Results for 'algorithmic process'

963 found
Order:
  1. Inscrutable Processes: Algorithms, Agency, and Divisions of Deliberative Labour.Marinus Ferreira - 2021 - Journal of Applied Philosophy 38 (4):646-661.
    As the use of algorithmic decision‐making becomes more commonplace, so too does the worry that these algorithms are often inscrutable and our use of them is a threat to our agency. Since we do not understand why an inscrutable process recommends one option over another, we lose our ability to judge whether the guidance is appropriate and are vulnerable to being led astray. In response, I claim that a process being inscrutable does not automatically make its guidance (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Is Evolution Algorithmic?Marcin Miłkowski - 2009 - Minds and Machines 19 (4):465-475.
    In Darwin’s Dangerous Idea, Daniel Dennett claims that evolution is algorithmic. On Dennett’s analysis, evolutionary processes are trivially algorithmic because he assumes that all natural processes are algorithmic. I will argue that there are more robust ways to understand algorithmic processes that make the claim that evolution is algorithmic empirical and not conceptual. While laws of nature can be seen as compression algorithms of information about the world, it does not follow logically that they are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Ameliorating Algorithmic Bias, or Why Explainable AI Needs Feminist Philosophy.Linus Ta-Lun Huang, Hsiang-Yun Chen, Ying-Tung Lin, Tsung-Ren Huang & Tzu-Wei Hung - 2022 - Feminist Philosophy Quarterly 8 (3).
    Artificial intelligence (AI) systems are increasingly adopted to make decisions in domains such as business, education, health care, and criminal justice. However, such algorithmic decision systems can have prevalent biases against marginalized social groups and undermine social justice. Explainable artificial intelligence (XAI) is a recent development aiming to make an AI system’s decision processes less opaque and to expose its problematic biases. This paper argues against technical XAI, according to which the detection and interpretation of algorithmic bias can (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Algorithm and Parameters: Solving the Generality Problem for Reliabilism.Jack C. Lyons - 2019 - Philosophical Review 128 (4):463-509.
    The paper offers a solution to the generality problem for a reliabilist epistemology, by developing an “algorithm and parameters” scheme for type-individuating cognitive processes. Algorithms are detailed procedures for mapping inputs to outputs. Parameters are psychological variables that systematically affect processing. The relevant process type for a given token is given by the complete algorithmic characterization of the token, along with the values of all the causally relevant parameters. The typing that results is far removed from the typings (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  5. The ethics of algorithms: mapping the debate.Brent Mittelstadt, Patrick Allo, Mariarosaria Taddeo, Sandra Wachter & Luciano Floridi - 2016 - Big Data and Society 3 (2):2053951716679679.
    In information societies, operations, decisions and choices previously left to humans are increasingly delegated to algorithms, which may advise, if not decide, about how data should be interpreted and what actions should be taken as a result. More and more often, algorithms mediate social processes, business transactions, governmental decisions, and how we perceive, understand, and interact among ourselves and with the environment. Gaps between the design and operation of algorithms and our understanding of their ethical implications can have severe consequences (...)
    Download  
     
    Export citation  
     
    Bookmark   219 citations  
  6. Algorithmic Bias and Risk Assessments: Lessons from Practice.Ali Hasan, Shea Brown, Jovana Davidovic, Benjamin Lange & Mitt Regan - 2022 - Digital Society 1 (1):1-15.
    In this paper, we distinguish between different sorts of assessments of algorithmic systems, describe our process of assessing such systems for ethical risk, and share some key challenges and lessons for future algorithm assessments and audits. Given the distinctive nature and function of a third-party audit, and the uncertain and shifting regulatory landscape, we suggest that second-party assessments are currently the primary mechanisms for analyzing the social impacts of systems that incorporate artificial intelligence. We then discuss two kinds (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Algorithms and Posthuman Governance.James Hughes - 2017 - Journal of Posthuman Studies.
