Results for 'IEEE'

56 found
Order:
  1. IEEE: un estándar global como iniciativa ética de la IA.Fabio Morandín-Ahuerma - 2023 - In Principios normativos para una ética de la inteligencia artificial. Consejo de Ciencia y Tecnología del Estado de Puebla (Concytep). pp. 127-136.
    “Diseño alineado éticamente: una visión para priorizar el bienestar humano con sistemas autónomos e inteligentes, primera edición” fue redactado bajo la “Iniciativa global sobre ética de los sistemas autónomos e inteligentes” y es un documento que pretende ofrecer un marco para las consideraciones éticas en el diseño, desarrollo, despliegue y uso de los sistemas de IA, con el objetivo de garantizar que las tecnologías digitales ayuden a las personas en sus labores. El Diseño consta de ocho principios: derechos humanos, bienestar, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  40
    Adaptive Channel Hopping for IEEE 802.15. 4 TSCH-Based Networks: A Dynamic Bernoulli Bandit Approach.Taheri Javan Nastooh - 2021 - IEEE Sensors Journal 21 (20):23667-23681.
    In IEEE 802.15.4 standard for low-power low-range wireless communications, only one channel is employed for transmission which can result in increased energy consumption, high network delay and poor packet delivery ratio (PDR). In the subsequent IEEE 802.15.4-2015 standard, a Time-slotted Channel Hopping (TSCH) mechanism has been developed which allows for a periodic yet fixed frequency hopping pattern over 16 different channels. Unfortunately, however, most of these channels are susceptible to high-power coexisting Wi-Fi signal interference and to possibly some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. An ethical code for commercial VR/AR applications.Erick Jose Ramirez, Jocelyn Tan, Miles Elliott, Mohit Gandhi & Lia Petronio - 2021 - In N. Shaghaghi, F. Lamberti, B. Beams, R. Shariatmadari & A. Amer (eds.), Intelligent Technologies for Interactive Entertainment. Springer.
    The commercial VR/AR marketplace is gaining ground and is becoming an ever larger and more significant component of the global economy. While much attention has been paid to the commercial promise of VR/AR, comparatively little attention has been given to the ethical issues that VR/AR technologies introduce. We here examine existing codes of ethics proposed by the ACM and IEEE and apply them to the unique ethical facets that VR/AR introduces. We propose a VR/AR code of ethics for developers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Ethical issues for robotics and autonomous systems.John McDermid, Vincent C. Müller, Tony Pipe, Zoe Porter & Alan Winfield - 2019 - UK Robotics and Autonomous Systems Network.
    There are unusual challenges in ethics for RAS. Perhaps the issue can best be summarised as needing to consider “technically informed ethics”. The technology of RAS raises issues that have an ethical dimension, and perhaps uniquely so due to the possibility of moving human decision-making which is implicitly ethically informed to computer systems. Further, if seeking solutions to these problems – ethically aligned design, to use the IEEE’s terminology – then the solutions must be technically meaningful, capable of realisation, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. There is no 'I' in 'Robot': Robots and Utilitarianism (expanded & revised).Christopher Grau - 2011 - In Susan Anderson & Michael Anderson (eds.), Machine Ethics. Cambridge University Press. pp. 451.
    Utilizing the film I, Robot as a springboard, I here consider the feasibility of robot utilitarians, the moral responsibilities that come with the creation of ethical robots, and the possibility of distinct ethics for robot-robot interaction as opposed to robot-human interaction. (This is a revised and expanded version of an essay that originally appeared in IEEE: Intelligent Systems.).
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  6. Humanoid robots: A new kind of tool.Bryan Adams, Cynthia Breazeal, Rodney Brooks & Brian Scassellati - 2000 - IEEE Intelligent Systems 15 (4):25-31.
    In his 1923 play R.U.R.: Rossum s Universal Robots, Karel Capek coined In 1993, we began a humanoid robotics project aimed at constructing a robot for use in exploring theories of human intelligence. In this article, we describe three aspects of our research methodology that distinguish our work from other humanoid projects. First, our humanoid robots are designed to act autonomously and safely in natural workspaces with people. Second, our robots are designed to interact socially with people by exploiting natural (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Mental models of force and motion.Varol Akman, Deniz Ede, William Randolph Franklin & Paul J. W. ten Hagen - 1990 - In Okyay Kaynak (ed.), Proceedings of the IEEE International Workshop on Intelligent Motion Control (Istanbul, 20-22 August 1990). New York: Institute of Electrical and Electronics Engineers. pp. 153-158.
