Results for 'Computer software'

978 found
Order:
  1. Epistemic issues in computational reproducibility: software as the elephant in the room.Alexandre Hocquet & Frédéric Wieber - 2021 - European Journal for Philosophy of Science 11 (2):1-20.
    Computational reproducibility possesses its own dynamics and narratives of crisis. Alongside the difficulties of computing as an ubiquitous yet complex scientific activity, computational reproducibility suffers from a naive expectancy of total reproducibility and a moral imperative to embrace the principles of free software as a non-negotiable epistemic virtue. We argue that the epistemic issues at stake in actual practices of computational reproducibility are best unveiled by focusing on software as a pivotal concept, one that is surprisingly often overlooked (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  2. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  3. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  4. Software is an abstract artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  5. Improving Mathematics Achievement and Attitude of the Grade 10 Students Using Dynamic Geometry Software (DGS) and Computer Algebra Systems (CAS).Starr Clyde Sebial - 2017 - International Journal of Social Science and Humanities Research 5 (1):374-387.
    It has become a fact that fluency and competency in utilizing the advancement of technology, specifically the computer and the internet is one way that could help in facilitating learning in mathematics. This study investigated the effects of Dynamic Geometry Software (DGS) and Computer Algebra Systems (CAS) in teaching Mathematics. This was conducted in Zamboanga del Sur National High School (ZSNHS) during the third grading period of the school year 2015-2016. The study compared the achievement and attitude (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Computer-Aided Argument Mapping and the Teaching of Critical Thinking (Part 1).Martin Davies - 2012 - Inquiry: Critical Thinking Across the Disciplines 27 (2):15-30.
    This paper is in two parts. Part I outlines three traditional approaches to the teaching of critical thinking: the normative, cognitive psychology, and educational approaches. Each of these approaches is discussed in relation to the influences of various methods of critical thinking instruction. The paper contrasts these approaches with what I call the “visualisation” approach. This approach is explained with reference to computer-aided argument mapping (CAAM) which uses dedicated computer software to represent inferences between premise and conclusions. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Werner Ceusters, Barry Smith & James Matthew Fielding, Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that is designed (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  8. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  41
    Enhancing Edge Network Efficiency through Software-Defined Networking and NFV Integration.Tran Kenny - 2020 - International Journal of Advanced Research in Education and Technology 7 (1):1606-1608.
    The proliferation of IoT devices and the emergence of latency-sensitive applications in 2019 accelerated the demand for edge computing architectures. To meet these demands, network infrastructure began shifting away from centralized data centers toward distributed, programmable edge nodes. This research explores how the integration of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) can optimize edge network performance. The paper analyzes architectural models that enable dynamic routing, load balancing, and traffic prioritization at the edge. It also evaluates security and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Why are Software Patents so Elusive? A Platonic Approach.Odin Kroeger - 2011 - Masaryk University Journal of Law and Technology 5 (1):57-70.
    Software patents are commonly criticised for being fuzzy, context-sensitive, and often granted for trivial inventions. More often than not, these shortcomings are said to be caused by the abstract nature of software - with little further analysis offered. Drawing on Plato’s Parmenides, this paper will argue (1) that the reason why software patents seem to be elusive is that patent law suggests to think about algorithms as paradigmatic examples and (2) that Plato’s distinction between two modes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between physicality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller, Computing and philosophy: Selected papers from IACAP 2014. Cham: pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Download  
     
    Export citation  
     
    Bookmark   41 citations  
  14. Computing and philosophy: Selected papers from IACAP 2014.Vincent C. Müller (ed.) - 2016 - Cham:
    This volume offers very selected papers from the 2014 conference of the “International Association for Computing and Philosophy” (IACAP) - a conference tradition of 28 years. - - - Table of Contents - 0 Vincent C. Müller: - Editorial - 1) Philosophy of computing - 1 Çem Bozsahin: - What is a computational constraint? - 2 Joe Dewhurst: - Computing Mechanisms and Autopoietic Systems - 3 Vincenzo Fano, Pierluigi Graziani, Roberto Macrelli and Gino Tarozzi: - Are Gandy Machines really local? (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Causality, computing, and complexity.Russ Abbott - 2015
    I discuss two categories of causal relationships: primitive causal interactions of the sort characterized by Phil Dowe and the more general manipulable causal relationships as defined by James Woodward. All primitive causal interactions are manipulable causal relationships, but there are manipulable causal relationships that are not primitive causal interactions. I’ll call the latter constructed causal relationships, and I’ll argue that constructed causal relationships serve as a foundation for both computing and complex systems. -/- Perhaps even more interesting are autonomous causal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. SP2MN: a Software Process Meta-Modeling Language.Hisham Khdair - 2015 - International Review on Computers and Software 10 (7):726-734.
