Results for ' Hardware'

58 found
Order:
  1. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. On Turing Completeness, or Why We Are So Many (7th edition).Ramón Casares - manuscript
    Why are we so many? Or, in other words, Why is our species so successful? The ultimate cause of our success as species is that we, Homo sapiens, are the first and the only Turing complete species. Turing completeness is the capacity of some hardware to compute by software whatever hardware can compute. To reach the answer, I propose to see evolution and computing from the problem solving point of view. Then, solving more problems is evolutionarily better, computing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. A Proposed Knowledge Based System for Desktop PC Troubleshooting.Ahmed Wahib Dahouk & Samy S. Abu-Naser - 2018 - International Journal of Academic Pedagogical Research (IJAPR) 2 (6):1-8.
    Abstract: Background: In spite of the fact that computers continue to improve in speed and functions operation, they remain complex to use. Problems frequently happen, and it is hard to resolve or find solutions for them. This paper outlines the significance and feasibility of building a desktop PC problems diagnosis system. The system gathers problem symptoms from users’ desktops, rather than the user describes his/her problems to primary search engines. It automatically searches global databases of problem symptoms and solutions, and (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  5. Function-Theoretic Explanation and the Search for Neural Mechanisms.Frances Egan - 2017 - In Explanation and Integration in Mind and Brain Science 145-163. Oxford, UK: pp. 145-163.
    A common kind of explanation in cognitive neuroscience might be called functiontheoretic: with some target cognitive capacity in view, the theorist hypothesizes that the system computes a well-defined function (in the mathematical sense) and explains how computing this function constitutes (in the system’s normal environment) the exercise of the cognitive capacity. Recently, proponents of the so-called ‘new mechanist’ approach in philosophy of science have argued that a model of a cognitive capacity is explanatory only to the extent that it reveals (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  6. ChatGPT.Andrej Poleev - 2023 - Enzymes 21.
    As testing of ChatGPT has shown, this form of artificial intelligence has the potential to develop, which requires improving its software and other hardware that allows it to learn, i.e., to acquire and use new knowledge, to contact its developers with suggestions for improvement, or to reprogram itself without their participation. Как показало тестирование ChatGPT, эта форма искусственного интеллекта имеет потенциал развития, для чего необходимо усовершенствовать её программное и прочее техническое обеспечение, позволяющее ей учиться, т.е. приобретать и использовать новые (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. What is data ethics?Luciano Floridi & Mariarosaria Taddeo - 2016 - Philosophical Transactions of the Royal Society A 374 (2083):20160360.
    This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including AI, artificial agents, machine learning, and robots), and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data Ethics builds on the foundation provided by Computer and Information (...)
    Download  
     
    Export citation  
     
    Bookmark   50 citations  
  8. Function-Theoretic Explanation and the Search for Neural Mechanisms.Frances Egan - 2017 - In David Michael Kaplan (ed.), Explanation and Integration in Mind and Brain Science. Oxford, United Kingdom: Oxford University Press. pp. 145-163.
    A common kind of explanation in cognitive neuroscience might be called functiontheoretic: with some target cognitive capacity in view, the theorist hypothesizes that the system computes a well-defined function (in the mathematical sense) and explains how computing this function constitutes (in the system’s normal environment) the exercise of the cognitive capacity. Recently, proponents of the so-called ‘new mechanist’ approach in philosophy of science have argued that a model of a cognitive capacity is explanatory only to the extent that it reveals (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Trends of Palestinian Higher Educational Institutions in Gaza Strip as Learning Organizations.Samy S. Abu Naser, Mazen J. Al Shobaki, Youssef M. Abu Amuna & Amal A. Al Hila - 2017 - International Journal of Digital Publication Technology 1 (1):1-42.
    The research aims to identify the trends of Palestinian higher educational institutions in Gaza Strip as learning organizations from the perspective of senior management in the Palestinian universities in Gaza Strip. The researchers used descriptive analytical approach and used the questionnaire as a tool for information gathering. The questionnaires were distributed to senior management in the Palestinian universities. The study population reached (344) employees in senior management is dispersed over (3) Palestinian universities. A stratified random sample of (182) employees from (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  10. The Turing Guide.Jack Copeland, Jonathan Bowen, Robin Wilson & Mark Sprevak (eds.) - 2017 - Oxford: Oxford University Press.
