regarding the relative usefulness of such metrics for measuring the value of knowledge production in the context of an "information tsunami."

    For example, anchoring fallacies can occur when unwarranted weight is given to data generated by metrics that the arguers themselves acknowledge are flawed. For example, the limitations of the journal impact factor (JIF) are well documented, and even JIF pioneer Eugene Garfield notes that, "while citation data create new tools for analyses of research performance, it should be stressed that they supplement rather than replace other quantitative and qualitative indicators." To the extent that arguers jettison the acknowledged limitations of JIF-generated data in evaluative judgments or leave behind Garfield's "supplement rather than replace" caveat, they commit anchoring fallacies.

    A naturalistic fallacy can occur, for example, in the case of sheer quantity metrics based on the premise "more is better" or, in the case of developmental assessment in the field of psychology, "higher is better".

    A false analogy occurs when claims are supported by unsound comparisons between data points. For example, the Scopus and Web of Science bibliographic databases have difficulty distinguishing between citations of scholarly work that are arms-length endorsements, ceremonial citations, or negative citations (indicating the citing author withholds endorsement of the cited work). Hence, measurement-based value claims premised on the uniform quality of all citations may be questioned on false analogy grounds.

    As another example, consider the Faculty Scholarly Productivity Index of Academic Analytics. This tool purports to measure overall faculty productivity, yet it does not capture data based on citations in books. This creates a possibility that low productivity measurements using the tool commit argument from silence fallacies, to the extent that such measurements are supported by the absence of book citation data.

    Ecological fallacies can be committed when one measures the scholarly productivity of a sub-group of individuals (e.g. "Puerto Rican" faculty) via reference to aggregate data about a larger and different group (e.g., "Hispanic" faculty).

    Intentional fallacy

    Sometimes a speaker or writer uses a fallacy intentionally. In any context, including academic debate, a conversation among friends, political discourse, advertising, or comedic purposes, the arguer may use fallacious reasoning to try to persuade the listener or reader, by means other than offering relevant evidence, that the conclusion is true.

    Examples of this include the speaker or writer:

    1. Diverting the argument to unrelated issues with a red herring (Ignoratio elenchi)
    2. Insulting someone's character (argumentum ad hominem)
    3. Assuming the conclusion of an argument, a kind of circular reasoning, also called "begging the question" (petitio principii)
    4. Making jumps in logic (non sequitur)
    5. Identifying a false cause and effect (post hoc ergo propter hoc)
    6. Asserting that everyone agrees (argumentum ad populum, bandwagoning)
    7. Creating a false dilemma (either-or fallacy) in which the situation is oversimplified, also called false dichotomy
    8. Selectively using facts (card stacking)
    9. Making false or misleading comparisons (false equivalence or false analogy)
    10. Generalizing quickly and sloppily (hasty generalization) (secundum quid)
    11. Using an argument's connections to other concepts or people to support or refute it, also called "guilt by association" (association fallacy)
    12. Claiming that a lack of proof counts as proof (appeal to ignorance)

    In humor, errors of reasoning are used for comical purposes. Groucho Marx used fallacies of amphiboly, for instance, to make ironic statements; Gary Larson and Scott Adams employed fallacious reasoning in many of their cartoons. Wes Boyer and Samuel Stoddard have written a humorous essay teaching students how to be persuasive by means of a whole host of informal and formal fallacies.

    When someone uses logical fallacies intentionally to mislead in academic, political, or other high-stakes contexts, the breach of trust calls into question the authority and intellectual integrity of that person.

    Assessment: pragmatic theory

    According to the pragmatic theory, a fallacy can be either a heuristic error or a ploy used intentionally to unfairly win an argument. There are always two parties to an argument containing a fallacy: the perpetrator and the intended victim.

    The dialogue framework required to support the pragmatic theory of fallacy is built on the presumption that argumentative dialogue has both an adversarial component and a collaborative component. A dialogue has individual goals for each participant as well as shared goals that apply to all participants. A fallacy of the second kind is seen as more than simply a violation of the rule of reasonable dialogue. It is also a deceptive tactic of argumentation based on sleight-of-hand. Aristotle explicitly compared contentious reasoning to unfair fighting in athletic contests. But the roots of the pragmatic theory go back even further in history, to the Sophists. The pragmatic theory finds its roots in the Aristotelian conception of a fallacy as a sophistical refutation but also supports the view that many of the types of arguments traditionally labeled as fallacies are in fact reasonable techniques of argumentation that can be used, in many cases, to support legitimate goals of dialogue. Hence, under the pragmatic approach, each case needs to be analyzed individually to determine whether the argument is fallacious or reasonable.

    Introduction to entropy

    From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Introduct...