Results for 'Mobile edge computing'

942 found
Order:
  1. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Energy Efficiency Multi task Offloading and Resource Allocation in Mobile Edge Computing.LiHuanjie Zang - 2018 - International Journal of Computer Techniques 5 (1):5-14.
    On edge computing, mobile devices can offload some computing intensive tasks to the cloud so that the time delay and battery losses can be reduced. Different from cloud computing, an edge computing model is under the constraint of radio transmitting bandwidth, power and etc. With regard to most models in presence, each user is assigned to a single mission, transmitting power or local CPU frequency on mobile terminals is deemed to be a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Advances and Analysis on Reducing Webpage Response Time with Effect of Edge Computing.N. Kamiyama, Y. Nakano, K. Shiomoto, G. Hasegawa, Masayuki Murata & Hideo Miyahara - 2018 - 2016 IEEE Global Communications Conference (GLOBECOM) 4.
    Modern webpages consist of many rich objects dynamically produced by servers and client terminals at diverse locations, so we face an increase in web response time. To reduce the time, edge computing, in which dynamic objects are generated and delivered from edge nodes, is effective. For ISPs and CDN providers, it is desirable to estimate the effect of reducing the web response time when introducing edge computing. Therefore, in this paper, we derive a simple formula (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Hunting For Humans: On Slavery as the Basis of the Emergence of the US as the World’s First Super Industrial State or Technocracy and its Deployment of Cutting-Edge Computing/Artificial Intelligence Technologies, Predictive Analytics, and Drones towards the Repression of Dissent.Miron Clay-Gilmore - manuscript
    This essay argues that Huey Newton’s philosophical explanation of US empire fills an epistemological gap in our thinking that provides us with a basis for understanding the emergence and operational application of predictive policing, Big Data, cutting-edge surveillance programs, and semi-autonomous weapons by US military and policing apparati to maintain control over racialized populations historically and in the (still ongoing) Global War on Terror today – a phenomenon that Black Studies scholars and Black philosophers alike have yet to demonstrate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Emergence and Computation at the Edge of Classical and Quantum Systems.Ignazio Licata - 2008 - In World Scientific (ed.), Physics of Emergence and Organization.
    The problem of emergence in physical theories makes necessary to build a general theory of the relationships between the observed system and the observing system. It can be shown that there exists a correspondence between classical systems and computational dynamics according to the Shannon-Turing model. A classical system is an informational closed system with respect to the observer; this characterizes the emergent processes in classical physics as phenomenological emergence. In quantum systems, the analysis based on the computation theory fails. It (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  9. The Nature and Function of Content in Computational Models.Frances Egan - 2018 - In Mark Sprevak & Matteo Colombo (eds.), The Routledge Handbook of the Computational Mind. Routledge.
    Much of computational cognitive science construes human cognitive capacities as representational capacities, or as involving representation in some way. Computational theories of vision, for example, typically posit structures that represent edges in the distal scene. Neurons are often said to represent elements of their receptive fields. Despite the ubiquity of representational talk in computational theorizing there is surprisingly little consensus about how such claims are to be understood. The point of this chapter is to sketch an account of the nature (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  10. Neural Computation of Surface Border Ownership and Relative Surface Depth from Ambiguous Contrast Inputs.Birgitta Dresp-Langley & Stephen Grossberg - 2016 - Frontiers in Psychology 7.
    The segregation of image parts into foreground and background is an important aspect of the neural computation of 3D scene perception. To achieve such segregation, the brain needs information about border ownership; that is, the belongingness of a contour to a specific surface represented in the image. This article presents psychophysical data derived from 3D percepts of figure and ground that were generated by presenting 2D images composed of spatially disjoint shapes that pointed inward or outward relative to the continuous (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  93
    Design and Development of Human Computer Interface using Virtual Reality Techniques.Iqbal Zarqa - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):325-337.
    The design and usability of computer interfaces are crucial factors in improving user experience and productivity in the field of human-computer interaction. This overview examines the development of computer interfaces, starting with command-line interfaces (CLI) and moving on to graphical user interfaces (GUI), touch interfaces, and gesture-controlled interfaces. The guiding concepts of interface development are highlighted: usability, accessibility and user-centered design. The harmony of form and function, the incorporation of cutting-edge technologies such as voice recognition and augmented reality, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  73
    Analysis of Human Computer Interface ( HCI) using Meta Verse Techniques.Iqbal Zarqa - 2024 - Journal of Science Technology and Research (JSTAR) 5:1.
