Results for 'computer networks'

956 found
Order:
  1. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  2. ITS for Learning computer networks.Monnes Hanjory & Mohammed Z. Shath - 2017 - International Journal of Advanced Research and Development 2 (1):74-78.
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - even if you do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  52
    Optimized Fog Computing and IoT Integrated Environment for Healthcare Monitoring and Diagnosis using Extended Li Zeroing Neural Network.S. M. Padmavathi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):501-516.
    The EdTech revolution in India has emerged as a transformative force, particularly during and after the COVID-19 pandemic, when traditional education systems faced unprecedented disruptions. While digital technologies have unlocked new opportunities for teaching and learning, they have also exposed systemic inequities and deepened the existing digital divide. This paper examines how EdTech is reshaping India's education landscape by addressing these challenges, with a focus on both the opportunities it presents and the barriers it creates.
    Download  
     
    Export citation  
     
    Bookmark  
  5. M2M Networking Architecture for Data Transmission and Routing.Soujanya Ambala - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):59-63.
    We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server free and router free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases routing and data transmission phase. In the routing phase, probe packets will be transmitted and forwarded in the network thus path selections are performed based on small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Nature as a Network of Morphological Infocomputational Processes for Cognitive Agents.Gordana Dodig Crnkovic - 2017 - Eur. Phys. J. Special Topics 226 (2):181-195.
    This paper presents a view of nature as a network of infocomputational agents organized in a dynamical hierarchy of levels. It provides a framework for unification of currently disparate understandings of natural, formal, technical, behavioral and social phenomena based on information as a structure, differences in one system that cause the differences in another system, and computation as its dynamics, i.e. physical process of morphological change in the informational structure. We address some of the frequent misunderstandings regarding the natural/morphological computational (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  7. Computational Dynamics of Natural Information Morphology, Discretely Continuous.Gordana Dodig-Crnkovic - 2017 - Philosophies 2 (4):23.
    This paper presents a theoretical study of the binary oppositions underlying the mechanisms of natural computation understood as dynamical processes on natural information morphologies. Of special interest are the oppositions of discrete vs. continuous, structure vs. process, and differentiation vs. integration. The framework used is that of computing nature, where all natural processes at different levels of organisation are computations over informational structures. The interactions at different levels of granularity/organisation in nature, and the character of the phenomena that unfold through (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8. Computational entrepreneurship: from economic complexities to interdisciplinary research.Quan-Hoang Vuong - 2019 - Problems and Perspectives in Management 17 (1):117-129.
    The development of technology is unbelievably rapid. From limited local networks to high speed Internet, from crude computing machines to powerful semi-conductors, the world had changed drastically compared to just a few decades ago. In the constantly renewing process of adapting to such an unnaturally high-entropy setting, innovations as well as entirely new concepts, were often born. In the business world, one such phenomenon was the creation of a new type of entrepreneurship. This paper proposes a new academic discipline (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  9. European Computing and Philosophy.Gordana Dodig-Crnkovic - 2009 - The Reasoner 3 (9):18-19.
    European Computing and Philosophy conference, 2–4 July Barcelona The Seventh ECAP (European Computing and Philosophy) conference was organized by Jordi Vallverdu at Autonomous University of Barcelona. The conference started with the IACAP (The International Association for CAP) presidential address by Luciano Floridi, focusing on mechanisms of knowledge production in informational networks. The first keynote delivered by Klaus Mainzer made a frame for the rest of the conference, by elucidating the fundamental role of complexity of informational structures that can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The Role of Social Network Structure in the Emergence of Linguistic Structure.Limor Raviv, Antje Meyer & Shiri Lev-Ari - 2020 - Cognitive Science 44 (8):e12876.
    Social network structure has been argued to shape the structure of languages, as well as affect the spread of innovations and the formation of conventions in the community. Specifically, theoretical and computational models of language change predict that sparsely connected communities develop more systematic languages, while tightly knit communities can maintain high levels of linguistic complexity and variability. However, the role of social network structure in the cultural evolution of languages has never been tested experimentally. Here, we present results from (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  11. Computer Ethics and Neoplatonic Virtue.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (1):1-11.
    In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves deontological and utilitarian ethics as appropriate to computer ethics, while classical theories of ethics, such as virtue ethics, are usually neglected as anachronistic and unsuitable to the information era and ICT industry. During past decades, an Aristotelian form of virtue (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Vulnerability in Social Epistemic Networks.Emily Sullivan, Max Sondag, Ignaz Rutter, Wouter Meulemans, Scott Cunningham, Bettina Speckmann & Mark Alfano - 2020 - International Journal of Philosophical Studies 28 (5):1-23.