    Future robots should have common sense about the world in order to handle the problems they will encounter. A large part of this commonsense knowledge must be naive physics knowledge, since carrying out even the simplest everyday chores requires familiarity with physics laws. But how should one start codifying this knowledge? What kind of skills should be elicited from the experts (each and every one of us)? This paper will attempt to provide some hints by studying the mental models of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Ethics in robotics research: CERNA recommendations.Alexei Grinbaum & Raja Chatila - 2017 - IEEE Robotics and Automation Magazine (99):1-8.
    This article summarizes the recommendations concerning robotics as issued by the Commission for the Ethics of Research in Information Sciences and Technologies (CERNA), the French advisory commission for the ethics of information and communication technology (ICT) research. Robotics has numerous applications in which its role can be overwhelming and may lead to unexpected consequences. In this rapidly evolving technological environment, CERNA does not set novel ethical standards but seeks to make ethical deliberation inseparable from scientific activity. Additionally, it provides tools (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Compact propositional Gödel logics.Matthias Baaz & Richard Zach - 1998 - In Baaz Matthias (ed.), 28th IEEE International Symposium on Multiple-Valued Logic, 1998. Proceedings. IEEE Press. pp. 108-113.
    Entailment in propositional Gödel logics can be defined in a natural way. While all infinite sets of truth values yield the same sets of tautologies, the entailment relations differ. It is shown that there is a rich structure of infinite-valued Gödel logics, only one of which is compact. It is also shown that the compact infinite-valued Gödel logic is the only one which interpolates, and the only one with an r.e. entailment relation.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  10. What is a subliminal technique? An ethical perspective on AI-driven influence.Juan Pablo Bermúdez, Rune Nyrup, Sebastian Deterding, Celine Mougenot, Laura Moradbakhti, Fangzhou You & Rafael A. Calvo - 2023 - Ieee Ethics-2023 Conference Proceedings.
    Concerns about threats to human autonomy feature prominently in the field of AI ethics. One aspect of this concern relates to the use of AI systems for problematically manipulative influence. In response to this, the European Union’s draft AI Act (AIA) includes a prohibition on AI systems deploying subliminal techniques that alter people’s behavior in ways that are reasonably likely to cause harm (Article 5(1)(a)). Critics have argued that the term ‘subliminal techniques’ is too narrow to capture the target cases (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. An empirical study on using visual metaphors in visualization.Rita Borgo, Alfie Abdul-Rahman, Mohamed Farhan, Philip W. Grant, Irene Reppa, Luciano Floridi & Min Chen - 2012 - IEEE Transactions on Visualization and Computer Graphics 18 (12):2759-2768.
    In written and spoken communications, metaphors are often used as an aid to help convey abstract or less tangible concepts. However, the benefits of using visual metaphors in visualization have so far been inconclusive. In this work, we report an empirical study to evaluate hypotheses that visual metaphors may aid memorization, visual search and concept comprehension. One major departure from previous metaphor-related experiments in the literature is that we make use of a dual-task methodology in our experiment. This design offers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Digital psychiatry: ethical risks and opportunities for public health and well-being.Christopher Burr, Jessica Morley, Mariarosaria Taddeo & Luciano Floridi - 2020 - IEEE Transactions on Technology and Society 1 (1):21–33.
    Common mental health disorders are rising globally, creating a strain on public healthcare systems. This has led to a renewed interest in the role that digital technologies may have for improving mental health outcomes. One result of this interest is the development and use of artificial intelligence for assessing, diagnosing, and treating mental health issues, which we refer to as ‘digital psychiatry’. This article focuses on the increasing use of digital psychiatry outside of clinical settings, in the following sectors: education, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  13. Conceptual Space Modeling for Space Event Characterization.Jeremy R. Chapman, David Kasmier, David Limbaugh, Stephen R. Gagnon, John L. Crassidis, James Llinas, Barry Smith & Alexander P. Cox - 2020 - IEEE 23rd International Conference on Information Fusion (FUSION).
