Results for 'Computer software'

940 found
Order:
  1. Epistemic issues in computational reproducibility: software as the elephant in the room.Alexandre Hocquet & Frédéric Wieber - 2021 - European Journal for Philosophy of Science 11 (2):1-20.
    Computational reproducibility possesses its own dynamics and narratives of crisis. Alongside the difficulties of computing as an ubiquitous yet complex scientific activity, computational reproducibility suffers from a naive expectancy of total reproducibility and a moral imperative to embrace the principles of free software as a non-negotiable epistemic virtue. We argue that the epistemic issues at stake in actual practices of computational reproducibility are best unveiled by focusing on software as a pivotal concept, one that is surprisingly often overlooked (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  2. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  3. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  4. Software is an abstract artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  5. Improving Mathematics Achievement and Attitude of the Grade 10 Students Using Dynamic Geometry Software (DGS) and Computer Algebra Systems (CAS).Starr Clyde Sebial - 2017 - International Journal of Social Science and Humanities Research 5 (1):374-387.
    It has become a fact that fluency and competency in utilizing the advancement of technology, specifically the computer and the internet is one way that could help in facilitating learning in mathematics. This study investigated the effects of Dynamic Geometry Software (DGS) and Computer Algebra Systems (CAS) in teaching Mathematics. This was conducted in Zamboanga del Sur National High School (ZSNHS) during the third grading period of the school year 2015-2016. The study compared the achievement and attitude (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Computer-Aided Argument Mapping and the Teaching of Critical Thinking (Part 1).Martin Davies - 2012 - Inquiry: Critical Thinking Across the Disciplines 27 (2):15-30.
    This paper is in two parts. Part I outlines three traditional approaches to the teaching of critical thinking: the normative, cognitive psychology, and educational approaches. Each of these approaches is discussed in relation to the influences of various methods of critical thinking instruction. The paper contrasts these approaches with what I call the “visualisation” approach. This approach is explained with reference to computer-aided argument mapping (CAAM) which uses dedicated computer software to represent inferences between premise and conclusions. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Werner Ceusters, Barry Smith & James Matthew Fielding (eds.), Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). Springer. pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that is designed (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  8. Problems and Solutions in Researching Computer Game Assisted Dialogues for Persons with Aphasia.Ylva Backman, Viktor Gardelli & Peter Parnes - 2022 - Designs for Learning 1 (14):46–51.
    In this paper, we describe technological advances for supporting persons with aphasia in philosophical dialogues about personally relevant and contestable questions. A computer game-based application for iPads is developed and researched through Living Lab inspired workshops in order to promote the target group’s communicative participation during group argumentation. We outline some central parts of the background theory of the application and some of its main features, which are related to needs of the target group. Methodological issues connected to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. Why are Software Patents so Elusive? A Platonic Approach.Odin Kroeger - 2011 - Masaryk University Journal of Law and Technology 5 (1):57-70.
    Software patents are commonly criticised for being fuzzy, context-sensitive, and often granted for trivial inventions. More often than not, these shortcomings are said to be caused by the abstract nature of software - with little further analysis offered. Drawing on Plato’s Parmenides, this paper will argue (1) that the reason why software patents seem to be elusive is that patent law suggests to think about algorithms as paradigmatic examples and (2) that Plato’s distinction between two modes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. No computer program required: Even pencil-and-paper argument mapping improves critical thinking skills.Mara Harrell - 2008 - Teaching Philosophy 31 (4):351-374.
    Argument-mapping software abounds, and one of the reasons is that using the software has been shown to teach/promote/improve critical thinking skills. These positive results are very encouraging, but they also raise the question of whether the computer tutorial environment is producing these results, or whether learning argument mapping, even with just paper and pencil, is sufficient. Based on the results of two empirical studies, I argue that the basic skill of being able to represent an argument diagrammatically (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  12. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  13. Causality, computing, and complexity.Russ Abbott - 2015
    I discuss two categories of causal relationships: primitive causal interactions of the sort characterized by Phil Dowe and the more general manipulable causal relationships as defined by James Woodward. All primitive causal interactions are manipulable causal relationships, but there are manipulable causal relationships that are not primitive causal interactions. I’ll call the latter constructed causal relationships, and I’ll argue that constructed causal relationships serve as a foundation for both computing and complex systems. -/- Perhaps even more interesting are autonomous causal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. SP2MN: a Software Process Meta-Modeling Language.Hisham Khdair - 2015 - International Review on Computers and Software 10 (7):726-734.