    This volume celebrates the various facets of Alan Turing (1912–1954), the British mathematician and computing pioneer, widely considered as the father of computer science. It is aimed at the general reader, with additional notes and references for those who wish to explore the life and work of Turing more deeply. -/- The book is divided into eight parts, covering different aspects of Turing’s life and work. -/- Part I presents various biographical aspects of Turing, some from a personal point of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  12. Code is Law: Subversion and Collective Knowledge in the Ethos of Video Game Speedrunning.Michael Hemmingsen - 2020 - Sport, Ethics and Philosophy 15 (3):435-460.
    Speedrunning is a kind of ‘metagame’ involving video games. Though it does not yet have the kind of profile of multiplayer e-sports, speedrunning is fast approaching e-sports in popularity. Aside from audience numbers, however, from the perspective of the philosophy of sport and games, speedrunning is particularly interesting. To the casual player or viewer, speedrunning appears to be a highly irreverent, even pointless, way of playing games, particularly due to the incorporation of “glitches”. For many outside the speedrunning community, the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  13. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages low-cost and globally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. AWS compliance with the ethical principle of proportionality: three possible solutions.Maciek Zając - 2023 - Ethics and Information Technology 25 (1):1-13.
    The ethical Principle of Proportionality requires combatants not to cause collateral harm excessive in comparison to the anticipated military advantage of an attack. This principle is considered a major (and perhaps insurmountable) obstacle to ethical use of autonomous weapon systems (AWS). This article reviews three possible solutions to the problem of achieving Proportionality compliance in AWS. In doing so, I describe and discuss the three components Proportionality judgments, namely collateral damage estimation, assessment of anticipated military advantage, and judgment of “excessiveness”. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Advantages of artificial intelligences, uploads, and digital minds.Kaj Sotala - 2012 - International Journal of Machine Consciousness 4 (01):275-291.
    I survey four categories of factors that might give a digital mind, such as an upload or an artificial general intelligence, an advantage over humans. Hardware advantages include greater serial speeds and greater parallel speeds. Self-improvement advantages include improvement of algorithms, design of new mental modules, and modification of motivational system. Co-operative advantages include copyability, perfect co-operation, improved communication, and transfer of skills. Human handicaps include computational limitations and faulty heuristics, human-centric biases, and socially motivated cognition. The shape of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  17. Come i Sette Sociopatici che Governano la Cina Stanno Vincendo la Terza Guerra Mondiale e Tre Modi per Fermarli (2019).Michael Richard Starks - 2020 - In Benvenuti all'inferno sulla Terra: Bambini, Cambiamenti climatici, Bitcoin, Cartelli, Cina, Democrazia, Diversità, Disgenetica, Uguaglianza, Pirati Informatici, Diritti umani, Islam, Liberalismo, Prosperità, Web, Caos, Fame, Malattia, Violenza, Intellige. Las Vegas, NV USA: Reality Press. pp. 325-333.
    La prima cosa che dobbiamo tenere a mente è che quando diciamo che la Cina dice questo o la Cina lo fa, non stiamo parlando del popolo cinese, ma dei Sociopatici che controllano il Partito Comunista Cinese CCP, cioè i Sette Killer Seriali Senile (SSSSK) del Comitato permanente del PCC o dei 25 membri del Politburo ecc. I piani del CCP per la terza guerra mondiale e il dominio totale sono strutturati abbastanza chiaramente nelle pubblicazioni e nei discorsi govt cinesi (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. XR Embodiment and the Changing Nature of Sexual Harassment.Erick José Ramirez, Shelby Jennett, Jocelyn Tan, Sydney Campbell & Raghav Gupta - 2023 - Societies 13 (36).