    This paper provides a method for characterizing space events using the framework of conceptual spaces. We focus specifically on estimating and ranking the likelihood of collisions between space objects. The objective is to design an approach for anticipatory decision support for space operators who can take preventive actions on the basis of assessments of relative risk. To make this possible our approach draws on the fusion of both hard and soft data within a single decision support framework. Contextual data is (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. To Be or Not To Be a Behaviorist? Facial Recognition Systems and Critical Knowledge.Mathieu Cornelis, Nathalie Grandjean & Claire Lobet - 2008 - Tenth IEEE International Symposium on Multimedia, 2008. ISM 2008:597-601.
    In this paper, we assess the possibility of a critical knowledge of technology. In the case of facial recognition systems, 'FRS', we argue that behaviorism underlies this technology, and analyze the debate about behaviorism to show the lack of consensus about its theoretical foundations. In particular we analyze the structure of knowledge generated by FRS as affected by a technological behaviorism. Our last point is a suggestion to use the concept of dasiacritical knowledgepsila, which we borrow from Ladriere, to question (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Behavior, Organization, Substance: Three Gestalts of General Systems Theory.Vincenzo De Florio - 2014 - In Martin Gibbs (ed.), Proceedings of the IEEE 2014 Conference on Norbert Wiener in the 21st Century. IEEE.
    The term gestalt, when used in the context of general systems theory, assumes the value of “systemic touchstone”, namely a figure of reference useful to categorize the properties or qualities of a set of systems. Typical gestalts used, e.g., in biology, are those based on anatomical or physiological characteristics, which correspond respectively to architectural and organizational design choices in natural and artificial systems. In this paper we discuss three gestalts of general systems theory: behavior, organization, and substance, which refer respectively (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Consciousness and special relativity.F. de Silva - 1996 - IEEE Engineering in Medicine and Biology Magazine 15:21-26.
    A description of consciousness leads to a contradiction with the postulation from special relativity that there can be no connections between simultaneous event. This contradiction points to consciousness involving quantum level mechanisms. The Quantum level description of the universe is re- evaluated in the light of what is observed in consciousness namely 4 Dimensional objects. A new improved interpretation of Quantum level observations is introduced. From this vantage point the following axioms of consciousness is presented. Consciousness consists of two distinct (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. A Semantics-Based Common Operational Command System for Multiagency Disaster Response.Linda Elmhadhbi, Mohamed-Hedi Karray, Bernard Archimède, J. Neil Otte & Barry Smith - 2022 - IEEE Transactions on Engineering Management 69 (6):3887 - 3901.
    Disaster response is a highly collaborative and critical process that requires the involvement of multiple emergency responders (ERs), ideally working together under a unified command, to enable a rapid and effective operational response. Following the 9/11 and 11/13 terrorist attacks and the devastation of hurricanes Katrina and Rita, it is apparent that inadequate communication and a lack of interoperability among the ERs engaged on-site can adversely affect disaster response efforts. Within this context, we present a scenario-based terrorism case study to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. An empirical study on using visual embellishments in visualization.Rita Borgo, Alfie Abdul-Rahman, Farhan Mohamed, Philip W. Grant, Irene Reppa, Luciano Floridi & Men Chin - 2012 - IEEE Transactions on Visualization and Computer Graphics 18 (12):2759–2768.
    In written and spoken communications, figures of speech (e.g., metaphors and synecdoche) are often used as an aid to help convey abstract or less tangible concepts. However, the benefits of using rhetorical illustrations or embellishments in visualization have so far been inconclusive. In this work, we report an empirical study to evaluate hypotheses that visual embellishments may aid memorization, visual search and concept comprehension. One major departure from related experiments in the literature is that we make use of a dual-task (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Modeling Epistemology: Examples and Analysis in Computational Philosophy of Science.Patrick Grim - 2019 - In A. Del Barrio, C. J. Lynch, F. J. Barros & X. Hu (eds.), IEEE SpringSim Proceedings 2019. IEEE. pp. 1-12.