    Since the Enlightenment, there have been advocates for the rationalizing efficiency of enlightened sovereigns, bureaucrats, and technocrats. Today these enthusiasms are joined by calls for replacing or augmenting government with algorithms and artificial intelligence, a process already substantially under way. Bureaucracies are in effect algorithms created by technocrats that systematize governance, and their automation simply removes bureaucrats and paper. The growth of algorithmic governance can already be seen in the automation of social services, regulatory oversight, policing, the justice (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. (1 other version)Algorithmic fairness in mortgage lending: from absolute conditions to relational trade-offs.Michelle Seng Ah Lee & Luciano Floridi - 2020 - Minds and Machines 31 (1):165-191.
    To address the rising concern that algorithmic decision-making may reinforce discriminatory biases, researchers have proposed many notions of fairness and corresponding mathematical formalizations. Each of these notions is often presented as a one-size-fits-all, absolute condition; however, in reality, the practical and ethical trade-offs are unavoidable and more complex. We introduce a new approach that considers fairness—not as a binary, absolute mathematical condition—but rather, as a relational notion in comparison to alternative decisionmaking processes. Using US mortgage lending as an example (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  9. AI Recruitment Algorithms and the Dehumanization Problem.Megan Fritts & Frank Cabrera - 2021 - Ethics and Information Technology (4):1-11.
    According to a recent survey by the HR Research Institute, as the presence of artificial intelligence (AI) becomes increasingly common in the workplace, HR professionals are worried that the use of recruitment algorithms will lead to a “dehumanization” of the hiring process. Our main goals in this paper are threefold: i) to bring attention to this neglected issue, ii) to clarify what exactly this concern about dehumanization might amount to, and iii) to sketch an argument for why dehumanizing the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. Algorithmic Nudging: The Need for an Interdisciplinary Oversight.Christian Schmauder, Jurgis Karpus, Maximilian Moll, Bahador Bahrami & Ophelia Deroy - 2023 - Topoi 42 (3):799-807.
    Nudge is a popular public policy tool that harnesses well-known biases in human judgement to subtly guide people’s decisions, often to improve their choices or to achieve some socially desirable outcome. Thanks to recent developments in artificial intelligence (AI) methods new possibilities emerge of how and when our decisions can be nudged. On the one hand, algorithmically personalized nudges have the potential to vastly improve human daily lives. On the other hand, blindly outsourcing the development and implementation of nudges to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Negligent Algorithmic Discrimination.Andrés Páez - 2021 - Law and Contemporary Problems 84 (3):19-33.
    The use of machine learning algorithms has become ubiquitous in hiring decisions. Recent studies have shown that many of these algorithms generate unlawful discriminatory effects in every step of the process. The training phase of the machine learning models used in these decisions has been identified as the main source of bias. For a long time, discrimination cases have been analyzed under the banner of disparate treatment and disparate impact, but these concepts have been shown to be ineffective in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. The philosophical basis of algorithmic recourse.Suresh Venkatasubramanian & Mark Alfano - forthcoming - Fairness, Accountability, and Transparency Conference 2020.
    Philosophers have established that certain ethically important val- ues are modally robust in the sense that they systematically deliver correlative benefits across a range of counterfactual scenarios. In this paper, we contend that recourse – the systematic process of reversing unfavorable decisions by algorithms and bureaucracies across a range of counterfactual scenarios – is such a modally ro- bust good. In particular, we argue that two essential components of a good life – temporally extended agency and trust – are (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  13.  73
    Optimization Algorithms for Load Balancing in Data-Intensive Systems with Multipath Routing.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    : In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Taste and the algorithm.Emanuele Arielli - 2018 - Studi di Estetica 12 (3):77-97.