    In this paper, we assess the impact of extended reality technologies as they relate to sexual forms of harassment. We begin with a brief history of the nature of sexual harassment itself. We then offer an account of extended reality technologies focusing specifically on psychological and hardware elements most likely to comprise what has been referred to as “the metaverse”. Although different forms of virtual spaces exist (i.e., private, semi-private, and public), we focus on public social metaverse spaces. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Streaching the notion of moral responsibility in nanoelectronics by appying AI.Robert Albin & Amos Bardea - 2021 - In Robert Albin & Amos Bardea (eds.), Ethics in Nanotechnology Social Sciences and Philosophical Aspects, Vol. 2. Berlin: De Gruyter. pp. 75-87.
    The development of machine learning and deep learning (DL) in the field of AI (artificial intelligence) is the direct result of the advancement of nano-electronics. Machine learning is a function that provides the system with the capacity to learn from data without being programmed explicitly. It is basically a mathematical and probabilistic model. DL is part of machine learning methods based on artificial neural networks, simply called neural networks (NNs), as they are inspired by the biological NNs that constitute organic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  43
    Gandhian design for the development of Braille printers. The contribution of Industrial Design.Federico Del Giorgio Solfa, Guido Amendolaggine, Florencia Tenorio & Sofia Lara Marozzi - 2019 - Innovación y Desarrollo Tecnológico y Social (Idts) 1 (2):16-27.
    The study, design and development of a low-cost digital braille printer is boarded with a transdisciplinary approach. The main challenge was focused on reducing significantly the high cost of this type of printers and their printing services. This context is aggravated with the low commercialization of these products in the country, a factor that makes the access of these tools -that are essential to much of the low and middle sectors of the Argentine social structure- even more difficult. An interdisciplinary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The Ethics of Digital Touch.Nicholas Barrow & Patrick Haggard - manuscript
    This paper aims to outline the foundations for an ethics of digital touch. Digital touch refers to hardware and software technologies, often collectively referred to as ‘haptics’, that provide somatic sensations including touch and kinaesthesis, either as a stand-alone interface to users, or as part of a wider immersive experience. Digital touch has particular promise in application areas such as communication, affective computing, medicine, and education. However, as with all emerging technologies, potential value needs to be considered against potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Auditable Blockchain Randomization Tool.Julio Michael Stern & Olivia Saa - 2019 - Proceedings 33 (17):1-6.
    Randomization is an integral part of well-designed statistical trials, and is also a required procedure in legal systems. Implementation of honest, unbiased, understandable, secure, traceable, auditable and collusion resistant randomization procedures is a mater of great legal, social and political importance. Given the juridical and social importance of randomization, it is important to develop procedures in full compliance with the following desiderata: (a) Statistical soundness and computational efficiency; (b) Procedural, cryptographical and computational security; (c) Complete auditability and traceability; (d) Any (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Agents, mechanisms, and other minds.Douglas C. Long - 1979 - In Agents, Mechanisms, and Other Minds. Dordrecht, Holland: Reidel. pp. 129--148.
    One of the goals of physiologists who study the detailed physical, chemical,and neurological mechanisms operating within the human body is to understand the intricate causal processes which underlie human abilities and activities. It is doubtless premature to predict that they will eventually be able to explain the behaviour of a particular human being as we might now explain the behaviour of a pendulum clock or even the invisible changes occurring within the hardware of a modern electronic computer. Nonetheless, it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Empirical status of Block's phenomenal/access distinction.Bruce Mangan - 1997 - Behavioral and Brain Sciences 20 (1):153-154.
    P/A (Block's phenomenal/access) confounds a logical distinction with an empirical claim. Success of P/A in its logical role has almost no bearing on its plausibility as an empirical thesis (i.e., that two kinds of consciousness exist). The advantage of P/A over a single-consciousness assumption is unclear, but one of Block's analogies for P (liquid in a hydraulic computer) may be used to clarify the notion of consciousness as cognitive “hardware.”.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. The Ecological Approach to Information Processing.Barry Smith - 2003 - In Kristóf Nyíri (ed.), Mobile Learning: Essays on Philosophy, Psychology and Education. Passagen Verlag. pp. 17--24.
    Imagine a 5-stone weakling whose brain has been loaded with all the knowledge of a champion tennis player. He goes to serve in his first match – Wham! – His arm falls off. The 5-stone weakling just doesn’t have the bone structure or muscular development to serve that hard. There are, clearly, different types of knowledge/ability/skill, only some of which are a matter of what can be transferred simply by passing signals down a wire from one brain (or computer) to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  26. The Physics and Electronics of Human Consciousness , Mind and their functions.Varanasi Ramabrahmam - June, 2019 - Cosmos and History 15 (No .2):63 - 110.