    What structure of scientific communication and cooperation, between what kinds of investigators, is best positioned to lead us to the truth? Against an outline of standard philosophical characteristics and a recent turn to social epistemology, this paper surveys highlights within two strands of computational philosophy of science that attempt to work toward an answer to this question. Both strands emerge from abstract rational choice theory and the analytic tradition in philosophy of science rather than postmodern sociology of science. The first (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Self-reference and Chaos in Fuzzy Logic.Patrick Grim - 1993 - IEEE Transactions on Fuzzy Systems 1:237-253.
    The purpose of this paper is to open for investigation a range of phenomena familiar from dynamical systems or chaos theory which appear in a simple fuzzy logic with the introduction of self-reference. Within that logic, self-referential sentences exhibit properties of fixed point attractors, fixed point repellers, and full chaos on the [0, 1] interval. Strange attractors and fractals appear in two dimensions in the graphing of pairs of mutually referential sentences and appear in three dimensions in the graphing of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Face in the Game: Using Facial Action Units to Track Expertise in Competitive Video Game Play.Gianluca Guglielmo, Paris Mavromoustakos Blom, Michał Klincewicz, Boris Čule & Pieter Spronck - 2022 - In IEEE Transactions on Games (Conference on Games 2022, Beijing, China). Acm.
    In this study, we extracted facial action units (AUs) data during a Hearthstone tournament to investigate behavioural differences between expert, intermediate, and novice players. Our aim was to obtain insights into the nature of expertise and how it may be tracked using non-invasive methods such as AUs. These insights may shed light on the endogenous responses in the player and at the same time may provide information to the opponents during a competition. Our results show that player expertise may be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Tracking Early Differences in Tetris Perfomance Using Eye Aspect Ratio Extracted Blinks.Gianluca Guglielmo, Michal Klincewicz, Elisabeth Huis in 'T. Veld & Pieter Spronck - 2023 - IEEE Transactions on Games 1:1-8.
    This study aimed to evaluate if eye blinks can be used to discriminate players with different performance in a session of Nintendo Entertainment System (NES) Tetris. To that end, we developed a state-of-the-art method for blink extraction from EAR measures, which is robust enough to be used with data collected by a low-grade webcam such as the ones widely available on laptop computers. Our results show a significant decrease in blink rate per minute (blinks/m) during the first minute of playing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical comparison for the combinations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Development of reaching to the body in early infancy: From experiments to robotic models.Matej Hoffmann, Lisa K. Chinn, Eszter Somogyi, Tobias Heed, Jacqueline Fagard, Jeffrey J. Lockman & Kevin J. O'Regan - 2017 - In 2017 Joint IEEE International Conference on Development and Learning and Epigenetic Robotics (ICDL-EpiRob). IEEE. pp. 112-119.
    We have been observing how infants between 3 and 21 months react when a vibrotactile stimulation (a buzzer) is applied to different parts of their bodies. Responses included in particular movement of the stimulated body part and successful reaching for and removal of the buzzer. Overall, there is a pronounced developmental progression from general to specific movement patterns, especially in the first year. In this article we review the series of studies we conducted and then focus on possible mechanisms that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The role of self-touch experience in the formation of the self.Matej Hoffmann - 2017 - The Development of the Self Workshop at IEEE ICDL-EpiRob 2017.
    The human self has many facets: there is the physical body and then there are different concepts or representations supported by processes in the brain such as the ecological, social, temporal, conceptual, and experiential self. The mechanisms of operation and formation of the self are, however, largely unknown. The basis is constituted by the ecological or sensorimotor self that deals with the configuration of the body in space and its action possibilities. This self is prereflective, prelinguistic, and initially perhaps even (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. A domain ontology for the non-coding RNA field.Jingshan Huang, Karen Eilbeck, Judith A. Blake, Dejing Dou, Darren A. Natale, Alan Ruttenberg, Barry Smith, Michael T. Zimmermann, Guoqian Jiang & Yu Lin - 2015 - In Huang Jingshan, Eilbeck Karen, Blake Judith A., Dou Dejing, Natale Darren A., Ruttenberg Alan, Smith Barry, Zimmermann Michael T., Jiang Guoqian & Lin Yu (eds.), IEEE International Conference on Bioinformatics and Biomedicine (IEEE BIBM 2015). pp. 621-624.
