Results for 'Hardware'

22 found
Order:
  1.  78
    The Bit Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  84
    THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Advantages of Artificial Intelligences, Uploads, and Digital Minds.Kaj Sotala - 2012 - International Journal of Machine Consciousness 4 (01):275-291.
    I survey four categories of factors that might give a digital mind, such as an upload or an artificial general intelligence, an advantage over humans. Hardware advantages include greater serial speeds and greater parallel speeds. Self-improvement advantages include improvement of algorithms, design of new mental modules, and modification of motivational system. Co-operative advantages include copyability, perfect co-operation, improved communication, and transfer of skills. Human handicaps include computational limitations and faulty heuristics, human-centric biases, and socially motivated cognition. The shape of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  46
    Building a Science of Individual Differences From fMRI.Julien Dubois & Ralph Adolphs - 2016 - Trends in Cognitive Sciences 20 (6):425-443.
    To date, fMRI research has been concerned primarily with evincing generic principles of brain function through averaging data from multiple subjects. Given rapid developments in both hardware and analysis tools, the field is now poised to study fMRI-derived measures in individual subjects, and to relate these to psy- chological traits or genetic variations. We discuss issues of validity, reliability and statistical assessment that arise when the focus shifts to individual subjects and that are applicable also to other imaging modalities. (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  5.  17
    The Physics and Electronics of Human Consciousness , Mind and Their Functions.Varanasi Ramabrahmam - June, 2019 - Cosmos and History 15 (No .2):63 - 110.
    Human consciousness, the result of breathing process as dealt with in the Upanishads, is translated into modern scientific terms and modeled as a mechanical oscillator of infrasonic frequency. The bio-mechanic oscillator is also proposed as the source of psychic energy. This is further advanced to get an insight of human consciousness (the being of mind) and functions of mind (the becoming of mind) in terms of psychic energy and reversible transformation of its virtual reflection. An alternative analytical insight of human (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Evolution: The Computer Systems Engineer Designing Minds.Aaron Sloman - 2011 - Avant: Trends in Interdisciplinary Studies 2 (2):45–69.
    What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Livro eletrônico, acesso e autonomia: Potenciais e desafios.Miguel Said Vieira - 2011 - Quaestio: Revista de Estudos Em Educação 13 (2):p - 203.
    Este trabalho é uma breve análise do livro eletrônico ― tomado como meio de comunicação relevante para a educação e a cultura no futuro próximo ― centrada nos potenciais e desafios que ele apresenta em relação a acesso e autonomia. A análise visa apontar tendências gerais relativas às características das plataformas de leitura (dispositivos leitores e softwares), particularmente para leitores. Essas tendências são extrapoladas a partir de um pequeno número de exemplos ou casos já existentes. O trabalho avalia as restrições (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  8. The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  47
    The Ecological Approach to Information Processing.Barry Smith - 2003 - In Kristóf Nyíri (ed.), Mobile Learning: Essays on Philosophy, Psychology and Education. Passagen Verlag. pp. 17--24.
    Imagine a 5-stone weakling whose brain has been loaded with all the knowledge of a champion tennis player. He goes to serve in his first match – Wham! – His arm falls off. The 5-stone weakling just doesn’t have the bone structure or muscular development to serve that hard. There are, clearly, different types of knowledge/ability/skill, only some of which are a matter of what can be transferred simply by passing signals down a wire from one brain (or computer) to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  89
    Empirical Status of Block's Phenomenal/Access Distinction.Bruce Mangan - 1997 - Behavioral and Brain Sciences 20 (1):153-154.
    P/A (Block's phenomenal/access) confounds a logical distinction with an empirical claim. Success of P/A in its logical role has almost no bearing on its plausibility as an empirical thesis (i.e., that two kinds of consciousness exist). The advantage of P/A over a single-consciousness assumption is unclear, but one of Block's analogies for P (liquid in a hydraulic computer) may be used to clarify the notion of consciousness as cognitive “hardware.”.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  76
    Agents, Mechanisms, and Other Minds.Douglas C. Long - 1979 - In Donald F. Gustafson & Bangs L. Tapscott (eds.), Body, Mind And Method. Dordrecht: Reidel. pp. 129--148.
    One of the goals of physiologists who study the detailed physical, chemical,and neurological mechanisms operating within the human body is to understand the intricate causal processes which underlie human abilities and activities. It is doubtless premature to predict that they will eventually be able to explain the behaviour of a particular human being as we might now explain the behaviour of a pendulum clock or even the invisible changes occurring within the hardware of a modern electronic computer. Nonetheless, it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact to raise (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  37