    Today, a consistent part of our everyday interaction with art and aesthetic artefacts occurs through digital media, and our preferences and choices are systematically tracked and analyzed by algorithms in ways that are far from transparent. Our consumption is constantly documented, and then, we are fed back through tailored information. We are therefore witnessing the emergence of a complex interrelation between our aesthetic choices, their digital elaboration, and also the production of content and the dynamics of creative processes. All are (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Neutrosophic Association Rule Mining Algorithm for Big Data Analysis.Mohamed Abdel-Basset, Mai Mohamed, Florentin Smarandache & Victor Chang - 2018 - Symmetry 10 (4):1-19.
    Big Data is a large-sized and complex dataset, which cannot be managed using traditional data processing tools. Mining process of big data is the ability to extract valuable information from these large datasets. Association rule mining is a type of data mining process, which is indented to determine interesting associations between items and to establish a set of association rules whose support is greater than a specific threshold. The classical association rules can only be extracted from binary data (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  16. Disoriented and alone in the “experience machine” - On Netflix, shared world deceptions and the consequences of deepening algorithmic personalization.Maria Brincker - 2021 - SATS 22 (1):75-96.
    Most online platforms are becoming increasingly algorithmically personalized. The question is if these practices are simply satisfying users preferences or if something is lost in this process. This article focuses on how to reconcile the personalization with the importance of being able to share cultural objects - including fiction – with others. In analyzing two concrete personalization examples from the streaming giant Netflix, several tendencies are observed. One is to isolate users and sometimes entirely eliminate shared world aspects. Another (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Neutrosophic speech recognition Algorithm for speech under stress by Machine learning.Florentin Smarandache, D. Nagarajan & Said Broumi - 2023 - Neutrosophic Sets and Systems 53.
    It is well known that the unpredictable speech production brought on by stress from the task at hand has a significant negative impact on the performance of speech processing algorithms. Speech therapy benefits from being able to detect stress in speech. Speech processing performance suffers noticeably when perceptually produced stress causes variations in speech production. Using the acoustic speech signal to objectively characterize speaker stress is one method for assessing production variances brought on by stress. Real-world complexity and ambiguity make (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  72
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Probable General Intelligence algorithm.Anton Venglovskiy - manuscript
    Contains a description of a generalized and constructive formal model for the processes of subjective and creative thinking. According to the author, the algorithm presented in the article is capable of real and arbitrarily complex thinking and is potentially able to report on the presence of consciousness.
    Download  
     
    Export citation  
     
    Bookmark  
  20. A communication algorithm for teamwork in multi-agent environments.Egon van Baars & Rineke Verbrugge - 2009 - Journal of Applied Non-Classical Logics 19 (4):431-461.
    Using a knowledge-based approach, we derive a protocol, MACOM1, for the sequence transmission problem from one agent to a group of agents. The protocol is correct for communication media where deletion and reordering errors may occur. Furthermore, it is shown that after k rounds the agents in the group attain depth k general knowledge about the members of the group and the values of the messages. Then, we adjust this algorithm for multi-agent communication for the process of teamwork. MACOM1 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  64
    From language to algorithm: trans and non-binary identities in research on facial and gender recognition.Katja Thieme, Mary Ann S. Saunders & Laila Ferreira - 2024 - AI and Ethics 2024.
    We assess the state of thinking about gender identities in computer vision through an analysis of how research papers in gender and facial recognition are designed, what claims they make about trans and non-binary people, what values they espouse, and what they describe as ongoing challenges for the field. In our corpus of 50 research papers, the seven papers that consider trans and non-binary identities use questionable assumptions about medicalization as a measure of transness, about gender transition as a linear (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  23. At Noon: (Post)Nihilistic Temporalities in The Age of Machine-Learning Algorithms That Speak.Talha Issevenler - 2023 - The Agonist : A Nietzsche Circle Journal 17 (2):63–72.