    In the last two decades, software process modeling has been an area of interest within both academia and industry. Software process modeling aims at defining and representing software processes in the form of models. A software process model represents the medium that allows better understanding, management and control of the software process. Software process metamodeling rather, provides standard metamodels which enable the defining of customized software process models for a specific project in hand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Computation of higher order Lie derivatives on the Infinity Computer.Felice Iavernaro, Francesca Mazzia, Marat Mukhametzhanov & Yaroslav Sergeyev - 2021 - Journal of Computational and Applied Mathematics 383:113135.
    In this paper, we deal with the computation of Lie derivatives, which are required, for example, in some numerical methods for the solution of differential equations. One common way for computing them is to use symbolic computation. Computer algebra software, however, might fail if the function is complicated, and cannot be even performed if an explicit formulation of the function is not available, but we have only an algorithm for its computation. An alternative way to address the problem (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between physicality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The mind as the software of the brain.Ned Block - 1990 - In Daniel N. Osherson & Edward E. Smith (eds.), An Invitation to Cognitive Science: Visual cognition. 2. MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  18. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Comparative study of manual and computerized software techniques of data management and analysis in educational research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):35-45.
    The study was conducted to compare manual and computerized software techniques of data management and analysis in educational research. Specifically, the study investigated whether there was a significant difference in the results of Pearson correlation, independent t-test and ANOVA obtained from using manual and computerized software technique of data analyses. Three null hypotheses were formulated accordingly to guide the study. The study adopted a quasi-experimental research design where several data were generated by the researchers and analyzed using manual (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  20. Computing and philosophy: Selected papers from IACAP 2014.Vincent C. Müller (ed.) - 2016 - Cham: Springer.
    This volume offers very selected papers from the 2014 conference of the “International Association for Computing and Philosophy” (IACAP) - a conference tradition of 28 years. - - - Table of Contents - 0 Vincent C. Müller: - Editorial - 1) Philosophy of computing - 1 Çem Bozsahin: - What is a computational constraint? - 2 Joe Dewhurst: - Computing Mechanisms and Autopoietic Systems - 3 Vincenzo Fano, Pierluigi Graziani, Roberto Macrelli and Gino Tarozzi: - Are Gandy Machines really local? (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Effects of Computer-Assisted Instruction on Mathematics Achievement among Secondary School Students in Rivers State, Nigeria.P. C. Dr Ukaigwe & Keesiop Evelyn Goi-Tanen - 2022 - International Journal of Research and Innovation in Social Science 6 (4):341-347.
    The study investigated the effects of computer-assisted instruction on mathematics achievement among secondary school students in Rivers State. Two research questions and two hypotheses guided the study. The design was quasi-experimental. The population of the study was 215 students in a senior secondary school Kpor in Gokana. The sample of the study was 35 students. The sample size was drawn using simple random sampling technique. The instrument used to collect data was multiple choice achievement test. The instrument was validated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Intelligent Tutoring System for Teaching "Introduction to Computer Science" in Al-Azhar University, Gaza.Ahmad Marouf - 2018 - Dissertation, Al-Azhar University , Gaza
    ITS (Intelligent Tutoring System) is a computer software that supplies direct and adaptive training or response to students without, or with little human teacher interfering. The main target of ITS is smoothing the learning-teaching process using the ultimate technology in computer science. The proposed system will be implemented using the “ITSB” Authoring tool. The book "Introduction To Computer Science" is taught in Al-Azhar University in Gaza as a compulsory subject for students who study at humanities faculties. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their qualities and constraints, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Illusion of Agency in Human–Computer Interaction.Michael Madary - 2022 - Neuroethics 15 (1):1-15.