    Human consciousness, the result of breathing process as dealt with in the Upanishads, is translated into modern scientific terms and modeled as a mechanical oscillator of infrasonic frequency. The bio-mechanic oscillator is also proposed as the source of psychic energy. This is further advanced to get an insight of human consciousness (the being of mind) and functions of mind (the becoming of mind) in terms of psychic energy and reversible transformation of its virtual reflection. An alternative analytical insight of human (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. How To Make Mind-Brain Relations Clear.Mostyn W. Jones - 2010 - Journal of Consciousness Studies 17 (5-6):135-160.
    The mind-body problem arises because all theories about mind-brain connections are too deeply obscure to gain general acceptance. This essay suggests a clear, simple, mind-brain solution that avoids all these perennial obscurities. (1) It does so, first of all, by reworking Strawson and Stoljar’s views. They argue that while minds differ from observable brains, minds can still be what brains are physically like behind the appearances created by our outer senses. This could avoid many obscurities. But to clearly do so, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Optimizing ICT Integration in Education: Critical Factors, Pedagogical Strategies, and Policy Implications.Merry Joice Zecree Lagarbe - 2024 - Imjrise 1 (3):121-126.
    This systematic literature review investigates critical factors influencing the use of Information and Communication Technologies (ICT) in teaching and learning environments. Drawing upon existing research, the study examines key themes including teacher attitudes and beliefs, professional development, infrastructure, and pedagogical integration. Findings indicate that positive teacher attitudes towards ICT and effective professional development programs are essential for successful technology integration. Moreover, the availability of reliable infrastructure, such as internet connectivity and hardware, plays a vital role in facilitating equitable access (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Evolution: The Computer Systems Engineer Designing Minds.Aaron Sloman - 2011 - Avant: Trends in Interdisciplinary Studies 2 (2):45-69.
    What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact to raise (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Livro eletrônico, acesso e autonomia: Potenciais e desafios.Miguel Said Vieira - 2011 - Quaestio: Revista de Estudos Em Educação 13 (2):p - 203.
    Este trabalho é uma breve análise do livro eletrônico ― tomado como meio de comunicação relevante para a educação e a cultura no futuro próximo ― centrada nos potenciais e desafios que ele apresenta em relação a acesso e autonomia. A análise visa apontar tendências gerais relativas às características das plataformas de leitura (dispositivos leitores e softwares), particularmente para leitores. Essas tendências são extrapoladas a partir de um pequeno número de exemplos ou casos já existentes. O trabalho avalia as restrições (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality.Avi Sion - 2010 - Geneva, Switzerland: CreateSpace & Kindle; Lulu..
    The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality is a treatise of formal logic and of aetiology. It is an original and wide-ranging investigation of the definition of causation (deterministic causality) in all its forms, and of the deduction and induction of such forms. The work was carried out in three phases over a dozen years (1998-2010), each phase introducing more sophisticated methods than the previous to solve outstanding problems. This study was intended as part of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. A very brief review of the life and work of neuroscientist, physician, psychoanalyst, inventor, animal rights activist and pioneer in dolphins, isolation tanks and psychedelics John C Lilly 1915-2001.Starks Michael - 2016 - In Michael Starks (ed.), Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Michael Starks. pp. 577-580.
    Lilly was one of the greatest scientists and pioneers on the limits of human possibility but after his death a collective amnesia has descended and he is now almost forgotten. His Wiki is good but inevitably incomplete so here are a few missing details and viewpoints. Lilly was a generation (or more) ahead of his time. He is almost single-handedly responsible for the great interest in dolphins (which led to the Marine Mammal Protection Act in the USA and helped to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Bitplanes Block Based Exact Image Compression.Abdelatief H. Abouali - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (10):18-26.