    Social epistemologists should be well-equipped to explain and evaluate the growing vulnerabilities associated with filter bubbles, echo chambers, and group polarization in social media. However, almost all social epistemology has been built for social contexts that involve merely a speaker-hearer dyad. Filter bubbles, echo chambers, and group polarization all presuppose much larger and more complex network structures. In this paper, we lay the groundwork for a properly social epistemology that gives the role and structure of networks their due. In (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  13. Computers, Dynamical Systems, Phenomena, and the Mind.Marco Giunti - 1992 - Dissertation, Indiana University
    This work addresses a broad range of questions which belong to four fields: computation theory, general philosophy of science, philosophy of cognitive science, and philosophy of mind. Dynamical system theory provides the framework for a unified treatment of these questions. ;The main goal of this dissertation is to propose a new view of the aims and methods of cognitive science--the dynamical approach . According to this view, the object of cognitive science is a particular set of dynamical systems, which I (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  14. Threshold Phenomena in Epistemic Networks.Patrick Grim - 2006 - In Proceedings, AAAI Fall Symposium on Complex Adaptive Systems and the Threshold Effect. AAAI Press.
    A small consortium of philosophers has begun work on the implications of epistemic networks (Zollman 2008 and forthcoming; Grim 2006, 2007; Weisberg and Muldoon forthcoming), building on theoretical work in economics, computer science, and engineering (Bala and Goyal 1998, Kleinberg 2001; Amaral et. al., 2004) and on some experimental work in social psychology (Mason, Jones, and Goldstone, 2008). This paper outlines core philosophical results and extends those results to the specific question of thresholds. Epistemic maximization of certain types (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  15. Computation on Information, Meaning and Representations. An Evolutionary Approach (World Scientific 2011).Christophe Menant - 2011 - In Gordana Dodig Crnkovic & Mark Burgin (eds.), Information and computation: Essays on scientific and philosophical understanding of foundations of information and computation. World Scientific. pp. 255-286.
    Understanding computation as “a process of the dynamic change of information” brings to look at the different types of computation and information. Computation of information does not exist alone by itself but is to be considered as part of a system that uses it for some given purpose. Information can be meaningless like a thunderstorm noise, it can be meaningful like an alert signal, or like the representation of a desired food. A thunderstorm noise participates to the generation of meaningful (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  16. Epistemic Advantage on the Margin: A Network Standpoint Epistemology.Jingyi Wu - 2022 - Philosophy and Phenomenological Research (3):1-23.
    ​I use network models to simulate social learning situations in which the dominant group ignores or devalues testimony from the marginalized group. I find that the marginalized group ends up with several epistemic advantages due to testimonial ignoration and devaluation. The results provide one possible explanation for a key claim of standpoint epistemology, the inversion thesis, by casting it as a consequence of another key claim of the theory, the unidirectional failure of testimonial reciprocity. Moreover, the results complicate the understanding (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  17. Handbook of Computational Economics, Volume 2: Agent-Based Computational Economics.Leigh Tesfatsion & Kenneth L. Judd (eds.) - 2006 - Amsterdam, The Netherlands: Elsevier.
    The explosive growth in computational power over the past several decades offers new tools and opportunities for economists. This handbook volume surveys recent research on Agent-based Computational Economics (ACE), the computational study of economic processes modeled as open-ended dynamic systems of interacting agents. Empirical referents for “agents” in ACE models can range from individuals or social groups with learning capabilities to physical world features with no cognitive function. Topics covered include: learning; empirical validation; network economics; social dynamics; financial markets; innovation (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  18. Assyrian Merchants meet Nuclear Physicists: History of the Early Contributions from Social Sciences to Computer Science. The Case of Automatic Pattern Detection in Graphs (1950s-1970s).Sébastien Plutniak - 2021 - Interdisciplinary Science Reviews 46 (4):547-568.
    Community detection is a major issue in network analysis. This paper combines a socio-historical approach with an experimental reconstruction of programs to investigate the early automation of clique detection algorithms, which remains one of the unsolved NP-complete problems today. The research led by the archaeologist Jean-Claude Gardin from the 1950s on non-numerical information and graph analysis is retraced to demonstrate the early contributions of social sciences and humanities. The limited recognition and reception of Gardin's innovative computer application to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. The effect of aging on facial attractiveness: An empirical and computational investigation.Dexian He, Clifford Ian Workman, Yoed Kennett & Anjan Chatterjee - 2021 - Acta Psychologica 219 (103385):1-11.