    In the last two decades, software process modeling has been an area of interest within both academia and industry. Software process modeling aims at defining and representing software processes in the form of models. A software process model represents the medium that allows better understanding, management and control of the software process. Software process metamodeling rather, provides standard metamodels which enable the defining of customized software process models for a specific project in hand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. No computer program required: Even pencil-and-paper argument mapping improves critical thinking skills.Mara Harrell - 2008 - Teaching Philosophy 31 (4):351-374.
    Argument-mapping software abounds, and one of the reasons is that using the software has been shown to teach/promote/improve critical thinking skills. These positive results are very encouraging, but they also raise the question of whether the computer tutorial environment is producing these results, or whether learning argument mapping, even with just paper and pencil, is sufficient. Based on the results of two empirical studies, I argue that the basic skill of being able to represent an argument diagrammatically (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  18. Problems and Solutions in Researching Computer Game Assisted Dialogues for Persons with Aphasia.Ylva Backman, Viktor Gardelli & Peter Parnes - 2022 - Designs for Learning 1 (14):46–51.
    In this paper, we describe technological advances for supporting persons with aphasia in philosophical dialogues about personally relevant and contestable questions. A computer game-based application for iPads is developed and researched through Living Lab inspired workshops in order to promote the target group’s communicative participation during group argumentation. We outline some central parts of the background theory of the application and some of its main features, which are related to needs of the target group. Methodological issues connected to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  34
    Software Development Strategies for Multi-Regional Applications.Baladari Venkata - 2022 - European Journal of Advances in Engineering and Technology 9 (3):193-200.
    Deploying applications across multiple cloud regions boosts availability, disaster recovery, and user experience but raises complexities including data synchronization, network optimization, security, and cost management. This research examines the responsibilities of software developers in designing and overseeing multi-region cloud-based applications. The main goal is to identify and examine the essential factors and most effective methods that developers should adhere to when constructing reliable, expandable, and high-performance cloud-based applications, approaches to tackle these complexities, such as Infrastructure as Code (IaC) for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Computation of higher order Lie derivatives on the Infinity Computer.Felice Iavernaro, Francesca Mazzia, Marat Mukhametzhanov & Yaroslav Sergeyev - 2021 - Journal of Computational and Applied Mathematics 383:113135.
    In this paper, we deal with the computation of Lie derivatives, which are required, for example, in some numerical methods for the solution of differential equations. One common way for computing them is to use symbolic computation. Computer algebra software, however, might fail if the function is complicated, and cannot be even performed if an explicit formulation of the function is not available, but we have only an algorithm for its computation. An alternative way to address the problem (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. The mind as the software of the brain.Ned Block - 1990 - In Daniel N. Osherson & Edward E. Smith, An Invitation to Cognitive Science: Visual cognition. 2. MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Download  
     
    Export citation  
     
    Bookmark   62 citations  
  22.  5
    Software Development Strategies for Multi-Regional Applications.Baladari Venkata - 2022 - European Journal of Advances in Engineering and Technology 9 (3):193-200.
    Deploying applications across multiple cloud regions boosts availability, disaster recovery, and user experience but raises complexities including data synchronization, network optimization, security, and cost management. This research examines the responsibilities of software developers in designing and overseeing multi-region cloud-based applications. The main goal is to identify and examine the essential factors and most effective methods that developers should adhere to when constructing reliable, expandable, and high-performance cloud-based applications, approaches to tackle these complexities, such as Infrastructure as Code (IaC) for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Comparative study of manual and computerized software techniques of data management and analysis in educational research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):35-45.
    The study was conducted to compare manual and computerized software techniques of data management and analysis in educational research. Specifically, the study investigated whether there was a significant difference in the results of Pearson correlation, independent t-test and ANOVA obtained from using manual and computerized software technique of data analyses. Three null hypotheses were formulated accordingly to guide the study. The study adopted a quasi-experimental research design where several data were generated by the researchers and analyzed using manual (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  24.  72
    Advancements in Cloud-Based Software Testing: Trends and Tools.Robinson Xander Noah - 2024 - International Journal of Computer Technology and Electronics Communication 7 (2).