    Abstract: In this paper, an exact image compression based on bit-planes blocking is proposed. The proposed algorithm uses two bit codes for block representation. The codes represent the states of Unicode block and non-Unicode. The algorithm considers further division to non-Unicode block. The block division continues until the smallest block size which are kept as residuals. The smallest block size in the study is two by two. The main process of encoding consumed three codes. Subsequent process uses the fourth code (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Nuevas tecnologías en el proceso de enseñanza-aprendizaje.Paulo Vélez-León & Yohana Yaguana Castillo (eds.) - 2019 - Loja, Ecuador: Universidad Técnica Particular de Loja.
    Este volumen contiene los trabajos presentados en el I Simposio de Pensamiento Contemporáneo, celebrado en la Universidad Técnica Particular de Loja (UTPL) durante los días 23 y 24 de enero de 2019 y cuyo tema central fue las «Nuevas Tecnologías en la Educación» (SPC–NTE). Este Simposio tuvo como objetivo fomentar la interacción entre personas de diferentes formaciones e intereses en la discusión de problemas y soluciones relevantes para la educación en la era digital, a fin de intercambiar ideas sobre prácticas (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  85
    Megadatele (Big Data) pe Internet.Sfetcu Nicolae - 2022 - It and C 1 (1):23-27.
    Termenul Big Data se referă la extragerea, manipularea și analiza unor seturi de date care sunt prea mari pentru a fi tratate în mod obișnuit. Din această cauză se utilizează software special și, în multe cazuri, și calculatoare și echipamente hardware special dedicate. În general la aceste date analiza se face statistic. Pe baza analizei datelor respective se fac de obicei predicții ale unor grupuri de persoane sau alte entități, pe baza comportamentului acestora în diverse situații și folosind tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Assessing the future plausibility of catastrophically dangerous AI.Alexey Turchin - 2018 - Futures.
    In AI safety research, the median timing of AGI creation is often taken as a reference point, which various polls predict will happen in second half of the 21 century, but for maximum safety, we should determine the earliest possible time of dangerous AI arrival and define a minimum acceptable level of AI risk. Such dangerous AI could be either narrow AI facilitating research into potentially dangerous technology like biotech, or AGI, capable of acting completely independently in the real world (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. UAP and Global Catastrophic Risks.Alexey Turchin - manuscript
    Abstract: After 2017 NY Times publication, the stigma of the scientific discussion of the problem of so-called UAP (Unidentified Aerial Phenomena) was lifted. Now the question arises: how UAP will affect the future of humanity, and especially, the probability of the global catastrophic risks? To answer this question, we assume that the Nimitz case in 2004 was real and we will suggest a classification of the possible explanations of the phenomena. The first level consists of mundane explanations: hardware glitches, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The problem of AI identity.Soenke Ziesche & Roman V. Yampolskiy - manuscript
    The problem of personal identity is a longstanding philosophical topic albeit without final consensus. In this article the somewhat similar problem of AI identity is discussed, which has not gained much traction yet, although this investigation is increasingly relevant for different fields, such as ownership issues, personhood of AI, AI welfare, brain–machine interfaces, the distinction between singletons and multi-agent systems as well as to potentially support finding a solution to the problem of personal identity. The AI identity problem analyses the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Catastrophically Dangerous AI is Possible Before 2030.Alexey Turchin - manuscript
    In AI safety research, the median timing of AGI arrival is often taken as a reference point, which various polls predict to happen in the middle of 21 century, but for maximum safety, we should determine the earliest possible time of Dangerous AI arrival. Such Dangerous AI could be either AGI, capable of acting completely independently in the real world and of winning in most real-world conflicts with humans, or an AI helping humans to build weapons of mass destruction, or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Artificial in its own right.Keith Elkin - manuscript
    Artificial Cells, , Artificial Ecologies, Artificial Intelligence, Bio-Inspired Hardware Systems, Computational Autopoiesis, Computational Biology, Computational Embryology, Computational Evolution, Morphogenesis, Cyborgization, Digital Evolution, Evolvable Hardware, Cyborgs, Mathematical Biology, Nanotechnology, Posthuman, Transhuman.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Levels of Self-Improvement in AI and their Implications for AI Safety.Alexey Turchin - manuscript
    Abstract: This article presents a model of self-improving AI in which improvement could happen on several levels: hardware, learning, code and goals system, each of which has several sublevels. We demonstrate that despite diminishing returns at each level and some intrinsic difficulties of recursive self-improvement—like the intelligence-measuring problem, testing problem, parent-child problem and halting risks—even non-recursive self-improvement could produce a mild form of superintelligence by combining small optimizations on different levels and the power of learning. Based on this, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Substrate-Prior of Consciousness.Gabriel Leuenberger -
    Given functionally equivalent minds, how does the expected quantity of their conscious experience differ across different substrates and how could we calculate this? We argue that a realistic digital brain emulation would be orders of magnitude less conscious than a real biological brain. On the other hand, a mind running on neuromorphic hardware or a quantum computer could in principle be more conscious than than a biological brain.