    How does aging affect facial attractiveness? We tested the hypothesis that people find older faces less attractive than younger faces, and furthermore, that these aging effects are modulated by the age and sex of the perceiver and by the specific kind of attractiveness judgment being made. Using empirical and computational network science methods, we confirmed that with increasing age, faces are perceived as less attractive. This effect was less pronounced in judgments made by older than younger and middle-aged perceivers, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Evolving Self-taught Neural Networks: The Baldwin Effect and the Emergence of Intelligence.Nam Le - 2019 - In AISB Annual Convention 2019 -- 10th Symposium on AI & Games.
    The so-called Baldwin Effect generally says how learning, as a form of ontogenetic adaptation, can influence the process of phylogenetic adaptation, or evolution. This idea has also been taken into computation in which evolution and learning are used as computational metaphors, including evolving neural networks. This paper presents a technique called evolving self-taught neural networks – neural networks that can teach themselves without external supervision or reward. The self-taught neural network is intrinsically motivated. Moreover, the self-taught neural (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was found that attackers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  44
    Einstein's Discourse Networks.Jimena Carnales - 2014 - Zeitschrift für Medien- Und Kulturforschung 5 (1):11-39.
    This paper situates Einstein’s theory of relativity within broader networks of communication.The speed of light, explained Einstein, was an unsurpassable velocity if, and only if, it was considered in terms of »arbitrary« and »voluntary« signals. Light signals in physics belong within a broader set of signs and symbols that include communication and military signals, understood by reference to Helmholtz, Saussure, media philosophies from WWII to ‘68 (Lavelle, Ong, McLuhan) and Derrida. Once light signals in physics are considered in relation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small applications and resources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Germs, Genes, and Memes: Function and Fitness Dynamics on Information Networks.Patrick Grim, Daniel J. Singer, Christopher Reade & Stephen Fisher - 2015 - Philosophy of Science 82 (2):219-243.
    Understanding the dynamics of information is crucial to many areas of research, both inside and outside of philosophy. Using computer simulations of three kinds of information, germs, genes, and memes, we show that the mechanism of information transfer often swamps network structure in terms of its effects on both the dynamics and the fitness of the information. This insight has both obvious and subtle implications for a number of questions in philosophy, including questions about the nature of information, whether (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  25. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Cultural evolution in Vietnam’s early 20th century: a Bayesian networks analysis of Hanoi Franco-Chinese house designs.Quan-Hoang Vuong, Quang-Khiem Bui, Viet-Phuong La, Thu-Trang Vuong, Manh-Toan Ho, Hong-Kong T. Nguyen, Hong-Ngoc Nguyen, Kien-Cuong P. Nghiem & Manh-Tung Ho - 2019 - Social Sciences and Humanities Open 1 (1):100001.
    The study of cultural evolution has taken on an increasingly interdisciplinary and diverse approach in explicating phenomena of cultural transmission and adoptions. Inspired by this computational movement, this study uses Bayesian networks analysis, combining both the frequentist and the Hamiltonian Markov chain Monte Carlo (MCMC) approach, to investigate the highly representative elements in the cultural evolution of a Vietnamese city’s architecture in the early 20th century. With a focus on the façade design of 68 old houses in Hanoi’s Old (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  27. Recurrent Neural Network Based Speech emotion detection using Deep Learning.P. Pavithra - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):65-77.
    In modern days, person-computer communication systems have gradually penetrated our lives. One of the crucial technologies in person-computer communication systems, Speech Emotion Recognition (SER) technology, permits machines to correctly recognize emotions and greater understand users' intent and human-computer interlinkage. The main objective of the SER is to improve the human-machine interface. It is also used to observe a person's psychological condition by lie detectors. Automatic Speech Emotion Recognition(SER) is vital in the person-computer interface, but SER has (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Towards a Computational History of Ideas.Arianna Betti & Hein Van Den Berg - 2016 - Proceedings of the Third Conference on Digital Humanities in Luxembourg with a Special Focus on Reading Historical Sources in the Digital Age: Luxembourg. Ceur Workshop Proceedings, 1681.