    This article recapitulates and develops the attempts in the Nietzschean traditions to address and overcome the proliferation of nihilism that Nietzsche predicted to unfold in the next 200 years (WP 2). Nietzsche approached nihilism not merely as a psychology but as a labyrinthic and pervasive historical process whereby the highest values of culture and founding assumptions of philosophical thought prevented the further flourishing of life. Therefore, he thought nihilism had to be encountered and experienced on many, often opposing, fronts (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  59
    Advanced Phishing Content Identification Using Dynamic Weighting Integrated with Genetic Algorithm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):500-520.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time. The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Schema-Centred Unity and Process-Centred Pluralism of the Predictive Mind.Nina Poth - 2022 - Minds and Machines 32 (3):433-459.
    Proponents of the predictive processing (PP) framework often claim that one of the framework’s significant virtues is its unificatory power. What is supposedly unified are predictive processes in the mind, and these are explained in virtue of a common prediction error-minimisation (PEM) schema. In this paper, I argue against the claim that PP currently converges towards a unified explanation of cognitive processes. Although the notion of PEM systematically relates a set of posits such as ‘efficiency’ and ‘hierarchical coding’ into a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Specter of Representation: Computational Images and Algorithmic Capitalism.Samine Joudat - 2024 - Dissertation, Claremont Graduate University
    The processes of computation and automation that produce digitized objects have displaced the concept of an image once conceived through optical devices such as a photographic plate or a camera mirror that were invented to accommodate the human eye. Computational images exist as information within networks mediated by machines. They are increasingly less about what art history understands as representation or photography considers indexing and more an operational product of data processing. Through genealogical, theoretical, and practice-based investigation, this dissertation project (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Abolish! Against the Use of Risk Assessment Algorithms at Sentencing in the US Criminal Justice System.Katia Schwerzmann - 2021 - Philosophy and Technology 34 (4):1883-1904.
    In this article, I show why it is necessary to abolish the use of predictive algorithms in the US criminal justice system at sentencing. After presenting the functioning of these algorithms in their context of emergence, I offer three arguments to demonstrate why their abolition is imperative. First, I show that sentencing based on predictive algorithms induces a process of rewriting the temporality of the judged individual, flattening their life into a present inescapably doomed by its past. Second, I (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28.  66
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  38
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical comparison for the combinations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Android Based Diet Consultant using Rule Pattern-based algorithm.M. Dhurgadevi - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):120-127.
    The proposed project is based on a Dietitian app. The proposed app lets us discover what should we eat based on our weight, height, age, sex, and physical activity. It calculates BMI and BMR and tells us how many calories should we ideally need to intake per day. The calories we should intake will be feed in and based on the RETE algorithm the amount of food intake for the day will be decided. The proposed application is for any type (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Design of Label Sorting Algorithm Program as Batik Pattern Drawer with Euclidean Distance Method.Budi Setiyono, Sumardi & Solichul Huda - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):36-46.
    Abstract: The development of technology pushes human to increase productivity by changing manual system to automatic system. Modernization affect almost all aspect especially in art. Batik is a ancestor legacy of indonesian people that recogized by UNESCO as culture legacy of Indonesia yet batik industries are not develop as much. Modernization in batik art is expected to optimize its productivity. This research design algorithm and the program in MATLAB that used for controlling movement protype of batik maker 2 dof cartesian (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  69
    Parallel Processing Techniques for Optimizing Data-Intensive Applications on Accelerated Computing Platforms.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-550.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Reframing Single- and Dual-Process Theories as Cognitive Models: Commentary on De Neys (2021). [REVIEW]Aliya R. Dewey - 2021 - Perspectives in Psychological Science 16 (6):1428–31.
    De Neys (2021) argues that the debate between single- and dual-process theorists of thought has become both empirically intractable and scientifically inconsequential. I argue that this is true only under the traditional framing of the debate—when single- and dual-process theories are understood as claims about whether thought processes share the same defining properties (e.g., making mathematical judgments) or have two different defining properties (e.g., making mathematical judgments autonomously versus via access to a central working memory capacity), respectively. But (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Principles of Information Processing and Natural Learning in Biological Systems.Predrag Slijepcevic - 2021 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 52 (2):227-245.