    This article makes the case that our digital devices create illusions of agency. There are times when users feel as if they are in control when in fact they are merely responding to stimuli on the screen in predictable ways. After the introduction, the second section of the article offers examples of illusions of agency that do not involve human–computer interaction in order to show that such illusions are possible and not terribly uncommon. The third and fourth sections of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. A MODERN SCIENTIFIC INSIGHT OF SPHOTA VADA: IMPLICATIONS TO THE DEVELOPMENT OF SOFTWARE FOR MODELING NATURAL LANGUAGE COMPREHENSION.Varanasi Ramabrahmam - manuscript
    Sabdabrahma Siddhanta, popularized by Patanjali and Bhartruhari will be scientifically analyzed. Sphota Vada, proposed and nurtured by the Sanskrit grammarians will be interpreted from modern physics and communication engineering points of view. Insight about the theory of language and modes of language acquisition and communication available in the Brahma Kanda of Vakyapadeeyam will be translated into modern computational terms. A flowchart of language processing in humans will be given. A gross model of human language acquisition, comprehension and communication process forming (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  64
    (2 other versions)From Silico to Vitro: Computational Models of Complex Biological Systems Reveal Real-World Emergent Phenomena.Orly Stettiner - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 133-147.
    Computer simulations constitute a significant scientific tool for promoting scientific understanding of natural phenomena and dynamic processes. Substantial leaps in computational force and software engineering methodologies now allow the design and development of large-scale biological models, which – when combined with advanced graphics tools – may produce realistic biological scenarios, that reveal new scientific explanations and knowledge about real life phenomena. A state-of-the-art simulation system termed Reactive Animation (RA) will serve as a study case to examine the contemporary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Introducing Argument & Computation.Guillermo R. Simari, Chris Reed, Iyad Rahwan & Floriana Grasso - 2010 - Argument and Computation 1 (1):1-5.
    Over the past decade or so, a new interdisciplinary field has emerged in the ground between, on the one hand, computer science – and artificial intelligence in particular – and, on the other, the area of philosophy concentrating on the language and structure of argument. There are now hundreds of researchers worldwide who would consider themselves a part of this nascent community. Various terms have been proposed for the area, including "Computational Dialectics," "Argumentation Technology," and "Argument-based Computing," but the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Evolution: The Computer Systems Engineer Designing Minds.Aaron Sloman - 2011 - Avant: Trends in Interdisciplinary Studies 2 (2):45-69.
    What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. History of Computer Art, Second Edition.Thomas Dreher - 2020 - Morrisville, USA: Lulu Press.
    The development of the use of computers and software in art from the Fifties to the present is explained. As general aspects of the history of computer art an interface model and three dominant modes to use computational processes (generative, modular, hypertextual) are presented. The "History of Computer Art" features examples of early developments in media like cybernetic sculptures, computer graphics and animation (including music videos and demos), video and computer games, reactive installations, virtual reality, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in MANETs. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. (1 other version)Logic and social cognition the facts matter, and so do computational models.Rineke Verbrugge - 2009 - Journal of Philosophical Logic 38 (6):649-680.
    This article takes off from Johan van Benthem’s ruminations on the interface between logic and cognitive science in his position paper “Logic and reasoning: Do the facts matter?”. When trying to answer Van Benthem’s question whether logic can be fruitfully combined with psychological experiments, this article focuses on a specific domain of reasoning, namely higher-order social cognition, including attributions such as “Bob knows that Alice knows that he wrote a novel under pseudonym”. For intelligent interaction, it is important that the (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  33. Halting problem proofs refuted on the basis of software engineering ?P. Olcott - manuscript
    This is an explanation of a possible new insight into the halting problem provided in the language of software engineering. Technical computer science terms are explained using software engineering terms. No knowledge of the halting problem is required. -/- It is based on fully operational software executed in the x86utm operating system. The x86utm operating system (based on an excellent open source x86 emulator) was created to study the details of the halting problem proof counter-examples at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The effectiveness of a single intervention of computer-aided argument mapping in a marketing and a financial accounting subject.Martin Davies - 2011 - Higher Education Research and Development 30 (3):387-403.