    The History of Ideas is presently enjoying a certain renaissance after a long period of disrepute. Increasing quantities of digitally available historical texts and the availability of computational tools for the exploration of such masses of sources, it is suggested, can be of invaluable help to historians of ideas. The question is: how exactly? In this paper, we argue that a computational history of ideas is possible if the following two conditions are satisfied: (i) Sound Method . A computational history (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  29. As AIs get smarter, understand human-computer interactions with the following five premises.Manh-Tung Ho & Quan-Hoang Vuong - manuscript
    The hypergrowth and hyperconnectivity of networks of artificial intelligence (AI) systems and algorithms increasingly cause our interactions with the world, socially and environmentally, more technologically mediated. AI systems start interfering with our choices or making decisions on our behalf: what we see, what we buy, which contents or foods we consume, where we travel to, who we hire, etc. It is imperative to understand the dynamics of human-computer interaction in the age of progressively more competent AI. This essay (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. My Social Networking Profile: Copy, Resemblance, or Simulacrum? A Poststructuralist Interpretation of Social Information Systems.David Kreps - 2010 - European Journal of Information Systems 19:104-115.
    This paper offers an introduction to poststructuralist interpretivist research in information systems, through a poststructuralist theoretical reading of the phenomenon and experience of social networking websites, such as Facebook. This is undertaken through an exploration of how loyally a social networking profile can represent the essence of an individual, and whether Platonic notions of essence, and loyalty of copy, are disturbed by the nature of a social networking profile, in ways described by poststructuralist thinker Deleuze’s notions of the reversal of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Theorem proving in artificial neural networks: new frontiers in mathematical AI.Markus Pantsar - 2024 - European Journal for Philosophy of Science 14 (1):1-22.
    Computer assisted theorem proving is an increasingly important part of mathematical methodology, as well as a long-standing topic in artificial intelligence (AI) research. However, the current generation of theorem proving software have limited functioning in terms of providing new proofs. Importantly, they are not able to discriminate interesting theorems and proofs from trivial ones. In order for computers to develop further in theorem proving, there would need to be a radical change in how the software functions. Recently, machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Factorization of Sparse Bayesian Networks.Julio Michael Stern & Ernesto Coutinho Colla - 2009 - Studies in Computational Intelligence 199:275-285.
    This paper shows how an efficient and parallel algorithm for inference in Bayesian Networks (BNs) can be built and implemented combining sparse matrix factorization methods with variable elimination algorithms for BNs. This entails a complete separation between a first symbolic phase, and a second numerical phase.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Modeling Epistemology: Examples and Analysis in Computational Philosophy of Science.Patrick Grim - 2019 - In A. Del Barrio, C. J. Lynch, F. J. Barros & X. Hu (eds.), IEEE SpringSim Proceedings 2019. IEEE. pp. 1-12.
    What structure of scientific communication and cooperation, between what kinds of investigators, is best positioned to lead us to the truth? Against an outline of standard philosophical characteristics and a recent turn to social epistemology, this paper surveys highlights within two strands of computational philosophy of science that attempt to work toward an answer to this question. Both strands emerge from abstract rational choice theory and the analytic tradition in philosophy of science rather than postmodern sociology of science. The first (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is pro- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Empiricism without Magic: Transformational Abstraction in Deep Convolutional Neural Networks.Cameron Buckner - 2018 - Synthese (12):1-34.
    In artificial intelligence, recent research has demonstrated the remarkable potential of Deep Convolutional Neural Networks (DCNNs), which seem to exceed state-of-the-art performance in new domains weekly, especially on the sorts of very difficult perceptual discrimination tasks that skeptics thought would remain beyond the reach of artificial intelligence. However, it has proven difficult to explain why DCNNs perform so well. In philosophy of mind, empiricists have long suggested that complex cognition is based on information derived from sensory experience, often appealing (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  36. Cessation states: Computer simulations, phenomenological assessments, and EMF theories.Chris Percy, Andrés Gómez-Emilsson & Bijan Fakhri - manuscript
    The stream of human consciousness appears to be interruptible, in that we can experience a sensation of ‘returning to ourselves after an absence of content’ (e.g. sleep, anaesthesia, full-absorption meditation). Prima facie, such evidence poses a challenge to simple applications of theories of consciousness based on electromagnetic or neural activity in the brain, because some of this activity persists during periods of interruption. This paper elaborates one of several possible responses to the challenge. We build on a previous theory in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  46
    Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Discussion on the Relationship between Computation, Information, Cognition, and Their Embodiment.Gordana Dodig-Crnkovic & Marcin Miłkowski - 2023 - Entropy 25 (2):310.