    The rapid adoption of cloud computing has transformed how software development and testing are conducted, leading to the emergence of cloud-based software testing as a vital area in software engineering. Cloudbased testing enables scalable, flexible, and cost-efficient testing environments without the need for extensive physical infrastructure. This paper explores the recent advancements in cloud-based software testing, highlighting emerging trends, innovative tools, and best practices. We analyze how cloud services support various types of testing, including functional, performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Reliability Engineering in Cloud Computing: Strategies, Metrics, and Performance Assessment.Anand Karanveer - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (12):3451-3464.
    Cloud computing has transformed the nature of computation, sharing of information resources, and storage capabilities, including the flexibility to scale these resources for corporate use. Nevertheless, maintaining high reliability in cloud environments is still an issue that has not been solved because of factors such as Hardware failures, network interruptions/slowdowns and software vulnerabilities. This paper discusses several methods that can be employed in the reliability engineering of cloud computing, including fault tolerance, redundancy, monitoring and predictive maintenance. It also further (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  98
    Analysis on GenAI for Source Code Scanning and Automated Software Testing.Girish Wali Praveen Sivathapandi - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):631-638.
    The fundamental purpose of software testing is to develop new test case sets that demonstrate the software product's deficiencies. Upon preparation of the test cases, the Test Oracle delineates the expected program behavior for each scenario. The application's correct functioning and its properties will be assessed by prioritizing test cases and running its components, which delineate inputs, actions, and outputs. The prioritization methods include initial ordering, random ordering, and reverse ranking based on fault detection capabilities. software application (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. A MODERN SCIENTIFIC INSIGHT OF SPHOTA VADA: IMPLICATIONS TO THE DEVELOPMENT OF SOFTWARE FOR MODELING NATURAL LANGUAGE COMPREHENSION.Varanasi Ramabrahmam - manuscript
    Sabdabrahma Siddhanta, popularized by Patanjali and Bhartruhari will be scientifically analyzed. Sphota Vada, proposed and nurtured by the Sanskrit grammarians will be interpreted from modern physics and communication engineering points of view. Insight about the theory of language and modes of language acquisition and communication available in the Brahma Kanda of Vakyapadeeyam will be translated into modern computational terms. A flowchart of language processing in humans will be given. A gross model of human language acquisition, comprehension and communication process forming (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. From Silico to Vitro: Computational Models of Complex Biological Systems Reveal Real-World Emergent Phenomena.Orly Stettiner - 2016 - In Vincent C. Müller, Computing and philosophy: Selected papers from IACAP 2014. Cham: pp. 133-147.
    Computer simulations constitute a significant scientific tool for promoting scientific understanding of natural phenomena and dynamic processes. Substantial leaps in computational force and software engineering methodologies now allow the design and development of large-scale biological models, which – when combined with advanced graphics tools – may produce realistic biological scenarios, that reveal new scientific explanations and knowledge about real life phenomena. A state-of-the-art simulation system termed Reactive Animation (RA) will serve as a study case to examine the contemporary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  62
    Software Testing Automation: Tools, Techniques, and Best Practices.Mohammed Nguyen Van An Tra, Al-Fulan Saeed Ibrahim - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    Generative AI has revolutionized the field of artificial intelligence by enabling machines to create new, original content across various modalities, including text, images, and audio. Two prominent architectures driving this transformation are Transformer-based models and Diffusion models. Transformers, introduced in the 2017 paper "Attention Is All You Need," leverage self-attention mechanisms to process sequential data efficiently, leading to significant advancements in natural language processing tasks. Diffusion models, on the other hand, employ a probabilistic approach to generate data by gradually denoising (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Intelligent Tutoring System for Teaching "Introduction to Computer Science" in Al-Azhar University, Gaza.Ahmad Marouf - 2018 - Dissertation, Al-Azhar University , Gaza
    ITS (Intelligent Tutoring System) is a computer software that supplies direct and adaptive training or response to students without, or with little human teacher interfering. The main target of ITS is smoothing the learning-teaching process using the ultimate technology in computer science. The proposed system will be implemented using the “ITSB” Authoring tool. The book "Introduction To Computer Science" is taught in Al-Azhar University in Gaza as a compulsory subject for students who study at humanities faculties. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  69
    Cloud-Native Quantum Computing: Unlocking the Potential of Quantum Algorithms on Cloud Infrastructure.Kanchan C. Gaikwad Sakshi R. Hirulkar - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research (Ijmserh) 13 (1):261-264.