    An argument map visually represents the structure of an argument, outlining its informal logical connections and informing judgments as to its worthiness. Argument mapping can be augmented with dedicated software that aids the mapping process. Empirical evidence suggests that semester‐length subjects using argument mapping along with dedicated software can produce remarkable increases in students’ critical thinking abilities. Introducing such specialised subjects, however, is often practically and politically difficult. This study ascertains student perceptions of the use of argument mapping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  36. Evaluation of the Image Quality of Ultra-Low-Dose Paranasal Sinus Computed Tomography Scans.Melih Akşamoğlu & Mehmet Sait Menzilcioğlu - 2023 - European Journal of Therapeutics 29 (2):143-148.
    Objective: We aimed to investigate the image quality of paranasal sinus computed tomography (CT) scans obtained with the “Advanced intelligent Clear-IQ Engine” (AICE) software and ultra-low dose parameters in patients with prediagnosed rhinitis, sinusitis or nasal septum deviation. -/- Methods: The first 50 patients (31 men and 19 women, aged 18-70 years) who agreed to participate in our prospectively planned study were included in the study. Imaging of the patients was performed with a 160-slice multidetector CT device Canon Aquilion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. OPUS-CAT: A State-of-the-Art Neural Machine Translation Engine on Your Local Computer[REVIEW]Yuri Balashov - 2021 - The ATA Chronicle.
    Neural machine translation (NMT) is one of the success stories of deep learning and artificial intelligence. Revolutionary innovations in the computational architectures made in 2015–2017 have led to dramatic improvements in the quality of machine translation (MT) and changed the field forever. Some professional translators welcome these changes with enthusiasm, others less so. But everyone has to deal with them. Historically, the relationship between human translation and MT has been uneasy and complicated, but an increasing number of players in both (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The ethics of information transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
    The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be disclosed and what (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  39. Developing Education in Israa University Using Intelligent Tutoring System.Hasan A. Abu Hasanein & Samy S. Abu-Naser - 2018 - International Journal of Academic Pedagogical Research (IJAPR) 2 (5):1-16.
    This study was conducted with the aim of developing the academic work in the Palestinian universities. No one can deny the technological stage that we are witnessing in the present era. Our mission is to use this development to develop the educational process. The Artificial Intelligence of the most important branches of computer science, which is interested in the development of computer software in order to make them simulate intelligent human, recently it emerged promised based on artificial (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Economic Cycles, Crises, and the Global Periphery.Leonid Grinin, Arno Tausch & Andrey Korotayev (eds.) - 2016 - Switzerland: Springer International Publishing Switzerland.
    This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. Rules of Tajweed the Holy Quran Intelligent Tutoring System.Alaa N. Akkila & Samy S. Abu-Naser - 2018 - International Journal of Academic Pedagogical Research (IJAPR) 2 (3):7-20.
    Undeniably, the greatest way for a Moslem to be closer to Allah, is recitation of Holy-Quran approves with the method conveyed from Messenger of Allah Mohammed from the feature of speech points of letters and the intrinsic and fleeting characteristics of the letters, So, there is a persistent need to teach all Moslems the science of Tajweed Al-Quran. ITS (Intelligent Tutoring System) is computer software that supplies direct and tailored training or response to students without human teacher interfering. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Ontological theory for ontological engineering: Biomedical systems information integration.James M. Fielding, Jonathan Simon, Werner Ceusters & Barry Smith - 2004 - In Fielding James M., Simon Jonathan, Ceusters Werner & Smith Barry (eds.), Proceedings of the Ninth International Conference on the Principles of Knowledge Representation and Reasoning (KR2004), Whistler, BC, 2-5 June 2004. pp. 114–120.
    Software application ontologies have the potential to become the keystone in state-of-the-art information management techniques. It is expected that these ontologies will support the sort of reasoning power required to navigate large and complex terminologies correctly and efficiently. Yet, there is one problem in particular that continues to stand in our way. As these terminological structures increase in size and complexity, and the drive to integrate them inevitably swells, it is clear that the level of consistency required for such (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  43. The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality.Avi Sion - 2010 - Geneva, Switzerland: CreateSpace & Kindle; Lulu..