    Identification of non-coding RNAs (ncRNAs) has been significantly enhanced due to the rapid advancement in sequencing technologies. On the other hand, semantic annotation of ncRNA data lag behind their identification, and there is a great need to effectively integrate discovery from relevant communities. To this end, the Non-Coding RNA Ontology (NCRO) is being developed to provide a precisely defined ncRNA controlled vocabulary, which can fill a specific and highly needed niche in unification of ncRNA biology.
    Download  
     
    Export citation  
     
    Bookmark  
  27. A semantic approach for knowledge capture of microRNA-target gene interactions.Jingshan Huang, Fernando Gutierrez, Dejing Dou, Judith A. Blake, Karen Eilbeck, Darren A. Natale, Barry Smith, Yu Lin, Xiaowei Wang & Zixing Liu - 2015 - In IEEE International Conference on Bioinformatics and Biomedicine (IEEE BIBM 2015),. pp. 975-982.
    Research has indicated that microRNAs (miRNAs), a special class of non-coding RNAs (ncRNAs), can perform important roles in different biological and pathological processes. miRNAs’ functions are realized by regulating their respective target genes (targets). It is thus critical to identify and analyze miRNA-target interactions for a better understanding and delineation of miRNAs’ functions. However, conventional knowledge discovery and acquisition methods have many limitations. Fortunately, semantic technologies that are based on domain ontologies can render great assistance in this regard. In our (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  95
    Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. In this research, we proposed an adaptable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows its (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  31. The Grounding of Computational Psychoanalysis: A Comparative History of Culture Overview of Matte Blanco Bilogic.Giuseppe Iurato - 2014 - In S. Patel, Y. Wang, W. Kinsner, D. Patel, G. Fariello & L. A. Zadeh (eds.), 13th IEEE International Conference on Cognitive Informatics and Cognitive Computing, (ICCI*CC’14) at LSBU, London, UK. IEEE Computer Society Press. pp. 162-171.
    In this paper, we wish to highlight, within the general cultural context, some possible elementary computational psychoanalysis formalizations concerning Matte Blanco’s bi-logic components through certain very elementary mathematical tools and notions drawn from theoretical physics and algebra. NOTE: This is the corrected version of the paper which had to be published but that instead has been wrongly uploaded in the related published proceedings.
    Download  
     
    Export citation  
     
    Bookmark  
  32. The technological fix as social cure-all: origins and implications.Sean F. Johnston - 2018 - IEEE Technology and Society 37 (1):47-54.
    On the historical origins of technological fixes and their wider social and political implications.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Advances and Analysis on Reducing Webpage Response Time with Effect of Edge Computing.N. Kamiyama, Y. Nakano, K. Shiomoto, G. Hasegawa, Masayuki Murata & Hideo Miyahara - 2018 - 2016 IEEE Global Communications Conference (GLOBECOM) 4.
    Modern webpages consist of many rich objects dynamically produced by servers and client terminals at diverse locations, so we face an increase in web response time. To reduce the time, edge computing, in which dynamic objects are generated and delivered from edge nodes, is effective. For ISPs and CDN providers, it is desirable to estimate the effect of reducing the web response time when introducing edge computing. Therefore, in this paper, we derive a simple formula that estimates the lower bound (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Playing the Blame Game with Robots.Markus Kneer & Michael T. Stuart - 2021 - In Companion of the 2021 ACM/IEEE International Conference on Human-Robot Interaction (HRI’21 Companion). New York, NY, USA:
    Recent research shows – somewhat astonishingly – that people are willing to ascribe moral blame to AI-driven systems when they cause harm [1]–[4]. In this paper, we explore the moral- psychological underpinnings of these findings. Our hypothesis was that the reason why people ascribe moral blame to AI systems is that they consider them capable of entertaining inculpating mental states (what is called mens rea in the law). To explore this hypothesis, we created a scenario in which an AI system (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  35. Towards a proteomics meta-classification.Anand Kumar & Barry Smith - 2004 - In IEEE Fourth Symposium on Bioinformatics and Bioengineering, Taichung, Taiwan. IEEE Press. pp. 419–427.
    that can serve as a foundation for more refined ontologies in the field of proteomics. Standard data sources classify proteins in terms of just one or two specific aspects. Thus SCOP (Structural Classification of Proteins) is described as classifying proteins on the basis of structural features; SWISSPROT annotates proteins on the basis of their structure and of parameters like post-translational modifications. Such data sources are connected to each other by pairwise term-to-term mappings. However, there are obstacles which stand in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  36.  88
    Transforming Data Analysis through AI-Powered Data Science.Mathan Kumar - 2023 - Proceedings of IEEE 2 (2):1-5.