    : The design and usability of computer interfaces are crucial factors in improving user experience and productivity in the field of human-computer interaction. This overview examines the development of computer interfaces, starting with command-line interfaces (CLI) and moving on to graphical user interfaces (GUI), touch interfaces, and gesture-controlled interfaces. The guiding concepts of interface development are highlighted: usability, accessibility and user-centered design. The harmony of form and function, the incorporation of cutting-edge technologies such as voice recognition and augmented reality, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Influencing the Others’ Minds: an Experimental Evaluation of the Use and Efficacy of Fallacious-reducible Arguments in Web and Mobile Technologies.Antonio Lieto & Fabiana Vernero - 2014 - PsychNology Journa 12 (3):87-105.
    The research in Human Computer Interaction (HCI) has nowadays extended its attention to the study of persuasive technologies. Following this line of research, in this paper we focus on websites and mobile applications in the e-commerce domain. In particular, we take them as an evident example of persuasive technologies. Starting from the hypothesis that there is a strong connection between logical fallacies, i.e., forms of reasoning which are logically invalid but psychologically persuasive, and some common persuasion strategies adopted within (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Comparing Mathematics Achievement: Control vs. Experimental Groups in the Context of Mobile Educational Applications.Charlotte Canilao & Melanie Gurat - 2023 - American Journal of Educational Research 11 (6):348-358.
    This study primarily assessed students' achievement in mathematics using a mobile educational application to help them learn and adapt to changes in education. The study involved selected Grade 9 students at a public high school in Nueva Vizcaya, Philippines. This study used a quasi-experimental method, particularly a post-test control group design. Descriptive statistics such as frequencies, percent, mean, and standard deviation were used to describe the achievement of the students in mathematics. A t-test for independent samples was also computed (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. The central system as a computational engine.Susan Schneider - unknown
    The Language of Thought program has a suicidal edge. Jerry Fodor, of all people, has argued that although LOT will likely succeed in explaining modular processes, it will fail to explain the central system, a subsystem in the brain in which information from the different sense modalities is integrated, conscious deliberation occurs, and behavior is planned. A fundamental characteristic of the central system is that it is “informationally unencapsulated” -- its operations can draw from information from any cognitive domain. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Games 2.0 jako próba konstrukcji społeczno-kulturowego perpetuum mobile.Andrzej Klimczuk - 2008 - Homo Communicativus 5:177--187.
    Increase in popularity of games like "Second Life" has contributed not only to significant changes in the development of the electronic entertainment industry. Promoting Games 2.0, the new trend of video game production that are assumed to be the virtual worlds that contain user-generated content makes both measured with a specific technological innovation, as well as a serious change in the organization of socio-cultural heritage. The article presents problems of the existing difficulties of terminology, the implications of the availability of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Proofs are Programs: 19th Century Logic and 21st Century Computing.Philip Wadler - manuscript
    As the 19th century drew to a close, logicians formalized an ideal notion of proof. They were driven by nothing other than an abiding interest in truth, and their proofs were as ethereal as the mind of God. Yet within decades these mathematical abstractions were realized by the hand of man, in the digital stored-program computer. How it came to be recognized that proofs and programs are the same thing is a story that spans a century, a chase with as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Eigth Ieee/Acis International Conference on Computer and Information Science 1 (1):852-857.
    A common characteristic of all popular multi-path routing algorithms in Mobile Ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end to end delay increment. In fact, due to medium access mechanism in wireless networks, such as CSMA/CA, data transmissions even through two Node Disjoint paths are not completely independent and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. IZM-DSR: A New Zone-Disjoint Multi-path Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Third Uksim European Symposium on Computer Modeling and Simulation 1 (1):511-516.