    The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality is a treatise of formal logic and of aetiology. It is an original and wide-ranging investigation of the definition of causation (deterministic causality) in all its forms, and of the deduction and induction of such forms. The work was carried out in three phases over a dozen years (1998-2010), each phase introducing more sophisticated methods than the previous to solve outstanding problems. This study was intended as part of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. An Intelligent Tutoring System for Developing Education Case Study (Israa University).Hasan Abdulla Abu Hasanein - 2018 - Dissertation, Al-Azhar University, Gaza
    This study was conducted with the aim of developing the academic work in the Palestinian universities. No one can deny the technological stage that we are witnessing in the present era. Our mission is to use this development to develop the educational process. The Artificial Intelligence of the most important branches of computer science, which is interested in the development of computer software in order to make them simulate intelligent human, recently it emerged promised based on artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. DETERMINATION OF MEDIAN TOLERANCE LIMIT (LC50 ) OF CHANNA PUNCTATA (BLOCH) FOR CADMIUM CHLORIDE.A. Kumar & Ashok Verma - 2021 - International Journal on Biological Sciences 12 (2):106-109.
    The present investigation was undertaken to investigate the acute toxicity of cadmium, a heavy metal widely detected in the aquatic environment due to natural effects and anthropogenic activities, in freshwater teleost, Channa punctata (Bloch). The experiments for the bioassay were performed in semi-static test condition according to the standard guidelines. The behavioural changes in the fish were observed for all tested concentrations of the metal. The data obtained for bioassay were analyzed for median lethal concentrations (LC ) of the metal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Thyroid Panel and Modified Lipid Profile among Sudanese Patients with Coronary Heart Disease.Lubna S. B. Mohmmedzain, Sahar A. M. Abdelrahman, Zainab E. M. Ibrahim, Zainab F. E. Ahmed & Mohamed A. M. Salih - 2019 - International Journal of Academic Health and Medical Research (IJAHMR) 3 (3):1-7.
    Abstract: The analytical, comparative cross-sectional study was conducted to assess the thyroid profiles and modified lipid profiles levels among Sudanese patients with coronary heart disease performed on forty-one patients with coronary heart disease as test group collected from Sudan Heart Center, Al rebat teaching hospital and Al mawada hospital in Khartoum state, during the period between November 2017 and May 2018. Furthermore, the test group compared with forty-one apparently healthy volunteers as control group was selected with the same inclusion criteria. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Engineering Topology of Construction Ecology for Dynamic Integration of Sustainability Outcomes to Functions in Urban Environments: Spatial Modeling.Moustafa Osman Mohammed - 2022 - International Scholarly and Scientific Research and Innovation 16 (11):312-323.
    Integration sustainability outcomes give attention to construction ecology in the design review of urban environments to comply with Earth’s System that is composed of integral parts of the (i.e., physical, chemical and biological components). Naturally, exchange patterns of industrial ecology have consistent and periodic cycles to preserve energy flows and materials in Earth’s System. When engineering topology is affecting internal and external processes in system networks, it postulated the valence of the first-level spatial outcome (i.e., project compatibility success). These instrumentalities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Wyjaśnianie w kognitywistyce.Marcin Miłkowski - 2013 - Przeglad Filozoficzny - Nowa Seria 86 (2):151-166.
    The paper defends the claim that the mechanistic explanation of information processing is the fundamental kind of explanation in cognitive science. These mechanisms are complex organized systems whose functioning depends on the orchestrated interaction of their component parts and processes. A constitutive explanation of every mechanism must include both appeal to its environment and to the role it plays in it. This role has been traditionally dubbed competence. To fully explain how this role is played it is necessary to explain (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Theorem proving in artificial neural networks: new frontiers in mathematical AI.Markus Pantsar - 2024 - European Journal for Philosophy of Science 14 (1):1-22.
    Computer assisted theorem proving is an increasingly important part of mathematical methodology, as well as a long-standing topic in artificial intelligence (AI) research. However, the current generation of theorem proving software have limited functioning in terms of providing new proofs. Importantly, they are not able to discriminate interesting theorems and proofs from trivial ones. In order for computers to develop further in theorem proving, there would need to be a radical change in how the software functions. Recently, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 940