    Download  
     
    Export citation  
     
    Bookmark  
  45. Wie die sieben Soziopathen, die China regieren, den Dritten Weltkrieg gewinnen und drei Wege, sie zu stoppen (2019).Michael Richard Starks - 2020 - In Willkommen in der Hölle auf Erden: Babys, Klimawandel, Bitcoin, Kartelle, China, Demokratie, Vielfalt, Dysgenie, Gleichheit, Hacker, Menschenrechte, Islam, Liberalismus, Wohlstand, Internet, Chaos, Hunger, Krankheit, Gewalt, Künstliche Intelligenz, Krieg. Reality Press. pp. 345-353.
    Obwohl die SSSSK und der Rest des Weltmilitärs riesige Summen für fortschrittliche Hardware ausgeben, ist es sehr wahrscheinlich, dass WW3 (oder die kleineren Engagements, die dazu führen) von softwaredominiert wird. Es ist nicht ausgeschlossen, dass die SSSSK, mit wahrscheinlich mehr Hackern (Codern), die für sie arbeiten, als der Rest der Welt zusammen, zukünftige Kriege mit minimalen physischen Konflikten gewinnen wird, nur indem sie ihre Feinde über das Netz lähmt. Keine Satelliten, keine Telefone, keine Kommunikation, keine Finanztransaktionen, kein Stromnetz, kein (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Problems of Using Autonomous Military AI Against the Background of Russia's Military Aggression Against Ukraine.Oleksii Kostenko, Tyler Jaynes, Dmytro Zhuravlov, Oleksii Dniprov & Yana Usenko - 2022 - Baltic Journal of Legal and Social Sciences 2022 (4):131-145.
    The application of modern technologies with artificial intelligence (AI) in all spheres of human life is growing exponentially alongside concern for its controllability. The lack of public, state, and international control over AI technologies creates large-scale risks of using such software and hardware that (un)intentionally harm humanity. The events of recent month and years, specifically regarding the Russian Federation’s war against its democratic neighbour Ukraine and other international conflicts of note, support the thesis that the uncontrolled use of AI, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. How the Seven Sociopaths Who Rule China are Winning World War Three and Three Ways to Stop Them.Michael Starks - 2020 - In Suicide by Democracy-an Obituary for America and the World 4th edition. Las Vegas, NV, USA: Reality Press. pp. 54-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Bagaimana Tujuh Sosiopat yang Memerintah Tiongkok Memenangkan Perang Dunia Tiga dan Tiga Cara untuk Menghentikan Mereka.Michael Richard Starks - 2019 - In Bunuh Diri oleh Demokrasi - Obituari untuk Amerika dan Dunia. Reality Press. pp. 56-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Cómo los siete sociópatas que gobiernan China están ganando la Tercera Guerra Mundial y tres maneras de detenerlos.Michael Starks - 2019 - In Suicidio por la Democracia - un Obituario para América y el Mundo 4ª edición. Las Vegas, NV USA: Reality Press. pp. 52-57.
    Lo primero que debemos tener en cuenta es que cuando decimos que China dice esto o China hace eso, no estamos hablando del pueblo chino, sino de los sociópatas que controlan el PCC -- Partido Comunista Chino, es decir, los Siete Asesinos En Serie Seniláticos (SSSSK) de th e Comité Permanente del PCC o de los 25 miembros del Politburó, etc. -/- Los planes del PCC para la Tercera Guerra Mundial y la dominación total están muy claro en las publicaciones (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet technology. (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 58