    AI-powered records science is revolutionizing the way facts are analyzed and understood. It can significantly improve the exceptional of information evaluation and boost its speed. AI-powered facts technological know-how enables access to more extensive, extra complicated information sets, faster insights, faster trouble solving, and higher choice making. Using the use of AI-powered information technological know-how techniques and tools, organizations can provide more accurate outcomes with shorter times to choices. AI-powered facts technology also offers more correct predictions of activities and developments (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Combating Disinformation with AI: Epistemic and Ethical Challenges.Benjamin Lange & Ted Lechterman - 2021 - IEEE International Symposium on Ethics in Engineering, Science and Technology (ETHICS) 1:1-5.
    AI-supported methods for identifying and combating disinformation are progressing in their development and application. However, these methods face a litany of epistemic and ethical challenges. These include (1) robustly defining disinformation, (2) reliably classifying data according to this definition, and (3) navigating ethical risks in the deployment of countermeasures, which involve a mixture of harms and benefits. This paper seeks to expose and offer preliminary analysis of these challenges.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Ethical Issues in Near-Future Socially Supportive Smart Assistants for Older Adults.Alex John London - forthcoming - IEEE Transactions on Technology and Society.
    Abstract:This paper considers novel ethical issues pertaining to near-future artificial intelligence (AI) systems that seek to support, maintain, or enhance the capabilities of older adults as they age and experience cognitive decline. In particular, we focus on smart assistants (SAs) that would seek to provide proactive assistance and mediate social interactions between users and other members of their social or support networks. Such systems would potentially have significant utility for users and their caregivers if they could reduce the cognitive load (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Integration of Motion Capture and EMG data for Classifying the Human Motions.Mihai Nadin, Gaurav N. Pradhan, Navzer Engineer & Balakrishnan Prabhakaran - 2007 - 2007 IEEE 23rd International Conference on Data Engineering Workshop.
    Download  
     
    Export citation  
     
    Bookmark  
  40.  84
    To Code or Not to Code: When and How to Use Network Coding in Energy Harvesting Wireless Multi-Hop Networks.Taheri Javan Nastooh - 2024 - IEEE Access 12:22608-22623.
    The broadcast nature of communication in transmission media has driven the rise of network coding’s popularity in wireless networks. Numerous benefits arise from employing network coding in multi-hop wireless networks, including enhanced throughput, reduced energy consumption, and decreased end-to-end delay. These advantages are a direct outcome of the minimized transmission count. This paper introduces a comprehensive framework to employ network coding in these networks. It refines decision-making at coding and decoding nodes simultaneously. The coding-nodes employ optimal stopping theory to find (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Information Theory’s failure in neuroscience: on the limitations of cybernetics.Lance Nizami - 2014 - In Proceedings of the IEEE 2014 Conference on Norbert Wiener in the 21st Century.
    In Cybernetics (1961 Edition), Professor Norbert Wiener noted that “The role of information and the technique of measuring and transmitting information constitute a whole discipline for the engineer, for the neuroscientist, for the psychologist, and for the sociologist”. Sociology aside, the neuroscientists and the psychologists inferred “information transmitted” using the discrete summations from Shannon Information Theory. The present author has since scrutinized the psychologists’ approach in depth, and found it wrong. The neuroscientists’ approach is highly related, but remains unexamined. Neuroscientists (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Sensory Systems as Cybernetic Systems that Require Awareness of Alternatives to Interact with the World: Analysis of the Brain-Receptor Loop in Norwich's Entropy Theory of Perception.Lance Nizami - 2009 - Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics. San Antonio, TX.