    Three special issues of Entropy journal have been dedicated to the topics of “InformationProcessing and Embodied, Embedded, Enactive Cognition”. They addressed morphological computing, cognitive agency, and the evolution of cognition. The contributions show the diversity of views present in the research community on the topic of computation and its relation to cognition. This paper is an attempt to elucidate current debates on computation that are central to cognitive science. It is written in the form of a dialog between two authors (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  60
    Pre-Determinant Cognition in Neural Networks.Marcus Verhaegh - 2009 - Communication and Cognition. Monographies 42 (3-4):133-153.
    Using Kantian starting points, we develop a notion of ‘pre-determinant intentionality,’ which refers to the intentionality of judgments that support objective truth-claims. We show how the weight-selections of neural networks can be taken to involve this form of intentionality. We argue that viewing weight selection or ‘internodal and meta-internodal selection’ as involving pre-determinant intentionality allows us to better conceptualize the coordination of computational systems. In particular, it allows us to better conceptualize the coordination of computational activity concerned with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. COMPUTATIONAL TREATMENT FOR LIFE SCIENCE.Igor F. Mikhailov - 2021 - Vestnik Tomskogo Gosudarstvennogo Universiteta. Filosofiya, Sotsiologiya, Politologiya 1 (61):38-46.
    According to some critics, if biology is a kind of reverse engineering for the nature, it is quite poorly prepared for the task. Thus, the issue is more likely with its ontology. Multiple hypotheses and conjectures found in papers on methodological issues claim that living systems should be viewed as complex networks of signal-transmitting paths, both neural and non-neural, that feature modularity and feedback circuits and are prone to emergent properties and increasing complexity. If so, we are on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  90
    The Specter of Representation: Computational Images and Algorithmic Capitalism.Samine Joudat - 2024 - Dissertation, Claremont Graduate University
    The processes of computation and automation that produce digitized objects have displaced the concept of an image once conceived through optical devices such as a photographic plate or a camera mirror that were invented to accommodate the human eye. Computational images exist as information within networks mediated by machines. They are increasingly less about what art history understands as representation or photography considers indexing and more an operational product of data processing. Through genealogical, theoretical, and practice-based investigation, this dissertation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Distributed Cognition, Toward a New Foundation for Human-Computer Interaction Research.David Kirsh, Jim Hollan & Edwin Hutchins - 2000 - ACM Transactions on Computer-Human Interaction 7 (2):174-196.
    We are quickly passing through the historical moment when people work in front of a single computer, dominated by a small CRT and focused on tasks involving only local information. Networked computers are becoming ubiquitous and are playing increasingly significant roles in our lives and in the basic infrastructure of science, business, and social interaction. For human-computer interaction o advance in the new millennium we need to better understand the emerging dynamic of interaction in which the focus task (...)
    Download  
     
    Export citation  
     
    Bookmark   77 citations  
  43. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Interventionist Methods for Interpreting Deep Neural Networks.Raphaël Millière & Cameron Buckner - forthcoming - In Gualtiero Piccinini (ed.), Neurocognitive Foundations of Mind. Routledge.
    Recent breakthroughs in artificial intelligence have primarily resulted from training deep neural networks (DNNs) with vast numbers of adjustable parameters on enormous datasets. Due to their complex internal structure, DNNs are frequently characterized as inscrutable ``black boxes,'' making it challenging to interpret the mechanisms underlying their impressive performance. This opacity creates difficulties for explanation, safety assurance, trustworthiness, and comparisons to human cognition, leading to divergent perspectives on these systems. This chapter examines recent developments in interpretability methods for DNNs, with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. From Analog to Digital Computing: Is Homo sapiens’ Brain on Its Way to Become a Turing Machine?Antoine Danchin & André A. Fenton - 2022 - Frontiers in Ecology and Evolution 10:796413.
    The abstract basis of modern computation is the formal description of a finite state machine, the Universal Turing Machine, based on manipulation of integers and logic symbols. In this contribution to the discourse on the computer-brain analogy, we discuss the extent to which analog computing, as performed by the mammalian brain, is like and unlike the digital computing of Universal Turing Machines. We begin with ordinary reality being a permanent dialog between continuous and discontinuous worlds. So it is with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. life More Photographic; mapping the networked image.Daniel Rubinstein - 2008 - photographies 1 (1):9-28.