    Some of multi-path routing algorithms in MANETs use multiple paths simultaneously. These algorithms can attempt to find node-disjoint to achieve higher fault tolerance. By using node-disjoint paths, it is expected that the end-to-end delay in each case should be independent of each other. However, because of natural properties and medium access mechanisms in ad hoc networks, such as CSMA/CA, the endto-end delay between any source and destination depends on the pattern of communication in the neighborhood region. In this case some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when a society (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages low-cost and globally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a meaningful (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Game Technologies to Assist Learning of Communication Skills in Dialogic Settings for Persons with Aphasia.Ylva Backman, Viktor Gardelli & Peter Parnes - 2021 - International Journal of Emerging Technologies in Learning 16 (3):190-205.
    Persons with aphasia suffer from a loss of communication ability as a consequence of a brain injury. A small strand of research indicates effec- tiveness of dialogic interventions for communication development for persons with aphasia, but a vast amount of research studies shows its effectiveness for other target groups. In this paper, we describe the main parts of the hitherto technological development of an application named Dialogica that is (i) aimed at facilitating increased communicative participation in dialogic settings for persons (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Neural Implants as Gateways to Digital-Physical Ecosystems and Posthuman Socioeconomic Interaction.Matthew E. Gladden - 2016 - In Łukasz Jonak, Natalia Juchniewicz & Renata Włoch (eds.), Digital Ecosystems: Society in the Digital Age. Digital Economy Lab, University of Warsaw. pp. 85-98.
    For many employees, ‘work’ is no longer something performed while sitting at a computer in an office. Employees in a growing number of industries are expected to carry mobile devices and be available for work-related interactions even when beyond the workplace and outside of normal business hours. In this article it is argued that a future step will increasingly be to move work-related information and communication technology (ICT) inside the human body through the use of neuroprosthetics, to create employees (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Internet Use and Healthcare.László Ropolyi - 2021 - In Dagmar Eigner (ed.), Wahrnehmung, Kommunikation und Resonanz. Beiträge zur Medical Anthropology, Band 4. Perception, Communication, and Resonance. Contributions to Medical Anthropology, Volume 4. Schriftenreihe der Landesverteidigungsakademie. pp. 173-192.
    The medical use of computing and information and communication technologies (ICTs) has a history of several decades, but the emergence of the internet, and especially the web and social media, created a new situation. As a result, currently the term eHealth is widely used – and the usage of the internet (and mobile) “technologies” in healthcare (among the patients and professionals, too) tends to be usual practice. There are more and more signs of the institutionalization of this new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Predictive Analysis of Lottery Outcomes Using Deep Learning and Time Series Analysis.Asil Mustafa Alghoul & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (10):1-6.
    Abstract: Lotteries have long been a source of fascination and intrigue, offering the tantalizing prospect of unexpected fortunes. In this research paper, we delve into the world of lottery predictions, employing cutting-edge AI techniques to unlock the secrets of lottery outcomes. Our dataset, obtained from Kaggle, comprises historical lottery draws, and our goal is to develop predictive models that can anticipate future winning numbers. This study explores the use of deep learning and time series analysis to achieve this elusive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  49
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  42
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Formalizing UMLS Relations Using Semantic Partitions in the Context of a Task-Based Clinical Guidelines Model.Anand Kumar, Matteo Piazza, Barry Smith, Silvana Quaglini & Mario Stefanelli - 2004 - In Anand Kumar, Matteo Piazza, Barry Smith, Silvana Quaglini & Mario Stefanelli (eds.), Formalizing UMLS Relations Using Semantic Partitions in the Context of a Task-Based Clinical Guidelines Model. Saarbrücken: IFOMIS.
    An important part of the Unified Medical Language System (UMLS) is its Semantic Network, consisting of 134 Semantic Types connected to each other by edges formed by one or more of 54 distinct Relation Types. This Network is however for many purposes overcomplex, and various groups have thus made attempts at simplification. Here we take this work further by simplifying the relations which involve the three Semantic Types – Diagnostic Procedure, Laboratory Procedure and Therapeutic or Preventive Procedure. We define operators (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Learning Management System (LMS) for Academic Inclusion and Learning Agency: An Interpretive Review of Technoprogressivism in ODL Instructional Technology Policy.Bongani Nkambule, Sindile Ngubane & Siphamandla Mncube - 2023 - Journal of Education Society and Multiculturalism 4 (2):48-84.