    Quantum computing has the potential to revolutionize problem-solving across various domains, from cryptography to materials science. However, the complexities of quantum hardware, including the need for highly specialized environments and significant computational resources, have made quantum computing difficult for most organizations to access. Cloud-native quantum computing, which leverages cloud infrastructure to provide scalable, ondemand access to quantum processors, offers a transformative solution to this challenge. This paper explores the rise of cloud-native quantum computing, focusing on how cloud infrastructure facilitates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their qualities and constraints, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Effects of Computer-Assisted Instruction on Mathematics Achievement among Secondary School Students in Rivers State, Nigeria.P. C. Dr Ukaigwe & Keesiop Evelyn Goi-Tanen - 2022 - International Journal of Research and Innovation in Social Science 6 (4):341-347.
    The study investigated the effects of computer-assisted instruction on mathematics achievement among secondary school students in Rivers State. Two research questions and two hypotheses guided the study. The design was quasi-experimental. The population of the study was 215 students in a senior secondary school Kpor in Gokana. The sample of the study was 35 students. The sample size was drawn using simple random sampling technique. The instrument used to collect data was multiple choice achievement test. The instrument was validated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  49
    Model-Driven Engineering: Enhancing Software Design and Code Generation.Gharat Tejas Nitin - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    Model-Driven Engineering (MDE) is a modern approach to software development that emphasizes the use of models as primary artifacts in the software design and development process. In MDE, models represent abstract versions of systems, serving as blueprints that can be automatically transformed into working code. This approach seeks to enhance software design, reduce the complexity of code generation, and improve maintainability. By focusing on high-level abstractions, MDE enables developers to design software systems more efficiently, automate repetitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Evolution: The Computer Systems Engineer Designing Minds.Aaron Sloman - 2011 - Avant: Trends in Interdisciplinary Studies 2 (2):45-69.
    What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Introducing Argument & Computation.Guillermo R. Simari, Chris Reed, Iyad Rahwan & Floriana Grasso - 2010 - Argument and Computation 1 (1):1-5.
    Over the past decade or so, a new interdisciplinary field has emerged in the ground between, on the one hand, computer science – and artificial intelligence in particular – and, on the other, the area of philosophy concentrating on the language and structure of argument. There are now hundreds of researchers worldwide who would consider themselves a part of this nascent community. Various terms have been proposed for the area, including "Computational Dialectics," "Argumentation Technology," and "Argument-based Computing," but the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. History of Computer Art, Second Edition.Thomas Dreher - 2020 - Morrisville, USA:
    The development of the use of computers and software in art from the Fifties to the present is explained. As general aspects of the history of computer art an interface model and three dominant modes to use computational processes (generative, modular, hypertextual) are presented. The "History of Computer Art" features examples of early developments in media like cybernetic sculptures, computer graphics and animation (including music videos and demos), video and computer games, reactive installations, virtual reality, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. The Illusion of Agency in Human–Computer Interaction.Michael Madary - 2022 - Neuroethics 15 (1):1-15.
    This article makes the case that our digital devices create illusions of agency. There are times when users feel as if they are in control when in fact they are merely responding to stimuli on the screen in predictable ways. After the introduction, the second section of the article offers examples of illusions of agency that do not involve human–computer interaction in order to show that such illusions are possible and not terribly uncommon. The third and fourth sections of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Logic and Social Cognition: The Facts Matter, and So Do Computational Models.Rineke Verbrugge - 2009 - Journal of Philosophical Logic 38 (6):649-680.
    This article takes off from Johan van Benthem’s ruminations on the interface between logic and cognitive science in his position paper “Logic and reasoning: Do the facts matter?”. When trying to answer Van Benthem’s question whether logic can be fruitfully combined with psychological experiments, this article focuses on a specific domain of reasoning, namely higher-order social cognition, including attributions such as “Bob knows that Alice knows that he wrote a novel under pseudonym”. For intelligent interaction, it is important that the (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  41.  83
    Exploring the Role of Large Language Models in Automated Code Review and Software Quality Enhancement.Kathiresan Gopinath - 2023 - International Journal of Innovative Research in Science Engineering and Technology 12 (9):11428-11438.