    The key assumption behind evolutionary epistemology is that animals are active learners or ‘knowers’. In the present study, I updated the concept of natural learning, developed by Henry Plotkin and John Odling-Smee, by expanding it from the animal-only territory to the biosphere-as-a-whole territory. In the new interpretation of natural learning the concept of biological information, guided by Peter Corning’s concept of “control information”, becomes the ‘glue’ holding the organism–environment interactions together. The control information guides biological systems, from bacteria to ecosystems, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  36. Decision Time: Normative Dimensions of Algorithmic Speed.Daniel Susser - forthcoming - ACM Conference on Fairness, Accountability, and Transparency (FAccT '22).
    Existing discussions about automated decision-making focus primarily on its inputs and outputs, raising questions about data collection and privacy on one hand and accuracy and fairness on the other. Less attention has been devoted to critically examining the temporality of decision-making processes—the speed at which automated decisions are reached. In this paper, I identify four dimensions of algorithmic speed that merit closer analysis. Duration (how much time it takes to reach a judgment), timing (when automated systems intervene in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  50
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  8
    A SURVEY ON STATIC AND DYNAMIC TASK SCHEDULING ALGORITHMS IN REAL-TIME SYSTEMS.Mohit Gangwar - 2021 - Wesleyan Journal of Research 14 (01):217-235.
    We present the scheduling algorithms of Distributed Real-time Systems in this analysis paper. A real-time system is a type of software where, under a given time period, we have to execute the process with a specific result. Whereas, in the general context, there is no fixed deadline. In reality, scheduling implies performing the operation according to its characteristics and scheduling is done on different processors, one is Uni-processor and one is Multiprocessor and can be performed on the distributed machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. (1 other version)The Question of Algorithmic Personhood and Being (Or: On the Tenuous Nature of Human Status and Humanity Tests in Virtual Spaces—Why All Souls are ‘Necessarily’ Equal When Considered as Energy).Tyler Jaynes - 2021 - J (2571-8800) 3 (4):452-475.
    What separates the unique nature of human consciousness and that of an entity that can only perceive the world via strict logic-based structures? Rather than assume that there is some potential way in which logic-only existence is non-feasible, our species would be better served by assuming that such sentient existence is feasible. Under this assumption, artificial intelligence systems (AIS), which are creations that run solely upon logic to process data, even with self-learning architectures, should therefore not face the opposition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. A Promethean Philosophy of External Technologies, Empiricism, & the Concept: Second-Order Cybernetics, Deep Learning, and Predictive Processing.Ekin Erkan - 2020 - Media Theory 4 (1):87-146.
    Beginning with a survey of the shortcoming of theories of organology/media-as-externalization of mind/body—a philosophical-anthropological tradition that stretches from Plato through Ernst Kapp and finds its contemporary proponent in Bernard Stiegler—I propose that the phenomenological treatment of media as an outpouching and extension of mind qua intentionality is not sufficient to counter the ̳black-box‘ mystification of today‘s deep learning‘s algorithms. Focusing on a close study of Simondon‘s On the Existence of Technical Objectsand Individuation, I argue that the process-philosophical work of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed a chatbot automation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The paradox of the artificial intelligence system development process: the use case of corporate wellness programs using smart wearables.Alessandra Angelucci, Ziyue Li, Niya Stoimenova & Stefano Canali - forthcoming - AI and Society:1-11.