    Literature frequently describes how ineffective implementation of instructional policy frameworks can make distance learning a lonely and unrewarding academic pursuit, characterized by high student drop-out rates, high failure rates and academic exclusion. In trying to mitigate this catastrophe, academic departments in distance learning institutions utilize learning management systems (LMSs) to stimulate students’ learning experiences. In keeping with techno-progressivism, the researchers (and authors of this paper) turned to extant documentary policy and literature to review – qualitatively – how the University of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. (1 other version)Problems of representation I: nature and role.Dan Ryder - 2009 - In Sarah Robins, John Symons & Paco Calvo (eds.), The Routledge Companion to Philosophy of Psychology. New York, NY: Routledge. pp. 233.
    Introduction There are some exceptions, which we shall see below, but virtually all theories in psychology and cognitive science make use of the notion of representation. Arguably, folk psychology also traffics in representations, or is at least strongly suggestive of their existence. There are many different types of things discussed in the psychological and philosophical literature that are candidates for representation-hood. First, there are the propositional attitudes – beliefs, judgments, desires, hopes etc. (see Chapters 9 and 17 of this volume). (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  36. Emotional AI as affective artifacts: A philosophical exploration.Manh-Tung Ho & Manh-Toan Ho - manuscript
    In recent years, with the advances in machine learning and neuroscience, the abundances of sensors and emotion data, computer engineers have started to endow machines with ability to detect, classify, and interact with human emotions. Emotional artificial intelligence (AI), also known as a more technical term in affective computing, is increasingly more prevalent in our daily life as it is embedded in many applications in our mobile devices as well as in physical spaces. Critically, emotional AI systems have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Novel Concepts on Domination in Neutrosophic Incidence Graphs with Some Applications.Florentin Smarandache, Siti Nurul Fitriah Mohamad & Roslan Hasni - 2023 - Journal of Advanced Computational Intelligence and Intelligent Informatics 27 (5).
    In graph theory, the concept of domination is essential in a variety of domains. It has broad applications in diverse fields such as coding theory, computer net work models, and school bus routing and facility lo cation problems. If a fuzzy graph fails to obtain acceptable results, neutrosophic sets and neutrosophic graphs can be used to model uncertainty correlated with indeterminate and inconsistent information in arbitrary real-world scenario. In this study, we consider the concept of domination as it relates to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. GIS-Based Educational Game Through Low-Cost Virtual Tour Experience-Khan Game.Guzden Varinlioğlu, Sepehr Vaez Afshar, Sarvin Eshaghi, Ozgun Balaban & Takehiko Nagakura - 2022 - In Guzden Varinlioğlu, Sepehr Vaez Afshar, Sarvin Eshaghi, Ozgun Balaban & Takehiko Nagakura (eds.), 27th International Conference of the Association for Computer-Aided Architectural Design Research in Asia: Post Carbon, CAADRIA 2022. Sydney: The Association for Computer-Aided Architectural Design Research in Asia. pp. 69-78.
    The pandemic brought new norms and techniques of pedagogical strategies in formal education. The synchronous/ asynchronous video streaming brought an emphasis on virtual and augmented realities, which are rapidly replacing textbooks as the main medium for learning and teaching. This transformation requires more extensive online and interactive content with simpler user interfaces. The aim of this study is to report on the design, implementation, and testing of a game based on low-cost and user-friendly content for digital cultural heritage. In this (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39. Revamping molecular biology for the twentieth first century, or putting back the theoretical horse ahead of the technological cart.Armando Aranda-Anzaldo - 2010 - Ludus Vitalis 18 (33):267-270.
    Molecular biology is a relatively new and very successful branch of science but currently it faces challenges posed by very complex issues that cannot be addressed by a traditional reductionist approach. However, despite its origins in the providential shift of some theoretical physicists to biology, currently molecular biology is immersed in a blind trend in which high-throughput technology, able to generate trillions of data, is becoming the leading edge of a discipline that has traded rational and critical thinking for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered instead. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Neuroenhancement, Coercion, and Neo-Luddism.Alexandre Erler - 2020 - In Nicole A. Vincent, Thomas Nadelhoffer & Allan McCay (eds.), Neurointerventions and the Law: Regulating Human Mental Capacity. Oxford University Press, Usa. pp. 375-405.