    As the newest, most savvy technology domain, Large Language Models (LLMs) are the technological force which is now revolutionizing Automated Code Review and Software Quality Assurance, making the context aware analysis, adaptive learning, and the intelligent recommendations. However, traditional code review methods are not only time consuming, but also prone to human error and are not scalable. The use of LLMs in software engineering allows for the detection of defects, optimization of performance and the maintenance of improve mental (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. OPUS-CAT: A State-of-the-Art Neural Machine Translation Engine on Your Local Computer.Yuri Balashov - 2021 - The ATA Chronicle.
    Neural machine translation (NMT) is one of the success stories of deep learning and artificial intelligence. Revolutionary innovations in the computational architectures made in 2015–2017 have led to dramatic improvements in the quality of machine translation (MT) and changed the field forever. Some professional translators welcome these changes with enthusiasm, others less so. But everyone has to deal with them. Historically, the relationship between human translation and MT has been uneasy and complicated, but an increasing number of players in both (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  81
    A Review of the Scope_ of Cloud Computing In Education (7th edition).Prof Mahendra Kumar B. Hritik Raj, - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (7):13230-13234.
    With the capability of using virtualized resources as a service, over the Internet, and having dynamic scalability, cloud computing has started to gain momentum across many types of enterprises. It is probably going to have a big effect on the future of schooling. Cloud computing, hence, offers a great opportunity for learning institutions, especially the less privileged ones, to efficiently manage their information system without having to spend additional money purchasing more computers and networking equipment. The universities make use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Halting problem proofs refuted on the basis of software engineering ?P. Olcott - manuscript
    This is an explanation of a possible new insight into the halting problem provided in the language of software engineering. Technical computer science terms are explained using software engineering terms. No knowledge of the halting problem is required. -/- It is based on fully operational software executed in the x86utm operating system. The x86utm operating system (based on an excellent open source x86 emulator) was created to study the details of the halting problem proof counter-examples at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  46. Evaluation of the Image Quality of Ultra-Low-Dose Paranasal Sinus Computed Tomography Scans.Melih Akşamoğlu & Mehmet Sait Menzilcioğlu - 2023 - European Journal of Therapeutics 29 (2):143-148.
    Objective: We aimed to investigate the image quality of paranasal sinus computed tomography (CT) scans obtained with the “Advanced intelligent Clear-IQ Engine” (AICE) software and ultra-low dose parameters in patients with prediagnosed rhinitis, sinusitis or nasal septum deviation. -/- Methods: The first 50 patients (31 men and 19 women, aged 18-70 years) who agreed to participate in our prospectively planned study were included in the study. Imaging of the patients was performed with a 160-slice multidetector CT device Canon Aquilion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The effectiveness of a single intervention of computer-aided argument mapping in a marketing and a financial accounting subject.Martin Davies - 2011 - Higher Education Research and Development 30 (3):387-403.
    An argument map visually represents the structure of an argument, outlining its informal logical connections and informing judgments as to its worthiness. Argument mapping can be augmented with dedicated software that aids the mapping process. Empirical evidence suggests that semester‐length subjects using argument mapping along with dedicated software can produce remarkable increases in students’ critical thinking abilities. Introducing such specialised subjects, however, is often practically and politically difficult. This study ascertains student perceptions of the use of argument mapping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The ethics of information transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
    The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be disclosed and what (...)
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  49. Rules of Tajweed the Holy Quran Intelligent Tutoring System.Alaa N. Akkila & Samy S. Abu-Naser - 2018 - International Journal of Academic Pedagogical Research (IJAPR) 2 (3):7-20.
    Undeniably, the greatest way for a Moslem to be closer to Allah, is recitation of Holy-Quran approves with the method conveyed from Messenger of Allah Mohammed from the feature of speech points of letters and the intrinsic and fleeting characteristics of the letters, So, there is a persistent need to teach all Moslems the science of Tajweed Al-Quran. ITS (Intelligent Tutoring System) is computer software that supplies direct and tailored training or response to students without human teacher interfering. (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  50. Developing Education in Israa University Using Intelligent Tutoring System.Hasan A. Abu Hasanein & Samy S. Abu-Naser - 2018 - International Journal of Academic Pedagogical Research (IJAPR) 2 (5):1-16.
    This study was conducted with the aim of developing the academic work in the Palestinian universities. No one can deny the technological stage that we are witnessing in the present era. Our mission is to use this development to develop the educational process. The Artificial Intelligence of the most important branches of computer science, which is interested in the development of computer software in order to make them simulate intelligent human, recently it emerged promised based on artificial (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
1 — 50 / 978