    Artificial intelligence systems have been widely applied to various contexts, including high-stake decision processes in healthcare, banking, and judicial systems. Some developed AI models fail to offer a fair output for specific minority groups, sparking comprehensive discussions about AI fairness. We argue that the development of AI systems is marked by a central paradox: the less participation one stakeholder has within the AI system’s life cycle, the more influence they have over the way the system will function. This means that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. The purpose of qualia: What if human thinking is not (only) information processing?Martin Korth - manuscript
    Despite recent breakthroughs in the field of artificial intelligence (AI) – or more specifically machine learning (ML) algorithms for object recognition and natural language processing – it seems to be the majority view that current AI approaches are still no real match for natural intelligence (NI). More importantly, philosophers have collected a long catalogue of features which imply that NI works differently from current AI not only in a gradual sense, but in a more substantial way: NI is closely related (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The “Cartographic Impulse” and Its Epistemic Gains in the Process of Iteratively Mapping M87's Black Hole.Paula Muhr - 2023 - Media+Environment 5 (1).
    After the Event Horizon Telescope Collaboration released in April 2019 the first empirical images of a black hole, an astrophysical object previously thought “unseeable,” much of the public discourse has approached these images as straightforward visual depictions of a black hole. This article challenges this view by showing that the first images of a black hole went beyond merely making an invisible cosmic object visible and that the images published in April 2019 were just the first in a series of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Axiology of Necrologies: Using Natural Language Processing to Examine Values in Obituaries (Dissertation Code and Limited Data).Jacob Levernier - 2016 - Dissertation, University of Oregon
    This dissertation is centrally concerned with exploring obituaries as repositories of values. Obituaries are a publicly-available natural language source that are variably written for members of communities that are wide (nation- level) and narrow (city-level, or at the level of specific groups therein). Because they are explicitly summative, limited in size, and written for consumption by a public audience, obituaries may be expected to express concisely the aspects of their subjects’ lives that the authors (often family members living in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. TORC3: Token-Ring Clearing Heuristic for Currency Circulation.Julio Michael Stern, Carlos Humes, Marcelo de Souza Lauretto, Fabio Nakano, Carlos Alberto de Braganca Pereira & Guilherme Frederico Gazineu Rafare - 2012 - AIP Conference Proceedings 1490:179-188.
    Clearing algorithms are at the core of modern payment systems, facilitating the settling of multilateral credit messages with (near) minimum transfers of currency. Traditional clearing procedures use batch processing based on MILP - mixed-integer linear programming algorithms. The MILP approach demands intensive computational resources; moreover, it is also vulnerable to operational risks generated by possible defaults during the inter-batch period. This paper presents TORC3 - the Token-Ring Clearing Algorithm for Currency Circulation. In contrast to the MILP approach, TORC3 is a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Agency Laundering and Information Technologies.Alan Rubel, Clinton Castro & Adam Pham - 2019 - Ethical Theory and Moral Practice 22 (4):1017-1041.
    When agents insert technological systems into their decision-making processes, they can obscure moral responsibility for the results. This can give rise to a distinct moral wrong, which we call “agency laundering.” At root, agency laundering involves obfuscating one’s moral responsibility by enlisting a technology or process to take some action and letting it forestall others from demanding an account for bad outcomes that result. We argue that the concept of agency laundering helps in understanding important moral problems in a (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  48. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Alan Rubel, Clinton Castro & Adam Pham (eds.), Algorithms and Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  49. What is data ethics?Luciano Floridi & Mariarosaria Taddeo - 2016 - Philosophical Transactions of the Royal Society A 374 (2083):20160360.
    This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including AI, artificial agents, machine learning, and robots), and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data Ethics builds on the foundation provided by Computer and Information (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  50. Shared decision-making and maternity care in the deep learning age: Acknowledging and overcoming inherited defeaters.Keith Begley, Cecily Begley & Valerie Smith - 2021 - Journal of Evaluation in Clinical Practice 27 (3):497–503.
    In recent years there has been an explosion of interest in Artificial Intelligence (AI) both in health care and academic philosophy. This has been due mainly to the rise of effective machine learning and deep learning algorithms, together with increases in data collection and processing power, which have made rapid progress in many areas. However, use of this technology has brought with it philosophical issues and practical problems, in particular, epistemic and ethical. In this paper the authors, with backgrounds in (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 963