    Introduction & Objectives: Norwich’s Entropy Theory of Perception (1975 [1] -present) stands alone. It explains many firing-rate behaviors and psychophysical laws from bare theory. To do so, it demands a unique sort of interaction between receptor and brain, one that Norwich never substantiated. Can it now be confirmed, given the accumulation of empirical sensory neuroscience? Background: Norwich conjoined sensation and a mathematical model of communication, Shannon’s Information Theory, as follows: “In the entropic view of sensation, magnitude of sensation is regarded (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. Predators or Ploughshares? Arms Control of Robotic Weapons.Robert Sparrow - 2009 - IEEE Technology and Society 28 (1):25-29.
    This paper makes the case for arms control regimes to govern the development and deployment of autonomous weapon systems and long range uninhabited aerial vehicles.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  44. Preparing undergraduates for visual analytics.Ronald A. Rensink - 2015 - IEEE Computer Graphics and Applications 35 (2):16-20.
    Visual analytics (VA) combines the strengths of human and machine intelligence to enable the discovery of interesting patterns in challenging datasets. Historically, most attention has been given to developing the machine component—for example, machine learning or the human-computer interface. However, it is also essential to develop the abilities of the analysts themselves, especially at the beginning of their careers. -/- For the past several years, we at the University of British Columbia (UBC)—with the support of The Boeing Company—have experimented with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. STATE POWER VERSUS WILLINGNESS (THIS IS THE HEADLINES).Thobias Sarbunan - 2022 - IEEE DATA PORT.
    This article created to address the current state of affairs, which has resulted in an insufficient progress and innovation system. The purpose of this overview article is to increase educate society's knowledge of how to use modern and innovative technologies based on need, cultural aspects, social context, and state context. As a result, I used secondary sources to assist readers understand how state actors and policies might best respond to society's aspirations to use and communicate through technology and information, as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Encoder-Decoder Based Long Short-Term Memory (LSTM) Model for Video Captioning.Adewale Sikiru, Tosin Ige & Bolanle Matti Hafiz - forthcoming - Proceedings of the IEEE:1-6.
    This work demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate model generality over (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Track-Down Operations on Bilattices.Damian Szmuc - 2018 - In Robert Wille & Martin Lukac (eds.), Proceedings of the 48th IEEE International Symposium on Multiple-Valued Logic. pp. 74-79.
    This paper discusses a dualization of Fitting's notion of a "cut-down" operation on a bilattice, rendering a "track-down" operation, later used to represent the idea that a consistent opinion cannot arise from a set including an inconsistent opinion. The logic of track-down operations on bilattices is proved equivalent to the logic d_Sfde, dual to Deutsch's system S_fde. Furthermore, track-down operations are employed to provide an epistemic interpretation for paraconsistent weak Kleene logic. Finally, two logics of sequential combinations of cut-and track-down (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  17
    ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Eigth Ieee/Acis International Conference on Computer and Information Science 1 (1):852-857.
    A common characteristic of all popular multi-path routing algorithms in Mobile Ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end to end delay increment. In fact, due to medium access mechanism in wireless networks, such as CSMA/CA, data transmissions even through two Node Disjoint paths are not completely independent and each (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Talkin' 'bout a (nanotechnological) revolution.Robert Sparrow - 2008 - IEEE Technology and Society 27 (2):37-43.
    It is often claimed that the development of nanotechnology will constitute a “technological revolution” with profound social, economic, and political consequences. The full implications of this claim can best be understood by imagining a scenario in which a political revolutionary made all the same claims that are commonly made by enthusiasts for nanotechnology. I argue that most people would be outraged to learn that the members of an unelected group were planning to radically reshape society in this fashion. I survey (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Speech Act Theory and Ethics of Speech Processing as Distinct Stages: the ethics of collecting, contextualizing and the releasing of (speech) data.Jolly Thomas, Lalaram Arya, Mubarak Hussain & Prasanna Srm - 2023 - 2023 Ieee International Symposium on Ethics in Engineering, Science, and Technology (Ethics), West Lafayette, in, Usa.
    Using speech act theory from the Philosophy of Language, this paper attempts to develop an ethical framework for the phenomenon of speech processing. We use the concepts of the illocutionary force and the illocutionary content of a speech act to explain the ethics of speech processing. By emphasizing the different stages involved in speech processing, we explore the distinct ethical issues that arise in relation to each stage. Input, processing, and output are the different ethically relevant stages under which a (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 56