    The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality.Avi Sion - 1999-2000, 2003- - Geneva, Switzerland: CreateSpace & Kindle; Lulu..
    The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality is a treatise of formal logic and of aetiology. It is an original and wide-ranging investigation of the definition of causation (deterministic causality) in all its forms, and of the deduction and induction of such forms. The work was carried out in three phases over a dozen years (1998-2010), each phase introducing more sophisticated methods than the previous to solve outstanding problems. This study was intended as part of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Assessing the Future Plausibility of Catastrophically Dangerous AI.Alexey Turchin - 2018 - Futures.
    In AI safety research, the median timing of AGI creation is often taken as a reference point, which various polls predict will happen in second half of the 21 century, but for maximum safety, we should determine the earliest possible time of dangerous AI arrival and define a minimum acceptable level of AI risk. Such dangerous AI could be either narrow AI facilitating research into potentially dangerous technology like biotech, or AGI, capable of acting completely independently in the real world (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  35
    How the Seven Sociopaths Who Rule China Are Winning World War Three and Three Ways to Stop Them.Michael Starks - 2019 - In Suicide by Democracy-an Obituary for America and the World . Las Vegas, NV USA: Reality Press. pp. 54-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  18
    Como os sete sociopaths que governam China estão ganhando a guerra de mundo três e três maneiras de pará-los.Michael Richard Starks - 2019 - In Suicide pela democracia - Um obituário para América e o mundo. Las Vegas, NV USA: Reality Press. pp. 52-56.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  17.  14
    Bagaimana Tujuh Sosiopat yang Memerintah Tiongkok Memenangkan Perang Dunia Tiga dan Tiga Cara untuk Menghentikan Mereka.Michael Richard Starks - 2019 - In Bunuh Diri oleh Demokrasi - Obituari untuk Amerika dan Dunia. Las Vegas, NV USA: Reality Press. pp. 56-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  18. Levels of Self-Improvement in AI and Their Implications for AI Safety.Alexey Turchin - manuscript
    Abstract: This article presents a model of self-improving AI in which improvement could happen on several levels: hardware, learning, code and goals system, each of which has several sublevels. We demonstrate that despite diminishing returns at each level and some intrinsic difficulties of recursive self-improvement—like the intelligence-measuring problem, testing problem, parent-child problem and halting risks—even non-recursive self-improvement could produce a mild form of superintelligence by combining small optimizations on different levels and the power of learning. Based on this, we (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  19.  21
    Big Data.Nicolae Sfetcu - manuscript
    Termenul Big Data se referă la extragerea, manipularea și analiza unor seturi de date care sunt prea mari pentru a fi tratate în mod obișnuit. Din această cauză se utilizează software special și, în multe cazuri, și calculatoare și echipamente hardware special dedicate. În general la aceste date analiza se face statistic. Pe baza analizei datelor respective se fac de obicei predicții ale unor grupuri de persoane sau alte entități, pe baza comportamentului acestora în diverse situații și folosind tehnici (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  20.  16
    Cómo los siete sociópatas que gobiernan China están ganando la Tercera Guerra Mundial y tres maneras de detenerlos.Michael Starks - 2019 - In Suicidio por la Democracia - un Obituario para América y el Mundo 4ª edición. Las Vegas, NV USA: Reality Press. pp. 52-57.
    Lo primero que debemos tener en cuenta es que cuando decimos que China dice esto o China hace eso, no estamos hablando del pueblo chino, sino de los sociópatas que controlan el PCC -- Partido Comunista Chino, es decir, los Siete Asesinos En Serie Seniláticos (SSSSK) de th e Comité Permanente del PCC o de los 25 miembros del Politburó, etc. -/- Los planes del PCC para la Tercera Guerra Mundial y la dominación total están muy claro en las publicaciones (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  21.  88
    A Very Brief Review of the Life and Work of Neuroscientist, Physician, Psychoanalyst, Inventor, Animal Rights Activist and Pioneer in Dolphins, Isolation Tanks and Psychedelics John C Lilly 1915-2001.Starks Michael - 2016 - In Michael Starks (ed.), Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Michael Starks. pp. 577-580.
    Lilly was one of the greatest scientists and pioneers on the limits of human possibility but after his death a collective amnesia has descended and he is now almost forgotten. His Wiki is good but inevitably incomplete so here are a few missing details and viewpoints. Lilly was a generation (or more) ahead of his time. He is almost single-handedly responsible for the great interest in dolphins (which led to the Marine Mammal Protection Act in the USA and helped to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  48
    Artificial in its Own Right.Keith Elkin - manuscript
    Artificial Cells, , Artificial Ecologies, Artificial Intelligence, Bio-Inspired Hardware Systems, Computational Autopoiesis, Computational Biology, Computational Embryology, Computational Evolution, Morphogenesis, Cyborgization, Digital Evolution, Evolvable Hardware, Cyborgs, Mathematical Biology, Nanotechnology, Posthuman, Transhuman.
    Download  
     
    Export citation  
     
    Bookmark