    This chapter addresses the claim that, as new types of neurointervention get developed allowing us to enhance various aspects of our mental functioning, we should work to prevent the use of such interventions from ever becoming the “new normal,” that is, a practice expected—even if not directly required—by employers. The author’s response to that claim is that, unlike compulsion or most cases of direct coercion, indirect coercion to use such neurointerventions is, per se, no more problematic than the pressure people (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. The role of mass media in church development in the twenty first century.Offiong O. Asuquo - unknown
    The life of man has been influenced greatly by modern Mass Media in the 21st century. Such Media include the radio, television, newspaper, magazines, billboards, internet, cable networks, mobile phones, pamphlets, handbills among others. They have greatly enhanced the instant or rapid transfer of information, opinion and ideas. These have influenced man positively and negatively in all aspects of life, ranging from physical, educational, moral, economic to spiritual and religious. Hence this write up has been conceived to explore and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. life More Photographic; mapping the networked image.Daniel Rubinstein - 2008 - photographies 1 (1):9-28.
    Twenty two years since the arrival of the first consumer digital camera (Tatsuno 36) Western culture is now characterised by ubiquitous photography. The disappearance of the camera inside the mobile phone has ensured that even the most banal moments of the day can become a point of photographic reverie, potentially shared instantly. Supported by the increased affordability of computers, digital storage and access to broadband, consumers are provided with new opportunities for the capture and transmission of images, particularly online (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  44. Quantum transport and utilization of free energy in protein α-helices.Danko D. Georgiev & James F. Glazebrook - 2020 - Advances in Quantum Chemistry 82:253-300.
    The essential biological processes that sustain life are catalyzed by protein nano-engines, which maintain living systems in far-from-equilibrium ordered states. To investigate energetic processes in proteins, we have analyzed the system of generalized Davydov equations that govern the quantum dynamics of multiple amide I exciton quanta propagating along the hydrogen-bonded peptide groups in α-helices. Computational simulations have confirmed the generation of moving Davydov solitons by applied pulses of amide I energy for protein α-helices of varying length. The stability and mobility (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Cognitive Biases for the Design of Persuasive Technologies: Uses, Abuses and Ethical Concerns.Antonio Lieto - 2021 - ACM Distinguished Speakers - Lecture Series.
    In the last decades Human-Computer Interaction (HCI) has started to focus attention on “persuasive technologies” having the goal of changing users’ behavior and attitudes according to a predefined direction. In this talk we show how some of the techniques employed in such technologies trigger some well known cognitive biases by adopting a strategy relying on logical fallacies (i.e. forms of reasoning which are logically invalid but psychologically persuasive). In particular, we will show how the mechanisms reducible to logical fallacies are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  60
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Mediatization theory and digital media.Niels Ole Finnemann - 2011 - Communications 36 (1):67-89.
    In the 20th century, the term “media logic” was introduced to denote the influence of independent mass media on political systems and other institutions. In recent years the idea has been reworked and labeled “mediatization” to widen the framework by including new media and new areas of application. In Section Two the paper discusses different conceptualizations. It is argued that even if they bring new insights, they cannot be unified into one concept, and that they also lack a consistent definition (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  48. (1 other version)Big Data.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Odată cu creșterea volumului de date pe Internet, în media socială, cloud computing, dispozitive mobile și date guvernamentale, Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate. În fiecare zi, folosim și generăm tone de date, alimentând bazele de date ale agențiilor guvernamentale, companiilor private și chiar cetățenilor privați. Beneficiem în multe feluri de existența și utilizarea Big Data, dar trebuie (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. A very brief review of the life and work of neuroscientist, physician, psychoanalyst, inventor, animal rights activist and pioneer in dolphins, isolation tanks and psychedelics John C Lilly 1915-2001.Starks Michael - 2016 - In Michael Starks (ed.), Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 577-580.
    Lilly was one of the greatest scientists and pioneers on the limits of human possibility but after his death a collective amnesia has descended and he is now almost forgotten. His Wiki is good but inevitably incomplete so here are a few missing details and viewpoints. Lilly was a generation (or more) ahead of his time. He is almost single-handedly responsible for the great interest in dolphins (which led to the Marine Mammal Protection Act in the USA and helped to (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 942