    Twenty two years since the arrival of the first consumer digital camera (Tatsuno 36) Western culture is now characterised by ubiquitous photography. The disappearance of the camera inside the mobile phone has ensured that even the most banal moments of the day can become a point of photographic reverie, potentially shared instantly. Supported by the increased affordability of computers, digital storage and access to broadband, consumers are provided with new opportunities for the capture and transmission of images, particularly online where (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  47. Altered Resting-State Functional Connectivity in Cortical Networks in Psychopathy.Carissa L. Philippi, Maia S. Pujara, Julian C. Motzkin, Joseph P. Newman, Kent A. Kiehl & Michael Koenigs - 2015 - The Journal of Neuroscience 35 (15):6068 – 6078.
    Psychopathy is a personality disorder characterized by callous antisocial behavior and criminal recidivism. Here we examine whether psychopathy is associated with alterations in functional connectivity in three large-scale cortical networks. Using fMRI in 142 adult male prison inmates, we computed resting-state functional connectivity using seeds from the default mode network, frontoparietal network, and cingulo-opercular network. To determine the specificity of our findings to these cortical networks, we also calculated functional connectivity using seeds from two comparison primary sensory (...): visual and auditory networks. Regression analyses related network connectivity to overall psychopathy scores and to subscores for the “factors” and “facets” of psychopathy: Factor 1, interpersonal/affective traits; Factor 2, lifestyle/antisocial traits; Facet 1, interpersonal; Facet 2, affective; Facet 3, lifestyle; Facet 4, antisocial. Overall psychopathy severity was associated with reduced functional connectivity between lateral parietal cortex and dorsal anterior cingulate cortex. The two factor scores exhibited contrasting relationships with functional connectivity: Factor 1 scores were associated with reduced functional connectivity in the three cortical networks, whereas Factor 2 scores were associated with heightened connectivity in the same networks. This dissociation was evident particularly in the functional connectivity between anterior insula and dorsal anterior cingulate cortex. The facet scores also demonstrated distinct patterns of connectivity. We found no associations between psychopathy scores and functional connectivity within visual or auditory networks. These findings provide novel evidence on the neural correlates of psychopathy and suggest that connectivity between cortical association hubs, such as the dorsal anterior cingulate cortex, may be a neurobiological marker of the disorder. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Michael A. Arbib, The metaphorical brain 2: Neural networks and beyond.John A. Barnden - 1998 - Artificial Intelligence 101 (1-2):301-309.
    The book is thought-provoking and informative, wide in scope while also being technically detailed, and still relevant to modem AI [at least as of 1998, the time of writing this review, but probably also at the time of posting this entry here, 2023] even though it was published in 1989. This relevance lies mainly in the book’s advocacy of distributed computation at multiple levels of description, its combining of neural networks and other techniques, its emphasis on the interplay between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Polarization and Belief Dynamics in the Black and White Communities: An Agent-Based Network Model from the Data.Patrick Grim, Stephen B. Thomas, Stephen Fisher, Christopher Reade, Daniel J. Singer, Mary A. Garza, Craig S. Fryer & Jamie Chatman - 2012 - In Christoph Adami, David M. Bryson, Charles Offria & Robert T. Pennock (eds.), Artificial Life 13. MIT Press.
    Public health care interventions—regarding vaccination, obesity, and HIV, for example—standardly take the form of information dissemination across a community. But information networks can vary importantly between different ethnic communities, as can levels of trust in information from different sources. We use data from the Greater Pittsburgh Random Household Health Survey to construct models of information networks for White and Black communities--models which reflect the degree of information contact between individuals, with degrees of trust in information from various sources (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  54
    AISC 18 Proceedings, Extended Abstract: The computational modeling of lexical competence.Fabrizio Calzavarini & Antonio Lieto - 2018 - In Jacques Fleuriot, Dongming Wang & Jacques Calmet (eds.), Artificial Intelligence and Symbolic Computation: 13th International Conference, AISC 2018, Suzhou, China, September 16–19, 2018, Proceedings. Springer. pp. 20-22.
    In philosophy of language, a distinction has been proposed between two aspects of lexical competence, i.e. referential and inferential competence (Marconi 1997). The former accounts for the relationship of words to the world, the latter for the relationship of words among themselves. The distinction may simply be a classification of patterns of behaviour involved in ordinary use of the lexicon. Recent research in neuropsychology and neuroscience, however, suggests that the distinction might be neurally implemented, i.e., that different cognitive architectures with (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 956